Topological study and Lyapunov exponent of a secure steganographic scheme
International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only...
Main Authors: | , , |
---|---|
Other Authors: | , , |
Format: | Conference Object |
Language: | English |
Published: |
HAL CCSD
2013
|
Subjects: | |
Online Access: | https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf |
id |
ftccsdartic:oai:HAL:hal-01304656v1 |
---|---|
record_format |
openpolar |
spelling |
ftccsdartic:oai:HAL:hal-01304656v1 2023-05-15T16:49:27+02:00 Topological study and Lyapunov exponent of a secure steganographic scheme Bahi, Jacques Friot, Nicolas Guyeux, Christophe Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST) Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC) Université Bourgogne Franche-Comté COMUE (UBFC)-Université Bourgogne Franche-Comté COMUE (UBFC)-Centre National de la Recherche Scientifique (CNRS) Reykjavik, Iceland 2013-07-29 https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf en eng HAL CCSD SciTePress IEEE hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf info:eu-repo/semantics/OpenAccess Security and Cryptography (SECRYPT), 2013 International Conference on 10th International Conference on Security and Cryptography (SECRYPT'2013) https://hal.archives-ouvertes.fr/hal-01304656 10th International Conference on Security and Cryptography (SECRYPT'2013), Jul 2013, Reykjavik, Iceland. pp.275--283 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7174743 [INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC] [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation info:eu-repo/semantics/conferenceObject Conference papers 2013 ftccsdartic 2021-10-17T01:17:20Z International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too. Conference Object Iceland Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe) |
institution |
Open Polar |
collection |
Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe) |
op_collection_id |
ftccsdartic |
language |
English |
topic |
[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC] [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation |
spellingShingle |
[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC] [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation Bahi, Jacques Friot, Nicolas Guyeux, Christophe Topological study and Lyapunov exponent of a secure steganographic scheme |
topic_facet |
[INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC] [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation |
description |
International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too. |
author2 |
Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST) Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC) Université Bourgogne Franche-Comté COMUE (UBFC)-Université Bourgogne Franche-Comté COMUE (UBFC)-Centre National de la Recherche Scientifique (CNRS) |
format |
Conference Object |
author |
Bahi, Jacques Friot, Nicolas Guyeux, Christophe |
author_facet |
Bahi, Jacques Friot, Nicolas Guyeux, Christophe |
author_sort |
Bahi, Jacques |
title |
Topological study and Lyapunov exponent of a secure steganographic scheme |
title_short |
Topological study and Lyapunov exponent of a secure steganographic scheme |
title_full |
Topological study and Lyapunov exponent of a secure steganographic scheme |
title_fullStr |
Topological study and Lyapunov exponent of a secure steganographic scheme |
title_full_unstemmed |
Topological study and Lyapunov exponent of a secure steganographic scheme |
title_sort |
topological study and lyapunov exponent of a secure steganographic scheme |
publisher |
HAL CCSD |
publishDate |
2013 |
url |
https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf |
op_coverage |
Reykjavik, Iceland |
genre |
Iceland |
genre_facet |
Iceland |
op_source |
Security and Cryptography (SECRYPT), 2013 International Conference on 10th International Conference on Security and Cryptography (SECRYPT'2013) https://hal.archives-ouvertes.fr/hal-01304656 10th International Conference on Security and Cryptography (SECRYPT'2013), Jul 2013, Reykjavik, Iceland. pp.275--283 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7174743 |
op_relation |
hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf |
op_rights |
info:eu-repo/semantics/OpenAccess |
_version_ |
1766039589362860032 |