-grayscale digital image.
-
-
-\subsection{Adaptive Embedding Rate}
-
-Two strategies have been developed in our scheme, depending on the embedding rate that is either \emph{adaptive} or \emph{fixed}.
-
-In the former the embedding rate depends on the number of edge pixels.
-The higher it is, the larger the message length that can be inserted is.
-Practically, a set of edge pixels is computed according to the
-Canny algorithm with an high threshold.
-The message length is thus defined to be half of this set cardinality.
-In this strategy, two methods are thus applied to extract bits that
-are modified. The first one is a direct application of the STC algorithm.
-This method is further referred to as \emph{adaptive+STC}.
-The second one randomly chooses the subset of pixels to modify by
-applying the BBS PRNG again. This method is denoted \emph{adaptive+sample}.
-Notice that the rate between
-available bits and bit message length is always equal to 2.
-This constraint is indeed induced by the fact that the efficiency
-of the STC algorithm is unsatisfactory under that threshold.
-In our experiments and with the adaptive scheme,
-the average size of the message that can be embedded is 16,445 bits.
-Its corresponds to an average payload of 6.35\%.
+grayscale digital image in a RAW format.
+We restrict experiments to
+this set of cover images since this paper is more focused on
+the methodology than on benchmarking.
+
+We use the matrices $\hat{H}$
+generated by the integers given
+in table~\ref{table:matrices:H}
+as introduced in~\cite{FillerJF11}, since these ones have experimentally
+be proven to have the best modification efficiency.
+For instance if the rate between the size of the message and the size of the
+cover vector
+is 1/4, each number in $\{81, 95, 107, 121\}$ is translated into a binary number
+and each one consitutes thus a column of $\hat{H}$.
+
+\begin{table}
+$$
+\begin{array}{|l|l|}
+\hline
+\textrm{Rate} & \textrm{Matrix generators} \\
+\hline
+{1}/{2} & \{71,109\}\\
+\hline
+{1}/{3} & \{95, 101, 121\}\\
+\hline
+{1}/{4} & \{81, 95, 107, 121\}\\
+\hline
+{1}/{5} & \{75, 95, 97, 105, 117\}\\
+\hline
+{1}/{6} & \{73, 83, 95, 103, 109, 123\}\\
+\hline
+{1}/{7} & \{69, 77, 93, 107, 111, 115, 121\}\\
+\hline
+{1}/{8} & \{69, 79, 81, 89, 93, 99, 107, 119\}\\
+\hline
+{1}/{9} & \{69, 79, 81, 89, 93, 99, 107, 119, 125\}\\
+\hline
+\end{array}
+$$
+\caption{Matrix Generator for $\hat{H}$ in STC}\label{table:matrices:H}
+\end{table}
+
+
+Our approach is always compared to Hugo~\cite{DBLP:conf/ih/PevnyFB10}
+and to EAISLSBMR~\cite{Luo:2010:EAI:1824719.1824720}.
+The former is the least detectable information hiding tool in spatial domain
+and the latter is the work that is the closest to ours, as far as we know.