CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
Nicolas Friot, Christophe Guyeux, Jacques M. Bahi
2011
Abstract
In this paper is proposed a novel steganographic scheme based on chaotic iterations. This research work takes place into the information hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called ``watermark-only attack''. Additionally, we prove that this scheme presents topological properties so that it is one of the firsts able to face, at least partially, an adversary when considering the others categories of attacks defined in the literature.
DownloadPaper Citation
in Harvard Style
Friot N., Guyeux C. and M. Bahi J. (2011). CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011) ISBN 978-989-8425-71-3, pages 218-227. DOI: 10.5220/0003545002180227
in Bibtex Style
@conference{secrypt11,
author={Nicolas Friot and Christophe Guyeux and Jacques M. Bahi},
title={CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)},
year={2011},
pages={218-227},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003545002180227},
isbn={978-989-8425-71-3},
}
in EndNote Style
TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2011)
TI - CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
SN - 978-989-8425-71-3
AU - Friot N.
AU - Guyeux C.
AU - M. Bahi J.
PY - 2011
SP - 218
EP - 227
DO - 10.5220/0003545002180227