-The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as
+The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as to
STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost.
What follows successively details all the inner steps and flow inside
the embedding stage (Fig.\ref{fig:sch:emb})
\end{figure*}
-\subsection{Steganalysis}
-
-LSB :
-"Adaptive steganalysis of Least Significant Bit replacement in grayscale natural images"
-
-Structural LSB Detectors:
-\verb+http://dde.binghamton.edu/download/structural_lsb_detectors/+
-
-Vainqueur du BOSS challenge
-
-
-ensemble:
-
-
-G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly
-undetactable steganograpy (HUGO). In Information Hiding, 13th International
-Workshop, volume 6958 of LNCS, pages 71–84, Prague, Czech Republic, May 18–
-20, 2011.
\subsection{Data Embedding}
Image Quality: Edge Image Steganography
\JFC{Raphael, les fuzzy edge detection sont souvent utilisés.
il faudrait comparer les approches en terme de nombre de bits retournés,
- en terme de complexité. }
+ en terme de complexité. } \cite{KF11}
Presentation des algos de detection de contour