<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>0120-5609</journal-id>
<journal-title><![CDATA[Ingeniería e Investigación]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. Investig.]]></abbrev-journal-title>
<issn>0120-5609</issn>
<publisher>
<publisher-name><![CDATA[Facultad de Ingeniería, Universidad Nacional de Colombia.]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S0120-56092018000200061</article-id>
<article-id pub-id-type="doi">10.15446/ing.investig.v38n2.64509</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Steganography applied in the origin claim of pictures captured by drones based on chaos]]></article-title>
<article-title xml:lang="es"><![CDATA[Esteganografía basada en caos, aplicada en la reclamación de origen en imágenes capturadas por drones]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Jiménez-Rodríguez]]></surname>
<given-names><![CDATA[Maricela]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Padilla-Leyferman]]></surname>
<given-names><![CDATA[Carlos E.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Estrada-Gutiérrez]]></surname>
<given-names><![CDATA[Juan C.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[González-Novoa]]></surname>
<given-names><![CDATA[María G.]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Gómez-Rodríguez]]></surname>
<given-names><![CDATA[Horacio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Flores-Siordia]]></surname>
<given-names><![CDATA[Octavio]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af3">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af4">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af5">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<aff id="Af6">
<institution><![CDATA[,Universidad de Guadalajara  ]]></institution>
<addr-line><![CDATA[ ]]></addr-line>
<country>Mexico</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2018</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2018</year>
</pub-date>
<volume>38</volume>
<numero>2</numero>
<fpage>61</fpage>
<lpage>69</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S0120-56092018000200061&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S0120-56092018000200061&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S0120-56092018000200061&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the system, a new technique that modifies the least significant bit (LSB) is applied, using a mathematical model to generate the chaotic orbits, one of the parts selects the RGB channel (Red, Green or Blue) where the LSB is changed and the other is implemented to calculate the random position of the sub pixel to be modified in the selected channel. In addition, a comparison between the bit to be hidden and the LSB of the pixel of the image is performed to verify if it is not necessary to modify it, which lessens the alterations in the container image. It is a tool to capture photos remotely with the Ar. Drone 2.0, with the features needed to perform an analysis that uses correlation diagrams and histograms to verify if the integrity of the message is guaranteed or if changes in the stego-image are visible to the naked eye. On the other hand, a test was done on the Baboon image to compare the robustness of the proposed system with other investigations, evaluating the correlation, contrast, energy, homogeneity, MSE, PSNR and quality index. The results generated were compared with the work of other authors concluding our system provides greater security, integrity, high sensitivity to the keys, it is not linked to a single chaotic system and can be applied to hide imperceptibly all kinds of information, in: radiographs, videos, files, official documents, and other types of containers.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN En este trabajo se implementa la esteganografía en las fotografías capturadas por un vehículo aéreo no tripulado (dron), con el fin de agregar un identificador que indique desde qué dispositivo son tomadas, y, de este modo, funcione para la reclamación de origen. En el sistema se aplica una nueva técnica que modifica solo el bit menos significativo (LSB), usando un modelo matemático que se utiliza para generar dos órbitas caóticas, una de las cuales se usa para seleccionar el canal RGB (Rojo, Verde o Azul), donde se cambia el LSB y la otra se implementa para calcular de forma aleatoria la posición del subpíxel que se modifica en el canal seleccionado; además se realiza una comparación entre el bit que se desea ocultar y el LSB del pixel de la imagen, para verificar si no es necesario modificarlo, lo cual altera menos la imagen contenedora. Se realizaron pruebas del algoritmo capturando fotografías de manera remota con un Ar.drone 2.0, con las cuales se hizo un análisis empleando diagramas de correlación e histogramas para verificar si se garantiza la integridad del mensaje o si a simple vista se detectan cambios en el esteganograma. Por otro lado, se realizaron tests a la imagen del Baboon para comparar la robustez del sistema propuesto con los de otras investigaciones, evaluando la correlación, contraste, energía, homogeneidad, MSE, PSNR e índice de calidad. Los resultados generados se compararon con los de otros autores determinando que nuestro sistema proporciona mayor seguridad, integridad, alta sensibilidad a las llaves, además, no está ligado a un solo sistema caótico y se puede aplicar para ocultar de forma imperceptible todo tipo de información, en: radiografías, videos, archivos, documentos oficiales, o cualquier otro tipo de contendor.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Steganography]]></kwd>
<kwd lng="en"><![CDATA[chaos]]></kwd>
<kwd lng="en"><![CDATA[security]]></kwd>
<kwd lng="en"><![CDATA[drones]]></kwd>
<kwd lng="es"><![CDATA[Esteganografía]]></kwd>
<kwd lng="es"><![CDATA[caos]]></kwd>
<kwd lng="es"><![CDATA[seguridad]]></kwd>
<kwd lng="es"><![CDATA[drones]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Anees]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Siddiqui]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Ahmed]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hussain]]></surname>
<given-names><![CDATA[I]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A technique for digital steganography using chaotic maps]]></article-title>
<source><![CDATA[Nonlinear Dynamics]]></source>
<year>2014</year>
<month>,</month>
<volume>75</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>807-16</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Aziz]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Tayarami-N]]></surname>
<given-names><![CDATA[M. H.]]></given-names>
</name>
<name>
<surname><![CDATA[Afsar]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A cycling chaos-based cryptic-free algorithm for image steganography]]></article-title>
<source><![CDATA[Nonlinear Dynamics]]></source>
<year>2015</year>
<volume>80</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1271-90</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Baig]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Khan]]></surname>
<given-names><![CDATA[M. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Beg]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Shah]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Saleem]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Onion steganography: a novel layering approach]]></article-title>
<source><![CDATA[Nonlinear Dynamics]]></source>
<year>2016</year>
<month>,</month>
<volume>84</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1431-46</page-range></nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bárbara-Morales]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Alba-Blanco]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Rodríguez-Ramírez]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Modulating electrocardiographic signals with chaotic algorithms]]></article-title>
<source><![CDATA[Ingeniería e Investigación]]></source>
<year>2012</year>
<month>,</month>
<volume>32</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>46-50</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ghebleh]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kanso]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A robust chaotic algorithm for digital image steganography]]></article-title>
<source><![CDATA[Communications in Nonlinear Science and Numerical Simulation]]></source>
<year>2014</year>
<month>,</month>
<volume>19</volume>
<numero>6</numero>
<issue>6</issue>
<page-range>1898-907</page-range></nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jiménez-Rodríguez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[González-Novoa]]></surname>
<given-names><![CDATA[M. G.]]></given-names>
</name>
<name>
<surname><![CDATA[Estrada-Gutiérrez]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Acosta-Lua]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
<name>
<surname><![CDATA[Flores-Siordia]]></surname>
<given-names><![CDATA[O]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure point-to-point communication using chaos]]></article-title>
<source><![CDATA[DYNA]]></source>
<year>2016</year>
<month>,</month>
<volume>83</volume>
<numero>197</numero>
<issue>197</issue>
<page-range>181-7</page-range></nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kanso]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ghebleh]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An algorithm for encryption of secret images into meaningful images]]></article-title>
<source><![CDATA[Optics and Lasers in Engineering]]></source>
<year>2017</year>
<month>,</month>
<volume>90</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>196-208</page-range></nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Martínez-González]]></surname>
<given-names><![CDATA[R. F.]]></given-names>
</name>
<name>
<surname><![CDATA[Díaz-Méndez]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Palacio-Luengas]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
<name>
<surname><![CDATA[López-Hernández]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vázquez-Medina]]></surname>
<given-names><![CDATA[R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A steganographic method using Bernoulli's chaotic maps]]></article-title>
<source><![CDATA[Computers and Electrical Engineering]]></source>
<year>2016</year>
<month>,</month>
<volume>54</volume>
<page-range>435-49</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Méndez-Naranjo]]></surname>
<given-names><![CDATA[P. M]]></given-names>
</name>
</person-group>
<source><![CDATA[Nuevo Algoritmo Criptográfico con la incorporación de la esteganografía en imágenes]]></source>
<year>2015</year>
<publisher-loc><![CDATA[Riombamba ]]></publisher-loc>
<publisher-name><![CDATA[Escuela Superior Politécnica de Chimborazo]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Morocho-Checa]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Zambrano-Miranda]]></surname>
<given-names><![CDATA[J. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Carvajal-Rodríguez]]></surname>
<given-names><![CDATA[J. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lopez-Fonseca]]></surname>
<given-names><![CDATA[G. R]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Análisis del Algoritmo Esteganográfico F5 para Imágenes JPEG a Color]]></article-title>
<source><![CDATA[Revista Politécnica]]></source>
<year>2015</year>
<month>,</month>
<volume>36</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>79-85</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Nassar]]></surname>
<given-names><![CDATA[S. S.]]></given-names>
</name>
<name>
<surname><![CDATA[Ayad]]></surname>
<given-names><![CDATA[N. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Kelash]]></surname>
<given-names><![CDATA[H. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Elsayed]]></surname>
<given-names><![CDATA[H. S.]]></given-names>
</name>
<name>
<surname><![CDATA[El-Bendary]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
<name>
<surname><![CDATA[El-Samie]]></surname>
<given-names><![CDATA[F. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Faragallah]]></surname>
<given-names><![CDATA[O. S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Secure Wireless Image Communication Using LSB Steganography and Chaotic Baker Ciphering]]></article-title>
<source><![CDATA[Wireless Pers Commun]]></source>
<year>2016</year>
<month>,</month>
<volume>91</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>1023-49</page-range></nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ranjith-Kumar]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Jayasudha]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Pradeep]]></surname>
<given-names><![CDATA[S]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Efficient and secure data hiding in encrypted images: A new approach using chaos]]></article-title>
<source><![CDATA[Information Security Journal: A Global Perspective]]></source>
<year>2016</year>
<month>,</month>
<volume>25</volume>
<numero>46</numero>
<issue>46</issue>
<page-range>235-46</page-range></nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ratnakirti]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Anirban]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Suvamoy]]></surname>
<given-names><![CDATA[C]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Chaos based Edge Adaptive Image Steganography]]></article-title>
<source><![CDATA[Procedia Technology]]></source>
<year>2013</year>
<month>,</month>
<volume>10</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>138-46</page-range></nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Reshma]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Ramesh]]></surname>
<given-names><![CDATA[T. K.]]></given-names>
</name>
<name>
<surname><![CDATA[Kumar]]></surname>
<given-names><![CDATA[P. S]]></given-names>
</name>
</person-group>
<source><![CDATA[Security Incident Management in Ground Transportation System Using UAVs]]></source>
<year>2015</year>
<conf-name><![CDATA[ 6IEEE International Conference on Computational Intelligence]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-7</page-range><publisher-loc><![CDATA[Madurai ]]></publisher-loc>
<publisher-name><![CDATA[IEEE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rodríguez-Mendoza]]></surname>
<given-names><![CDATA[M. N]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis de las técnicas de esteganografía para el ocultamiento de información]]></source>
<year>2016</year>
<month>,</month>
<publisher-loc><![CDATA[Quito, Pichincha, Ecuador ]]></publisher-loc>
<publisher-name><![CDATA[Tesis - Ingeniería en Informática, Universidad Central de Ecuador]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Rõssler]]></surname>
<given-names><![CDATA[O. E]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[An Equation for Continuous Chaos]]></article-title>
<source><![CDATA[Physical Letters]]></source>
<year>1976</year>
<month>,</month>
<volume>57</volume>
<numero>5</numero>
<issue>5</issue>
<page-range>397-8</page-range></nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Samland]]></surname>
<given-names><![CDATA[F.]]></given-names>
</name>
<name>
<surname><![CDATA[Fruth]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Hildebrandt]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Dittman]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<source><![CDATA[AR.Drone: Security threat analysis and exemplary attack to track persons]]></source>
<year>2012</year>
<conf-name><![CDATA[ Proceedings of SPIE - The International Society for Optical Engineering]]></conf-name>
<conf-loc> </conf-loc>
<page-range>1-15</page-range><publisher-loc><![CDATA[Magdeburg ]]></publisher-loc>
<publisher-name><![CDATA[SPIE]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="">
<collab>SCT, C. S</collab>
<source><![CDATA[Regula la SCT el uso de Aeronaves No Tripuladas (Drones). Retrieved from Secretaría de Comunicación y Transportes]]></source>
<year>2015</year>
<month>,</month>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sen-Te]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Samsudin]]></surname>
<given-names><![CDATA[A]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A Chaos-Based Authenticated Cipher with Associated Data]]></article-title>
<source><![CDATA[Security and Communication Networks]]></source>
<year>2017</year>
<month>,</month>
<volume>17</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>1-15</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Sharif]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Mollaeefar]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Nazari]]></surname>
<given-names><![CDATA[M]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A novel method for digital image steganography based on a new three-dimensional chaotic map]]></article-title>
<source><![CDATA[Multimedia Tools and Applications]]></source>
<year>2016</year>
<month>,</month>
<page-range>1-19</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Xiang]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
<name>
<surname><![CDATA[Hu]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Sun]]></surname>
<given-names><![CDATA[J]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Outsourcing chaotic selective image encryption to the cloud with steganography]]></article-title>
<source><![CDATA[Digital Signal Processing]]></source>
<year>2015</year>
<month>,</month>
<volume>43</volume>
<page-range>28-37</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
