1 \begin{thebibliography}{10}
4 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux.
5 \newblock Application of steganography for anonymity through the internet.
6 \newblock In {\em IHTIAP'2012, 1-st Workshop on Information Hiding Techniques
7 for Internet Anonymity and Privacy}, pages 96--101, Venice, Italy, June 2012.
10 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux.
11 \newblock A robust data hiding process contributing to the development of a
13 \newblock In {\em INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, pages
14 71--76, Venice, Italy, June 2012.
17 Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, Christophe Guyeux, and
19 \newblock Quality studies of an invisible chaos-based watermarking scheme with
21 \newblock In {\em IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding
22 and Multimedia Signal Processing}, pages ***--***, Beijing, China, October
27 Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux.
28 \newblock Steganography: a class of algorithms having secure properties.
29 \newblock In {\em IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information
30 Hiding and Multimedia Signal Processing}, pages 109--112, Dalian, China,
34 Jacques Bahi, Nicolas Friot, and Christophe Guyeux.
35 \newblock Lyapunov exponent evaluation of a digital watermarking scheme proven
37 \newblock In {\em IIH-MSP'2012, 8-th Int. Conf. on Intelligent Information
38 Hiding and Multimedia Signal Processing}, pages 359--362, Piraeus-Athens,
39 Greece, July 2012. IEEE Computer Society.
42 Jacques Bahi, Nicolas Friot, and Christophe Guyeux.
43 \newblock Topological study and lyapunov exponent of a secure steganographic
45 \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2013,
46 Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The
47 International Joint Conference on e-Business and Telecommunications}, pages
48 ***--***, Reykjavik, Iceland, July 2013. SciTePress.
49 \newblock 8 pages. To appear.
52 Jacques Bahi and Christophe Guyeux.
53 \newblock A new chaos-based watermarking algorithm.
54 \newblock In {\em SECRYPT'10, Int. conf. on security and cryptography}, pages
55 455--458, Athens, Greece, July 2010. SciTePress.
58 Jacques Bahi and Christophe Guyeux.
59 \newblock A new chaos-based watermarking algorithm.
60 \newblock In {\em SECRYPT'10, Int. conf. on security and cryptography}, pages
61 455--458, Athens, Greece, July 2010. SciTePress.
64 Jacques Bahi and Christophe Guyeux.
65 \newblock {\em Discrete Dynamical Systems and Chaotic Machines: Theory and
67 \newblock Chapman \& Hall, CRC Press, June 2013.
71 Jacques~M. Bahi and Christophe Guyeux.
72 \newblock Topological chaos and chaotic iterations, application to hash
74 \newblock In {\em WCCI'10, IEEE World Congress on Computational Intelligence},
75 pages 1--7, Barcelona, Spain, July 2010.
76 \newblock Best paper award.
79 J.~Banks, J.~Brooks, G.~Cairns, and P.~Stacey.
80 \newblock On {D}evaney's definition of chaos.
81 \newblock {\em Amer. Math. Monthly}, 99:332--334, 1992.
83 \bibitem{DBLP:conf/ih/BasFP11}
84 P.~Bas, T.~Filler, and T.~Pevn\'{y}.
85 \newblock Break our steganographic system --- the ins and outs of organizing
87 \newblock In T.~Filler, editor, {\em Information Hiding, 13th International
88 Workshop}, Lecture Notes in Computer Science, Prague, Czech Republic, May
89 18--20, 2011. Springer-Verlag, New York.
93 \newblock An information-theoretic model for steganography.
94 \newblock In {\em Information Hiding}, volume 1525 of {\em Lecture Notes in
95 Computer Science}, pages 306--318. Springer Berlin / Heidelberg, 1998.
99 \newblock Kerckhoffs-based embedding security classes for woa data hiding.
100 \newblock {\em IEEE Transactions on Information Forensics and Security},
103 \bibitem{ComesanaPP05bis}
104 Pedro Comesa{\~n}a, Luis P{\'e}rez-Freire, and Fernando P{\'e}rez-Gonz{\'a}lez.
105 \newblock Fundamentals of data hiding security and their application to
106 spread-spectrum analysis.
107 \newblock In Mauro Barni, Jordi Herrera-Joancomart\'{\i}, Stefan Katzenbeisser,
108 and Fernando P{\'e}rez-Gonz{\'a}lez, editors, {\em IH'05: Information Hiding
109 Workshop}, volume 3727 of {\em Lecture Notes in Computer Science}, pages
110 146--160. Lectures Notes in Computer Science, Springer-Verlag, 2005.
114 \newblock {\em An Introduction to Chaotic Dynamical Systems}.
115 \newblock Addison-Wesley, Redwood City, CA, 2nd edition, 1989.
117 \bibitem{Formenti1998}
119 \newblock {\em Automates cellulaires et chaos : de la vision topologique à la
120 vision algorithmique}.
121 \newblock PhD thesis, \'Ecole Normale Supérieure de Lyon, 1998.
123 \bibitem{Fridrich:2009:SDM:1721894}
125 \newblock {\em Steganography in Digital Media: Principles, Algorithms, and
127 \newblock Cambridge University Press, New York, NY, USA, 1st edition, 2009.
129 \bibitem{DBLP:conf/mmsec/FridrichPK07}
130 Jessica~J. Fridrich, Tom{\'a}s Pevn{\'y}, and Jan Kodovsk{\'y}.
131 \newblock Statistically undetectable jpeg steganography: dead ends challenges,
133 \newblock In Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, and
134 Jessica~J. Fridrich, editors, {\em MM{\&}Sec}, pages 3--14. ACM, 2007.
137 Nicolas Friot, Christophe Guyeux, and Jacques Bahi.
138 \newblock Chaotic iterations for steganography - stego-security and
140 \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2011,
141 Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The
142 International Joint Conference on e-Business and Telecommunications}, pages
143 218--227, Sevilla, Spain, July 2011. SciTePress.
145 \bibitem{GuyeuxThese10}
147 \newblock {\em Le d\'{e}sordre des it\'{e}rations chaotiques et leur
148 utilit\'{e} en s\'{e}curit\'{e} informatique}.
149 \newblock PhD thesis, Universit\'{e} de Franche-Comt\'{e}, 2010.
153 \newblock {\em Le d\'esordre des it\'erations chaotiques - Applications aux
154 r\'eseaux de capteurs, \`a la dissimulation d'information, et aux fonctions
156 \newblock \'Editions Universitaires Europ\'eennes, 2012.
157 \newblock ISBN 978-3-8417-9417-8. 362 pages. Publication de la thèse de
161 Christophe Guyeux, Nicolas Friot, and Jacques Bahi.
162 \newblock Chaotic iterations versus spread-spectrum: chaos and stego security.
163 \newblock In {\em IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding
164 and Multimedia Signal Processing}, pages 208--211, Darmstadt, Germany,
167 \bibitem{Jenkins1996}
170 \newblock {\em Fast Software Encryption}, pages 41--49, 1996.
172 \bibitem{junod1999cryptographic}
174 \newblock {\em Cryptographic secure pseudo-random bits generation: The
175 Blum-Blum-Shub generator}.
176 \newblock August, 1999.
180 \newblock Considerations on watermarking security.
181 \newblock In {\em Multimedia Signal Processing, 2001 IEEE Fourth Workshop on},
182 pages 201--206, 2001.
185 Andrew~D. Ker, Tom\'{a}\v{s} Pevn\'{y}, Jan Kodovsk\'{y}, and Jessica Fridrich.
186 \newblock The square root law of steganographic capacity.
187 \newblock In {\em MMSec '08: Proceedings of the 10th ACM workshop on Multimedia
188 and security}, pages 107--116, New York, NY, USA, 2008. ACM.
190 \bibitem{DBLP:conf/ih/KimDR06}
191 Younhee Kim, Zoran Duric, and Dana Richards.
192 \newblock Modified matrix encoding technique for minimal distortion
194 \newblock In Jan Camenisch, Christian~S. Collberg, Neil F.~Johnson 0001, and
195 Phil Sallee, editors, {\em Information Hiding}, volume 4437 of {\em Lecture
196 Notes in Computer Science}, pages 314--327. Springer, 2006.
199 J.~Kodovský and J.~Fridrich.
200 \newblock Steganalysis in high dimensions: fusing classifiers built on random
202 \newblock In {\em Proc. SPIE, Electronic Imaging, Media Watermarking, Security,
203 and Forensics XIII, San Francisco, CA,}, January 2011.
206 J.~Kodovský, J.~Fridrich, and V.~Holub.
207 \newblock Ensemble classifiers for steganalysis of digital media.
208 \newblock {\em IEEE Transactions on Information Forensics and Security}, PP
209 Issue:99:1 -- 1, 2011.
212 \bibitem{Perez-Freire06}
213 Luis Perez-Freire, Pedro Comesana, Juan~Ramon Troncoso-Pastoriza, and Fernando
215 \newblock Watermarking security: a survey.
216 \newblock In {\em LNCS Transactions on Data Hiding and Multimedia Security},
219 \bibitem{DBLP:conf/ih/PevnyFB10}
220 Tom{\'a}s Pevn{\'y}, Tom{\'a}s Filler, and Patrick Bas.
221 \newblock Using high-dimensional image models to perform highly undetectable
223 \newblock In Rainer B{\"o}hme, Philip W.~L. Fong, and Reihaneh Safavi-Naini,
224 editors, {\em Information Hiding}, volume 6387 of {\em Lecture Notes in
225 Computer Science}, pages 161--177. Springer, 2010.
227 \bibitem{DBLP:journals/tifs/PevnyBF10}
228 Tomás Pevný, Patrick Bas, and Jessica~J. Fridrich.
229 \newblock Steganalysis by subtractive pixel adjacency matrix.
230 \newblock {\em IEEE Transactions on Information Forensics and Security},
234 Tomáš Pevný, Tomáš Filler, and Patrick Bas.
235 \newblock Break our steganographic system, 2010.
236 \newblock available at \url{http://www.agents.cz/boss/}.
238 \bibitem{rifq/others03}
239 Maria Rifqi, Marcin Detyniecki, and Bernadette Bouchon-Meunier.
240 \newblock {D}iscrimination power of measures of resemblance.
241 \newblock In {\em {IFSA}'03}, 2003.
244 Anindya Sarkar, Kaushal Solanki, and B.~S. Manjunath.
245 \newblock Further study on yass: Steganography based on randomized embedding to
246 resist blind steganalysis.
249 Li~Shujun, Li~Qi, Li~Wenmin, Mou Xuanqin, and Cai Yuanlong.
250 \newblock Statistical properties of digital piecewise linear chaotic maps and
251 their roles in cryptography and pseudo-random coding.
252 \newblock {\em Proceedings of the 8th IMA International Conference on
253 Cryptography and Coding}, 1:205--221, 2001.
257 \newblock The prisoners' problem and the subliminal channel.
258 \newblock In {\em Advances in Cryptology, Proc. CRYPTO'83}, pages 51--67, 1984.
260 \bibitem{DBLP:conf/ih/SolankiSM07}
261 Kaushal Solanki, Anindya Sarkar, and B.~S. Manjunath.
262 \newblock Yass: Yet another steganographic scheme that resists blind
264 \newblock In Teddy Furon, Fran\c{c}ois Cayre, Gwena{\"e}l~J. Do{\"e}rr, and
265 Patrick Bas, editors, {\em Information Hiding}, volume 4567 of {\em Lecture
266 Notes in Computer Science}, pages 16--31. Springer, 2007.
268 \bibitem{prng-Blum-goldwasser}
269 Umesh Vazirani and Vijay Vazirani.
270 \newblock Efficient and secure pseudo-random number generation (extended
272 \newblock In George Blakley and David Chaum, editors, {\em Advances in
273 Cryptology}, volume 196 of {\em Lecture Notes in Computer Science}, pages
274 193--202. Springer Berlin / Heidelberg, 1985.
275 \newblock 10.1007/3-540-39568-7\_17.
277 \bibitem{DBLP:conf/ih/Westfeld01}
279 \newblock F5-a steganographic algorithm.
280 \newblock In Ira~S. Moskowitz, editor, {\em Information Hiding}, volume 2137 of
281 {\em Lecture Notes in Computer Science}, pages 289--302. Springer, 2001.
283 \bibitem{Xie09:BASecurity}
284 F.~Xie, T.~Furon, and C.~Fontaine.
285 \newblock Better security levels for `broken arrows'.
286 \newblock In {\em Proc. of SPIE Electronic Imaging on Media Forensics and
287 Security XII}, San Jose, CA, USA, jan 2010.
289 \end{thebibliography}