\relax 
\citation{Dawei2004,4722496}
\citation{fgb11:ip}
\citation{fgb11:ip}
\newlabel{sec:introduction}{{}{1}}
\@writefile{toc}{\contentsline {section}{\numberline {I}The Steganography Scheme $\ensuremath  {\mathcal  {CI}}\xspace  $}{1}}
\newlabel{section:process-ci2}{{I}{1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-A}}Notations used for \ensuremath  {\mathcal  {CI}}\xspace  }{1}}
\newlabel{sec:ci2:notations}{{\unhbox \voidb@x \hbox {I-A}}{1}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-B}}The $\ensuremath  {\mathcal  {CI}}\xspace  $ scheme}{1}}
\newlabel{sub:ci2:scheme}{{\unhbox \voidb@x \hbox {I-B}}{1}}
\citation{rifq/others03}
\newlabel{itm2:Sc}{{2}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-C}}Correctness and Completeness Studies}{2}}
\newlabel{sub:ci2:discussion}{{\unhbox \voidb@x \hbox {I-C}}{2}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-D}}Deciding whether a Media is Watermarked}{2}}
\newlabel{sub:ci2:distances}{{\unhbox \voidb@x \hbox {I-D}}{2}}
\citation{Boss10}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces The Watermark}}{3}}
\newlabel{(b) Watermark}{{1}{3}}
\@writefile{toc}{\contentsline {section}{\numberline {II}Robustness Study of $\ensuremath  {\mathcal  {CI}}\xspace  $}{3}}
\newlabel{sec:robustness}{{II}{3}}
\newlabel{Fig:atq:dec:curves}{{II}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Cropping Results}}{3}}
\newlabel{Fig:atck:dec}{{2}{3}}
\newlabel{Fig:atq:jpg:curves}{{3(a)}{3}}
\newlabel{sub@Fig:atq:jpg:curves}{{(a)}{3}}
\newlabel{Fig:atq:jp2:curves}{{3(b)}{3}}
\newlabel{sub@Fig:atq:jp2:curves}{{(b)}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Compression Results}}{3}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {JPEG Effect}}}{3}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {JPEG 2000 Effect}}}{3}}
\newlabel{Fig:atck:comp}{{3}{3}}
\newlabel{Fig:atq:rot:curve}{{II}{3}}
\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Rotation Attack Results}}{3}}
\newlabel{Fig:atq:rot}{{4}{3}}
\citation{fgb11:ip}
\bibstyle{plain}
\bibdata{jabref}
\bibcite{Boss10}{1}
\bibcite{Dawei2004}{2}
\bibcite{fgb11:ip}{3}
\bibcite{rifq/others03}{4}
\bibcite{4722496}{5}
\newlabel{Fig:atq:lsb:curve}{{5(a)}{4}}
\newlabel{sub@Fig:atq:lsb:curve}{{(a)}{4}}
\newlabel{Fig:atq:ci2:curve}{{5(b)}{4}}
\newlabel{sub@Fig:atq:ci2:curve}{{(b)}{4}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces LSB Modifications}}{4}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB Erasing Effect}}}{4}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying Algorithm twice}}}{4}}
\newlabel{Fig:atq:lsb}{{5}{4}}
\@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {II-A}}Evaluation of the Embeddings}{4}}
\newlabel{sub:roc}{{\unhbox \voidb@x \hbox {II-A}}{4}}
\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{4}}
\newlabel{fig:roc:dwt}{{6}{4}}
\@writefile{toc}{\contentsline {section}{\numberline {III}Conclusion}{4}}
\newlabel{sec:conclusion}{{III}{4}}
\@writefile{toc}{\contentsline {section}{References}{4}}