Computer Science – Cryptography and Security
Scientific paper
2012-03-03
Computer Science
Cryptography and Security
10 pages
Scientific paper
In our previous researches, a new digital watermarking scheme based on chaotic iterations has been introduced. This scheme was both stego-secure and topologically secure. The stego-security is to face an attacker in the "watermark only attack" category, whereas the topological security concerns other categories of attacks. Its Lyapunov exponent is evaluated here, to quantify the chaos generated by this scheme. Keywords : Lyapunov exponent; Information hiding; Security; Chaotic iterations; Digital Watermarking.
Bahi Jacques M.
Friot Nicolas
Guyeux Christophe
No associations
LandOfFree
Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Lyapunov exponent evaluation of a digital watermarking scheme proven to be secure will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-331236