1 The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as to
2 STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost.
3 What follows successively details all the inner steps and flow inside
4 the embedding stage (Fig.\ref{fig:sch:emb})
5 and inside the extraction one(Fig.~\ref{fig:sch:ext}).
10 \subfloat[Data Embedding.]{
11 \begin{minipage}{0.49\textwidth}
13 % \includegraphics[width=5cm]{emb.pdf}
14 \includegraphics[width=5cm]{emb.ps}
19 \subfloat[Data Extraction.]{
20 \begin{minipage}{0.49\textwidth}
22 % \includegraphics[width=5cm]{rec.pdf}
23 \includegraphics[width=5cm]{rec.ps}
29 \caption{The STABYLO Scheme.}
36 \subsection{Data Embedding}
41 \subsubsection{Edge Based Image Steganography}
42 Image Quality: Edge Image Steganography
43 \JFC{Raphael, les fuzzy edge detection sont souvent utilisés.
44 il faudrait comparer les approches en terme de nombre de bits retournés,
45 en terme de complexité. } \cite{KF11}
48 Presentation des algos de detection de contour
51 Comparaison théoriques, références
53 Algo de stegano basé juste sur cela : (pas de bbs, pas de stc, même message).
55 Quels paramètres sont optimaux ? Combinaison ?
61 \subsubsection{Security Considerations}
64 BBS-based cryptographic version of the message
66 \subsubsection{Minimizing Distortion with Syndrome-Treillis Codes}
71 \subsection{Data Extraction}