id ftunifranchecom:oai:HAL:hal-01304656v1
record_format openpolar
spelling ftunifranchecom:oai:HAL:hal-01304656v1 2023-06-11T04:13:08+02:00 Topological study and Lyapunov exponent of a secure steganographic scheme Bahi, Jacques Friot, Nicolas Guyeux, Christophe Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST) Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Centre National de la Recherche Scientifique (CNRS)-Université de Franche-Comté (UFC) Université Bourgogne Franche-Comté COMUE (UBFC)-Université Bourgogne Franche-Comté COMUE (UBFC) Reykjavik, Iceland 2013-07-29 https://hal.science/hal-01304656 https://hal.science/hal-01304656/document https://hal.science/hal-01304656/file/bfg13%3Aip-author.pdf en eng HAL CCSD SciTePress IEEE hal-01304656 https://hal.science/hal-01304656 https://hal.science/hal-01304656/document https://hal.science/hal-01304656/file/bfg13%3Aip-author.pdf info:eu-repo/semantics/OpenAccess Security and Cryptography (SECRYPT), 2013 International Conference on 10th International Conference on Security and Cryptography (SECRYPT'2013) https://hal.science/hal-01304656 10th International Conference on Security and Cryptography (SECRYPT'2013), Jul 2013, Reykjavik, Iceland. pp.275--283 http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7174743 [INFO.INFO-DC]Computer Science [cs]/Distributed Parallel and Cluster Computing [cs.DC] [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] [INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation info:eu-repo/semantics/conferenceObject Conference papers 2013 ftunifranchecom 2023-04-18T23:54:14Z International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too. Conference Object Iceland Université de Franche-Comté (UFC): HAL
institution Open Polar
collection Université de Franche-Comté (UFC): HAL
op_collection_id ftunifranchecom
language English
topic [INFO.INFO-DC]Computer Science [cs]/Distributed
Parallel
and Cluster Computing [cs.DC]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
spellingShingle [INFO.INFO-DC]Computer Science [cs]/Distributed
Parallel
and Cluster Computing [cs.DC]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
Bahi, Jacques
Friot, Nicolas
Guyeux, Christophe
Topological study and Lyapunov exponent of a secure steganographic scheme
topic_facet [INFO.INFO-DC]Computer Science [cs]/Distributed
Parallel
and Cluster Computing [cs.DC]
[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
[INFO.INFO-MO]Computer Science [cs]/Modeling and Simulation
description International audience CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stegoand topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Itstopological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in theSimmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations overthe real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able towithdraw a malicious attacker in the "estimated original attack" context too.
author2 Franche-Comté Électronique Mécanique, Thermique et Optique - Sciences et Technologies (UMR 6174) (FEMTO-ST)
Université de Technologie de Belfort-Montbeliard (UTBM)-Ecole Nationale Supérieure de Mécanique et des Microtechniques (ENSMM)-Centre National de la Recherche Scientifique (CNRS)-Université de Franche-Comté (UFC)
Université Bourgogne Franche-Comté COMUE (UBFC)-Université Bourgogne Franche-Comté COMUE (UBFC)
format Conference Object
author Bahi, Jacques
Friot, Nicolas
Guyeux, Christophe
author_facet Bahi, Jacques
Friot, Nicolas
Guyeux, Christophe
author_sort Bahi, Jacques
title Topological study and Lyapunov exponent of a secure steganographic scheme
title_short Topological study and Lyapunov exponent of a secure steganographic scheme
title_full Topological study and Lyapunov exponent of a secure steganographic scheme
title_fullStr Topological study and Lyapunov exponent of a secure steganographic scheme
title_full_unstemmed Topological study and Lyapunov exponent of a secure steganographic scheme
title_sort topological study and lyapunov exponent of a secure steganographic scheme
publisher HAL CCSD
publishDate 2013
url https://hal.science/hal-01304656
https://hal.science/hal-01304656/document
https://hal.science/hal-01304656/file/bfg13%3Aip-author.pdf
op_coverage Reykjavik, Iceland
genre Iceland
genre_facet Iceland
op_source Security and Cryptography (SECRYPT), 2013 International Conference on
10th International Conference on Security and Cryptography (SECRYPT'2013)
https://hal.science/hal-01304656
10th International Conference on Security and Cryptography (SECRYPT'2013), Jul 2013, Reykjavik, Iceland. pp.275--283
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7174743
op_relation hal-01304656
https://hal.science/hal-01304656
https://hal.science/hal-01304656/document
https://hal.science/hal-01304656/file/bfg13%3Aip-author.pdf
op_rights info:eu-repo/semantics/OpenAccess
_version_ 1768389801212379136