X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/these_qian.git/blobdiff_plain/69e15f7dca156a0c19b96e7ecdb4732465630b7e..00bb1f8de7321d28d6ee38d0841dd5f3a61a71f7:/these.mtc7?ds=inline diff --git a/these.mtc7 b/these.mtc7 index 68d5e87..8a2ba5e 100644 --- a/these.mtc7 +++ b/these.mtc7 @@ -1,14 +1,14 @@ -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.1}Application example of the use of the proposed PRNG}{\reset@font\mtcSfont 91}{section.14.1}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.2}Introduction}{\reset@font\mtcSfont 93}{section.14.2}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.3}Definition of a Chaos-Based Information Hiding Scheme}{\reset@font\mtcSfont 93}{section.14.3}} -{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.1}Most and least significant coefficients}{\reset@font\mtcSSfont 93}{subsection.14.3.1}} -{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.2}Stages of the scheme}{\reset@font\mtcSSfont 94}{subsection.14.3.2}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.1}Watermark mixture}{\reset@font\mtcSSSfont 94}{subsubsection.14.3.2.1}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.2}Watermark embedding}{\reset@font\mtcSSSfont 94}{subsubsection.14.3.2.2}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.3}Extraction}{\reset@font\mtcSSSfont 95}{subsubsection.14.3.2.3}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.4}Experimental protocol}{\reset@font\mtcSfont 95}{section.14.4}} -{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.5}Robustness evaluation}{\reset@font\mtcSfont 96}{section.14.5}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.4}Zeroing attack}{\reset@font\mtcSSSfont 97}{subsubsection.14.5.0.4}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.5}Rotation attack}{\reset@font\mtcSSSfont 98}{subsubsection.14.5.0.5}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.6}JPEG compression}{\reset@font\mtcSSSfont 98}{subsubsection.14.5.0.6}} -{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.7}Gaussian noise}{\reset@font\mtcSSSfont 99}{subsubsection.14.5.0.7}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.1}Application example of the use of the proposed PRNG}{\reset@font\mtcSfont 93}{section.14.1}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.2}Information hiding}{\reset@font\mtcSfont 95}{section.14.2}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.3}Definition of a Chaos-Based Information Hiding Scheme}{\reset@font\mtcSfont 95}{section.14.3}} +{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.1}Most and least significant coefficients}{\reset@font\mtcSSfont 95}{subsection.14.3.1}} +{\reset@font\mtcSSfont\mtc@string\contentsline{subsection}{\noexpand \leavevmode \numberline {7.3.2}Stages of the scheme}{\reset@font\mtcSSfont 96}{subsection.14.3.2}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.1}Watermark mixture}{\reset@font\mtcSSSfont 96}{subsubsection.14.3.2.1}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.2}Watermark embedding}{\reset@font\mtcSSSfont 96}{subsubsection.14.3.2.2}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.3.2.3}Extraction}{\reset@font\mtcSSSfont 97}{subsubsection.14.3.2.3}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.4}Experimental protocol}{\reset@font\mtcSfont 97}{section.14.4}} +{\reset@font\mtcSfont\mtc@string\contentsline{section}{\noexpand \leavevmode \numberline {7.5}Robustness evaluation}{\reset@font\mtcSfont 98}{section.14.5}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.4}Zeroing attack}{\reset@font\mtcSSSfont 99}{subsubsection.14.5.0.4}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.5}Rotation attack}{\reset@font\mtcSSSfont 100}{subsubsection.14.5.0.5}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.6}JPEG compression}{\reset@font\mtcSSSfont 100}{subsubsection.14.5.0.6}} +{\reset@font\mtcSSSfont\mtc@string\contentsline{subsubsection}{\noexpand \leavevmode \numberline {7.5.0.7}Gaussian noise}{\reset@font\mtcSSSfont 101}{subsubsection.14.5.0.7}}