\begin{thebibliography}{1} \bibitem{Boss10} Patrick Bas, Tom{\'a}s Filler, and Tom{\'a}s Pevn{\'y}. \newblock "break our steganographic system": The ins and outs of organizing boss. \newblock In Tom{\'a}s Filler, Tom{\'a}s Pevn{\'y}, Scott Craver, and Andrew~D. Ker, editors, {\em Information Hiding}, volume 6958 of {\em Lecture Notes in Computer Science}, pages 59--70. Springer, 2011. \bibitem{Dawei2004} Zhao Dawei, Chen Guanrong, and Liu Wenbo. \newblock A chaos-based robust wavelet-domain watermarking algorithm. \newblock {\em Chaos, Solitons and Fractals}, 22:47--54, 2004. \bibitem{fgb11:ip} Nicolas Friot, Christophe Guyeux, and Jacques~M. Bahi. \newblock Chaotic iterations for steganography - stego-security and chaos-security. \newblock In Javier Lopez and Pierangela Samarati, editors, {\em SECRYPT}, pages 218--227. SciTePress, 2011. \bibitem{rifq/others03} Maria Rifqi, Marcin Detyniecki, and Bernadette Bouchon-Meunier. \newblock {D}iscrimination power of measures of resemblance. \newblock In {\em {IFSA}'03}, 2003. \bibitem{4722496} Zhao Yantao, Ma~Yunfei, and Li~Zhiquan. \newblock A robust chaos-based dct-domain watermarking algorithm. \newblock In {\em Computer Science and Software Engineering, 2008 International Conference on}, volume~3, pages 935 --938, dec. 2008. \end{thebibliography}