2 This work has reviewed the evolution of chaos based data hiding schemes.
3 The whole class of algorithms has been formally presented and implemented.
4 Two watermarking processes ($\mathcal{CIW}_1$ and $\mathcal{CIS}_2$) have been
5 recalled; the former is a one-bit approach whereas the latter allows to
6 embed any message of reasonable size.
7 The two schemes have been
8 theoretically evaluated: both are stego-secure and verify the
9 topological expansiveness property.
10 These two scheme has been practically evaluated: they have been proven to be
11 robust against a large class of attacks.
12 Finally, $\mathcal{DI}_3$ which adapts the $\mathcal{CIS}_2$ scheme to
13 the steganography field. It capacity to resists to steganalysis has been
14 evaluated and has shown promissing results.
16 To summarize, this works has presented three
17 chaos based data hiding schemes and has study their security.
18 In a future work we plan to combine these approaches to other data hiding
19 schemes to take benefit of their best behaviors:
20 for instance the pixel selection may be achieved by state of the art
21 distortion function and modifications may be delayed to chaos