]> AND Private Git Repository - HindawiJournalOfChaos.git/commitdiff
Logo AND Algorithmique Numérique Distribuée

Private GIT Repository
abstract
authorcouchot <jf.couchot@gmail.com>
Sun, 27 Oct 2013 20:54:43 +0000 (21:54 +0100)
committercouchot <jf.couchot@gmail.com>
Sun, 27 Oct 2013 20:54:43 +0000 (21:54 +0100)
article.aux
article.blg
article.log
article.pdf
article.synctex.gz [deleted file]
article.tex
article.thm

index 808524bad3afe339d0959d6e64fd109826ca14ee..e2ec2a79104d5ef4e798c8f23c1925a90c0d55dd 100644 (file)
 \relax 
+\citation{Cayre2008}
+\citation{Cayre2008}
+\citation{guyeux13:bc}
+\citation{guyeux13:bc}
+\citation{bg10b:ip}
+\citation{gfb10:ip}
+\citation{Guyeux2012}
+\citation{Guyeux2012}
 \citation{1411349,Xie09:BASecurity}
 \citation{Cayre2008}
 \citation{Cayre2008}
 \citation{guyeux13:bc}
 \citation{guyeux13:bc}
 \citation{bg10b:ip}
-\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{1}}
-\newlabel{sec:introduction}{{1}{1}}
+\@writefile{toc}{\contentsline {section}{\numberline {1}Introduction}{2}}
+\newlabel{sec:introduction}{{1}{2}}
 \citation{gfb10:ip}
 \citation{Guyeux2012}
 \citation{Guyeux2012}
 \citation{Devaney}
-\@writefile{toc}{\contentsline {section}{\numberline {2}Notations and Terminologies}{2}}
-\newlabel{not}{{2}{2}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}The mathematical theory of chaos}{2}}
+\@writefile{toc}{\contentsline {section}{\numberline {2}Notations and Terminologies}{3}}
+\newlabel{not}{{2}{3}}
 \citation{Banks92}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.1}The mathematical theory of chaos}{4}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{1}{}}{4}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{2}{}}{4}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{3}{}}{4}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{4}{Devaney's chaos}}{4}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{5}{}}{4}}
+\newlabel{sensitivity}{{5}{4}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Chaotic iterations and watermarking scheme}{4}}
+\newlabel{sec:chaotic iterations}{{2.2}{4}}
 \citation{guyeux10}
-\@writefile{thm}{\contentsline {Def}{{Definition}{1}{}}{3}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{2}{}}{3}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{3}{}}{3}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{4}{Devaney's chaos}}{3}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{5}{}}{3}}
-\newlabel{sensitivity}{{5}{3}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {2.2}Chaotic iterations and watermarking scheme}{3}}
-\newlabel{sec:chaotic iterations}{{2.2}{3}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{6}{}}{3}}
-\newlabel{Def:chaotic iterations}{{6}{3}}
 \citation{Devaney}
 \citation{guyeux10}
 \citation{guyeux10}
 \citation{gfb10:ip,bcg11b:ip}
+\@writefile{thm}{\contentsline {Def}{{Definition}{6}{}}{5}}
+\newlabel{Def:chaotic iterations}{{6}{5}}
+\newlabel{Gf}{{1}{5}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{1}{}}{5}}
 \citation{gfb10:ip,bcg11b:ip}
-\newlabel{Gf}{{1}{4}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{1}{}}{4}}
-\@writefile{toc}{\contentsline {section}{\numberline {3}The $\mathcal  {CIW}_1$ Chaotic Iteration based Watermarking Process}{4}}
-\newlabel{sec:ciw1}{{3}{4}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Using chaotic iterations as information hiding schemes}{4}}
-\newlabel{sec:data-hiding-algo-chaotic iterations}{{3.1}{4}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Presentation of the dhCI process}{4}}
 \citation{guyeux10ter}
 \citation{Guyeux2012}
 \citation{gfb10:ip}
+\@writefile{toc}{\contentsline {section}{\numberline {3}The $\mathcal  {CIW}_1$ Chaotic Iteration based Watermarking Process}{6}}
+\newlabel{sec:ciw1}{{3}{6}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.1}Using chaotic iterations as information hiding schemes}{6}}
+\newlabel{sec:data-hiding-algo-chaotic iterations}{{3.1}{6}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.1}Presentation of the dhCI process}{6}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Most and least significant coefficients}{6}}
+\newlabel{sec:msc-lsc}{{3.1.2}{6}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{7}{}}{6}}
+\@writefile{thm}{\contentsline {Ex}{{Example}{1}{}}{6}}
+\newlabel{Exemple LSC}{{1}{6}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{8}{}}{6}}
+\newlabel{def:msc,lsc}{{8}{6}}
 \citation{guyeux10ter}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.2}Most and least significant coefficients}{5}}
-\newlabel{sec:msc-lsc}{{3.1.2}{5}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{7}{}}{5}}
-\@writefile{thm}{\contentsline {Ex}{{Example}{1}{}}{5}}
-\newlabel{Exemple LSC}{{1}{5}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{8}{}}{5}}
-\newlabel{def:msc,lsc}{{8}{5}}
 \citation{gfb10:ip}
+\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Most and least significant coefficients of Lena.}}{7}}
+\newlabel{fig:MSCLSC}{{1}{7}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Presentation of the $\mathcal  {CIW}_1$ dhCI scheme}{7}}
+\newlabel{trucMachin}{{3.1.3}{7}}
 \citation{Shujun1}
-\@writefile{lof}{\contentsline {figure}{\numberline {1}{\ignorespaces Most and least significant coefficients of Lena.}}{6}}
-\newlabel{fig:MSCLSC}{{1}{6}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.3}Presentation of the $\mathcal  {CIW}_1$ dhCI scheme}{6}}
-\newlabel{trucMachin}{{3.1.3}{6}}
 \citation{Shujun1}
 \citation{Shujun1}
+\newlabel{invad}{{2(b)}{8}}
+\newlabel{sub@invad}{{(b)}{8}}
+\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Data hiding with chaotic iterations}}{8}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Original Lena.}}}{8}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Watermark.}}}{8}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Watermarked Lena.}}}{8}}
+\newlabel{fig:DWT}{{2}{8}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.4}Examples of strategies}{8}}
+\newlabel{sec:ciis-cids-example}{{3.1.4}{8}}
+\@writefile{toc}{\contentsline {paragraph}{CIIS strategy}{8}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{9}{PLCM}}{8}}
+\newlabel{Def:PLCM}{{9}{8}}
+\newlabel{eq:PLCM-for-strategy}{{3.1.4}{8}}
 \citation{gfb10:ip}
-\newlabel{invad}{{2(b)}{7}}
-\newlabel{sub@invad}{{(b)}{7}}
-\@writefile{lof}{\contentsline {figure}{\numberline {2}{\ignorespaces Data hiding with chaotic iterations}}{7}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {Original Lena.}}}{7}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Watermark.}}}{7}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(c)}{\ignorespaces {Watermarked Lena.}}}{7}}
-\newlabel{fig:DWT}{{2}{7}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.1.4}Examples of strategies}{7}}
-\newlabel{sec:ciis-cids-example}{{3.1.4}{7}}
-\@writefile{toc}{\contentsline {paragraph}{CIIS strategy}{7}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{9}{PLCM}}{7}}
-\newlabel{Def:PLCM}{{9}{7}}
-\newlabel{eq:PLCM-for-strategy}{{3.1.4}{7}}
-\newlabel{sec:cids-example}{{3.1.4}{7}}
-\@writefile{toc}{\contentsline {paragraph}{CIDS strategy}{7}}
 \citation{Perez-Freire06}
 \citation{Kalker2001,ComesanaPP05bis}
 \citation{Kalker2001}
 \citation{Kalker2001}
 \citation{Kalker2001}
 \citation{Cayre2008}
+\newlabel{sec:cids-example}{{3.1.4}{9}}
+\@writefile{toc}{\contentsline {paragraph}{CIDS strategy}{9}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Security versus robustness}{9}}
+\newlabel{sec:chaotic iterations-security-level}{{3.2}{9}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.1}Presentation}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{10}{Security~\cite {Kalker2001}}}{9}}
+\newlabel{def:security}{{10}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{11}{Robustness~\cite {Kalker2001}}}{9}}
+\newlabel{def:robustness}{{11}{9}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Classification of attacks}{9}}
+\newlabel{sec:attack-classes}{{3.2.2}{9}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{12}{}}{9}}
 \citation{Kalker2001}
 \citation{Simmons83}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.2}Security versus robustness}{8}}
-\newlabel{sec:chaotic iterations-security-level}{{3.2}{8}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.1}Presentation}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{10}{Security~\cite {Kalker2001}}}{8}}
-\newlabel{def:security}{{10}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{11}{Robustness~\cite {Kalker2001}}}{8}}
-\newlabel{def:robustness}{{11}{8}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.2}Classification of attacks}{8}}
-\newlabel{sec:attack-classes}{{3.2.2}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{12}{}}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{13}{}}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{14}{}}{8}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{15}{}}{8}}
 \citation{Cayre2008}
 \citation{Cayre2008}
 \citation{Cachin2004}
 \citation{gfb10:ip}
+\@writefile{thm}{\contentsline {Def}{{Definition}{13}{}}{10}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{14}{}}{10}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{15}{}}{10}}
+\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Watermarking attacks classification in context of\nobreakspace  {}\cite  {Kalker2001}}}{10}}
+\newlabel{table:attack-classification}{{1}{10}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.3}Definition of stego-security}{10}}
+\newlabel{sec:stego-security-definition}{{3.2.3}{10}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{16}{Stego-Security~\cite {Cayre2008}}}{10}}
+\newlabel{Def:Stego-security}{{16}{10}}
 \citation{gfb10:ip}
-\@writefile{lot}{\contentsline {table}{\numberline {1}{\ignorespaces Watermarking attacks classification in context of\nobreakspace  {}\cite  {Kalker2001}}}{9}}
-\newlabel{table:attack-classification}{{1}{9}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.2.3}Definition of stego-security}{9}}
-\newlabel{sec:stego-security-definition}{{3.2.3}{9}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{16}{Stego-Security~\cite {Cayre2008}}}{9}}
-\newlabel{Def:Stego-security}{{16}{9}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Security evaluation}{9}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Evaluation of the stego-security}{9}}
-\newlabel{sec:stego-security-proof}{{3.3.1}{9}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{1}{}}{9}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Evaluation of the topological security}{9}}
-\newlabel{sec:topological security-evaluation}{{3.3.2}{9}}
 \citation{gfb10:ip}
 \citation{gfb10:ip}
 \citation{gfb10:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.3}Security evaluation}{11}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.1}Evaluation of the stego-security}{11}}
+\newlabel{sec:stego-security-proof}{{3.3.1}{11}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{1}{}}{11}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {3.3.2}Evaluation of the topological security}{11}}
+\newlabel{sec:topological security-evaluation}{{3.3.2}{11}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{17}{}}{11}}
+\newlabel{Def:topological security-definition}{{17}{11}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{2}{}}{11}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Comparison between spread-spectrum and chaotic iterations}{11}}
+\newlabel{sec:comparison-application-context}{{3.4}{11}}
 \citation{bfg12:ip}
-\@writefile{thm}{\contentsline {Def}{{Definition}{17}{}}{10}}
-\newlabel{Def:topological security-definition}{{17}{10}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{2}{}}{10}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.4}Comparison between spread-spectrum and chaotic iterations}{10}}
-\newlabel{sec:comparison-application-context}{{3.4}{10}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Lyapunov exponent evaluation}{10}}
 \citation{Guyeux2012}
 \citation{gfb10:ip}
 \citation{Cayre2008}
 \citation{fgb11:ip}
 \citation{gfb10:ip}
 \citation{fgb11:ip}
-\@writefile{toc}{\contentsline {section}{\numberline {4}The $\mathcal  {CIS}_2$ Chaotic Iteration based Steganographic Process}{11}}
-\newlabel{sec:secrypt11}{{4}{11}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}The improved algorithm}{11}}
-\newlabel{section:Algorithm}{{4.1}{11}}
-\newlabel{section:IH based on CIs}{{4.1}{11}}
-\newlabel{sec:topological}{{4.1}{11}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{18}{}}{11}}
-\newlabel{def:strategy-adapter}{{18}{11}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{19}{}}{11}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{20}{}}{11}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {3.5}Lyapunov exponent evaluation}{12}}
+\@writefile{toc}{\contentsline {section}{\numberline {4}The $\mathcal  {CIS}_2$ Chaotic Iteration based Steganographic Process}{12}}
+\newlabel{sec:secrypt11}{{4}{12}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.1}The improved algorithm}{12}}
+\newlabel{section:Algorithm}{{4.1}{12}}
+\newlabel{section:IH based on CIs}{{4.1}{12}}
+\newlabel{sec:topological}{{4.1}{12}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{18}{}}{12}}
+\newlabel{def:strategy-adapter}{{18}{12}}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Security study of the $\mathcal  {CIS}_2$}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.1}Stego-security}{12}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{3}{}}{12}}
-\@writefile{thm}{\contentsline {Pre}{{Proof}{1}{}}{12}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.2}Topological security}{12}}
-\@writefile{toc}{\contentsline {paragraph}{Topological model}{12}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{19}{}}{13}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{20}{}}{13}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.2}Security study of the $\mathcal  {CIS}_2$}{13}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.1}Stego-security}{13}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{3}{}}{13}}
+\@writefile{thm}{\contentsline {Pre}{{Proof}{1}{}}{13}}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{fgb11:ip}
 \citation{bcfg+13:ip}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{4}{}}{13}}
-\@writefile{toc}{\contentsline {paragraph}{A new distance on $\mathcal  {X}_2$}{13}}
-\@writefile{toc}{\contentsline {paragraph}{Continuity of $\mathcal  {CIS}_2$}{13}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{5}{}}{13}}
-\newlabel{section:chaos-security}{{4.2.2}{13}}
-\@writefile{toc}{\contentsline {paragraph}{$\mathcal  {CIS}_2$ is chaotic}{13}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{2}{}}{13}}
-\newlabel{theo:chaotic}{{2}{13}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Correctness and completeness studies}{13}}
-\newlabel{sub:ci2:discussion}{{4.3}{13}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.2.2}Topological security}{14}}
+\@writefile{toc}{\contentsline {paragraph}{Topological model}{14}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{4}{}}{14}}
+\@writefile{toc}{\contentsline {paragraph}{A new distance on $\mathcal  {X}_2$}{14}}
+\@writefile{toc}{\contentsline {paragraph}{Continuity of $\mathcal  {CIS}_2$}{14}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{5}{}}{14}}
+\newlabel{section:chaos-security}{{4.2.2}{14}}
+\@writefile{toc}{\contentsline {paragraph}{$\mathcal  {CIS}_2$ is chaotic}{14}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{2}{}}{14}}
+\newlabel{theo:chaotic}{{2}{14}}
 \citation{bcfg+13:ip}
 \citation{rifq/others03}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.3}Correctness and completeness studies}{15}}
+\newlabel{sub:ci2:discussion}{{4.3}{15}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{6}{}}{15}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Deciding whether a possibly attacked media is watermarked}{15}}
+\newlabel{sub:ci2:distances}{{4.4}{15}}
 \citation{bcfg+13:ip}
 \citation{bcfg+13:ip}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{6}{}}{14}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.4}Deciding whether a possibly attacked media is watermarked}{14}}
-\newlabel{sub:ci2:distances}{{4.4}{14}}
 \citation{bcfg+13:ip}
 \citation{Boss10}
 \citation{bcfg+13:ip}
 \citation{bcfg+13:ip}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}Robustness study of the process}{15}}
-\newlabel{Fig:atq:dec:curves}{{4.5}{15}}
-\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Cropping Results}}{15}}
-\newlabel{Fig:atck:dec}{{3}{15}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.5}Robustness study of the process}{16}}
+\newlabel{Fig:atq:dec:curves}{{4.5}{16}}
+\@writefile{lof}{\contentsline {figure}{\numberline {3}{\ignorespaces Cropping Results}}{16}}
+\newlabel{Fig:atck:dec}{{3}{16}}
 \citation{bcfg+13:ip}
+\newlabel{Fig:atq:jpg:curves}{{4(a)}{17}}
+\newlabel{sub@Fig:atq:jpg:curves}{{(a)}{17}}
+\newlabel{Fig:atq:jp2:curves}{{4(b)}{17}}
+\newlabel{sub@Fig:atq:jp2:curves}{{(b)}{17}}
+\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Compression Results}}{17}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {JPEG Effect}}}{17}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {JPEG 2000 Effect}}}{17}}
+\newlabel{Fig:atck:comp}{{4}{17}}
+\newlabel{Fig:atq:rot:curve}{{4.5}{17}}
+\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Rotation Attack Results}}{17}}
+\newlabel{Fig:atq:rot}{{5}{17}}
 \citation{bcfg+13:ip}
-\newlabel{Fig:atq:jpg:curves}{{4(a)}{16}}
-\newlabel{sub@Fig:atq:jpg:curves}{{(a)}{16}}
-\newlabel{Fig:atq:jp2:curves}{{4(b)}{16}}
-\newlabel{sub@Fig:atq:jp2:curves}{{(b)}{16}}
-\@writefile{lof}{\contentsline {figure}{\numberline {4}{\ignorespaces Compression Results}}{16}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {JPEG Effect}}}{16}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {JPEG 2000 Effect}}}{16}}
-\newlabel{Fig:atck:comp}{{4}{16}}
-\newlabel{Fig:atq:rot:curve}{{4.5}{16}}
-\@writefile{lof}{\contentsline {figure}{\numberline {5}{\ignorespaces Rotation Attack Results}}{16}}
-\newlabel{Fig:atq:rot}{{5}{16}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Evaluation of the embeddings}{16}}
-\newlabel{sub:roc}{{4.6}{16}}
+\newlabel{Fig:atq:lsb:curve}{{6(a)}{18}}
+\newlabel{sub@Fig:atq:lsb:curve}{{(a)}{18}}
+\newlabel{Fig:atq:ci2:curve}{{6(b)}{18}}
+\newlabel{sub@Fig:atq:ci2:curve}{{(b)}{18}}
+\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces LSB Modifications}}{18}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB erasing effects}}}{18}}
+\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying algorithm twice}}}{18}}
+\newlabel{Fig:atq:lsb}{{6}{18}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.6}Evaluation of the embeddings}{18}}
+\newlabel{sub:roc}{{4.6}{18}}
+\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{18}}
+\newlabel{fig:roc:dwt}{{7}{18}}
 \citation{bfg13:ip}
-\newlabel{Fig:atq:lsb:curve}{{6(a)}{17}}
-\newlabel{sub@Fig:atq:lsb:curve}{{(a)}{17}}
-\newlabel{Fig:atq:ci2:curve}{{6(b)}{17}}
-\newlabel{sub@Fig:atq:ci2:curve}{{(b)}{17}}
-\@writefile{lof}{\contentsline {figure}{\numberline {6}{\ignorespaces LSB Modifications}}{17}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(a)}{\ignorespaces {LSB erasing effects}}}{17}}
-\@writefile{lof}{\contentsline {subfigure}{\numberline{(b)}{\ignorespaces {Applying algorithm twice}}}{17}}
-\newlabel{Fig:atq:lsb}{{6}{17}}
-\@writefile{lof}{\contentsline {figure}{\numberline {7}{\ignorespaces ROC Curves for DWT or DCT Embeddings}}{17}}
-\newlabel{fig:roc:dwt}{{7}{17}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {4.7}Lyapunov evaluation of $\mathcal  {CIS}_2$}{17}}
-\newlabel{sec:lyapCIS2}{{4.7}{17}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.1}A topological semi-conjugacy between $\mathcal  {X}_2$ and $\mathds  {R}$}{18}}
-\newlabel{sec:topological-semiconjugacy}{{4.7.1}{18}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{21}{}}{18}}
-\newlabel{def:psi-function}{{21}{18}}
-\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Some values for $\psi $\nobreakspace  {}(see Definition\nobreakspace  {}21\hbox {}).}}{18}}
-\newlabel{tablePsi}{{2}{18}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{22}{}}{18}}
 \citation{bfg13:ip}
 \citation{bfg13:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {4.7}Lyapunov evaluation of $\mathcal  {CIS}_2$}{19}}
+\newlabel{sec:lyapCIS2}{{4.7}{19}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.1}A topological semi-conjugacy between $\mathcal  {X}_2$ and $\mathds  {R}$}{19}}
+\newlabel{sec:topological-semiconjugacy}{{4.7.1}{19}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{21}{}}{19}}
+\newlabel{def:psi-function}{{21}{19}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{22}{}}{19}}
 \citation{bfg13:ip}
-\@writefile{thm}{\contentsline {Def}{{Definition}{23}{}}{19}}
-\newlabel{def:e et s}{{23}{19}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{24}{}}{19}}
-\newlabel{def:function-g-on-R}{{24}{19}}
+\@writefile{lot}{\contentsline {table}{\numberline {2}{\ignorespaces Some values for $\psi $\nobreakspace  {}(see Definition\nobreakspace  {}21\hbox {}).}}{20}}
+\newlabel{tablePsi}{{2}{20}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{23}{}}{20}}
+\newlabel{def:e et s}{{23}{20}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{24}{}}{20}}
+\newlabel{def:function-g-on-R}{{24}{20}}
 \citation{bfg13:ip}
 \citation{bfg13:ip}
 \citation{bfg13:ip}
+\@writefile{thm}{\contentsline {Def}{{Definition}{25}{}}{21}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{7}{}}{21}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{3}{}}{21}}
 \citation{bfg13:ip}
-\@writefile{thm}{\contentsline {Def}{{Definition}{25}{}}{20}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{7}{}}{20}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{3}{}}{20}}
 \citation{Formenti1998}
 \citation{bfg13:ip}
 \citation{bfg13:ip}
 \citation{bfg13:ip}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{8}{}}{21}}
-\newlabel{Prop:derivabilite-de-g}{{8}{21}}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.2}Topological security of $\mathcal  {CIS}_2$ on $\mathds  {R}$}{21}}
-\newlabel{section:topo-secu-cis2-R}{{4.7.2}{21}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{4}{}}{21}}
-\newlabel{theo:chaos-and-fineness}{{4}{21}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{5}{}}{21}}
-\newlabel{th:cis2-topo-order}{{5}{21}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{8}{}}{22}}
+\newlabel{Prop:derivabilite-de-g}{{8}{22}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.2}Topological security of $\mathcal  {CIS}_2$ on $\mathds  {R}$}{22}}
+\newlabel{section:topo-secu-cis2-R}{{4.7.2}{22}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{4}{}}{22}}
+\newlabel{theo:chaos-and-fineness}{{4}{22}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{5}{}}{22}}
+\newlabel{th:cis2-topo-order}{{5}{22}}
 \citation{bfg13:ip}
 \citation{gfb10:ip}
 \citation{Cayre2008}
 \citation{DBLP:conf/mmsec/FridrichPK07}
 \citation{DBLP:conf/ih/KimDR06}
 \citation{DBLP:conf/ih/PevnyFB10}
-\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.3}Evaluation of the Lyapunov exponent}{22}}
-\newlabel{section:lyapunov-exponent-evaluation}{{4.7.3}{22}}
-\@writefile{thm}{\contentsline {Th}{{Theorem}{6}{}}{22}}
-\@writefile{thm}{\contentsline {Rem}{{Rem}{1}{}}{22}}
-\@writefile{toc}{\contentsline {section}{\numberline {5}The $\mathcal  {DI}_3$ Steganographic Process}{22}}
-\newlabel{di3sec}{{5}{22}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Mathematical definitions and notations}{22}}
-\newlabel{sec:math-def}{{5.1}{22}}
+\@writefile{toc}{\contentsline {subsubsection}{\numberline {4.7.3}Evaluation of the Lyapunov exponent}{23}}
+\newlabel{section:lyapunov-exponent-evaluation}{{4.7.3}{23}}
+\@writefile{thm}{\contentsline {Th}{{Theorem}{6}{}}{23}}
+\@writefile{thm}{\contentsline {Rem}{{Rem}{1}{}}{23}}
+\@writefile{toc}{\contentsline {section}{\numberline {5}The $\mathcal  {DI}_3$ Steganographic Process}{23}}
+\newlabel{di3sec}{{5}{23}}
 \citation{bcfg12a:ip}
 \citation{bcfg12b:ip}
 \citation{bcfg12a:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.1}Mathematical definitions and notations}{24}}
+\newlabel{sec:math-def}{{5.1}{24}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{26}{}}{24}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{27}{}}{24}}
+\newlabel{def:injective-sequence}{{27}{24}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}The new $\mathcal  {DI}_3$ process}{24}}
+\newlabel{sec:new-process-di-1}{{5.2}{24}}
+\@writefile{thm}{\contentsline {Rem}{{Rem}{2}{}}{24}}
+\@writefile{thm}{\contentsline {Def}{{Definition}{28}{$\mathcal {DI}_3$ Data hiding scheme}}{24}}
+\newlabel{def:process-DI-1}{{28}{24}}
 \citation{bcfg12a:ip}
-\@writefile{thm}{\contentsline {Def}{{Definition}{26}{}}{23}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{27}{}}{23}}
-\newlabel{def:injective-sequence}{{27}{23}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.2}The new $\mathcal  {DI}_3$ process}{23}}
-\newlabel{sec:new-process-di-1}{{5.2}{23}}
-\@writefile{thm}{\contentsline {Rem}{{Rem}{2}{}}{23}}
-\@writefile{thm}{\contentsline {Def}{{Definition}{28}{$\mathcal {DI}_3$ Data hiding scheme}}{23}}
-\newlabel{def:process-DI-1}{{28}{23}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Security study}{23}}
-\@writefile{thm}{\contentsline {Prop}{{Proposition}{9}{}}{23}}
 \citation{junod1999cryptographic}
 \citation{prng-Blum-goldwasser}
 \citation{Jenkins1996}
 \citation{bcfg12a:ip}
 \citation{bcfg12b:ip}
 \citation{bcfg12a:ip}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.3}Security study}{25}}
+\@writefile{thm}{\contentsline {Prop}{{Proposition}{9}{}}{25}}
 \citation{bcfg12a:ip}
 \citation{bcfg12b:ip}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Implementing the $\mathcal  {DI}_3$ scheme}{24}}
 \citation{bcfg12a:ip}
 \citation{DBLP:conf/ih/SolankiSM07}
 \citation{DBLP:conf/ih/PevnyFB10}
 \citation{DBLP:conf/mmsec/FridrichPK07}
 \citation{bcfg12a:ip}
-\@writefile{thm}{\contentsline {Rem}{{Rem}{3}{}}{25}}
-\@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces $strategy(N,P,\lambda )$}}{25}}
-\newlabel{algo:strategy}{{1}{25}}
 \citation{DBLP:conf/ih/BasFP11}
 \citation{bcfg12a:ip}
 \citation{holmes11,ensemble11}
 \citation{DBLP:conf/ih/BasFP11}
 \citation{bcfg12a:ip}
-\citation{bcfg12a:ip}
-\@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces $embed(LSC, M, S, \lambda )$}}{26}}
-\newlabel{algo:embed}{{2}{26}}
-\@writefile{loa}{\contentsline {algocf}{\numberline {3}{\ignorespaces $extract(LSC, S, \lambda ,P)$}}{26}}
-\newlabel{algo:extract}{{3}{26}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.4}Implementing the $\mathcal  {DI}_3$ scheme}{26}}
+\@writefile{thm}{\contentsline {Rem}{{Rem}{3}{}}{26}}
 \@writefile{toc}{\contentsline {subsection}{\numberline {5.5}Evaluation against steganalyzers}{26}}
 \newlabel{section:steganalysis}{{5.5}{26}}
+\citation{bcfg12a:ip}
 \citation{bcfg12b:ip}
 \citation{DBLP:conf/ih/BasFP11}
+\@writefile{loa}{\contentsline {algocf}{\numberline {1}{\ignorespaces $strategy(N,P,\lambda )$}}{27}}
+\newlabel{algo:strategy}{{1}{27}}
+\@writefile{loa}{\contentsline {algocf}{\numberline {2}{\ignorespaces $embed(LSC, M, S, \lambda )$}}{27}}
+\newlabel{algo:embed}{{2}{27}}
 \citation{bcfg12b:ip}
 \citation{bcfg12b:ip}
-\@writefile{loa}{\contentsline {algocf}{\numberline {4}{\ignorespaces $significationFunction(H)$}}{27}}
-\newlabel{algo:signification-function}{{4}{27}}
-\newlabel{algo:build-function}{{5}{27}}
-\@writefile{loa}{\contentsline {algocf}{\numberline {5}{\ignorespaces $buildFunction(MSC,PC,LSC)$ )}}{27}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {5.6}Robustness study}{27}}
-\newlabel{sec:robustness-study}{{5.6}{27}}
+\@writefile{loa}{\contentsline {algocf}{\numberline {3}{\ignorespaces $extract(LSC, S, \lambda ,P)$}}{28}}
+\newlabel{algo:extract}{{3}{28}}
+\@writefile{loa}{\contentsline {algocf}{\numberline {4}{\ignorespaces $significationFunction(H)$}}{28}}
+\newlabel{algo:signification-function}{{4}{28}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {5.6}Robustness study}{28}}
+\newlabel{sec:robustness-study}{{5.6}{28}}
 \citation{Fridrich:2009:SDM:1721894}
 \citation{DBLP:conf/ih/SolankiSM07}
 \citation{SSM09}
-\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Steganalysis results of HugoBreakers steganalyser applied on steganographic scheme}}{28}}
-\newlabel{table:holme}{{3}{28}}
-\@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion}{28}}
-\@writefile{toc}{\contentsline {section}{\numberline {7}Appendix}{28}}
-\newlabel{AppendixIH}{{7}{28}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}YASS}{28}}
+\newlabel{algo:build-function}{{5}{29}}
+\@writefile{loa}{\contentsline {algocf}{\numberline {5}{\ignorespaces $buildFunction(MSC,PC,LSC)$ )}}{29}}
+\@writefile{lot}{\contentsline {table}{\numberline {3}{\ignorespaces Steganalysis results of HugoBreakers steganalyser applied on steganographic scheme}}{29}}
+\newlabel{table:holme}{{3}{29}}
+\@writefile{toc}{\contentsline {section}{\numberline {6}Conclusion}{29}}
+\@writefile{toc}{\contentsline {section}{\numberline {7}Appendix}{29}}
+\newlabel{AppendixIH}{{7}{29}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.1}YASS}{29}}
 \citation{DBLP:conf/mmsec/FridrichPK07}
 \citation{DBLP:conf/ih/Westfeld01}
-\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Robustness of $\mathcal  {DI}_3$ scheme facing several attacks (50 images from the BOSS repository)}}{29}}
-\newlabel{fig:robustness-results}{{8}{29}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}nsF5}{29}}
+\@writefile{lof}{\contentsline {figure}{\numberline {8}{\ignorespaces Robustness of $\mathcal  {DI}_3$ scheme facing several attacks (50 images from the BOSS repository)}}{30}}
+\newlabel{fig:robustness-results}{{8}{30}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.2}nsF5}{31}}
 \citation{DBLP:conf/ih/KimDR06}
 \citation{DBLP:conf/ih/KimDR06}
 \citation{DBLP:conf/ih/PevnyFB10}
 \citation{DBLP:journals/tifs/PevnyBF10}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.3}MMx}{32}}
+\@writefile{toc}{\contentsline {subsection}{\numberline {7.4}HUGO}{32}}
 \bibstyle{plain}
 \bibdata{mabase}
 \bibcite{bcfg12a:ip}{1}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.3}MMx}{31}}
-\@writefile{toc}{\contentsline {subsection}{\numberline {7.4}HUGO}{31}}
 \bibcite{bcfg12b:ip}{2}
 \bibcite{bcfg+13:ip}{3}
 \bibcite{bcg11b:ip}{4}
index 85398475400f6cd9538121cbdf94a6e05fb9ac5e..23f1c262646557b7a0d26eb750268eecbe502403 100644 (file)
@@ -1,4 +1,4 @@
-This is BibTeX, Version 0.99d (TeX Live 2013/Arch Linux)
+This is BibTeX, Version 0.99d (TeX Live 2013/Debian)
 Capacity: max_strings=35307, hash_size=35307, hash_prime=30011
 The top-level auxiliary file: article.aux
 The style file: plain.bst
index d305b9b8bf27343dac0bd70fefd9820aa650974f..e364bdac05c7e02faf12f1c00751d0a306bfb5c0 100644 (file)
@@ -1,14 +1,14 @@
-This is pdfTeX, Version 3.1415926-2.5-1.40.14 (TeX Live 2013/Arch Linux) (format=pdflatex 2013.10.17)  23 OCT 2013 18:52
+This is pdfTeX, Version 3.1415926-2.5-1.40.14 (TeX Live 2013/Debian) (format=pdflatex 2013.10.25)  27 OCT 2013 21:34
 entering extended mode
  restricted \write18 enabled.
  %&-line parsing enabled.
 **article.tex
 (./article.tex
 LaTeX2e <2011/06/27>
-Babel <3.9f> and hyphenation patterns for 78 languages loaded.
-(/usr/share/texmf-dist/tex/latex/base/article.cls
+Babel <3.9f> and hyphenation patterns for 2 languages loaded.
+(/usr/share/texlive/texmf-dist/tex/latex/base/article.cls
 Document Class: article 2007/10/19 v1.4h Standard LaTeX document class
-(/usr/share/texmf-dist/tex/latex/base/size10.clo
+(/usr/share/texlive/texmf-dist/tex/latex/base/size10.clo
 File: size10.clo 2007/10/19 v1.4h Standard LaTeX file (size option)
 )
 \c@part=\count79
@@ -23,26 +23,26 @@ File: size10.clo 2007/10/19 v1.4h Standard LaTeX file (size option)
 \belowcaptionskip=\skip42
 \bibindent=\dimen102
 )
-(/usr/share/texmf-dist/tex/latex/base/fontenc.sty
+(/usr/share/texlive/texmf-dist/tex/latex/base/fontenc.sty
 Package: fontenc 2005/09/27 v1.99g Standard LaTeX package
 
-(/usr/share/texmf-dist/tex/latex/base/t1enc.def
+(/usr/share/texlive/texmf-dist/tex/latex/base/t1enc.def
 File: t1enc.def 2005/09/27 v1.99g Standard LaTeX file
 LaTeX Font Info:    Redeclaring font encoding T1 on input line 43.
 ))
-(/usr/share/texmf-dist/tex/latex/base/inputenc.sty
+(/usr/share/texlive/texmf-dist/tex/latex/base/inputenc.sty
 Package: inputenc 2008/03/30 v1.1d Input encoding file
 \inpenc@prehook=\toks14
 \inpenc@posthook=\toks15
 
-(/usr/share/texmf-dist/tex/latex/base/utf8.def
+(/usr/share/texlive/texmf-dist/tex/latex/base/utf8.def
 File: utf8.def 2008/04/05 v1.1m UTF-8 support for inputenc
 Now handling font encoding OML ...
 ... no UTF-8 mapping file for font encoding OML
 Now handling font encoding T1 ...
 ... processing UTF-8 mapping file for font encoding T1
 
-(/usr/share/texmf-dist/tex/latex/base/t1enc.dfu
+(/usr/share/texlive/texmf-dist/tex/latex/base/t1enc.dfu
 File: t1enc.dfu 2008/04/05 v1.1m UTF-8 support for inputenc
    defining Unicode char U+00A1 (decimal 161)
    defining Unicode char U+00A3 (decimal 163)
@@ -192,7 +192,7 @@ File: t1enc.dfu 2008/04/05 v1.1m UTF-8 support for inputenc
 Now handling font encoding OT1 ...
 ... processing UTF-8 mapping file for font encoding OT1
 
-(/usr/share/texmf-dist/tex/latex/base/ot1enc.dfu
+(/usr/share/texlive/texmf-dist/tex/latex/base/ot1enc.dfu
 File: ot1enc.dfu 2008/04/05 v1.1m UTF-8 support for inputenc
    defining Unicode char U+00A1 (decimal 161)
    defining Unicode char U+00A3 (decimal 163)
@@ -223,7 +223,7 @@ File: ot1enc.dfu 2008/04/05 v1.1m UTF-8 support for inputenc
 Now handling font encoding OMS ...
 ... processing UTF-8 mapping file for font encoding OMS
 
-(/usr/share/texmf-dist/tex/latex/base/omsenc.dfu
+(/usr/share/texlive/texmf-dist/tex/latex/base/omsenc.dfu
 File: omsenc.dfu 2008/04/05 v1.1m UTF-8 support for inputenc
    defining Unicode char U+00A7 (decimal 167)
    defining Unicode char U+00B6 (decimal 182)
@@ -247,7 +247,7 @@ Now handling font encoding U ...
    defining Unicode char U+2122 (decimal 8482)
    defining Unicode char U+2423 (decimal 9251)
 ))
-(/usr/share/texmf-dist/tex/latex/lm/lmodern.sty
+(/usr/share/texmf/tex/latex/lm/lmodern.sty
 Package: lmodern 2009/10/30 v1.6 Latin Modern Fonts
 LaTeX Font Info:    Overwriting symbol font `operators' in version `normal'
 (Font)                  OT1/cmr/m/n --> OT1/lmr/m/n on input line 22.
@@ -282,13 +282,13 @@ LaTeX Font Info:    Overwriting math alphabet `\mathit' in version `bold'
 LaTeX Font Info:    Overwriting math alphabet `\mathtt' in version `bold'
 (Font)                  OT1/cmtt/m/n --> OT1/lmtt/m/n on input line 38.
 )
-(/usr/share/texmf-dist/tex/latex/doublestroke/dsfont.sty
+(/usr/share/texlive/texmf-dist/tex/latex/doublestroke/dsfont.sty
 Package: dsfont 1995/08/01 v0.1 Double stroke roman fonts
 )
-(/usr/share/texmf-dist/tex/latex/ntheorem/ntheorem.sty
+(/usr/share/texlive/texmf-dist/tex/latex/ntheorem/ntheorem.sty
 Style `ntheorem', Version 1.33 <2011/08/15>
 Package: ntheorem 2011/08/15 1.33
-(/usr/share/texmf-dist/tex/latex/base/ifthen.sty
+(/usr/share/texlive/texmf-dist/tex/latex/base/ifthen.sty
 Package: ifthen 2001/05/26 v1.1c Standard LaTeX ifthen package (DPC)
 )
 \theorem@style=\toks16
@@ -322,7 +322,7 @@ Package: ifthen 2001/05/26 v1.1c Standard LaTeX ifthen package (DPC)
 \thm@topsep=\skip49
 \thm@topsepadd=\skip50
 )
-(/usr/share/texmf-dist/tex/latex/amsfonts/amsfonts.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsfonts/amsfonts.sty
 Package: amsfonts 2013/01/14 v3.01 Basic AMSFonts support
 \@emptytoks=\toks34
 \symAMSa=\mathgroup4
@@ -330,24 +330,24 @@ Package: amsfonts 2013/01/14 v3.01 Basic AMSFonts support
 LaTeX Font Info:    Overwriting math alphabet `\mathfrak' in version `bold'
 (Font)                  U/euf/m/n --> U/euf/b/n on input line 106.
 )
-(/usr/share/texmf-dist/tex/latex/amsmath/amsmath.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsmath.sty
 Package: amsmath 2013/01/14 v2.14 AMS math features
 \@mathmargin=\skip51
 
 For additional information on amsmath, use the `?' option.
-(/usr/share/texmf-dist/tex/latex/amsmath/amstext.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amstext.sty
 Package: amstext 2000/06/29 v2.01
 
-(/usr/share/texmf-dist/tex/latex/amsmath/amsgen.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsgen.sty
 File: amsgen.sty 1999/11/30 v2.0
 \@emptytoks=\toks35
 \ex@=\dimen107
 ))
-(/usr/share/texmf-dist/tex/latex/amsmath/amsbsy.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsbsy.sty
 Package: amsbsy 1999/11/29 v1.2d
 \pmbraise@=\dimen108
 )
-(/usr/share/texmf-dist/tex/latex/amsmath/amsopn.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amsopn.sty
 Package: amsopn 1999/12/14 v2.01 operator names
 )
 \inf@bad=\count87
@@ -388,34 +388,34 @@ LaTeX Font Info:    Redeclaring font encoding OMS on input line 567.
 LaTeX Info: Redefining \[ on input line 2665.
 LaTeX Info: Redefining \] on input line 2666.
 )
-(/usr/share/texmf-dist/tex/latex/amsfonts/amssymb.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsfonts/amssymb.sty
 Package: amssymb 2013/01/14 v3.01 AMS font symbols
 )
-(/usr/share/texmf-dist/tex/latex/graphics/graphicx.sty
+(/usr/share/texlive/texmf-dist/tex/latex/graphics/graphicx.sty
 Package: graphicx 1999/02/16 v1.0f Enhanced LaTeX Graphics (DPC,SPQR)
 
-(/usr/share/texmf-dist/tex/latex/graphics/keyval.sty
+(/usr/share/texlive/texmf-dist/tex/latex/graphics/keyval.sty
 Package: keyval 1999/03/16 v1.13 key=value parser (DPC)
 \KV@toks@=\toks40
 )
-(/usr/share/texmf-dist/tex/latex/graphics/graphics.sty
+(/usr/share/texlive/texmf-dist/tex/latex/graphics/graphics.sty
 Package: graphics 2009/02/05 v1.0o Standard LaTeX Graphics (DPC,SPQR)
 
-(/usr/share/texmf-dist/tex/latex/graphics/trig.sty
+(/usr/share/texlive/texmf-dist/tex/latex/graphics/trig.sty
 Package: trig 1999/03/16 v1.09 sin cos tan (DPC)
 )
-(/usr/share/texmf-dist/tex/latex/latexconfig/graphics.cfg
+(/usr/share/texlive/texmf-dist/tex/latex/latexconfig/graphics.cfg
 File: graphics.cfg 2010/04/23 v1.9 graphics configuration of TeX Live
 )
 Package graphics Info: Driver file: pdftex.def on input line 91.
 
-(/usr/share/texmf-dist/tex/latex/pdftex-def/pdftex.def
+(/usr/share/texlive/texmf-dist/tex/latex/pdftex-def/pdftex.def
 File: pdftex.def 2011/05/27 v0.06d Graphics/color for pdfTeX
 
-(/usr/share/texmf-dist/tex/generic/oberdiek/infwarerr.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/infwarerr.sty
 Package: infwarerr 2010/04/08 v1.3 Providing info/warning/error messages (HO)
 )
-(/usr/share/texmf-dist/tex/generic/oberdiek/ltxcmds.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/ltxcmds.sty
 Package: ltxcmds 2011/11/09 v1.22 LaTeX kernel commands for general use (HO)
 )
 \Gread@gobject=\count99
@@ -423,13 +423,13 @@ Package: ltxcmds 2011/11/09 v1.22 LaTeX kernel commands for general use (HO)
 \Gin@req@height=\dimen116
 \Gin@req@width=\dimen117
 )
-(/usr/share/texmf-dist/tex/latex/stmaryrd/stmaryrd.sty
+(/usr/share/texlive/texmf-dist/tex/latex/stmaryrd/stmaryrd.sty
 Package: stmaryrd 1994/03/03 St Mary's Road symbol package
 \symstmry=\mathgroup6
 LaTeX Font Info:    Overwriting symbol font `stmry' in version `bold'
 (Font)                  U/stmry/m/n --> U/stmry/b/n on input line 89.
 )
-(/usr/share/texmf-dist/tex/latex/subfigure/subfigure.sty
+(/usr/share/texlive/texmf-dist/tex/latex/subfigure/subfigure.sty
 Package: subfigure 2002/03/15 v2.1.5 subfigure package
 \subfigtopskip=\skip54
 \subfigcapskip=\skip55
@@ -445,23 +445,23 @@ Package: subfigure 2002/03/15 v2.1.5 subfigure package
 ****************************************
 * Local config file subfigure.cfg used *
 ****************************************
-(/usr/share/texmf-dist/tex/latex/subfigure/subfigure.cfg)
+(/usr/share/texlive/texmf-dist/tex/latex/subfigure/subfigure.cfg)
 \subfig@top=\skip58
 \subfig@bottom=\skip59
 )
-(/usr/share/texmf-dist/tex/latex/cite/cite.sty
+(/usr/share/texlive/texmf-dist/tex/latex/cite/cite.sty
 LaTeX Info: Redefining \cite on input line 302.
 LaTeX Info: Redefining \nocite on input line 373.
 Package: cite 2010/09/10  v 5.3
 )
-(/usr/share/texmf-dist/tex/latex/amsmath/amscd.sty
+(/usr/share/texlive/texmf-dist/tex/latex/amsmath/amscd.sty
 Package: amscd 1999/11/29 v2.0
 \athelp@=\toks41
 \minaw@=\dimen120
 \bigaw@=\dimen121
 \minCDarrowwidth=\dimen122
 )
-(/usr/share/texmf-dist/tex/latex/algorithms/algorithmic.sty
+(/usr/share/texlive/texmf-dist/tex/latex/algorithms/algorithmic.sty
 Package: algorithmic 2009/08/24 v0.1 Document Style `algorithmic'
 \c@ALC@unique=\count104
 \c@ALC@line=\count105
@@ -470,14 +470,14 @@ Package: algorithmic 2009/08/24 v0.1 Document Style `algorithmic'
 \ALC@tlm=\skip60
 \algorithmicindent=\skip61
 )
-(/usr/share/texmf-dist/tex/latex/algorithm2e/algorithm2e.sty
+(/usr/share/texlive/texmf-dist/tex/latex/algorithm2e/algorithm2e.sty
 Package: algorithm2e 2013/01/06 v5.00 algorithms environments
 \c@AlgoLine=\count108
 
-(/usr/share/texmf-dist/tex/latex/tools/xspace.sty
+(/usr/share/texlive/texmf-dist/tex/latex/tools/xspace.sty
 Package: xspace 2009/10/20 v1.13 Space after command names (DPC,MH)
 )
-(/usr/share/texmf-dist/tex/latex/relsize/relsize.sty
+(/usr/share/texlive/texmf-dist/tex/latex/relsize/relsize.sty
 Package: relsize 2013/03/29 ver 4.1
 )
 ********************************************************
@@ -520,14 +520,14 @@ subscribe by emailing sympa@lirmm.fr with 'subscribe <list> <firstname name>'
 \c@algocf=\count111
 \algocf@algoframe=\box34
 \algocf@algobox=\box35
-) (/usr/share/texmf-dist/tex/latex/url/url.sty
+) (/usr/share/texlive/texmf-dist/tex/latex/url/url.sty
 \Urlmuskip=\muskip11
 Package: url 2006/04/12  ver 3.3  Verb mode for urls, etc.
 )
-(/usr/share/texmf-dist/tex/latex/graphics/color.sty
+(/usr/share/texlive/texmf-dist/tex/latex/graphics/color.sty
 Package: color 2005/11/14 v1.0j Standard LaTeX Color (DPC)
 
-(/usr/share/texmf-dist/tex/latex/latexconfig/color.cfg
+(/usr/share/texlive/texmf-dist/tex/latex/latexconfig/color.cfg
 File: color.cfg 2007/01/18 v1.5 color configuration of teTeX/TeXLive
 )
 Package color Info: Driver file: pdftex.def on input line 130.
@@ -555,11 +555,10 @@ LaTeX Font Info:    ... okay on input line 31.
 LaTeX Font Info:    Checking defaults for U/cmr/m/n on input line 31.
 LaTeX Font Info:    ... okay on input line 31.
 LaTeX Font Info:    Try loading font information for T1+lmr on input line 31.
-
-(/usr/share/texmf-dist/tex/latex/lm/t1lmr.fd
+ (/usr/share/texmf/tex/latex/lm/t1lmr.fd
 File: t1lmr.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
-(/usr/share/texmf-dist/tex/context/base/supp-pdf.mkii
+(/usr/share/texlive/texmf-dist/tex/context/base/supp-pdf.mkii
 [Loading MPS to PDF converter (version 2006.09.02).]
 \scratchcounter=\count119
 \scratchdimen=\dimen129
@@ -572,15 +571,15 @@ File: t1lmr.fd 2009/10/30 v1.6 Font defs for Latin Modern
 \MPnumerator=\count123
 \makeMPintoPDFobject=\count124
 \everyMPtoPDFconversion=\toks43
-) (/usr/share/texmf-dist/tex/generic/oberdiek/pdftexcmds.sty
+) (/usr/share/texlive/texmf-dist/tex/generic/oberdiek/pdftexcmds.sty
 Package: pdftexcmds 2011/11/29 v0.20 Utility functions of pdfTeX for LuaTeX (HO
 )
 
-(/usr/share/texmf-dist/tex/generic/oberdiek/ifluatex.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/ifluatex.sty
 Package: ifluatex 2010/03/01 v1.3 Provides the ifluatex switch (HO)
 Package ifluatex Info: LuaTeX not detected.
 )
-(/usr/share/texmf-dist/tex/generic/oberdiek/ifpdf.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/ifpdf.sty
 Package: ifpdf 2011/01/30 v2.3 Provides the ifpdf switch (HO)
 Package ifpdf Info: pdfTeX in PDF mode is detected.
 )
@@ -589,22 +588,22 @@ Package pdftexcmds Info: \pdf@primitive is available.
 Package pdftexcmds Info: \pdf@ifprimitive is available.
 Package pdftexcmds Info: \pdfdraftmode found.
 )
-(/usr/share/texmf-dist/tex/latex/oberdiek/epstopdf-base.sty
+(/usr/share/texlive/texmf-dist/tex/latex/oberdiek/epstopdf-base.sty
 Package: epstopdf-base 2010/02/09 v2.5 Base part for package epstopdf
 
-(/usr/share/texmf-dist/tex/latex/oberdiek/grfext.sty
+(/usr/share/texlive/texmf-dist/tex/latex/oberdiek/grfext.sty
 Package: grfext 2010/08/19 v1.1 Manage graphics extensions (HO)
 
-(/usr/share/texmf-dist/tex/generic/oberdiek/kvdefinekeys.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/kvdefinekeys.sty
 Package: kvdefinekeys 2011/04/07 v1.3 Define keys (HO)
 ))
-(/usr/share/texmf-dist/tex/latex/oberdiek/kvoptions.sty
+(/usr/share/texlive/texmf-dist/tex/latex/oberdiek/kvoptions.sty
 Package: kvoptions 2011/06/30 v3.11 Key value format for package options (HO)
 
-(/usr/share/texmf-dist/tex/generic/oberdiek/kvsetkeys.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/kvsetkeys.sty
 Package: kvsetkeys 2012/04/25 v1.16 Key value parser (HO)
 
-(/usr/share/texmf-dist/tex/generic/oberdiek/etexcmds.sty
+(/usr/share/texlive/texmf-dist/tex/generic/oberdiek/etexcmds.sty
 Package: etexcmds 2011/02/16 v1.5 Avoid name clashes with e-TeX commands (HO)
 Package etexcmds Info: Could not find \expanded.
 (etexcmds)             That can mean that you are not using pdfTeX 1.50 or
@@ -616,30 +615,30 @@ Package grfext Info: Graphics extension search list:
 G,.JBIG2,.JB2,.eps]
 (grfext)             \AppendGraphicsExtensions on input line 452.
 
-(/usr/share/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
+(/usr/share/texlive/texmf-dist/tex/latex/latexconfig/epstopdf-sys.cfg
 File: epstopdf-sys.cfg 2010/07/13 v1.3 Configuration of (r)epstopdf for TeX Liv
 e
 ))
 LaTeX Font Info:    Try loading font information for OT1+lmr on input line 33.
 
-(/usr/share/texmf-dist/tex/latex/lm/ot1lmr.fd
+(/usr/share/texmf/tex/latex/lm/ot1lmr.fd
 File: ot1lmr.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
 LaTeX Font Info:    Try loading font information for OML+lmm on input line 33.
 
-(/usr/share/texmf-dist/tex/latex/lm/omllmm.fd
+(/usr/share/texmf/tex/latex/lm/omllmm.fd
 File: omllmm.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
 LaTeX Font Info:    Try loading font information for OMS+lmsy on input line 33.
 
 
-(/usr/share/texmf-dist/tex/latex/lm/omslmsy.fd
+(/usr/share/texmf/tex/latex/lm/omslmsy.fd
 File: omslmsy.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
 LaTeX Font Info:    Try loading font information for OMX+lmex on input line 33.
 
 
-(/usr/share/texmf-dist/tex/latex/lm/omxlmex.fd
+(/usr/share/texmf/tex/latex/lm/omxlmex.fd
 File: omxlmex.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
 LaTeX Font Info:    External font `lmex10' loaded for size
@@ -650,45 +649,50 @@ LaTeX Font Info:    External font `lmex10' loaded for size
 (Font)              <6> on input line 33.
 LaTeX Font Info:    Try loading font information for U+msa on input line 33.
 
-(/usr/share/texmf-dist/tex/latex/amsfonts/umsa.fd
+(/usr/share/texlive/texmf-dist/tex/latex/amsfonts/umsa.fd
 File: umsa.fd 2013/01/14 v3.01 AMS symbols A
 )
 LaTeX Font Info:    Try loading font information for U+msb on input line 33.
 
-(/usr/share/texmf-dist/tex/latex/amsfonts/umsb.fd
+(/usr/share/texlive/texmf-dist/tex/latex/amsfonts/umsb.fd
 File: umsb.fd 2013/01/14 v3.01 AMS symbols B
 )
 LaTeX Font Info:    Try loading font information for U+stmry on input line 33.
 
-(/usr/share/texmf-dist/tex/latex/stmaryrd/Ustmry.fd)
+(/usr/share/texlive/texmf-dist/tex/latex/stmaryrd/Ustmry.fd)
 Overfull \hbox (28.75941pt too wide) in paragraph at lines 33--33
  [][] 
  []
 
-(./IH/intro.tex [1
+[1
 
 {/var/lib/texmf/fonts/map/pdftex/updmap/pdftex.map}]
 LaTeX Font Info:    External font `lmex10' loaded for size
+(Font)              <9> on input line 82.
+LaTeX Font Info:    External font `lmex10' loaded for size
+(Font)              <5> on input line 82.
+ (./IH/intro.tex [2]
+LaTeX Font Info:    External font `lmex10' loaded for size
 (Font)              <10> on input line 51.
 LaTeX Font Info:    External font `lmex10' loaded for size
 (Font)              <7> on input line 51.
-LaTeX Font Info:    External font `lmex10' loaded for size
-(Font)              <5> on input line 51.
 )
-(./IH/notations.tex [2]
+(./IH/notations.tex [3]
 LaTeX Font Info:    Try loading font information for U+dsrom on input line 49.
- (/usr/share/texmf-dist/tex/latex/doublestroke/Udsrom.fd
+
+(/usr/share/texlive/texmf-dist/tex/latex/doublestroke/Udsrom.fd
 File: Udsrom.fd 1995/08/01 v0.1 Double stroke roman font definitions
 )
 LaTeX Font Info:    Try loading font information for OT1+lmss on input line 100
 .
- (/usr/share/texmf-dist/tex/latex/lm/ot1lmss.fd
+
+(/usr/share/texmf/tex/latex/lm/ot1lmss.fd
 File: ot1lmss.fd 2009/10/30 v1.6 Font defs for Latin Modern
-) [3]
+) [4]
 LaTeX Font Info:    Try loading font information for OMS+lmr on input line 166.
 
 
-(/usr/share/texmf-dist/tex/latex/lm/omslmr.fd
+(/usr/share/texmf/tex/latex/lm/omslmr.fd
 File: omslmr.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
 LaTeX Font Info:    Font shape `OMS/lmr/m/n' in size <10> not available
@@ -701,7 +705,7 @@ Overfull \hbox (5.15031pt too wide) in paragraph at lines 2--2
 []\T1/lmr/bx/n/14.4 The $[][]$ Chaotic It-er-a-tion based Wa-ter-mark-
  []
 
-[4]
+[5]
 Overfull \hbox (7.38942pt too wide) in paragraph at lines 51--62
 []\T1/lmr/m/it/10 Let us con-sider a set of grayscale im-ages stored into porta
 ble graymap
@@ -709,40 +713,39 @@ ble graymap
 
 LaTeX Font Info:    Font shape `OMS/lmr/m/it' in size <10> not available
 (Font)              Font shape `OMS/lmsy/m/n' tried instead on input line 69.
-<IH/img/lena512.pdf, id=39, 514.92375pt x 514.92375pt>
+[6] <IH/img/lena512.pdf, id=50, 514.92375pt x 514.92375pt>
 File: IH/img/lena512.pdf Graphic file (type pdf)
 
 <use IH/img/lena512.pdf>
 Package pdftex.def Info: IH/img/lena512.pdf used on input line 95.
 (pdftex.def)             Requested size: 106.69783pt x 106.69147pt.
 
-<IH/img/lena_msb_678.pdf, id=40, 514.92375pt x 514.92375pt>
+<IH/img/lena_msb_678.pdf, id=51, 514.92375pt x 514.92375pt>
 File: IH/img/lena_msb_678.pdf Graphic file (type pdf)
 
 <use IH/img/lena_msb_678.pdf>
 Package pdftex.def Info: IH/img/lena_msb_678.pdf used on input line 100.
 (pdftex.def)             Requested size: 106.69783pt x 106.69147pt.
 
-<IH/img/lena_lsb_1234_facteur17.pdf, id=41, 514.92375pt x 514.92375pt>
+<IH/img/lena_lsb_1234_facteur17.pdf, id=52, 514.92375pt x 514.92375pt>
 File: IH/img/lena_lsb_1234_facteur17.pdf Graphic file (type pdf)
 
 <use IH/img/lena_lsb_1234_facteur17.pdf>
 Package pdftex.def Info: IH/img/lena_lsb_1234_facteur17.pdf used on input line 
 106.
 (pdftex.def)             Requested size: 106.69783pt x 106.69147pt.
- [5]
 Package epstopdf Info: Source file: <IH/Medias/lena512.eps>
-(epstopdf)                    date: 2011-02-14 11:10:36
+(epstopdf)                    date: 2013-10-27 21:33:40
 (epstopdf)                    size: 330255 bytes
 (epstopdf)             Output file: <IH/Medias/lena512-eps-converted-to.pdf>
-(epstopdf)                    date: 2013-09-16 16:03:08
+(epstopdf)                    date: 2013-10-27 21:33:40
 (epstopdf)                    size: 61882 bytes
 (epstopdf)             Command: <repstopdf --outfile=IH/Medias/lena512-eps-conv
 erted-to.pdf IH/Medias/lena512.eps>
 (epstopdf)             \includegraphics on input line 142.
 Package epstopdf Info: Output file is already uptodate.
 
-<IH/Medias/lena512-eps-converted-to.pdf, id=46, 514.92375pt x 514.92375pt>
+<IH/Medias/lena512-eps-converted-to.pdf, id=53, 514.92375pt x 514.92375pt>
 File: IH/Medias/lena512-eps-converted-to.pdf Graphic file (type pdf)
 
 <use IH/Medias/lena512-eps-converted-to.pdf>
@@ -750,7 +753,7 @@ Package pdftex.def Info: IH/Medias/lena512-eps-converted-to.pdf used on input l
 ine 142.
 (pdftex.def)             Requested size: 113.81102pt x 113.81pt.
 
-<IH/iihmsp13/exp/invader.png, id=47, 64.24pt x 64.24pt>
+<IH/iihmsp13/exp/invader.png, id=54, 64.24pt x 64.24pt>
 File: IH/iihmsp13/exp/invader.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/invader.png>
@@ -767,18 +770,18 @@ Underfull \hbox (badness 10000) in paragraph at lines 143--143
  []
 
 Package epstopdf Info: Source file: <IH/Medias/lena512marqueDWT.eps>
-(epstopdf)                    date: 2011-02-14 11:10:36
+(epstopdf)                    date: 2013-10-27 21:33:40
 (epstopdf)                    size: 330550 bytes
 (epstopdf)             Output file: <IH/Medias/lena512marqueDWT-eps-converted-t
 o.pdf>
-(epstopdf)                    date: 2013-09-16 16:03:09
+(epstopdf)                    date: 2013-10-27 21:33:40
 (epstopdf)                    size: 61881 bytes
 (epstopdf)             Command: <repstopdf --outfile=IH/Medias/lena512marqueDWT
 -eps-converted-to.pdf IH/Medias/lena512marqueDWT.eps>
 (epstopdf)             \includegraphics on input line 144.
 Package epstopdf Info: Output file is already uptodate.
 
-<IH/Medias/lena512marqueDWT-eps-converted-to.pdf, id=48, 514.92375pt x 514.9237
+<IH/Medias/lena512marqueDWT-eps-converted-to.pdf, id=55, 514.92375pt x 514.9237
 5pt>
 File: IH/Medias/lena512marqueDWT-eps-converted-to.pdf Graphic file (type pdf)
  <use IH/Medias/lena512marqueDWT-eps-converted-to.pdf>
@@ -789,75 +792,76 @@ n input line 144.
 
 LaTeX Warning: `!h' float specifier changed to `!ht'.
 
-
+[7 <./IH/img/lena512.pdf> <./IH/img/lena_msb_678.pdf> <./IH/img/lena_lsb_1234_f
+acteur17.pdf>]
 Overfull \hbox (7.57658pt too wide) in paragraph at lines 175--176
  \T1/lmr/bx/n/10 CIIS strat-egy[] \T1/lmr/m/n/10 Let us first in-tro-duce the P
 iece-wise Lin-ear Chaotic Map (PLCM,
  []
 
-[6 <./IH/img/lena512.pdf> <./IH/img/lena_msb_678.pdf> <./IH/img/lena_lsb_1234_f
-acteur17.pdf>] [7 <./IH/Medias/lena512-eps-converted-to.pdf> <./IH/iihmsp13/exp
-/invader.png (PNG copy)> <./IH/Medias/lena512marqueDWT-eps-converted-to.pdf>]
-
-LaTeX Warning: `h' float specifier changed to `ht'.
-
-[8] [9] [10]) (./IH/cis2.tex [11]
+[8 <./IH/Medias/lena512-eps-converted-to.pdf> <./IH/iihmsp13/exp/invader.png (P
+NG copy)> <./IH/Medias/lena512marqueDWT-eps-converted-to.pdf>] [9] [10]
+[11]) (./IH/cis2.tex [12]
 Overfull \hbox (4.41489pt too wide) in paragraph at lines 87--95
 []\T1/lmr/m/n/10 The in-for-ma-tion hid-ing scheme pub-lished in [20] was for-m
 erly called Steganog-
  []
 
-[12] [13] [14] <IH/iihmsp13/exp/atq-dec.png, id=99, 578.16pt x 433.62pt>
+[13] [14] [15] <IH/iihmsp13/exp/atq-dec.png, id=106, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/atq-dec.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/atq-dec.png>
 Package pdftex.def Info: IH/iihmsp13/exp/atq-dec.png used on input line 376.
 (pdftex.def)             Requested size: 172.5pt x 129.37242pt.
 
-<IH/iihmsp13/exp/atq-jpg.png, id=100, 578.16pt x 433.62pt>
+<IH/iihmsp13/exp/atq-jpg.png, id=107, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/atq-jpg.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/atq-jpg.png>
 Package pdftex.def Info: IH/iihmsp13/exp/atq-jpg.png used on input line 398.
 (pdftex.def)             Requested size: 155.24895pt x 116.43716pt.
 
-<IH/iihmsp13/exp/atq-jp2.png, id=101, 578.16pt x 433.62pt>
+<IH/iihmsp13/exp/atq-jp2.png, id=108, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/atq-jp2.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/atq-jp2.png>
 Package pdftex.def Info: IH/iihmsp13/exp/atq-jp2.png used on input line 400.
 (pdftex.def)             Requested size: 155.24895pt x 116.43716pt.
-
-<IH/iihmsp13/exp/atq-rot.png, id=102, 578.16pt x 433.62pt>
+ [16 <./IH/iihmsp13/exp/atq-dec.png>]
+<IH/iihmsp13/exp/atq-rot.png, id=113, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/atq-rot.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/atq-rot.png>
 Package pdftex.def Info: IH/iihmsp13/exp/atq-rot.png used on input line 418.
 (pdftex.def)             Requested size: 172.5pt x 129.37242pt.
- [15 <./IH/iihmsp13/exp/atq-dec.png>]
-<IH/iihmsp13/exp/atq-lsb.png, id=107, 578.16pt x 433.62pt>
+ [17 <./IH/iihmsp13/exp/atq-jpg.png> <./IH/iihmsp13/exp/atq-jp2.png> <./IH/iihm
+sp13/exp/atq-rot.png>]
+<IH/iihmsp13/exp/atq-lsb.png, id=120, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/atq-lsb.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/atq-lsb.png>
 Package pdftex.def Info: IH/iihmsp13/exp/atq-lsb.png used on input line 444.
 (pdftex.def)             Requested size: 155.24895pt x 116.43716pt.
 
-<IH/iihmsp13/exp/atq-ci2.png, id=108, 578.16pt x 433.62pt>
+<IH/iihmsp13/exp/atq-ci2.png, id=121, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/atq-ci2.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/atq-ci2.png>
 Package pdftex.def Info: IH/iihmsp13/exp/atq-ci2.png used on input line 446.
 (pdftex.def)             Requested size: 155.24895pt x 116.43716pt.
 
-<IH/iihmsp13/exp/ROC.png, id=109, 578.16pt x 433.62pt>
+<IH/iihmsp13/exp/ROC.png, id=122, 578.16pt x 433.62pt>
 File: IH/iihmsp13/exp/ROC.png Graphic file (type png)
 
 <use IH/iihmsp13/exp/ROC.png>
 Package pdftex.def Info: IH/iihmsp13/exp/ROC.png used on input line 465.
 (pdftex.def)             Requested size: 172.5pt x 129.37242pt.
- [16 <./IH/iihmsp13/exp/atq-jpg.png> <./IH/iihmsp13/exp/atq-jp2.png> <./IH/iihm
-sp13/exp/atq-rot.png>] [17 <./IH/iihmsp13/exp/atq-lsb.png> <./IH/iihmsp13/exp/a
-tq-ci2.png> <./IH/iihmsp13/exp/ROC.png>]
+ [18 <./IH/iihmsp13/exp/atq-lsb.png> <./IH/iihmsp13/exp/atq-ci2.png> <./IH/iihm
+sp13/exp/ROC.png>]
+
+LaTeX Warning: `h' float specifier changed to `ht'.
+
+
 Overfull \hbox (79.7776pt too wide) in paragraph at lines 558--566
 \T1/lmr/m/it/10 lows. If $[] \OT1/lmr/m/n/10 = [] \OML/lmm/m/it/10 ;$
  []
@@ -869,15 +873,15 @@ equal to: $\OML/lmm/m/it/10 s \OT1/lmr/m/n/10 = 0\OML/lmm/m/it/10 ;   []  []  [
 ]  []  []  [] []$
  []
 
-[18] [19] [20] [21]) (./IH/di3.tex [22]
+[19] [20] [21] [22]) (./IH/di3.tex [23]
 
 LaTeX Font Warning: Font shape `U/stmry/b/n' undefined
 (Font)              using `U/stmry/m/n' instead on input line 75.
 
-[23] [24]
+[24] [25]
 LaTeX Font Info:    Try loading font information for T1+lmtt on input line 226.
 
- (/usr/share/texmf-dist/tex/latex/lm/t1lmtt.fd
+ (/usr/share/texmf/tex/latex/lm/t1lmtt.fd
 File: t1lmtt.fd 2009/10/30 v1.6 Font defs for Latin Modern
 )
 
@@ -892,84 +896,88 @@ LaTeX Warning: `h' float specifier changed to `ht'.
 
 LaTeX Warning: `h' float specifier changed to `ht'.
 
-[25] [26] <IH/graphs/atq-jpg.pdf, id=155, 578.16pt x 433.62pt>
+
+LaTeX Warning: `h' float specifier changed to `ht'.
+
+[26] [27] <IH/graphs/atq-jpg.pdf, id=162, 578.16pt x 433.62pt>
 File: IH/graphs/atq-jpg.pdf Graphic file (type pdf)
 
 <use IH/graphs/atq-jpg.pdf>
 Package pdftex.def Info: IH/graphs/atq-jpg.pdf used on input line 404.
 (pdftex.def)             Requested size: 199.16928pt x 149.3741pt.
 
-<IH/graphs/atq-jp2.pdf, id=156, 578.16pt x 433.62pt>
+<IH/graphs/atq-jp2.pdf, id=163, 578.16pt x 433.62pt>
 File: IH/graphs/atq-jp2.pdf Graphic file (type pdf)
 
 <use IH/graphs/atq-jp2.pdf>
 Package pdftex.def Info: IH/graphs/atq-jp2.pdf used on input line 410.
 (pdftex.def)             Requested size: 199.16928pt x 149.3741pt.
 
-<IH/graphs/atq-dec.pdf, id=157, 578.16pt x 433.62pt>
+<IH/graphs/atq-dec.pdf, id=164, 578.16pt x 433.62pt>
 File: IH/graphs/atq-dec.pdf Graphic file (type pdf)
 
 <use IH/graphs/atq-dec.pdf>
 Package pdftex.def Info: IH/graphs/atq-dec.pdf used on input line 416.
 (pdftex.def)             Requested size: 199.16928pt x 149.3741pt.
 
-<IH/graphs/atq-rot.pdf, id=158, 578.16pt x 433.62pt>
+<IH/graphs/atq-rot.pdf, id=165, 578.16pt x 433.62pt>
 File: IH/graphs/atq-rot.pdf Graphic file (type pdf)
 
 <use IH/graphs/atq-rot.pdf>
 Package pdftex.def Info: IH/graphs/atq-rot.pdf used on input line 422.
 (pdftex.def)             Requested size: 199.16928pt x 149.3741pt.
- [27]) (./IH/conclusion.tex) (./IH/wellKnown.tex
-[28] [29 <./IH/graphs/atq-jpg.pdf> <./IH/graphs/atq-jp2.pdf> <./IH/graphs/atq-d
-ec.pdf> <./IH/graphs/atq-rot.pdf>] [30]) (./article.bbl [31] [32] [33] [34])
+ [28]) (./IH/conclusion.tex) (./IH/wellKnown.tex
+[29] [30 <./IH/graphs/atq-jpg.pdf> <./IH/graphs/atq-jp2.pdf> <./IH/graphs/atq-d
+ec.pdf> <./IH/graphs/atq-rot.pdf>] [31] [32]) (./article.bbl [33] [34] [35]
+[36])
 \tf@thm=\write3
 \openout3 = `article.thm'.
 
-
-[35] (./article.aux)
+ [37] (./article.aux)
 
 LaTeX Font Warning: Some font shapes were not available, defaults substituted.
 
  ) 
 Here is how much of TeX's memory you used:
- 5754 strings out of 493311
- 76702 string characters out of 6143649
- 159130 words of memory out of 5000000
- 8984 multiletter control sequences out of 15000+600000
- 116722 words of font info for 98 fonts, out of 8000000 for 9000
957 hyphenation exceptions out of 8191
+ 5767 strings out of 495031
+ 77738 string characters out of 6181530
+ 156848 words of memory out of 5000000
+ 8743 multiletter control sequences out of 15000+600000
+ 125203 words of font info for 105 fonts, out of 8000000 for 9000
14 hyphenation exceptions out of 8191
  38i,18n,26p,437b,407s stack positions out of 5000i,500n,10000p,200000b,80000s
-{/usr/share/texmf-dist/fonts/enc/dvips/lm/lm-ec.enc}{/usr/share/texmf-dist/fo
-nts/enc/dvips/lm/lm-rm.enc}{/usr/share/texmf-dist/fonts/enc/dvips/lm/lm-mathsy.
-enc}{/usr/share/texmf-dist/fonts/enc/dvips/lm/lm-mathit.enc}{/usr/share/texmf-d
-ist/fonts/enc/dvips/lm/lm-mathex.enc}</usr/share/texmf-dist/fonts/type1/public/
-doublestroke/dsrom10.pfb></usr/share/texmf-dist/fonts/type1/public/doublestroke
-/dsrom8.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmbsy10.pfb></usr/shar
-e/texmf-dist/fonts/type1/public/lm/lmbx10.pfb></usr/share/texmf-dist/fonts/type
-1/public/lm/lmbx12.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmbx7.pfb><
-/usr/share/texmf-dist/fonts/type1/public/lm/lmbx9.pfb></usr/share/texmf-dist/fo
-nts/type1/public/lm/lmex10.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmm
-i10.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmmi5.pfb></usr/share/texm
-f-dist/fonts/type1/public/lm/lmmi7.pfb></usr/share/texmf-dist/fonts/type1/publi
-c/lm/lmr10.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmr12.pfb></usr/sha
-re/texmf-dist/fonts/type1/public/lm/lmr17.pfb></usr/share/texmf-dist/fonts/type
-1/public/lm/lmr5.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmr6.pfb></us
-r/share/texmf-dist/fonts/type1/public/lm/lmr7.pfb></usr/share/texmf-dist/fonts/
-type1/public/lm/lmr8.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmr9.pfb>
-</usr/share/texmf-dist/fonts/type1/public/lm/lmri10.pfb></usr/share/texmf-dist/
-fonts/type1/public/lm/lmri7.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lm
-ss10.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmss8.pfb></usr/share/tex
-mf-dist/fonts/type1/public/lm/lmsy10.pfb></usr/share/texmf-dist/fonts/type1/pub
-lic/lm/lmsy5.pfb></usr/share/texmf-dist/fonts/type1/public/lm/lmsy7.pfb></usr/s
-hare/texmf-dist/fonts/type1/public/lm/lmtt10.pfb></usr/share/texmf-dist/fonts/t
-ype1/public/amsfonts/symbols/msam10.pfb></usr/share/texmf-dist/fonts/type1/publ
-ic/amsfonts/symbols/msbm10.pfb></usr/share/texmf-dist/fonts/type1/public/amsfon
-ts/symbols/msbm7.pfb></usr/share/texmf-dist/fonts/type1/public/stmaryrd/stmary1
-0.pfb></usr/share/texmf-dist/fonts/type1/public/stmaryrd/stmary7.pfb>
-Output written on article.pdf (35 pages, 1123996 bytes).
+{/usr/share/texmf/fonts/enc/dvips/lm/lm-ec.enc}{/usr/share/texmf/fonts/enc/dv
+ips/lm/lm-rm.enc}{/usr/share/texmf/fonts/enc/dvips/lm/lm-mathsy.enc}{/usr/share
+/texmf/fonts/enc/dvips/lm/lm-mathit.enc}{/usr/share/texmf/fonts/enc/dvips/lm/lm
+-mathex.enc}</usr/share/texlive/texmf-dist/fonts/type1/public/doublestroke/dsro
+m10.pfb></usr/share/texlive/texmf-dist/fonts/type1/public/doublestroke/dsrom8.p
+fb></usr/share/texmf/fonts/type1/public/lm/lmbsy10.pfb></usr/share/texmf/fonts/
+type1/public/lm/lmbx10.pfb></usr/share/texmf/fonts/type1/public/lm/lmbx12.pfb><
+/usr/share/texmf/fonts/type1/public/lm/lmbx7.pfb></usr/share/texmf/fonts/type1/
+public/lm/lmbx9.pfb></usr/share/texmf/fonts/type1/public/lm/lmex10.pfb></usr/sh
+are/texmf/fonts/type1/public/lm/lmmi10.pfb></usr/share/texmf/fonts/type1/public
+/lm/lmmi5.pfb></usr/share/texmf/fonts/type1/public/lm/lmmi6.pfb></usr/share/tex
+mf/fonts/type1/public/lm/lmmi7.pfb></usr/share/texmf/fonts/type1/public/lm/lmr1
+0.pfb></usr/share/texmf/fonts/type1/public/lm/lmr12.pfb></usr/share/texmf/fonts
+/type1/public/lm/lmr17.pfb></usr/share/texmf/fonts/type1/public/lm/lmr5.pfb></u
+sr/share/texmf/fonts/type1/public/lm/lmr6.pfb></usr/share/texmf/fonts/type1/pub
+lic/lm/lmr7.pfb></usr/share/texmf/fonts/type1/public/lm/lmr8.pfb></usr/share/te
+xmf/fonts/type1/public/lm/lmr9.pfb></usr/share/texmf/fonts/type1/public/lm/lmri
+10.pfb></usr/share/texmf/fonts/type1/public/lm/lmri7.pfb></usr/share/texmf/font
+s/type1/public/lm/lmri9.pfb></usr/share/texmf/fonts/type1/public/lm/lmss10.pfb>
+</usr/share/texmf/fonts/type1/public/lm/lmss8.pfb></usr/share/texmf/fonts/type1
+/public/lm/lmsy10.pfb></usr/share/texmf/fonts/type1/public/lm/lmsy5.pfb></usr/s
+hare/texmf/fonts/type1/public/lm/lmsy7.pfb></usr/share/texmf/fonts/type1/public
+/lm/lmsy9.pfb></usr/share/texmf/fonts/type1/public/lm/lmtt10.pfb></usr/share/te
+xlive/texmf-dist/fonts/type1/public/amsfonts/symbols/msam10.pfb></usr/share/tex
+live/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm10.pfb></usr/share/texl
+ive/texmf-dist/fonts/type1/public/amsfonts/symbols/msbm7.pfb></usr/share/texliv
+e/texmf-dist/fonts/type1/public/stmaryrd/stmary10.pfb></usr/share/texlive/texmf
+-dist/fonts/type1/public/stmaryrd/stmary7.pfb>
+Output written on article.pdf (37 pages, 1170420 bytes).
 PDF statistics:
- 427 PDF objects out of 1000 (max. 8388607)
- 215 compressed objects within 3 object streams
+ 450 PDF objects out of 1000 (max. 8388607)
+ 233 compressed objects within 3 object streams
  0 named destinations out of 1000 (max. 500000)
  86 words of extra memory for PDF output out of 10000 (max. 10000000)
 
index 2585a904e6dbfe2088c4a5c23bbfe340d9e4b723..db2663a2b25256ac3e567201612bfb08ce2a397a 100644 (file)
Binary files a/article.pdf and b/article.pdf differ
diff --git a/article.synctex.gz b/article.synctex.gz
deleted file mode 100644 (file)
index a578869..0000000
Binary files a/article.synctex.gz and /dev/null differ
index af63053f032160c637d34b5bfbce6b8283ef4e10..7a1c93c28c8ffa777c1afb3a4a07f1732bf1ccab 100644 (file)
 
 
 \begin{abstract}
-Information hiding schemes are studied 
-Spread-spectrum data-hiding techniques have been widely studied in recent years
-under the scope of security. These techniques encompass several schemes, such as 
-Improved Spread Spectrum~(ISS), Circular Watermarking~(CW), and Natural 
-Watermarking~(NW). Some of these schemes have revealed various 
-security issues. On the contrary, it has
-been proven in~\cite{Cayre2008} that the Natural Watermarking technique is 
-stego-secure. This stego-security is one of the security classes defined 
-in~\cite{Cayre2008}, where probabilistic models are used to 
-categorize the security of data hiding algorithms in the Watermark Only 
-Attack~(WOA) framework.
-
-We have explained in our previous research works~\cite{guyeux13:bc}
-that any algorithm can be rewritten as an iterative
-process, leading to the possibility to study its
-topological behavior. As a concrete example, 
-we have shown that the security level of some information hiding algorithms 
-(of the spread-spectrum kind) can be studied into a 
-novel framework based on unpredictability, as it is understood in the mathematical
-theory of chaos~\cite{guyeux13:bc}. 
-The key idea motivating our research works is that: \emph{if artificial intelligence (AI)
-tools seem to have difficulties to deal with chaos, then steganalyzers (software based 
-on AI that try to separate original from stego-contents) may
-be proven defective against chaotic information hiding schemes}. Our work
-has thus constituted in showing theoretically that such chaotic schemes can be constructed. 
-We are not looking to struggle with best available information hiding techniques and
-we do not focus on effective and operational aspects, as
-our questioning are more locating in a conceptual domain. Among other things, we do
-not specify how to chose embedding coefficients, but the way to insert the hidden
-message in a selection of these ``least significant coefficient'' in an unpredictable
-manner. To say this another
-way, our intention is not to realize an hidden channel that does not appear as sleazy
-to a steganalyzer, but to construct an information hiding scheme whose behavior cannot
-be predicted: supposing that the adversary has anything (algorithm, possible embedding 
-coefficient, etc.) but the secret key, we want to determine if he can predict which coefficients
-will be finally used, and in which order. To do so, a new class of security has been 
-introduced in~\cite{bg10b:ip}, namely the topological security. This new class can be used to study 
-some categories of attacks that are difficult to investigate in the existing 
-security approach. It also enriches the variety of qualitative and quantitative 
-tools that evaluate how strong the security is, thus reinforcing the confidence 
-that can be added in a given scheme. 
-
-In addition of being stego-secure, we have proven in~\cite{gfb10:ip} that 
-Natural Watermarking (NW) technique is topologically secure. Moreover, this technique 
-possesses additional properties of unpredictability, namely, strong transitivity,
-topological mixing, and a constant of sensitivity equal to $\frac{N}{2}$~\cite{Guyeux2012}.
-However NW are not expansive, which is in our opinion problematic in the Constant-Message 
-Attack (CMA) and Known Message Attack (KMA) setups, when we
-consider that the attacker has all but the embedding key~\cite{Guyeux2012}. 
-Since these initial investigations, our research works in that information hiding field have
-thus consisted in searching more secure schemes than NW, regarding the 
-concerns presented in the first paragraph of this introduction. The objective
-of this review paper is to list the results obtained by following such an approach.
-
-This article is organized as follows. Notations and terminologies are firstly recalled in 
-the next section. Then the formerly published $\mathcal{CIW}_1$ chaotic iteration based one-bit watermarking 
-process is recalled in detail in Section~\ref{sec:ciw1}. Its steganographic version $\mathcal{CIS}_2$ 
-is then explained in Section~\ref{sec:secrypt11}, while Section~\ref{di3sec} presents the
-$\mathcal{DI}_3$ process, whose aims is to merge the two previous approaches.
-This review article of chaotic iterations based information hiding algorithms 
-ends by a conclusion section containing intended future works.
-
+Steganographic Information Hiding (IH) schemes 
+are in competition with Artificial Intelligence based
+Steganalysers. 
+However, such kind of latter approaches suffer for dealing with
+unpredictable behaviors.
+The open problem is how defective they can be  
+proven against IH schemes based on mathematical chaos,
+since this framework is theoretically and practically unpredictable.
+This article addresses this problem and presents a review of IH schemes
+based on Devaney's mathematical chaos.
 \end{abstract}
 
 \input{IH/intro}
index 3a61f1b1565e68c81cde8d08f11a67b66c0f838b..3ba9dbf1a0d9e1e81db3d21cfe4f2e00daea7b1f 100644 (file)
@@ -1,48 +1,48 @@
-\contentsline {Def}{{Definition}{1}{}}{3}
-\contentsline {Def}{{Definition}{2}{}}{3}
-\contentsline {Def}{{Definition}{3}{}}{3}
-\contentsline {Def}{{Definition}{4}{Devaney's chaos}}{3}
-\contentsline {Def}{{Definition}{5}{}}{3}
-\contentsline {Def}{{Definition}{6}{}}{3}
-\contentsline {Th}{{Theorem}{1}{}}{4}
-\contentsline {Def}{{Definition}{7}{}}{5}
-\contentsline {Ex}{{Example}{1}{}}{5}
-\contentsline {Def}{{Definition}{8}{}}{5}
-\contentsline {Def}{{Definition}{9}{PLCM}}{7}
-\contentsline {Def}{{Definition}{10}{Security~\cite {Kalker2001}}}{8}
-\contentsline {Def}{{Definition}{11}{Robustness~\cite {Kalker2001}}}{8}
-\contentsline {Def}{{Definition}{12}{}}{8}
-\contentsline {Def}{{Definition}{13}{}}{8}
-\contentsline {Def}{{Definition}{14}{}}{8}
-\contentsline {Def}{{Definition}{15}{}}{8}
-\contentsline {Def}{{Definition}{16}{Stego-Security~\cite {Cayre2008}}}{9}
-\contentsline {Prop}{{Proposition}{1}{}}{9}
-\contentsline {Def}{{Definition}{17}{}}{10}
-\contentsline {Prop}{{Proposition}{2}{}}{10}
-\contentsline {Def}{{Definition}{18}{}}{11}
-\contentsline {Def}{{Definition}{19}{}}{11}
-\contentsline {Def}{{Definition}{20}{}}{11}
-\contentsline {Prop}{{Proposition}{3}{}}{12}
-\contentsline {Pre}{{Proof}{1}{}}{12}
-\contentsline {Prop}{{Proposition}{4}{}}{13}
-\contentsline {Prop}{{Proposition}{5}{}}{13}
-\contentsline {Th}{{Theorem}{2}{}}{13}
-\contentsline {Prop}{{Proposition}{6}{}}{14}
-\contentsline {Def}{{Definition}{21}{}}{18}
-\contentsline {Def}{{Definition}{22}{}}{18}
-\contentsline {Def}{{Definition}{23}{}}{19}
-\contentsline {Def}{{Definition}{24}{}}{19}
-\contentsline {Def}{{Definition}{25}{}}{20}
-\contentsline {Prop}{{Proposition}{7}{}}{20}
-\contentsline {Th}{{Theorem}{3}{}}{20}
-\contentsline {Prop}{{Proposition}{8}{}}{21}
-\contentsline {Th}{{Theorem}{4}{}}{21}
-\contentsline {Th}{{Theorem}{5}{}}{21}
-\contentsline {Th}{{Theorem}{6}{}}{22}
-\contentsline {Rem}{{Rem}{1}{}}{22}
-\contentsline {Def}{{Definition}{26}{}}{23}
-\contentsline {Def}{{Definition}{27}{}}{23}
-\contentsline {Rem}{{Rem}{2}{}}{23}
-\contentsline {Def}{{Definition}{28}{$\mathcal {DI}_3$ Data hiding scheme}}{23}
-\contentsline {Prop}{{Proposition}{9}{}}{23}
-\contentsline {Rem}{{Rem}{3}{}}{25}
+\contentsline {Def}{{Definition}{1}{}}{4}
+\contentsline {Def}{{Definition}{2}{}}{4}
+\contentsline {Def}{{Definition}{3}{}}{4}
+\contentsline {Def}{{Definition}{4}{Devaney's chaos}}{4}
+\contentsline {Def}{{Definition}{5}{}}{4}
+\contentsline {Def}{{Definition}{6}{}}{5}
+\contentsline {Th}{{Theorem}{1}{}}{5}
+\contentsline {Def}{{Definition}{7}{}}{6}
+\contentsline {Ex}{{Example}{1}{}}{6}
+\contentsline {Def}{{Definition}{8}{}}{6}
+\contentsline {Def}{{Definition}{9}{PLCM}}{8}
+\contentsline {Def}{{Definition}{10}{Security~\cite {Kalker2001}}}{9}
+\contentsline {Def}{{Definition}{11}{Robustness~\cite {Kalker2001}}}{9}
+\contentsline {Def}{{Definition}{12}{}}{9}
+\contentsline {Def}{{Definition}{13}{}}{10}
+\contentsline {Def}{{Definition}{14}{}}{10}
+\contentsline {Def}{{Definition}{15}{}}{10}
+\contentsline {Def}{{Definition}{16}{Stego-Security~\cite {Cayre2008}}}{10}
+\contentsline {Prop}{{Proposition}{1}{}}{11}
+\contentsline {Def}{{Definition}{17}{}}{11}
+\contentsline {Prop}{{Proposition}{2}{}}{11}
+\contentsline {Def}{{Definition}{18}{}}{12}
+\contentsline {Def}{{Definition}{19}{}}{13}
+\contentsline {Def}{{Definition}{20}{}}{13}
+\contentsline {Prop}{{Proposition}{3}{}}{13}
+\contentsline {Pre}{{Proof}{1}{}}{13}
+\contentsline {Prop}{{Proposition}{4}{}}{14}
+\contentsline {Prop}{{Proposition}{5}{}}{14}
+\contentsline {Th}{{Theorem}{2}{}}{14}
+\contentsline {Prop}{{Proposition}{6}{}}{15}
+\contentsline {Def}{{Definition}{21}{}}{19}
+\contentsline {Def}{{Definition}{22}{}}{19}
+\contentsline {Def}{{Definition}{23}{}}{20}
+\contentsline {Def}{{Definition}{24}{}}{20}
+\contentsline {Def}{{Definition}{25}{}}{21}
+\contentsline {Prop}{{Proposition}{7}{}}{21}
+\contentsline {Th}{{Theorem}{3}{}}{21}
+\contentsline {Prop}{{Proposition}{8}{}}{22}
+\contentsline {Th}{{Theorem}{4}{}}{22}
+\contentsline {Th}{{Theorem}{5}{}}{22}
+\contentsline {Th}{{Theorem}{6}{}}{23}
+\contentsline {Rem}{{Rem}{1}{}}{23}
+\contentsline {Def}{{Definition}{26}{}}{24}
+\contentsline {Def}{{Definition}{27}{}}{24}
+\contentsline {Rem}{{Rem}{2}{}}{24}
+\contentsline {Def}{{Definition}{28}{$\mathcal {DI}_3$ Data hiding scheme}}{24}
+\contentsline {Prop}{{Proposition}{9}{}}{25}
+\contentsline {Rem}{{Rem}{3}{}}{26}