1 \documentclass[draft,journal]{IEEEtran}
6 % correct bad hyphenation here
7 \hyphenation{op-tical net-works semi-conduc-tor}
13 % can use linebreaks \\ within to get better formatting as desired
14 \title{Bare Demo of IEEEtran.cls for Journals}
17 % author names and IEEE memberships
18 % note positions of commas and nonbreaking spaces ( ~ ) LaTeX will not break
19 % a structure at a ~ so this keeps an author's name from being broken across
21 % use \thanks{} to gain access to the first footnote area
22 % a separate \thanks must be used for each paragraph as LaTeX2e's \thanks
23 % was not built to handle multiple paragraphs
26 \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*
27 FEMTO-ST Institute, UMR 6174 CNRS\\
28 Computer Science Laboratory DISC\\
29 University of Franche-Comt\'{e}\\
31 \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\
32 * Authors in alphabetic order\\
34 \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
41 The abstract goes here.
45 %IEEEtran, journal, \LaTeX, paper, template.
46 Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code.
53 \IEEEpeerreviewmaketitle
57 \section{Introduction}
60 \section{Analysis of Steganographic Approaches}
63 This work considers digital images as covers and fondation is
64 spatial least significant-bit (LSB) replacement.
65 I this data hiding scheme a subset of all the LSB of the cover image is modified
66 with a secret bit stream depending on to a key, the cover, and the message to embed.
67 This well studied steganographic approach never decreases (resp. increases)
68 pixel with even value (resp. odd value) and may break structural symetry.
69 This structure modification is detectable by statistical approaches
70 and thus by steganalysis methods~\cite{Dumitrescu:2005:LSB:1073170.1073176,DBLP:conf/ih/2005,FK12}.
73 random LSB selection: coarse, easily tractable, easilly detactable
77 feature-based : precise but time consuming
79 security need : message has to be encrypted before beeing introduced. Using efficient and secured cryptographic approach
81 LSBR: to coarse (apply hugo breaker on it)
83 \section{Our Approach}
84 \input{ourapproach.tex}
86 % Image Quality: Edge Image Steganography
89 % BBS-based cprotographic version of the message
91 % Enlarging embeding efficiency:
92 % Syndrome treillis code
96 The conclusion goes here.
100 \section{Proof of the First Zonklar Equation}
101 Appendix one text goes here.
103 % you can choose not to have a title for an appendix
104 % if you want by leaving the argument blank
106 Appendix two text goes here.
109 % use section* for acknowledgement
110 \section*{Acknowledgment}
111 The authors would like to thank...
113 \bibliographystyle{plain}
114 \bibliography{biblio}