1 The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as
2 STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost.
3 What follows successively details all the inner steps and flow inside
4 the embedding stage (Fig.\ref{fig:sch:emb})
5 and inside the extraction one(Fig.~\ref{fig:sch:ext}).
10 \subfloat[Data Embedding.]{
11 \begin{minipage}{0.49\textwidth}
13 % \includegraphics[width=5cm]{emb.pdf}
14 \includegraphics[width=5cm]{emb.ps}
19 \subfloat[Data Extraction.]{
20 \begin{minipage}{0.49\textwidth}
22 % \includegraphics[width=5cm]{rec.pdf}
23 \includegraphics[width=5cm]{rec.ps}
29 \caption{The STABYLO Scheme.}
34 \subsection{Steganalysis}
37 "Adaptive steganalysis of Least Significant Bit replacement in grayscale natural images"
39 Structural LSB Detectors:
40 \verb+http://dde.binghamton.edu/download/structural_lsb_detectors/+
42 Vainqueur du BOSS challenge
48 G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly
49 undetactable steganograpy (HUGO). In Information Hiding, 13th International
50 Workshop, volume 6958 of LNCS, pages 71–84, Prague, Czech Republic, May 18–
54 \subsection{Data Embedding}
59 \subsubsection{Edge Based Image Steganography}
60 Image Quality: Edge Image Steganography
61 \JFC{Raphael, les fuzzy edge detection sont souvent utilisés.
62 il faudrait comparer les approches en terme de nombre de bits retournés,
63 en terme de complexité. }
66 Presentation des algos de detection de contour
69 Comparaison théoriques, références
71 Algo de stegano basé juste sur cela : (pas de bbs, pas de stc, même message).
73 Quels paramètres sont optimaux ? Combinaison ?
79 \subsubsection{Security Considerations}
82 BBS-based cryptographic version of the message
84 \subsubsection{Minimizing Distortion with Syndrome-Treillis Codes}
89 \subsection{Data Extraction}