4 \section{Chaotic Iterations for Steganography: Stego-security and chaos-security~\cite{fgb11:ip}}
6 The next investigations in steganography since our thesis was published in
7 Secrypt 11~\cite{fgb11:ip}. The contribution is summarized thereafter.
9 \subsection{Introduction}
10 \label{sec:introduction}
13 After the study published in~\cite{gfb10:ip}, there were only two information hiding
14 schemes being both stego-secure and topologically secure.
15 The first one is based on a spread spectrum technique called Natural Watermarking.
16 It is stego-secure when its parameter $\eta$ is equal to $1$ \cite{Cayre2008}.
17 Unfortunately, this scheme is neither robust, nor able to face an attacker
18 in KOA and KMA setups, due to its lack of expansiveness~\cite{gfb10:ip}.
19 The second scheme both topologically secure and stego-secure, presented in the previous section, is based on chaotic iterations.
20 However, it allows to embed securely only one bit per embedding parameters.
21 The objective of~\cite{fgb11:ip} was to improve the scheme studied in~\cite{gfb10:ip}, in such a way that more than one bit can be embedded.
27 \subsection{The improved algorithm}
28 \label{section:Algorithm}
30 \label{section:IH based on CIs}
31 \label{sec:topological}
33 Let us firstly recall the notations and terminologies introduced
34 in~\cite{fgb11:ip}, which extend the ones presented in Chapter~\ref{chpt:recalls}.
36 \begin{Def}%[Strategy adapter]
37 \label{def:strategy-adapter}
38 Let $\mathsf{k} \in \mathds{N}^\ast$.
39 A \emph{strategy adapter} is a sequence which elements belong into $\llbracket 0, \mathsf{k-1} \rrbracket$.
40 The set of all strategies with terms in $\llbracket 0, \mathsf{k-1} \rrbracket$
41 is denoted by $\mathbb{S}_\mathsf{k}$.
46 Intuitively, a strategy-adapter aims at generating a strategy
47 $(S^t)^{t \in \mathds{N}}$ where each term $S^t$ belongs to
48 $\llbracket 1, n \rrbracket$.
52 \begin{Def}%[Initial function]
53 Let $k \in \mathds{N}^\ast$.
54 The \emph{initial function} is the map $i_k$ defined by:
57 i_k: & \mathbb{S}_k & \longrightarrow & \llbracket 0, \mathsf{k-1} \rrbracket \\
58 & (S^{n})_{n\in \mathds{N}} & \longmapsto & S^{0} \\
65 Let $k \in \mathds{N}^\ast$.
66 The \emph{shift function} is the map $\sigma_k$ defined by:
69 \sigma_k : & \mathbb{S}_k & \longrightarrow & \mathbb{S}_k\\
70 & (S^{n})_{n\in \mathds{N}} & \longmapsto & (S^{n+1})_{n\in \mathds{N}}
75 Let us additionnaly recall the following notations.
77 \item $x^0 \in \mathbb{B}^\mathsf{N}$ the $\mathsf{N}$ least
78 significant coefficients of a given cover media $C$.% $X$ be the initial state $X_0$,
79 \item $m^0 \in \mathbb{B}^\mathsf{P}$ is the watermark to embed into $x^0$.
80 \item $S_1 \in \mathbb{S}_N$ is a strategy called \textbf{place strategy}, giving the location (LCS) where to insert the message at each iteration.
81 \item $S_2 \in \mathbb{S}_P$ is a strategy called \textbf{choice strategy}, providing which bits from the message must be inserted at the given iteration.
82 \item Lastly, $S_3 \in \mathbb{S}_P$ is a strategy called \textbf{mixing strategy}, as it is required for chaos to mix the message at each
89 The information hiding scheme published in~\cite{fgb11:ip} was
90 called Steganography by Chaotic Iterations and
91 Substitution with Mixing Message (SCISMM in short,
92 which has been renamed $\mathcal{CIS}_2$ in later
93 publications). It is defined by
95 \mathds{N}^{\ast} \times \llbracket 0;\mathsf{N-1}\rrbracket \times \llbracket
96 0;\mathsf{P-1}\rrbracket$:
103 x_i^{n-1} & \text{ if }S_1^n\neq i \\
104 m_{S_2^n} & \text{ if }S_1^n=i.
111 m_j^{n-1} & \text{ if }S_3^n\neq j \\
112 \overline{m_j^{n-1}} & \text{ if }S_3^n=j.
121 The stego-content is the Boolean vector $y = x^P \in
122 \mathbb{B}^\mathsf{N}$.
124 \subsection{Security study of the $\mathcal{CIS}_2$}
126 After having introduced the $\mathcal{CIS}_2$, we have studied its security in~\cite{fgb11:ip}.
129 \subsubsection{Stego-security}
131 We have proven in~\cite{fgb11:ip} that,
134 $\mathcal{CIS}_2$ is stego-secure.
143 \subsubsection{Topological security}
146 \paragraph{Topological model}
148 We have firstly proven in~\cite{fgb11:ip} that $\mathcal{CIS}_2$ can be modeled as a
149 dynamical system in a topological space, as follows.
153 F: & \llbracket0;\mathsf{N-1}\rrbracket \times
154 \mathds{B}^{\mathsf{N}}\times \llbracket0;\mathsf{P-1}\rrbracket \times
155 \mathds{B}^{\mathsf{P}}
156 \longrightarrow \mathds{B}^{\mathsf{N}} \\
157 & (k,x,\lambda,m) \longmapsto \left( \delta
158 (k,j).x_j+\overline{\delta (k,j)}.m_{\lambda}\right) _{j\in
159 \llbracket0;\mathsf{N-1}\rrbracket}\\
164 \noindent where + and . are the boolean addition and product operations.
166 Consider the phase space $\mathcal{X}_2$ defined as follow:
169 \mathcal{X}_2 = \mathbb{S}_N \times \mathds{B}^\mathsf{N} \times \mathbb{S}_P
170 \times \mathds{B}^\mathsf{P} \times \mathbb{S}_P,
172 where $\mathbb{S}_N$ and $\mathbb{S}_P$ are the sets introduced in Section \ref{section:Algorithm}.
175 We define the map $\mathcal{G}_{f_0}:\mathcal{X}_2 \longrightarrow \mathcal{X}_2$ by:
178 \mathcal{G}_{f_0}\left(S_1,x,S_2,m,S_3\right) =
182 F(i_N(S_1),x,i_P(S_2),m),\sigma_P(S_2),G_{f_0}(m,S_3),\sigma_P(S_3)\right)
185 \noindent Then $\mathcal{CIS}_2$ can be described by the
186 iterations of the following discret dynamical system:
192 X^0 \in \mathcal{X}_2 \\
193 X^{k+1}=\mathcal{G}_{f_0}(X^k).%
198 Then, by comparing $\mathcal{X}_2$ and the phase space $\mathcal{X}$ formerly introduced in
199 this manuscript, we have verified in~\cite{fgb11:ip} that.
202 The phase space $\mathcal{X}_2$ has, at least, the cardinality of the continuum.
207 This result is independent on the number of cells of the system.
211 \paragraph{A new distance on $\mathcal{X}_2$}
213 We define a new distance on $\mathcal{X}_2$ as follow:
214 $\forall X,\check{X} \in \mathcal{X}_2,$ if $X =(S_1,x,S_2,m,S_3)$ and $\check{X} =
215 (\check{S_1},\check{x},\check{S_2},\check{m}, \check{S_3}),$ then:
218 d_2(X,\check{X}) & = &
219 d_{\mathds{B}^{\mathsf{N}}}(x,\check{x})+d_{\mathds{B}^{\mathsf{P}}}(m,\check{m})\\
221 d_{\mathbb{S}_N}(S_1,\check{S_1})+d_{\mathbb{S}_P}(S_2,\check{S_2})+d_{\mathbb{S}_P}(S_3,\check{S_3}).
226 \paragraph{Continuity of $\mathcal{CIS}_2$}
228 To prove that $\mathcal{CIS}_2$ is another example of topological chaos in the
229 sense of Devaney, $\mathcal{G}_{f_0}$ must be continuous on the metric
230 space $(\mathcal{X}_2,d_2)$. We thus have proven in~\cite{fgb11:ip} that,
233 $\mathcal{G}_{f_0}$ is a continuous function on $(\mathcal{X}_2,d_2)$.
237 \paragraph{$\mathcal{CIS}_2$ is chaotic}
238 \label{section:chaos-security}
242 In conclusion, $(\mathcal{X}_2,\mathcal{G}_{f_0})$ has been proven to be topologically transitive, regular,
243 and sensitive dependence on initial conditions. Then we have the result~\cite{fgb11:ip} that.
245 \begin{Th}%[$\mathcal{G}_{f_0}$ is a chaotic map]
247 $\mathcal{G}_{f_0}$ is a chaotic map on $(\mathcal{X}_2,d_2)$ in the sense of Devaney.
249 So we can claim that $\mathcal{CIS}_2$ is topologically secure.