CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security

Nicolas Friot, Christophe Guyeux, Jacques M. Bahi

2011

Abstract

In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called ``watermark-only attack''. Additionally, we prove that this scheme presents topological properties so that it is one of the firsts able to face, at least partially, an adversary when considering the others categories of attacks defined in the literature.

Download


Paper Citation


in Harvard Style

Friot N., Guyeux C. and M. Bahi J. (2011). CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 218-227. DOI: 10.5220/0003545002180227

in Bibtex Style

@conference{secrypt11,
author={Nicolas Friot and Christophe Guyeux and Jacques M. Bahi},
title={CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={218-227},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003545002180227},
isbn={978-989-8425-71-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
SN - 978-989-8425-71-3
AU - Friot N.
AU - Guyeux C.
AU - M. Bahi J.
PY - 2011
SP - 218
EP - 227
DO - 10.5220/0003545002180227