Description
Summary:International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too.