X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/HindawiJournalOfChaos.git/blobdiff_plain/f5dfadd98093d3fb12f61c1b56c7e2c0b56a2a25..refs/heads/master:/IH/ciw1.tex diff --git a/IH/ciw1.tex b/IH/ciw1.tex index 1a07a76..6c9a618 100644 --- a/IH/ciw1.tex +++ b/IH/ciw1.tex @@ -1,6 +1,13 @@ \section{The $\mathcal{CIW}_1$ Chaotic Iteration based Watermarking Process} \label{sec:ciw1} + +This section introduces the $\mathcal{CIW}_1$ watermarking process. +It first recalls its fundations, addresses security issues, +compares it with the Spread Spectrum Scheme, and ends with evaluating +its Lyapunov exponent. + + \subsection{Using chaotic iterations as information hiding schemes} \label{sec:data-hiding-algo-chaotic iterations} @@ -120,7 +127,7 @@ These two definitions are illustrated on Figure~\ref{fig:MSCLSC}, \subsubsection{Presentation of the $\mathcal{CIW}_1$ dhCI scheme} \label{trucMachin} -We have proposed in SECRYPT10~\cite{guyeux10ter} to +We have proposed in~\cite{guyeux10ter} to study a particular instance of the dhCI class, which considers the negation function as iteration mode. The resulting chaotic iterations watermarking\footnote{Watermarking means here that only a binary information, like the presence of a copyright, can be extracted.} process has been denoted by