-In this research work, we thus propose to combine tried and
-tested techniques of signal theory (the adaptive edge detection), coding (the binary embedding), and cryptography
-(encryption of the hidden message) to compute an efficient steganographic
-scheme, which takes into consideration the cover image
-and that can be executed on small devices.
+To sum up, in this research work, well-studied and experimented
+techniques of signal processing (adaptive edges detection),
+coding theory (syndrome-trellis codes), and cryptography
+(Blum-Goldwasser encryption protocol) are combined
+to compute an efficient steganographic
+scheme, whose principal characteristic is to take into
+consideration the cover image and to be compatible with small computation resources.