Banks, J., Brooks, J., Cairns, G., and Stacey, P. (1992). On
devaney’s definition of chaos. Amer. Math. Monthly,
99:332–334.
Barni, M., Bartolini, F., and Furon, T. (2003). A general
framework for robust watermarking security. Signal
Processing, 83(10):2069–2084. Special issue on Se-
curity of Data Hiding Technologies, invited paper.
Bergmair, R. and Katzenbeisser, S. (2006). Content-aware
steganography: About lazy prisoners and narrow-
minded wardens. In (Camenisch et al., 2007), pages
109–123.
Bras-Amor´os, M. and Domingo-Ferrer, J. (2008). On over-
lappings of digitized straight lines and shared stegano-
graphic file systems. Transactions on Data Privacy,
1(3):131–139.
Cachin, C. (1998). An information-theoretic model for
steganography. In Information Hiding, volume 1525
of Lecture Notes in Computer Science, pages 306–
318. Springer Berlin / Heidelberg.
Camenisch, J., Collberg, C. S., Johnson, N. F., and Sallee,
P., editors (2007). Information Hiding, 8th Interna-
tional Workshop, IH 2006, Alexandria, VA, USA, July
10-12, 2006. Revised Selcted Papers, volume 4437 of
Lecture Notes in Computer Science. Springer.
Cayre, F. and Bas, P. (2008). Kerckhoffs-based embedding
security classes for woa data hiding. IEEE Transac-
tions on Information Forensics and Security, 3(1):1–
15.
Cayre, F., Fontaine, C., and Furon, T. (2005). Watermarking
security: theory and practice. IEEE Transactions on
Signal Processing, 53(10):3976–3987.
Devaney, R. L. (1989). An Introduction to Chaotic Dynam-
ical Systems. Addison-Wesley, Redwood City, CA,
2nd edition.
Domingo-Ferrer, J. and Bras-Amor´os, M. (2008). A shared
steganographic file system with error correction. In
Torra, V. and Narukawa, Y., editors, MDAI, volume
5285 of Lecture Notes in Computer Science, pages
227–238. Springer.
Furon, T. (2002). Security analysis. European Project IST-
1999-10987 CERTIMARK, Deliverable D.5.5.
Guyeux, C., Friot, N., and Bahi, J. (2010). Chaotic itera-
tions versus spread-spectrum: chaos and stego secu-
rity. In IIH-MSP’10, 6-th Int. Conf. on Intelligent In-
formation Hiding and Multimedia Signal Processing,
pages 208–211, Darmstadt, Germany.
Kalker, T. (2001). Considerations on watermarking security.
pages 201–206.
Katzenbeisser, S. and Dittmann, J. (2004). Malicious at-
tacks on media authentication schemes based on in-
vertible watermarks. In Delp, E. J. and Wong, P. W.,
editors, Security, Steganography, and Watermarking
of Multimedia Contents, volume 5306 of Proceedings
of SPIE, pages 838–847. SPIE.
Ker, A. D. (2006). Batch steganography and pooled ste-
ganalysis. In (Camenisch et al., 2007), pages 265–
281.
Mittelholzer, T. (1999). An information-theoretic approach
to steganography and watermarking. In Pfitzmann,
A., editor, Information Hiding, volume 1768 of Lec-
ture Notes in Computer Science, pages 1–16, Dresden,
Germany. Springer.
Perez-Freire, L., Prez-gonzalez, F., and Comesaa, P. (2006).
Secret dither estimation in lattice-quantization data
hiding: A set-membership approach. In Delp, E. J.
and Wong, P. W., editors, Security, Steganography,
and Watermarking of Multimedia Contents, San Jose,
California, USA. SPIE.
Shannon, C. E. (1949). Communication theory of secrecy
systems. Bell Systems Technical Journal, 28:656–715.
Shujun, L., Qi, L., Wenmin, L., Xuanqin, M., and Yuan-
long, C. (2001). Statistical properties of digital piece-
wise linear chaotic maps and their roles in cryptogra-
phy and pseudo-random coding. Proceedings of the
8th IMA International Conference on Cryptography
and Coding, 1:205–221.
Simmons, G. J. (1984). The prisoners’ problem and the
subliminal channel. In Advances in Cryptology, Proc.
CRYPTO’83, pages 51–67.
CHAOTIC ITERATIONS FOR STEGANOGRAPHY - Stego-security and Chaos-security
227