1 \documentclass{article}
2 \usepackage[T1]{fontenc}
3 \usepackage[utf8]{inputenc}
12 \usepackage{subfigure}
15 \usepackage[noend]{algorithmic}
16 \usepackage[ruled,vlined]{algorithm2e}
20 \newtheorem{Ex}{Example}
21 \newtheorem{Def}{Definition}
23 \newtheorem{Prop}{Proposition}
24 \newtheorem{Th}{Theorem}
25 \newtheorem{Pre}{Proof}
26 \newtheorem{Lemma}{Lemma}
28 \title{On the interest and realization of chaos-based information hiding schemes: a review}
29 \author{Christophe Guyeux, Jean-Fran\c cois Couchot, and Jacques M. Bahi\\ \{christophe.guyeux,jean-francois.couchot,jacques.bahi\}@univ-fcomte.fr\\Institut Femto-st, Universit\'e de Franche-Comt\'e, France}
37 Steganographic Information Hiding (IH) schemes
38 are in competition with Artificial Intelligence based
40 However, such kind of latter approaches suffer for dealing with
41 unpredictable behaviors.
42 The open problem is how defective they can be
43 proven against IH schemes based on mathematical chaos,
44 since this framework is theoretically and practically unpredictable.
45 This article addresses this problem and presents a review of IH schemes
46 based on Devaney's mathematical chaos.
55 %\input{IH/IIHMSP13_2}
59 \bibliographystyle{plain}