-% Image Quality: Edge Image Steganography
-
-% Security aspect:
-% BBS-based cprotographic version of the message
-
-% Enlarging embeding efficiency:
-% Syndrome treillis code
-
-\input{stc.tex}
-\section{Conclusion}
-The conclusion goes here.
-
-
-\appendices
-\section{Proof of the First Zonklar Equation}
-Appendix one text goes here.
-
-% you can choose not to have a title for an appendix
-% if you want by leaving the argument blank
-\section{}
-Appendix two text goes here.
-
+\section{Experiments}\label{sec:experiments}
+\input{experiments}
+
+
+\section{Conclusion}\label{sec:concl}
+
+The STABYLO algorithm, whose acronym means STeganography
+with cAnny, Bbs, binarY embedding at LOw cost, has been introduced
+in this document as an efficient method having comparable, though
+somewhat smaller, security than the well known
+Highly Undetectable steGO (HUGO) steganographic scheme.
+This edge-based steganographic approach embeds a Canny
+detection filter, the Blum-Blum-Shub cryptographically secure
+pseudorandom number generator, together with Syndrome-Treillis Codes
+for minimizing distortion.
+After having introduced with details the proposed method,
+we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M,
+BIQI, and weighted PSNR) and using well established steganalysers.
+
+For future work, the authors' intention is to investigate systematically
+all the existing edge detection methods, to see if the STABYLO evaluation scores can
+be improved by replacing Canny with another edge filter. We will try
+to take into account the least significant bits too during all the
+stages of the algorithm, hoping by doing so to be closer to the HUGO scores against
+steganalyzers. Other steganalyzers than the ones used in this document will be
+examined for the sake of completeness. Finally, the
+systematic replacement of all the LSBs of edges by binary digits provided
+by the BBS generator will be investigated, and the consequences of such a
+replacement, in terms of security, will be discussed.