1 \contentsline {section}{\numberline {1}Introduction}{2}
2 \contentsline {section}{\numberline {2}The $\mathcal {CIW}_1$ Chaotic Iteration based Watermarking Process}{3}
3 \contentsline {subsection}{\numberline {2.1}Using chaotic iterations as information hiding schemes}{3}
4 \contentsline {subsubsection}{\numberline {2.1.1}Presentation of the dhCI process}{3}
5 \contentsline {subsubsection}{\numberline {2.1.2}Most and least significant coefficients}{4}
6 \contentsline {subsubsection}{\numberline {2.1.3}Presentation of the $\mathcal {CIW}_1$ dhCI scheme}{4}
7 \contentsline {subsubsection}{\numberline {2.1.4}Examples of strategies}{6}
8 \contentsline {paragraph}{CIIS strategy}{6}
9 \contentsline {paragraph}{CIDS strategy}{6}
10 \contentsline {subsection}{\numberline {2.2}Security versus robustness}{7}
11 \contentsline {subsubsection}{\numberline {2.2.1}Presentation}{7}
12 \contentsline {subsubsection}{\numberline {2.2.2}Classification of attacks}{7}
13 \contentsline {subsubsection}{\numberline {2.2.3}Definition of stego-security}{8}
14 \contentsline {subsection}{\numberline {2.3}Security evaluation}{8}
15 \contentsline {subsubsection}{\numberline {2.3.1}Evaluation of the stego-security}{8}
16 \contentsline {subsubsection}{\numberline {2.3.2}Evaluation of the topological security}{9}
17 \contentsline {subsection}{\numberline {2.4}Comparison between spread-spectrum and chaotic iterations}{9}
18 \contentsline {subsection}{\numberline {2.5}Lyapunov exponent evaluation}{10}
19 \contentsline {section}{\numberline {3}The $\mathcal {CIS}_2$ Chaotic Iteration based Steganographic Process}{10}
20 \contentsline {subsection}{\numberline {3.1}The improved algorithm}{10}
21 \contentsline {subsection}{\numberline {3.2}Security study of the $\mathcal {CIS}_2$}{11}
22 \contentsline {subsubsection}{\numberline {3.2.1}Stego-security}{11}
23 \contentsline {subsubsection}{\numberline {3.2.2}Topological security}{12}
24 \contentsline {paragraph}{Topological model}{12}
25 \contentsline {paragraph}{A new distance on $\mathcal {X}_2$}{12}
26 \contentsline {paragraph}{Continuity of $\mathcal {CIS}_2$}{12}
27 \contentsline {paragraph}{$\mathcal {CIS}_2$ is chaotic}{12}
28 \contentsline {subsection}{\numberline {3.3}Correctness and completeness studies}{13}
29 \contentsline {subsection}{\numberline {3.4}Deciding whether a possibly attacked media is watermarked}{13}
30 \contentsline {subsection}{\numberline {3.5}Robustness study of the process}{14}
31 \contentsline {subsection}{\numberline {3.6}Evaluation of the embeddings}{16}
32 \contentsline {subsection}{\numberline {3.7}Lyapunov evaluation of $\mathcal {CIS}_2$}{17}
33 \contentsline {subsubsection}{\numberline {3.7.1}A topological semi-conjugacy between $\mathcal {X}_2$ and $\mathds {R}$}{17}
34 \contentsline {subsubsection}{\numberline {3.7.2}Topological security of $\mathcal {CIS}_2$ on $\mathds {R}$}{20}
35 \contentsline {subsubsection}{\numberline {3.7.3}Evaluation of the Lyapunov exponent}{21}
36 \contentsline {section}{\numberline {4}The $\mathcal {DI}_3$ Steganographic Process}{21}
37 \contentsline {subsection}{\numberline {4.1}Mathematical definitions and notations}{22}
38 \contentsline {subsection}{\numberline {4.2}The new $\mathcal {DI}_3$ process}{22}
39 \contentsline {subsection}{\numberline {4.3}Security study}{23}
40 \contentsline {subsection}{\numberline {4.4}Implementing the $\mathcal {DI}_3$ scheme}{24}
41 \contentsline {subsection}{\numberline {4.5}Evaluation against steganalyzers}{24}
42 \contentsline {subsection}{\numberline {4.6}Robustness study}{26}
43 \contentsline {section}{\numberline {5}Further Investigations of the dhCI Class}{27}
44 \contentsline {subsection}{\numberline {5.1}Introduction}{28}
45 \contentsline {subsection}{\numberline {5.2}Formalization of steganographic methods}{29}
46 \contentsline {subsection}{\numberline {5.3}Security analysis}{32}
47 \contentsline {subsection}{\numberline {5.4}Discovering another relevant mode}{32}
48 \contentsline {subsection}{\numberline {5.5}dhCI in frequency domains}{33}
49 \contentsline {subsubsection}{\numberline {5.5.1}DWT embedding}{33}
50 \contentsline {subsubsection}{\numberline {5.5.2}DCT embedding}{34}
51 \contentsline {subsection}{\numberline {5.6}Image quality}{36}
52 \contentsline {subsection}{\numberline {5.7}Robustness}{36}
53 \contentsline {subsubsection}{\numberline {5.7.1}Robustness against cropping}{37}
54 \contentsline {subsubsection}{\numberline {5.7.2}Robustness against compression}{37}
55 \contentsline {subsubsection}{\numberline {5.7.3}Robustness against contrast and sharpness}{38}
56 \contentsline {subsubsection}{\numberline {5.7.4}Robustness against geometric transformations}{38}
57 \contentsline {subsection}{\numberline {5.8}Evaluation of the Embedding}{39}
58 \contentsline {section}{\numberline {6}A Cryptographic Approach for Steganography}{40}
59 \contentsline {subsection}{\numberline {6.1}Drawbacks of the stego-security notion}{41}
60 \contentsline {subsection}{\numberline {6.2}Toward a cryptographically secure hiding}{41}
61 \contentsline {subsubsection}{\numberline {6.2.1}Definition of a stegosystem}{42}
62 \contentsline {subsubsection}{\numberline {6.2.2}Heading notions}{42}
63 \contentsline {subsubsection}{\numberline {6.2.3}A cryptographically secure information hiding scheme}{42}