id ftccsdartic:oai:HAL:hal-01304656v1
record_format openpolar
spelling ftccsdartic:oai:HAL:hal-01304656v1 2023-05-15T16:49:27+02:00 Topological study and Lyapunov exponent of a secure steganographic scheme Bahi, Jacques Friot, Nicolas Guyeux, Christophe Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST) Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC) Université Bourgogne Franche-Comté COMUE (UBFC)-Université Bourgogne Franche-Comté COMUE (UBFC)-Centre National de la Recherche Scientifique (CNRS) Reykjavik, Iceland 2013-07-29 https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf en eng HAL CCSD SciTePress IEEE hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656 https://hal.archives-ouvertes.fr/hal-01304656/document https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf info:eu-repo/semantics/OpenAccess Security and Cryptography (SECRYPT), 2013 International Conference on 10th International Conference on Security and Cryptography (SECRYPT'2013) https://hal.archives-ouvertes.fr/hal-01304656 10th International Conference on Security and Cryptography (SECRYPT'2013), Jul 2013, Reykjavik, Iceland. pp.275--283 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7174743 [INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC] [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation info:eu-repo/semantics/conferenceObject Conference papers 2013 ftccsdartic 2021-10-17T01:17:20Z International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too. Conference Object Iceland Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
institution Open Polar
collection Archive ouverte HAL (Hyper Article en Ligne, CCSD - Centre pour la Communication Scientifique Directe)
op_collection_id ftccsdartic
language English
topic [INFO.INFO-DC]Computer Science [cs]/Distributed
Parallel
and Cluster Computing [cs.DC]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
spellingShingle [INFO.INFO-DC]Computer Science [cs]/Distributed
Parallel
and Cluster Computing [cs.DC]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
Bahi, Jacques
Friot, Nicolas
Guyeux, Christophe
Topological study and Lyapunov exponent of a secure steganographic scheme
topic_facet [INFO.INFO-DC]Computer Science [cs]/Distributed
Parallel
and Cluster Computing [cs.DC]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
description International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too.
author2 Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST)
Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Université de Franche-Comté (UFC)
Université Bourgogne Franche-Comté COMUE (UBFC)-Université Bourgogne Franche-Comté COMUE (UBFC)-Centre National de la Recherche Scientifique (CNRS)
format Conference Object
author Bahi, Jacques
Friot, Nicolas
Guyeux, Christophe
author_facet Bahi, Jacques
Friot, Nicolas
Guyeux, Christophe
author_sort Bahi, Jacques
title Topological study and Lyapunov exponent of a secure steganographic scheme
title_short Topological study and Lyapunov exponent of a secure steganographic scheme
title_full Topological study and Lyapunov exponent of a secure steganographic scheme
title_fullStr Topological study and Lyapunov exponent of a secure steganographic scheme
title_full_unstemmed Topological study and Lyapunov exponent of a secure steganographic scheme
title_sort topological study and lyapunov exponent of a secure steganographic scheme
publisher HAL CCSD
publishDate 2013
url https://hal.archives-ouvertes.fr/hal-01304656
https://hal.archives-ouvertes.fr/hal-01304656/document
https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf
op_coverage Reykjavik, Iceland
genre Iceland
genre_facet Iceland
op_source Security and Cryptography (SECRYPT), 2013 International Conference on
10th International Conference on Security and Cryptography (SECRYPT'2013)
https://hal.archives-ouvertes.fr/hal-01304656
10th International Conference on Security and Cryptography (SECRYPT'2013), Jul 2013, Reykjavik, Iceland. pp.275--283
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7174743
op_relation hal-01304656
https://hal.archives-ouvertes.fr/hal-01304656
https://hal.archives-ouvertes.fr/hal-01304656/document
https://hal.archives-ouvertes.fr/hal-01304656/file/bfg13%3Aip-author.pdf
op_rights info:eu-repo/semantics/OpenAccess
_version_ 1766039589362860032