\citation{Devaney}
\@writefile{toc}{\contentsline {section}{\numberline {2}Notations and Terminologies}{2}}
\newlabel{not}{{2}{2}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}The mathematical theory of chaos}{2}}
\citation{Banks92}
-\citation{guyeux10}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}The mathematical theory of chaos}{3}}
\@writefile{thm}{\contentsline {Def}{{Definition}{1}{}}{3}}
\@writefile{thm}{\contentsline {Def}{{Definition}{2}{}}{3}}
\@writefile{thm}{\contentsline {Def}{{Definition}{3}{}}{3}}
\newlabel{sensitivity}{{5}{3}}
\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Chaotic iterations and watermarking scheme}{3}}
\newlabel{sec:chaotic iterations}{{2.2}{3}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{6}{}}{3}}
-\newlabel{Def:chaotic iterations}{{6}{3}}
+\citation{guyeux10}
\citation{Devaney}
\citation{guyeux10}
\citation{guyeux10}
-\citation{gfb10:ip,bcg11b:ip}
-\citation{gfb10:ip,bcg11b:ip}
+\@writefile{thm}{\contentsline {Def}{{Definition}{6}{}}{4}}
+\newlabel{Def:chaotic iterations}{{6}{4}}
\newlabel{Gf}{{1}{4}}
\@writefile{thm}{\contentsline {Th}{{Theorem}{1}{}}{4}}
-\@writefile{toc}{\contentsline {section}{\numberline {3}The $\mathcal {CIW}_1$ Chaotic Iteration based Watermarking Process}{4}}
-\newlabel{sec:ciw1}{{3}{4}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Using chaotic iterations as information hiding schemes}{4}}
-\newlabel{sec:data-hiding-algo-chaotic iterations}{{3.1}{4}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Presentation of the dhCI process}{4}}
+\citation{gfb10:ip,bcg11b:ip}
+\citation{gfb10:ip,bcg11b:ip}
\citation{guyeux10ter}
\citation{Guyeux2012}
\citation{gfb10:ip}
-\citation{guyeux10ter}
+\@writefile{toc}{\contentsline {section}{\numberline {3}The $\mathcal {CIW}_1$ Chaotic Iteration based Watermarking Process}{5}}
+\newlabel{sec:ciw1}{{3}{5}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Using chaotic iterations as information hiding schemes}{5}}
+\newlabel{sec:data-hiding-algo-chaotic iterations}{{3.1}{5}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Presentation of the dhCI process}{5}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Most and least significant coefficients}{5}}
\newlabel{sec:msc-lsc}{{3.1.2}{5}}
\@writefile{thm}{\contentsline {Def}{{Definition}{7}{}}{5}}
\newlabel{Exemple LSC}{{1}{5}}
\@writefile{thm}{\contentsline {Def}{{Definition}{8}{}}{5}}
\newlabel{def:msc,lsc}{{8}{5}}
-\citation{gfb10:ip}
-\citation{Shujun1}
+\citation{guyeux10ter}
\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Most and least significant coefficients of Lena.}}{6}}
\newlabel{fig:MSCLSC}{{1}{6}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Presentation of the $\mathcal {CIW}_1$ dhCI scheme}{6}}
\newlabel{trucMachin}{{3.1.3}{6}}
+\citation{gfb10:ip}
\citation{Shujun1}
\citation{Shujun1}
-\citation{gfb10:ip}
\newlabel{invad}{{2(b)}{7}}
\newlabel{sub@invad}{{(b)}{7}}
\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Data hiding with chaotic iterations}}{7}}
\@writefile{toc}{\contentsline {paragraph}{CIIS strategy}{7}}
\@writefile{thm}{\contentsline {Def}{{Definition}{9}{PLCM}}{7}}
\newlabel{Def:PLCM}{{9}{7}}
-\newlabel{eq:PLCM-for-strategy}{{3.1.4}{7}}
-\newlabel{sec:cids-example}{{3.1.4}{7}}
-\@writefile{toc}{\contentsline {paragraph}{CIDS strategy}{7}}
+\citation{Shujun1}
+\citation{gfb10:ip}
\citation{Perez-Freire06}
\citation{Kalker2001,ComesanaPP05bis}
\citation{Kalker2001}
\citation{Kalker2001}
\citation{Kalker2001}
\citation{Cayre2008}
-\citation{Kalker2001}
-\citation{Simmons83}
+\newlabel{eq:PLCM-for-strategy}{{3.1.4}{8}}
+\newlabel{sec:cids-example}{{3.1.4}{8}}
+\@writefile{toc}{\contentsline {paragraph}{CIDS strategy}{8}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Security versus robustness}{8}}
\newlabel{sec:chaotic iterations-security-level}{{3.2}{8}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.1}Presentation}{8}}
\newlabel{def:security}{{10}{8}}
\@writefile{thm}{\contentsline {Def}{{Definition}{11}{Robustness~\cite {Kalker2001}}}{8}}
\newlabel{def:robustness}{{11}{8}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Classification of attacks}{8}}
-\newlabel{sec:attack-classes}{{3.2.2}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{12}{}}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{13}{}}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{14}{}}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{15}{}}{8}}
+\citation{Kalker2001}
+\citation{Simmons83}
\citation{Cayre2008}
\citation{Cayre2008}
\citation{Cachin2004}
-\citation{gfb10:ip}
-\citation{gfb10:ip}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Classification of attacks}{9}}
+\newlabel{sec:attack-classes}{{3.2.2}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{12}{}}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{13}{}}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{14}{}}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{15}{}}{9}}
\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Watermarking attacks classification in context of\nobreakspace {}\cite {Kalker2001}}}{9}}
\newlabel{table:attack-classification}{{1}{9}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.3}Definition of stego-security}{9}}
\newlabel{sec:stego-security-definition}{{3.2.3}{9}}
\@writefile{thm}{\contentsline {Def}{{Definition}{16}{Stego-Security~\cite {Cayre2008}}}{9}}
\newlabel{Def:Stego-security}{{16}{9}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Security evaluation}{9}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Evaluation of the stego-security}{9}}
-\newlabel{sec:stego-security-proof}{{3.3.1}{9}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{1}{}}{9}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Evaluation of the topological security}{9}}
-\newlabel{sec:topological security-evaluation}{{3.3.2}{9}}
\citation{gfb10:ip}
\citation{gfb10:ip}
\citation{gfb10:ip}
-\citation{bfg12:ip}
+\citation{gfb10:ip}
+\citation{gfb10:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Security evaluation}{10}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Evaluation of the stego-security}{10}}
+\newlabel{sec:stego-security-proof}{{3.3.1}{10}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{1}{}}{10}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Evaluation of the topological security}{10}}
+\newlabel{sec:topological security-evaluation}{{3.3.2}{10}}
\@writefile{thm}{\contentsline {Def}{{Definition}{17}{}}{10}}
\newlabel{Def:topological security-definition}{{17}{10}}
\@writefile{thm}{\contentsline {Prop}{{Proposition}{2}{}}{10}}
\@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Comparison between spread-spectrum and chaotic iterations}{10}}
\newlabel{sec:comparison-application-context}{{3.4}{10}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Lyapunov exponent evaluation}{10}}
+\citation{bfg12:ip}
\citation{Guyeux2012}
\citation{gfb10:ip}
\citation{Cayre2008}
\citation{fgb11:ip}
\citation{gfb10:ip}
\citation{fgb11:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Lyapunov exponent evaluation}{11}}
\@writefile{toc}{\contentsline {section}{\numberline {4}The $\mathcal {CIS}_2$ Chaotic Iteration based Steganographic Process}{11}}
\newlabel{sec:secrypt11}{{4}{11}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}The improved algorithm}{11}}
-\newlabel{section:Algorithm}{{4.1}{11}}
-\newlabel{section:IH based on CIs}{{4.1}{11}}
-\newlabel{sec:topological}{{4.1}{11}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{18}{}}{11}}
-\newlabel{def:strategy-adapter}{{18}{11}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{19}{}}{11}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{20}{}}{11}}
\citation{fgb11:ip}
\citation{fgb11:ip}
\citation{fgb11:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}The improved algorithm}{12}}
+\newlabel{section:Algorithm}{{4.1}{12}}
+\newlabel{section:IH based on CIs}{{4.1}{12}}
+\newlabel{sec:topological}{{4.1}{12}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{18}{}}{12}}
+\newlabel{def:strategy-adapter}{{18}{12}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{19}{}}{12}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{20}{}}{12}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Security study of the $\mathcal {CIS}_2$}{12}}
\citation{fgb11:ip}
\citation{fgb11:ip}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Security study of the $\mathcal {CIS}_2$}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.1}Stego-security}{12}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{3}{}}{12}}
-\@writefile{thm}{\contentsline {Pre}{{Proof}{1}{}}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.2}Topological security}{12}}
-\@writefile{toc}{\contentsline {paragraph}{Topological model}{12}}
\citation{fgb11:ip}
\citation{fgb11:ip}
\citation{fgb11:ip}
\citation{fgb11:ip}
\citation{fgb11:ip}
-\citation{bcfg+13:ip}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.1}Stego-security}{13}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{3}{}}{13}}
+\@writefile{thm}{\contentsline {Pre}{{Proof}{1}{}}{13}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.2}Topological security}{13}}
+\@writefile{toc}{\contentsline {paragraph}{Topological model}{13}}
\@writefile{thm}{\contentsline {Prop}{{Proposition}{4}{}}{13}}
\@writefile{toc}{\contentsline {paragraph}{A new distance on $\mathcal {X}_2$}{13}}
\@writefile{toc}{\contentsline {paragraph}{Continuity of $\mathcal {CIS}_2$}{13}}
\@writefile{thm}{\contentsline {Prop}{{Proposition}{5}{}}{13}}
-\newlabel{section:chaos-security}{{4.2.2}{13}}
-\@writefile{toc}{\contentsline {paragraph}{$\mathcal {CIS}_2$ is chaotic}{13}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{2}{}}{13}}
-\newlabel{theo:chaotic}{{2}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Correctness and completeness studies}{13}}
-\newlabel{sub:ci2:discussion}{{4.3}{13}}
-\citation{bcfg+13:ip}
-\citation{rifq/others03}
\citation{bcfg+13:ip}
\citation{bcfg+13:ip}
+\citation{rifq/others03}
+\newlabel{section:chaos-security}{{4.2.2}{14}}
+\@writefile{toc}{\contentsline {paragraph}{$\mathcal {CIS}_2$ is chaotic}{14}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{2}{}}{14}}
+\newlabel{theo:chaotic}{{2}{14}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Correctness and completeness studies}{14}}
+\newlabel{sub:ci2:discussion}{{4.3}{14}}
\@writefile{thm}{\contentsline {Prop}{{Proposition}{6}{}}{14}}
\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Deciding whether a possibly attacked media is watermarked}{14}}
\newlabel{sub:ci2:distances}{{4.4}{14}}
\citation{bcfg+13:ip}
+\citation{bcfg+13:ip}
+\citation{bcfg+13:ip}
\citation{Boss10}
\citation{bcfg+13:ip}
\citation{bcfg+13:ip}
\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Cropping Results}}{15}}
\newlabel{Fig:atck:dec}{{3}{15}}
\citation{bcfg+13:ip}
-\citation{bcfg+13:ip}
\newlabel{Fig:atq:jpg:curves}{{4(a)}{16}}
\newlabel{sub@Fig:atq:jpg:curves}{{(a)}{16}}
\newlabel{Fig:atq:jp2:curves}{{4(b)}{16}}
\newlabel{Fig:atq:rot:curve}{{4.5}{16}}
\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Rotation Attack Results}}{16}}
\newlabel{Fig:atq:rot}{{5}{16}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Evaluation of the embeddings}{16}}
-\newlabel{sub:roc}{{4.6}{16}}
-\citation{bfg13:ip}
+\citation{bcfg+13:ip}
\newlabel{Fig:atq:lsb:curve}{{6(a)}{17}}
\newlabel{sub@Fig:atq:lsb:curve}{{(a)}{17}}
\newlabel{Fig:atq:ci2:curve}{{6(b)}{17}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB erasing effects}}}{17}}
\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying algorithm twice}}}{17}}
\newlabel{Fig:atq:lsb}{{6}{17}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Evaluation of the embeddings}{17}}
+\newlabel{sub:roc}{{4.6}{17}}
\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{17}}
\newlabel{fig:roc:dwt}{{7}{17}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.7}Lyapunov evaluation of $\mathcal {CIS}_2$}{17}}
-\newlabel{sec:lyapCIS2}{{4.7}{17}}
+\citation{bfg13:ip}
+\citation{bfg13:ip}
+\citation{bfg13:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.7}Lyapunov evaluation of $\mathcal {CIS}_2$}{18}}
+\newlabel{sec:lyapCIS2}{{4.7}{18}}
\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.1}A topological semi-conjugacy between $\mathcal {X}_2$ and $\mathds {R}$}{18}}
\newlabel{sec:topological-semiconjugacy}{{4.7.1}{18}}
\@writefile{thm}{\contentsline {Def}{{Definition}{21}{}}{18}}
\newlabel{def:psi-function}{{21}{18}}
-\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Some values for $\psi $\nobreakspace {}(see Definition\nobreakspace {}21\hbox {}).}}{18}}
-\newlabel{tablePsi}{{2}{18}}
\@writefile{thm}{\contentsline {Def}{{Definition}{22}{}}{18}}
\citation{bfg13:ip}
-\citation{bfg13:ip}
-\citation{bfg13:ip}
+\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Some values for $\psi $\nobreakspace {}(see Definition\nobreakspace {}21\hbox {}).}}{19}}
+\newlabel{tablePsi}{{2}{19}}
\@writefile{thm}{\contentsline {Def}{{Definition}{23}{}}{19}}
\newlabel{def:e et s}{{23}{19}}
\@writefile{thm}{\contentsline {Def}{{Definition}{24}{}}{19}}
\citation{bfg13:ip}
\citation{bfg13:ip}
\citation{bfg13:ip}
-\citation{bfg13:ip}
\@writefile{thm}{\contentsline {Def}{{Definition}{25}{}}{20}}
\@writefile{thm}{\contentsline {Prop}{{Proposition}{7}{}}{20}}
\@writefile{thm}{\contentsline {Th}{{Theorem}{3}{}}{20}}
+\citation{bfg13:ip}
\citation{Formenti1998}
\citation{bfg13:ip}
\citation{bfg13:ip}
\@writefile{thm}{\contentsline {Rem}{{Rem}{1}{}}{22}}
\@writefile{toc}{\contentsline {section}{\numberline {5}The $\mathcal {DI}_3$ Steganographic Process}{22}}
\newlabel{di3sec}{{5}{22}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Mathematical definitions and notations}{22}}
-\newlabel{sec:math-def}{{5.1}{22}}
\citation{bcfg12a:ip}
\citation{bcfg12b:ip}
\citation{bcfg12a:ip}
-\citation{bcfg12a:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Mathematical definitions and notations}{23}}
+\newlabel{sec:math-def}{{5.1}{23}}
\@writefile{thm}{\contentsline {Def}{{Definition}{26}{}}{23}}
\@writefile{thm}{\contentsline {Def}{{Definition}{27}{}}{23}}
\newlabel{def:injective-sequence}{{27}{23}}
\@writefile{thm}{\contentsline {Rem}{{Rem}{2}{}}{23}}
\@writefile{thm}{\contentsline {Def}{{Definition}{28}{$\mathcal {DI}_3$ Data hiding scheme}}{23}}
\newlabel{def:process-DI-1}{{28}{23}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Security study}{23}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{9}{}}{23}}
+\citation{bcfg12a:ip}
\citation{junod1999cryptographic}
\citation{prng-Blum-goldwasser}
\citation{Jenkins1996}
\citation{bcfg12a:ip}
\citation{bcfg12b:ip}
\citation{bcfg12a:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Security study}{24}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{9}{}}{24}}
\citation{bcfg12a:ip}
\citation{bcfg12b:ip}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Implementing the $\mathcal {DI}_3$ scheme}{24}}
\citation{bcfg12a:ip}
\citation{DBLP:conf/ih/SolankiSM07}
\citation{DBLP:conf/ih/PevnyFB10}
\citation{DBLP:conf/mmsec/FridrichPK07}
\citation{bcfg12a:ip}
-\@writefile{thm}{\contentsline {Rem}{{Rem}{3}{}}{25}}
-\@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces $strategy(N,P,\lambda )$}}{25}}
-\newlabel{algo:strategy}{{1}{25}}
\citation{DBLP:conf/ih/BasFP11}
\citation{bcfg12a:ip}
\citation{holmes11,ensemble11}
\citation{DBLP:conf/ih/BasFP11}
\citation{bcfg12a:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Implementing the $\mathcal {DI}_3$ scheme}{25}}
+\@writefile{thm}{\contentsline {Rem}{{Rem}{3}{}}{25}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.5}Evaluation against steganalyzers}{25}}
+\newlabel{section:steganalysis}{{5.5}{25}}
\citation{bcfg12a:ip}
-\@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces $embed(LSC, M, S, \lambda )$}}{26}}
-\newlabel{algo:embed}{{2}{26}}
-\@writefile{loa}{\contentsline {algocf}{\numberline {3}{\ignorespaces $extract(LSC, S, \lambda ,P)$}}{26}}
-\newlabel{algo:extract}{{3}{26}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.5}Evaluation against steganalyzers}{26}}
-\newlabel{section:steganalysis}{{5.5}{26}}
\citation{bcfg12b:ip}
\citation{DBLP:conf/ih/BasFP11}
+\@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces $strategy(N,P,\lambda )$}}{26}}
+\newlabel{algo:strategy}{{1}{26}}
+\@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces $embed(LSC, M, S, \lambda )$}}{26}}
+\newlabel{algo:embed}{{2}{26}}
\citation{bcfg12b:ip}
\citation{bcfg12b:ip}
+\@writefile{loa}{\contentsline {algocf}{\numberline {3}{\ignorespaces $extract(LSC, S, \lambda ,P)$}}{27}}
+\newlabel{algo:extract}{{3}{27}}
\@writefile{loa}{\contentsline {algocf}{\numberline {4}{\ignorespaces $significationFunction(H)$}}{27}}
\newlabel{algo:signification-function}{{4}{27}}
-\newlabel{algo:build-function}{{5}{27}}
-\@writefile{loa}{\contentsline {algocf}{\numberline {5}{\ignorespaces $buildFunction(MSC,PC,LSC)$ )}}{27}}
\@writefile{toc}{\contentsline {subsection}{\numberline {5.6}Robustness study}{27}}
\newlabel{sec:robustness-study}{{5.6}{27}}
\citation{Fridrich:2009:SDM:1721894}
-\citation{DBLP:conf/ih/SolankiSM07}
-\citation{SSM09}
+\newlabel{algo:build-function}{{5}{28}}
+\@writefile{loa}{\contentsline {algocf}{\numberline {5}{\ignorespaces $buildFunction(MSC,PC,LSC)$ )}}{28}}
\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Steganalysis results of HugoBreakers steganalyser applied on steganographic scheme}}{28}}
\newlabel{table:holme}{{3}{28}}
\@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion}{28}}
-\@writefile{toc}{\contentsline {section}{\numberline {7}Appendix}{28}}
-\newlabel{AppendixIH}{{7}{28}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}YASS}{28}}
-\citation{DBLP:conf/mmsec/FridrichPK07}
-\citation{DBLP:conf/ih/Westfeld01}
+\citation{DBLP:conf/ih/SolankiSM07}
+\citation{SSM09}
\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Robustness of $\mathcal {DI}_3$ scheme facing several attacks (50 images from the BOSS repository)}}{29}}
\newlabel{fig:robustness-results}{{8}{29}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}nsF5}{29}}
+\@writefile{toc}{\contentsline {section}{\numberline {7}Appendix}{29}}
+\newlabel{AppendixIH}{{7}{29}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}YASS}{29}}
+\citation{DBLP:conf/mmsec/FridrichPK07}
+\citation{DBLP:conf/ih/Westfeld01}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}nsF5}{30}}
\citation{DBLP:conf/ih/KimDR06}
\citation{DBLP:conf/ih/KimDR06}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.3}MMx}{31}}
\citation{DBLP:conf/ih/PevnyFB10}
\citation{DBLP:journals/tifs/PevnyBF10}
\bibstyle{plain}
\bibdata{mabase}
\bibcite{bcfg12a:ip}{1}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.3}MMx}{31}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.4}HUGO}{31}}
\bibcite{bcfg12b:ip}{2}
\bibcite{bcfg+13:ip}{3}
\bibcite{bcg11b:ip}{4}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.4}HUGO}{32}}
\bibcite{bfg12:ip}{5}
\bibcite{bfg13:ip}{6}
\bibcite{bg10b:ip}{7}