1 \documentclass[journal]{IEEEtran}
2 \usepackage[utf8]{inputenc}
3 \usepackage[T1]{fontenc}
4 \usepackage[english]{babel}
6 \usepackage{amsmath,amssymb}
7 \usepackage{epsfig,psfrag}
8 \usepackage{graphics,graphicx}
12 \usepackage{subfigure}
20 \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
21 \newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}}
27 Jean-Fran\c cois Couchot, Christophe Guyeux, and
28 Jacques M. Bahi,~\IEEEmembership{Senior Member,~IEEE}\\
29 FEMTO-ST Institute, UMR 6174 CNRS\\
30 DISC Department, University of Franche-Comt\'{e}\\
32 \{jean-francois.couchot, christophe.guyeux, jacques.bahi\}@femto-st.fr\\
39 \title{Mathematical topology: a new practicable framework for
40 studying information-hiding security.
41 Application to Spread-Spectrum schemes.}
49 \newcommand{\ie}{\textit{i.e.}}
50 %\newcommand{\Nats}[0]{\ensuremath{\mathds{N}}}
51 %\newcommand{\R}[0]{\ensuremath{\mathds{R}}}
52 %\newcommand{\Bool}[0]{\ensuremath{\mathds{B}}}
57 Information hiding security is often expressed as a probability problem.
58 However, various classes of attacks cannot currently be addressed,
59 due to strong hypotheses not compatible with a probabilistic approach.
60 In this work, a complementary theoretical framework is presented to
61 improve security. Contrary to existing ones, it is not based
62 on probability theory, but on mathematical topology.
63 It addresses thus security issues in classes of
64 attacks that are not currently studied.
65 It can also be used to reinforce the
66 confidence in a new scheme.
67 In this paper, first the theoretical framework of the study is presented,
68 then some concrete examples are detailed in order to show how our approach
75 Information Hiding Security,
76 Mathematical Theory of Chaos,
77 Spread-Spectrum, Discrete Dynamical Systems,
88 \section{Introduction}
94 \section{Related Work and Contributions}
103 %Reprendre les contributions.}
108 \section{Chaos for Data Hiding Security}
109 \label{section:Chaos}
111 This section starts with a state of the art in chaos-based information hiding
112 (Sec.~\ref{subsection:ChaosInComputerScience}).
113 It reminds the readers of the theory of chaos as introduced by Devaney
114 (Sec.~\ref{subsection:Devaney}).
115 Other qualitative and quantitative properties are next introduced
116 (Sec.~\ref{subsection:properties}).
117 Their application to information hiding concludes this section (Sec.~\ref{subsection:links}).
119 \subsection{State of the Art}
120 \label{subsection:ChaosInComputerScience}
123 \subsection{Devaney's Chaotic Dynamical Systems}
124 \label{subsection:Devaney}
127 \subsection{Qualitative and Quantitative
128 Properties of Discrete Dynamical Systems}
129 \label{subsection:properties}
132 \subsection{Chaos Properties and Information Hiding Security}
133 \label{subsection:links}
137 \section{Chaos-Security of two Data Hiding Schemes}
140 To check whether an existing data hiding scheme is chaos-secure, we
141 first write it as an iterate process $X^{n+1}=f(X^n)$
142 defined on the set $\mathcal{X}$, with $X^0$ as the initial
143 configuration of the machine.
144 Let then $\mathcal{T}(S)$ be the iterative process of a data hiding scheme $S$
145 and $\tau$ be a topology on the topological space $\mathcal{X}$.
146 If $\mathcal{T}(S)$ has a chaotic behavior on $\mathcal{X}$,
147 as defined by Devaney, $S$ is said
148 to be \emph{chaos-secure} on $(\mathcal{X},\tau)$.
150 This section studies two classes of
151 data hiding schemes in the perspective
157 \subsection{Spread-Spectrum Data Hiding Schemes}
159 \input{spreadspectrum}
162 \subsection{dhCI: Chaos-based Expansive Data Hiding Schemes}
168 \section{Discussion and Future Work}
172 %\bibliographystyle{compj}
173 \bibliographystyle{IEEEtran}
174 \bibliography{forensicsVer4}