\section{The $\mathcal{CIW}_1$ Chaotic Iteration based Watermarking Process}
\label{sec:ciw1}
+
+This section introduces the $\mathcal{CIW}_1$ watermarking process.
+It first recalls its fundations, addresses security issues,
+compares it with the Spread Spectrum Scheme, and ends with evaluating
+its Lyapunov exponent.
+
+
\subsection{Using chaotic iterations as information hiding schemes}
\label{sec:data-hiding-algo-chaotic iterations}
\subsubsection{Presentation of the $\mathcal{CIW}_1$ dhCI scheme}
\label{trucMachin}
-We have proposed in SECRYPT10~\cite{guyeux10ter} to
+We have proposed in~\cite{guyeux10ter} to
study a particular instance of the dhCI class, which
considers the negation function as iteration mode.
The resulting chaotic iterations watermarking\footnote{Watermarking means here that only a binary information, like the presence of a copyright, can be extracted.} process has been denoted by