-\documentclass[draft,journal]{IEEEtran}
+\documentclass{acm_proc_article-sp}
\usepackage{subfig}
\usepackage{color}
\usepackage{graphicx}
+\usepackage{url}
+\usepackage{cite}
% correct bad hyphenation here
\hyphenation{op-tical net-works semi-conduc-tor}
\begin{document}
-%
-% paper title
-% can use linebreaks \\ within to get better formatting as desired
-\title{Bare Demo of IEEEtran.cls for Journals}
-%
-%
-% author names and IEEE memberships
-% note positions of commas and nonbreaking spaces ( ~ ) LaTeX will not break
-% a structure at a ~ so this keeps an author's name from being broken across
-% two lines.
-% use \thanks{} to gain access to the first footnote area
-% a separate \thanks must be used for each paragraph as LaTeX2e's \thanks
-% was not built to handle multiple paragraphs
-%
-
-\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*
+\title{STABYLO:
+a lightweight %stego-secure
+edge-based steganographic approach}
+
+
+\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\
FEMTO-ST Institute, UMR 6174 CNRS\\
- Computer Science Laboratory DISC\\
- University of Franche-Comt\'{e}\\
- Besan\c con, France\\
- \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\
-* Authors in alphabetic order\\
+ Computer Science Laboratory DISC,
+ University of Franche-Comt\'{e},
+ Besan\c con, France.\\
+ \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\
+ $*:$ Authors in alphabetic order.\\
}
-\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
+\newcommand{\JFC}[1]{\begin{color}{green}\textit{}\end{color}}
+\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}}
+\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}}
% make the title area
-%\maketitle
-
+\maketitle
-\begin{abstract}
-%\boldmath
-The abstract goes here.
-\end{abstract}
-\begin{IEEEkeywords}
-%IEEEtran, journal, \LaTeX, paper, template.
-Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code.
-\end{IEEEkeywords}
+%IEEEtran, journal, \LaTeX, paper, template.
+\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code}
+\maketitle
+\begin{abstract}
+A novel steganographic method called STABYLO is introduced in this research work.
+Its main avantage for being is to be much lighter than the so-called
+Highly Undetectable steGO (HUGO) method, a well known state of the art
+steganographic process. Additionally to this effectiveness,
+quite comparable results through noise measures like PSNR-HVS-M,
+BIQI, and weighted PSNR (wPSNR) are obtained.
+To achieve the proposed goal, famous experimented components of signal processing,
+coding theory, and cryptography are combined together, leading to
+a scheme that can reasonably face up-to-date steganalysers.
+\end{abstract}
-\IEEEpeerreviewmaketitle
-
-
-
-\section{Introduction}
-\input{intro.tex}
-
-\section{Analysis of Steganographic Approaches}
-\input{analysis.tex}
-This work considers digital images as covers and fondation is
-spatial least significant-bit (LSB) replacement.
-I this data hiding scheme a subset of all the LSB of the cover image is modified
-with a secret bit stream depending on to a key, the cover, and the message to embed.
-This well studied steganographic approach never decreases (resp. increases)
-pixel with even value (resp. odd value) and may break structural symetry.
-This structure modification is detectable by statistical approaches
-and thus by steganalysis methods~\cite{Dumitrescu:2005:LSB:1073170.1073176,DBLP:conf/ih/2005,FK12}.
-random LSB selection: coarse, easily tractable, easilly detactable
-feature-based : precise but time consuming
-security need : message has to be encrypted before beeing introduced. Using efficient and secured cryptographic approach
+\section{Introduction}\label{sec:intro}
+\input{intro.tex}
-LSBR: to coarse (apply hugo breaker on it)
-\section{Our Approach}
+\section{Presentation of the Proposed Approach}\label{sec:ourapproach}
\input{ourapproach.tex}
-% Image Quality: Edge Image Steganography
-
-% Security aspect:
-% BBS-based cprotographic version of the message
-
-% Enlarging embeding efficiency:
-% Syndrome treillis code
-
-\input{stc.tex}
-\section{Conclusion}
-The conclusion goes here.
-
-
-\appendices
-\section{Proof of the First Zonklar Equation}
-Appendix one text goes here.
-
-% you can choose not to have a title for an appendix
-% if you want by leaving the argument blank
-\section{}
-Appendix two text goes here.
-
+\section{Experiments}\label{sec:experiments}
+\input{experiments}
+
+
+\section{Conclusion}\label{sec:concl}
+
+The STABYLO algorithm, whose acronym means STeganography
+with cAnny, Bbs, binarY embedding at LOw cost, has been introduced
+in this document as an efficient method having comparable, though
+somewhat smaller, security than the well known
+Highly Undetectable steGO (HUGO) steganographic scheme.
+This edge-based steganographic approach embeds a Canny
+detection filter, the Blum-Blum-Shub cryptographically secure
+pseudorandom number generator, together with Syndrome-Treillis Codes
+for minimizing distortion.
+After having introduced with details the proposed method,
+we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M,
+BIQI, and weighted PSNR) and using well established steganalysers.
+
+For future work, the authors' intention is to investigate systematically
+all the existing edge detection methods, to see if the STABYLO evaluation scores can
+be improved by replacing Canny with another edge filter. We will try
+to take into account the least significant bits too during all the
+stages of the algorithm, hoping by doing so to be closer to the HUGO scores against
+steganalyzers. Other steganalyzers than the ones used in this document will be
+examined for the sake of completeness. Finally, the
+systematic replacement of all the LSBs of edges by binary digits provided
+by the BBS generator will be investigated, and the consequences of such a
+replacement, in terms of security, will be discussed.
-% use section* for acknowledgement
-\section*{Acknowledgment}
-The authors would like to thank...
\bibliographystyle{plain}
\bibliography{biblio}