\begin{thebibliography}{10} \bibitem{bcfg12a:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux. \newblock Application of steganography for anonymity through the internet. \newblock In {\em IHTIAP'2012, 1-st Workshop on Information Hiding Techniques for Internet Anonymity and Privacy}, pages 96--101, Venice, Italy, June 2012. \bibitem{bcfg12b:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, and Christophe Guyeux. \newblock A robust data hiding process contributing to the development of a semantic web. \newblock In {\em INTERNET'2012, 4-th Int. Conf. on Evolving Internet}, pages 71--76, Venice, Italy, June 2012. \bibitem{bcfg+13:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, Nicolas Friot, Christophe Guyeux, and Kamel Mazouzi. \newblock Quality studies of an invisible chaos-based watermarking scheme with message extraction. \newblock In {\em IIHMSP'13, 9th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages ***--***, Beijing, China, October 2013. \newblock To appear. \bibitem{bcg11b:ip} Jacques Bahi, Jean-Fran\c{c}ois Couchot, and Christophe Guyeux. \newblock Steganography: a class of algorithms having secure properties. \newblock In {\em IIH-MSP-2011, 7-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages 109--112, Dalian, China, October 2011. \bibitem{bfg12:ip} Jacques Bahi, Nicolas Friot, and Christophe Guyeux. \newblock Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure. \newblock In {\em IIH-MSP'2012, 8-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages 359--362, Piraeus-Athens, Greece, July 2012. IEEE Computer Society. \bibitem{bfg13:ip} Jacques Bahi, Nicolas Friot, and Christophe Guyeux. \newblock Topological study and lyapunov exponent of a secure steganographic scheme. \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2013, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, pages ***--***, Reykjavik, Iceland, July 2013. SciTePress. \newblock 8 pages. To appear. \bibitem{bg10b:ip} Jacques Bahi and Christophe Guyeux. \newblock A new chaos-based watermarking algorithm. \newblock In {\em SECRYPT'10, Int. conf. on security and cryptography}, pages 455--458, Athens, Greece, July 2010. SciTePress. \bibitem{guyeux10ter} Jacques Bahi and Christophe Guyeux. \newblock A new chaos-based watermarking algorithm. \newblock In {\em SECRYPT'10, Int. conf. on security and cryptography}, pages 455--458, Athens, Greece, July 2010. SciTePress. \bibitem{guyeux13:bc} Jacques Bahi and Christophe Guyeux. \newblock {\em Discrete Dynamical Systems and Chaotic Machines: Theory and Applications}. \newblock Chapman \& Hall, CRC Press, June 2013. \newblock 212 pages. \bibitem{guyeux10} Jacques~M. Bahi and Christophe Guyeux. \newblock Topological chaos and chaotic iterations, application to hash functions. \newblock In {\em WCCI'10, IEEE World Congress on Computational Intelligence}, pages 1--7, Barcelona, Spain, July 2010. \newblock Best paper award. \bibitem{Banks92} J.~Banks, J.~Brooks, G.~Cairns, and P.~Stacey. \newblock On {D}evaney's definition of chaos. \newblock {\em Amer. Math. Monthly}, 99:332--334, 1992. \bibitem{DBLP:conf/ih/BasFP11} P.~Bas, T.~Filler, and T.~Pevn\'{y}. \newblock Break our steganographic system --- the ins and outs of organizing boss. \newblock In T.~Filler, editor, {\em Information Hiding, 13th International Workshop}, Lecture Notes in Computer Science, Prague, Czech Republic, May 18--20, 2011. Springer-Verlag, New York. \bibitem{Cachin2004} Christian Cachin. \newblock An information-theoretic model for steganography. \newblock In {\em Information Hiding}, volume 1525 of {\em Lecture Notes in Computer Science}, pages 306--318. Springer Berlin / Heidelberg, 1998. \bibitem{Cayre2008} F.~Cayre and P.~Bas. \newblock Kerckhoffs-based embedding security classes for woa data hiding. \newblock {\em IEEE Transactions on Information Forensics and Security}, 3(1):1--15, 2008. \bibitem{ComesanaPP05bis} Pedro Comesa{\~n}a, Luis P{\'e}rez-Freire, and Fernando P{\'e}rez-Gonz{\'a}lez. \newblock Fundamentals of data hiding security and their application to spread-spectrum analysis. \newblock In Mauro Barni, Jordi Herrera-Joancomart\'{\i}, Stefan Katzenbeisser, and Fernando P{\'e}rez-Gonz{\'a}lez, editors, {\em IH'05: Information Hiding Workshop}, volume 3727 of {\em Lecture Notes in Computer Science}, pages 146--160. Lectures Notes in Computer Science, Springer-Verlag, 2005. \bibitem{Devaney} Robert~L. Devaney. \newblock {\em An Introduction to Chaotic Dynamical Systems}. \newblock Addison-Wesley, Redwood City, CA, 2nd edition, 1989. \bibitem{Formenti1998} Enrico Formenti. \newblock {\em Automates cellulaires et chaos : de la vision topologique à la vision algorithmique}. \newblock PhD thesis, \'Ecole Normale Supérieure de Lyon, 1998. \bibitem{Fridrich:2009:SDM:1721894} Jessica Fridrich. \newblock {\em Steganography in Digital Media: Principles, Algorithms, and Applications}. \newblock Cambridge University Press, New York, NY, USA, 1st edition, 2009. \bibitem{DBLP:conf/mmsec/FridrichPK07} Jessica~J. Fridrich, Tom{\'a}s Pevn{\'y}, and Jan Kodovsk{\'y}. \newblock Statistically undetectable jpeg steganography: dead ends challenges, and opportunities. \newblock In Deepa Kundur, Balakrishnan Prabhakaran, Jana Dittmann, and Jessica~J. Fridrich, editors, {\em MM{\&}Sec}, pages 3--14. ACM, 2007. \bibitem{fgb11:ip} Nicolas Friot, Christophe Guyeux, and Jacques Bahi. \newblock Chaotic iterations for steganography - stego-security and chaos-security. \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT'2011, Int. Conf. on Security and Cryptography. SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications}, pages 218--227, Sevilla, Spain, July 2011. SciTePress. \bibitem{GuyeuxThese10} Christophe Guyeux. \newblock {\em Le d\'{e}sordre des it\'{e}rations chaotiques et leur utilit\'{e} en s\'{e}curit\'{e} informatique}. \newblock PhD thesis, Universit\'{e} de Franche-Comt\'{e}, 2010. \bibitem{Guyeux2012} Christophe Guyeux. \newblock {\em Le d\'esordre des it\'erations chaotiques - Applications aux r\'eseaux de capteurs, \`a la dissimulation d'information, et aux fonctions de hachage}. \newblock \'Editions Universitaires Europ\'eennes, 2012. \newblock ISBN 978-3-8417-9417-8. 362 pages. Publication de la thèse de doctorat. \bibitem{gfb10:ip} Christophe Guyeux, Nicolas Friot, and Jacques Bahi. \newblock Chaotic iterations versus spread-spectrum: chaos and stego security. \newblock In {\em IIH-MSP'10, 6-th Int. Conf. on Intelligent Information Hiding and Multimedia Signal Processing}, pages 208--211, Darmstadt, Germany, October 2010. \bibitem{Jenkins1996} R.~J. Jenkins. \newblock {ISAAC}. \newblock {\em Fast Software Encryption}, pages 41--49, 1996. \bibitem{junod1999cryptographic} P.~Junod. \newblock {\em Cryptographic secure pseudo-random bits generation: The Blum-Blum-Shub generator}. \newblock August, 1999. \bibitem{Kalker2001} T.~Kalker. \newblock Considerations on watermarking security. \newblock In {\em Multimedia Signal Processing, 2001 IEEE Fourth Workshop on}, pages 201--206, 2001. \bibitem{1411349} Andrew~D. Ker, Tom\'{a}\v{s} Pevn\'{y}, Jan Kodovsk\'{y}, and Jessica Fridrich. \newblock The square root law of steganographic capacity. \newblock In {\em MMSec '08: Proceedings of the 10th ACM workshop on Multimedia and security}, pages 107--116, New York, NY, USA, 2008. ACM. \bibitem{DBLP:conf/ih/KimDR06} Younhee Kim, Zoran Duric, and Dana Richards. \newblock Modified matrix encoding technique for minimal distortion steganography. \newblock In Jan Camenisch, Christian~S. Collberg, Neil F.~Johnson 0001, and Phil Sallee, editors, {\em Information Hiding}, volume 4437 of {\em Lecture Notes in Computer Science}, pages 314--327. Springer, 2006. \bibitem{holmes11} J.~Kodovský and J.~Fridrich. \newblock Steganalysis in high dimensions: fusing classifiers built on random subspaces. \newblock In {\em Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII, San Francisco, CA,}, January 2011. \bibitem{ensemble11} J.~Kodovský, J.~Fridrich, and V.~Holub. \newblock Ensemble classifiers for steganalysis of digital media. \newblock {\em IEEE Transactions on Information Forensics and Security}, PP Issue:99:1 -- 1, 2011. \newblock To appear. \bibitem{Perez-Freire06} Luis Perez-Freire, Pedro Comesana, Juan~Ramon Troncoso-Pastoriza, and Fernando Perez-Gonzalez. \newblock Watermarking security: a survey. \newblock In {\em LNCS Transactions on Data Hiding and Multimedia Security}, 2006. \bibitem{DBLP:conf/ih/PevnyFB10} Tom{\'a}s Pevn{\'y}, Tom{\'a}s Filler, and Patrick Bas. \newblock Using high-dimensional image models to perform highly undetectable steganography. \newblock In Rainer B{\"o}hme, Philip W.~L. Fong, and Reihaneh Safavi-Naini, editors, {\em Information Hiding}, volume 6387 of {\em Lecture Notes in Computer Science}, pages 161--177. Springer, 2010. \bibitem{DBLP:journals/tifs/PevnyBF10} Tomás Pevný, Patrick Bas, and Jessica~J. Fridrich. \newblock Steganalysis by subtractive pixel adjacency matrix. \newblock {\em IEEE Transactions on Information Forensics and Security}, 5(2):215--224, 2010. \bibitem{Boss10} Tomáš Pevný, Tomáš Filler, and Patrick Bas. \newblock Break our steganographic system, 2010. \newblock available at \url{http://www.agents.cz/boss/}. \bibitem{rifq/others03} Maria Rifqi, Marcin Detyniecki, and Bernadette Bouchon-Meunier. \newblock {D}iscrimination power of measures of resemblance. \newblock In {\em {IFSA}'03}, 2003. \bibitem{SSM09} Anindya Sarkar, Kaushal Solanki, and B.~S. Manjunath. \newblock Further study on yass: Steganography based on randomized embedding to resist blind steganalysis. \bibitem{Shujun1} Li~Shujun, Li~Qi, Li~Wenmin, Mou Xuanqin, and Cai Yuanlong. \newblock Statistical properties of digital piecewise linear chaotic maps and their roles in cryptography and pseudo-random coding. \newblock {\em Proceedings of the 8th IMA International Conference on Cryptography and Coding}, 1:205--221, 2001. \bibitem{Simmons83} Gustavus~J. Simmons. \newblock The prisoners' problem and the subliminal channel. \newblock In {\em Advances in Cryptology, Proc. CRYPTO'83}, pages 51--67, 1984. \bibitem{DBLP:conf/ih/SolankiSM07} Kaushal Solanki, Anindya Sarkar, and B.~S. Manjunath. \newblock Yass: Yet another steganographic scheme that resists blind steganalysis. \newblock In Teddy Furon, Fran\c{c}ois Cayre, Gwena{\"e}l~J. Do{\"e}rr, and Patrick Bas, editors, {\em Information Hiding}, volume 4567 of {\em Lecture Notes in Computer Science}, pages 16--31. Springer, 2007. \bibitem{prng-Blum-goldwasser} Umesh Vazirani and Vijay Vazirani. \newblock Efficient and secure pseudo-random number generation (extended abstract). \newblock In George Blakley and David Chaum, editors, {\em Advances in Cryptology}, volume 196 of {\em Lecture Notes in Computer Science}, pages 193--202. Springer Berlin / Heidelberg, 1985. \newblock 10.1007/3-540-39568-7\_17. \bibitem{DBLP:conf/ih/Westfeld01} Andreas Westfeld. \newblock F5-a steganographic algorithm. \newblock In Ira~S. Moskowitz, editor, {\em Information Hiding}, volume 2137 of {\em Lecture Notes in Computer Science}, pages 289--302. Springer, 2001. \bibitem{Xie09:BASecurity} F.~Xie, T.~Furon, and C.~Fontaine. \newblock Better security levels for `broken arrows'. \newblock In {\em Proc. of SPIE Electronic Imaging on Media Forensics and Security XII}, San Jose, CA, USA, jan 2010. \end{thebibliography}