\relax \citation{Dawei2004,4722496} \citation{fgb11:ip} \citation{fgb11:ip} \newlabel{sec:introduction}{{}{1}} \@writefile{toc}{\contentsline {section}{\numberline {I}The Steganography Scheme $\ensuremath {\mathcal {CI}}\xspace $}{1}} \newlabel{section:process-ci2}{{I}{1}} \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-A}}Notations used for \ensuremath {\mathcal {CI}}\xspace }{1}} \newlabel{sec:ci2:notations}{{\unhbox \voidb@x \hbox {I-A}}{1}} \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-B}}The $\ensuremath {\mathcal {CI}}\xspace $ scheme}{1}} \newlabel{sub:ci2:scheme}{{\unhbox \voidb@x \hbox {I-B}}{1}} \citation{rifq/others03} \newlabel{itm2:Sc}{{2}{2}} \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-C}}Correctness and Completeness Studies}{2}} \newlabel{sub:ci2:discussion}{{\unhbox \voidb@x \hbox {I-C}}{2}} \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {I-D}}Deciding whether a Media is Watermarked}{2}} \newlabel{sub:ci2:distances}{{\unhbox \voidb@x \hbox {I-D}}{2}} \citation{Boss10} \@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces The Watermark}}{3}} \newlabel{(b) Watermark}{{1}{3}} \@writefile{toc}{\contentsline {section}{\numberline {II}Robustness Study of $\ensuremath {\mathcal {CI}}\xspace $}{3}} \newlabel{sec:robustness}{{II}{3}} \newlabel{Fig:atq:dec:curves}{{II}{3}} \@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Cropping Results}}{3}} \newlabel{Fig:atck:dec}{{2}{3}} \newlabel{Fig:atq:jpg:curves}{{3(a)}{3}} \newlabel{sub@Fig:atq:jpg:curves}{{(a)}{3}} \newlabel{Fig:atq:jp2:curves}{{3(b)}{3}} \newlabel{sub@Fig:atq:jp2:curves}{{(b)}{3}} \@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Compression Results}}{3}} \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {JPEG Effect}}}{3}} \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {JPEG 2000 Effect}}}{3}} \newlabel{Fig:atck:comp}{{3}{3}} \newlabel{Fig:atq:rot:curve}{{II}{3}} \@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Rotation Attack Results}}{3}} \newlabel{Fig:atq:rot}{{4}{3}} \citation{fgb11:ip} \bibstyle{plain} \bibdata{jabref} \bibcite{Boss10}{1} \bibcite{Dawei2004}{2} \bibcite{fgb11:ip}{3} \bibcite{rifq/others03}{4} \bibcite{4722496}{5} \newlabel{Fig:atq:lsb:curve}{{5(a)}{4}} \newlabel{sub@Fig:atq:lsb:curve}{{(a)}{4}} \newlabel{Fig:atq:ci2:curve}{{5(b)}{4}} \newlabel{sub@Fig:atq:ci2:curve}{{(b)}{4}} \@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces LSB Modifications}}{4}} \@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB Erasing Effect}}}{4}} \@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying Algorithm twice}}}{4}} \newlabel{Fig:atq:lsb}{{5}{4}} \@writefile{toc}{\contentsline {subsection}{\numberline {\unhbox \voidb@x \hbox {II-A}}Evaluation of the Embeddings}{4}} \newlabel{sub:roc}{{\unhbox \voidb@x \hbox {II-A}}{4}} \@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{4}} \newlabel{fig:roc:dwt}{{6}{4}} \@writefile{toc}{\contentsline {section}{\numberline {III}Conclusion}{4}} \newlabel{sec:conclusion}{{III}{4}} \@writefile{toc}{\contentsline {section}{References}{4}}