-Next, our approach is more easily detectable than HUGO, which
-is the most secure steganographic tool, as far as we know.
-However by combining \emph{adaptive} and \emph{STC} strategies
-our approach obtains similar results to HUGO ones.
-
-%%%%et pour b= 6 ?
-
-
-Compared to EAILSBMR, we obtain better results when the strategy is
-\emph{adaptive}.
-However due to its
-huge number of integration features, it is not lightweight, which justifies
-in the authors' opinion the consideration of the proposed method.
-
+Next, our approach is more easily detectable than HUGO,
+WOW and UNIWARD which are the most secure steganographic tool,
+as far as we know.
+However by combining Adaptive and STC strategies
+our approach obtains similar results than the ones of these schemes.
+
+Compared to EAILSBMR, we obtain similar
+results when the strategy is
+Adaptive.
+However due to its huge number of integration features, it is not lightweight.
+
+All these numerical experiments confirm
+the objective presented in the motivations:
+providing an efficient steganography approach in a lightweight manner.