Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
139 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Topological study and Lyapunov exponent of a secure steganographic scheme (1206.2847v2)

Published 13 Jun 2012 in cs.CR and cs.MM

Abstract: CIS2 is a steganographic scheme proposed in the information hiding literature, belonging into the small category of algorithms being both stego and topologically secure. Due to its stego-security, this scheme is able to face attacks that take place into the "watermark only attack" framework. Its topological security reinforce its capability to face attacks in other frameworks as "known message attack" or "known original attack", in the Simmons' prisoner problem. In this research work, the study of topological properties of C I S 2 is enlarged by describing this scheme as iterations over the real line, and investigating other security properties of topological nature as the Lyapunov exponent. Results show that this scheme is able to withdraw a malicious attacker in the "estimated original attack" context too.

Citations (1)

Summary

We haven't generated a summary for this paper yet.