2 \usepackage{epsfig,psfrag}
8 \usepackage{mathptmx,amsmath,amssymb,bm}
11 \usepackage{mathtools,etoolbox}
26 \DeclarePairedDelimiter{\abs}{\lvert}{\rvert}
28 % correct bad hyphenation here
29 \hyphenation{op-tical net-works semi-conduc-tor}
34 \title[STABYLO]{STABYLO:
36 Adaptive, Bbs, and binarY embedding at LOw cost.}
38 \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}}
41 \affiliation{ FEMTO-ST Institute, UMR 6174 CNRS\\
42 Computer Science Laboratory DISC,
43 University of Franche-Comt\'{e},
45 \email{\{raphael.couturier, jean-francois.couchot, christophe.guyeux\}@univ-fcomte.fr}
47 \shortauthors{J.-F. Couchot, R. Couturier, and C. Guyeux}
59 \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
60 \newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}}
61 \newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}}
66 %IEEEtran, journal, \LaTeX, paper, template.
67 %\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes}
81 A novel steganographic method called STABYLO is introduced in
83 Its main advantage is to be much lighter than the so-called
84 Highly Undetectable steGO (HUGO) scheme, a well-known state of the art
85 steganographic process in the spatial domain.
86 Additionally to this effectiveness,
87 quite comparable results through noise measures like PSNR-HVS-M,
88 and weighted PSNR (wPSNR) are obtained.
89 To achieve the proposed goal, famous experimented
90 components of signal processing,
91 coding theory, and cryptography are combined together, leading to
92 a scheme that can reasonably face up-to-date steganalysers.
100 \section{Introduction}\label{sec:intro}
104 \section{Presentation of the Proposed Approach}\label{sec:ourapproach}
105 \input{ourapproach.tex}
108 \section{Complexity Analysis}\label{sub:complexity}
111 \section{Experiments}\label{sec:experiments}
115 \section{Conclusion}\label{sec:concl}
117 The STABYLO algorithm, whose acronym means STeganography with
118 Adaptive, Bbs, and binarY embedding at LOw cost, has been introduced
119 in this document as an efficient method having comparable, though
120 somewhat smaller, security than the well-known
121 Highly Undetectable steGO (HUGO) steganographic scheme.
122 This edge-based steganographic approach embeds a Canny
123 detection filter, the Blum-Blum-Shub cryptographically secure
124 pseudorandom number generator, together with Syndrome-Trellis Codes
125 for minimizing distortion.
126 After having introduced with details the proposed method,
127 we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M,
128 BIQI, and weighted PSNR), we have used well-established steganalysers.
130 % Of course, other detectors like the fuzzy edge methods
131 % deserve much further attention, which is why we intend
132 % to investigate systematically all of these detectors in our next work.
135 For future work, the authors' intention is to investigate systematically
136 all the existing edge detection methods, to see if the STABYLO evaluation scores can
137 be improved by replacing Canny with another edge filter.
138 Other steganalysers than the ones used in this document will be
139 examined for the sake of completeness. Finally, the
140 systematic replacement of all the LSBs of edges by binary digits provided
141 by the BBS generator will be investigated, and the consequences of such a
142 replacement, in terms of security, will be discussed.
143 Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding.
146 \bibliographystyle{compj}
147 \bibliography{biblio}