1 The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as
2 STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost.
3 What follows successively details all the inner steps and flow inside
4 the embedding stage (Fig.\ref{fig:sch:emb})
5 and inside the extraction one(Fig.~\ref{fig:sch:ext}).
10 \subfloat[Data Embedding.]{
11 \begin{minipage}{0.49\textwidth}
13 \includegraphics[width=5cm]{emb.pdf}
18 \subfloat[Data Extraction.]{
19 \begin{minipage}{0.49\textwidth}
21 \includegraphics[width=5cm]{rec.pdf}
27 \caption{The STABYLO Scheme.}
32 \subsection{Steganalysis}
35 "Adaptive steganalysis of Least Significant Bit replacement in grayscale natural images"
37 Structural LSB Detectors:
38 \verb+http://dde.binghamton.edu/download/structural_lsb_detectors/+
40 Vainqueur du BOSS challenge
46 G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly
47 undetactable steganograpy (HUGO). In Information Hiding, 13th International
48 Workshop, volume 6958 of LNCS, pages 71–84, Prague, Czech Republic, May 18–
52 \subsection{Data Embedding}
57 \subsubsection{Edge Based Image Steganography}
58 Image Quality: Edge Image Steganography
59 \JFC{Raphael, les fuzzy edge detection sont souvent utilisés.
60 il faudrait comparer les approches en terme de nombre de bits retournés,
61 en terme de complexité. }
64 Presentation des algos de detection de contour
67 Comparaison théoriques, références
69 Algo de stegano basé juste sur cela : (pas de bbs, pas de stc, même message).
71 Quels paramètres sont optimaux ? Combinaison ?
77 \subsubsection{Security Considerations}
80 BBS-based cryptographic version of the message
82 \subsubsection{Minimizing Distortion with Syndrome-Treillis Codes}
87 \subsection{Data Extraction}