-\newlabel{invad}{{2(b)}{8}}
-\newlabel{sub@invad}{{(b)}{8}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Data hiding with chaotic iterations}}{8}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Original Lena.}}}{8}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Watermark.}}}{8}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Watermarked Lena.}}}{8}}
-\newlabel{fig:DWT}{{2}{8}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.4}Examples of strategies}{8}}
-\newlabel{sec:ciis-cids-example}{{3.1.4}{8}}
-\@writefile{toc}{\contentsline {paragraph}{CIIS strategy}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{9}{PLCM}}{8}}
-\newlabel{Def:PLCM}{{9}{8}}
-\newlabel{eq:PLCM-for-strategy}{{3.1.4}{8}}