X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/these_qian.git/blobdiff_plain/179c1fac8a03a8756d902b572f7e9d022d87f034..refs/heads/master:/these.mtc7 diff --git a/these.mtc7 b/these.mtc7 index 68d5e87..8a2ba5e 100644 --- a/these.mtc7 +++ b/these.mtc7 @@ -1,14 +1,14 @@ -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.1}Application example of the use of the proposed PRNG}{\reset@font\mtcSfont 91}{section.14.1}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.2}Introduction}{\reset@font\mtcSfont 93}{section.14.2}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.3}Definition of a Chaos-Based Information Hiding Scheme}{\reset@font\mtcSfont 93}{section.14.3}} -{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.1}Most and least significant coefficients}{\reset@font\mtcSSfont 93}{subsection.14.3.1}} -{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.2}Stages of the scheme}{\reset@font\mtcSSfont 94}{subsection.14.3.2}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.1}Watermark mixture}{\reset@font\mtcSSSfont 94}{subsubsection.14.3.2.1}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.2}Watermark embedding}{\reset@font\mtcSSSfont 94}{subsubsection.14.3.2.2}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.3}Extraction}{\reset@font\mtcSSSfont 95}{subsubsection.14.3.2.3}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.4}Experimental protocol}{\reset@font\mtcSfont 95}{section.14.4}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.5}Robustness evaluation}{\reset@font\mtcSfont 96}{section.14.5}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.4}Zeroing attack}{\reset@font\mtcSSSfont 97}{subsubsection.14.5.0.4}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.5}Rotation attack}{\reset@font\mtcSSSfont 98}{subsubsection.14.5.0.5}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.6}JPEG compression}{\reset@font\mtcSSSfont 98}{subsubsection.14.5.0.6}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.7}Gaussian noise}{\reset@font\mtcSSSfont 99}{subsubsection.14.5.0.7}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.1}Application example of the use of the proposed PRNG}{\reset@font\mtcSfont 93}{section.14.1}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.2}Information hiding}{\reset@font\mtcSfont 95}{section.14.2}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.3}Definition of a Chaos-Based Information Hiding Scheme}{\reset@font\mtcSfont 95}{section.14.3}} +{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.1}Most and least significant coefficients}{\reset@font\mtcSSfont 95}{subsection.14.3.1}} +{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.2}Stages of the scheme}{\reset@font\mtcSSfont 96}{subsection.14.3.2}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.1}Watermark mixture}{\reset@font\mtcSSSfont 96}{subsubsection.14.3.2.1}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.2}Watermark embedding}{\reset@font\mtcSSSfont 96}{subsubsection.14.3.2.2}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.3}Extraction}{\reset@font\mtcSSSfont 97}{subsubsection.14.3.2.3}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.4}Experimental protocol}{\reset@font\mtcSfont 97}{section.14.4}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.5}Robustness evaluation}{\reset@font\mtcSfont 98}{section.14.5}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.4}Zeroing attack}{\reset@font\mtcSSSfont 99}{subsubsection.14.5.0.4}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.5}Rotation attack}{\reset@font\mtcSSSfont 100}{subsubsection.14.5.0.5}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.6}JPEG compression}{\reset@font\mtcSSSfont 100}{subsubsection.14.5.0.6}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.7}Gaussian noise}{\reset@font\mtcSSSfont 101}{subsubsection.14.5.0.7}}