-\documentclass[10pt]{NSP1}
+\documentclass[10pt]{article}
\usepackage{url}
\usepackage{graphicx}
\usepackage{mathptmx,amsmath,amssymb,bm}
\usepackage{color}
\usepackage{mathtools,etoolbox}
\usepackage{cite}
+\usepackage{setspace}
+\usepackage[switch, modulo]{lineno}
-\tolerance=1
-\emergencystretch=\maxdimen
-\hyphenpenalty=10000
-\hbadness=10000
-\topmargin=0.00cm
-\def\sm{\smallskip}
-\def\no{\noindent}
-
-\def\firstpage{1}
-\setcounter{page}{\firstpage}
-\def\thevol{7}
-\def\thenumber{?}
-\def\theyear{2013}
\DeclarePairedDelimiter{\abs}{\lvert}{\rvert}
-\titlefigurecaption{{\large \bf \rm Applied Mathematics \& Information Sciences }\\ {\it\small An International Journal}}
edge-based steganographic approach}
-\titlerunning{STABYLO}
-
-\institute{
- FEMTO-ST Institute, UMR 6174 CNRS\\
- Computer Science Laboratory DISC,
- University of Franche-Comt\'{e},
- Besan\c con, France.
-}
-
-\received{...}
-\revised{...}
-\accepted{...}
-\published{...}
-
-
+\linenumbers
\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\
$*:$ Authors in alphabetic order.\\
+ FEMTO-ST Institute, UMR 6174 CNRS\\
+ Computer Science Laboratory DISC,
+ University of Franche-Comt\'{e},
+ Besan\c con, France.
}
-\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux}
+%\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux}
-\mail{jean-francois.couchot@femto-st.fr}
+%\mail{jean-francois.couchot@femto-st.fr}
\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}}
%IEEEtran, journal, \LaTeX, paper, template.
-\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes}
+%\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes}
+
+
+
+
+
+\begin{document}
+\maketitle
+\doublespacing
-\abstracttext{A novel steganographic method called STABYLO is introduced in
+\begin{abstract}
+A novel steganographic method called STABYLO is introduced in
this research work.
Its main advantage is to be much lighter than the so-called
Highly Undetectable steGO (HUGO) scheme, a well-known state of the art
To achieve the proposed goal, famous experimented
components of signal processing,
coding theory, and cryptography are combined together, leading to
-a scheme that can reasonably face up-to-date steganalysers.}
-
+a scheme that can reasonably face up-to-date steganalysers.
+\end{abstract}
-\begin{document}
-
-\maketitle
systematic replacement of all the LSBs of edges by binary digits provided
by the BBS generator will be investigated, and the consequences of such a
replacement, in terms of security, will be discussed.
+Furthermore, we plan to investigate information hiding on other models, high frequency for JPEG encoding for instance.
\bibliographystyle{plain}