1 \begin{thebibliography}{1}
4 Patrick Bas, Tom{\'a}s Filler, and Tom{\'a}s Pevn{\'y}.
5 \newblock "break our steganographic system": The ins and outs of organizing
7 \newblock In Tom{\'a}s Filler, Tom{\'a}s Pevn{\'y}, Scott Craver, and Andrew~D.
8 Ker, editors, {\em Information Hiding}, volume 6958 of {\em Lecture Notes in
9 Computer Science}, pages 59--70. Springer, 2011.
12 Zhao Dawei, Chen Guanrong, and Liu Wenbo.
13 \newblock A chaos-based robust wavelet-domain watermarking algorithm.
14 \newblock {\em Chaos, Solitons and Fractals}, 22:47--54, 2004.
17 Nicolas Friot, Christophe Guyeux, and Jacques~M. Bahi.
18 \newblock Chaotic iterations for steganography - stego-security and
20 \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT},
21 pages 218--227. SciTePress, 2011.
23 \bibitem{rifq/others03}
24 Maria Rifqi, Marcin Detyniecki, and Bernadette Bouchon-Meunier.
25 \newblock {D}iscrimination power of measures of resemblance.
26 \newblock In {\em {IFSA}'03}, 2003.
29 Zhao Yantao, Ma~Yunfei, and Li~Zhiquan.
30 \newblock A robust chaos-based dct-domain watermarking algorithm.
31 \newblock In {\em Computer Science and Software Engineering, 2008 International
32 Conference on}, volume~3, pages 935 --938, dec. 2008.