-\documentclass[journal]{IEEEtran}
-\usepackage{subfig}
+\documentclass[twocolumn]{svjour3} % twocolumn
+\usepackage{epsfig,psfrag}
+\usepackage{graphicx}
\usepackage{color}
-\usepackage{graphicx}
+\usepackage{dsfont}
\usepackage{url}
+\usepackage{graphicx}
+\usepackage{mathptmx,amsmath,amssymb,bm}
+\usepackage{subfig}
+\usepackage{color}
+\usepackage{mathtools,etoolbox}
\usepackage{cite}
+\usepackage{setspace}
+\usepackage{lineno}
+
+
+\begin{document}
+%\doublespacing
+%\linenumbers
+
+
+
+
+
+
+\DeclarePairedDelimiter{\abs}{\lvert}{\rvert}
% correct bad hyphenation here
\hyphenation{op-tical net-works semi-conduc-tor}
-\begin{document}
+
+
\title{STABYLO:
-a lightweight stego-secure edge-based steganographic approach}
+STeganography with
+Adaptive, Bbs, and binarY embedding at LOw cost}
+
+\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}}
-\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*
+\institute{ Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux \at
FEMTO-ST Institute, UMR 6174 CNRS\\
- Computer Science Laboratory DISC
- University of Franche-Comt\'{e}
- Besan\c con, France.\\
- \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\
- $*:$ Authors in alphabetic order.\\
+ Computer Science Laboratory DISC,
+ University of Franche-Comt\'{e},
+ Besan\c con, France.
+\email{\{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@univ-fcomte.fr}
}
+
+
+\date{Received: date / Accepted: date}
+
+
+
+
+
+
+
+
+
+
\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
-\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}}
-\newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}}
+\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}}
+\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}}
% make the title area
-\maketitle
-\begin{IEEEkeywords}
%IEEEtran, journal, \LaTeX, paper, template.
-Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code.
-\end{IEEEkeywords}
+\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes}
+
+
+
+
+
+
+
+
+\maketitle
+
\begin{abstract}
-Todo
-\end{abstract}
+A new steganographic method called STABYLO is introduced in
+this research work.
+Its main advantage is to be much lighter than the so-called
+Highly Undetectable steGO (HUGO) scheme, a well-known state of the art
+steganographic process in the spatial domain.
+Additionally to this effectiveness,
+quite comparable results through noise measures like PSNR-HVS-M
+and weighted PSNR (wPSNR) are obtained.
+To achieve the proposed goal, famous experimented
+components of signal processing,
+coding theory, and cryptography are combined together, leading to
+a scheme that can reasonably face up-to-date steganalysers.
+\end{abstract}
-\IEEEpeerreviewmaketitle
\input{intro.tex}
-\section{Our Approach}\label{sec:ourapproach}
+\section{Presentation of the Proposed Approach}\label{sec:ourapproach}
\input{ourapproach.tex}
+
+\section{Complexity Analysis}\label{sub:complexity}
+\input{complexity}
+
\section{Experiments}\label{sec:experiments}
\input{experiments}
\section{Conclusion}\label{sec:concl}
-The conclusion goes here.
+The STABYLO algorithm, whose acronym means STeganography with
+Adaptive, Bbs, and binarY embedding at LOw cost, has been introduced
+in this document as an efficient method having comparable, though
+somewhat smaller, security than the well-known
+Highly Undetectable steGO (HUGO) steganographic scheme.
+This edge-based steganographic approach embeds a Canny
+detection filter, the Blum-Blum-Shub cryptographically secure
+pseudorandom number generator, together with Syndrome-Trellis Codes
+for minimizing distortion.
+After having introduced with details the proposed method,
+we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M,
+and weighted PSNR), we have used well-established steganalysers.
+% Of course, other detectors like the fuzzy edge methods
+% deserve much further attention, which is why we intend
+% to investigate systematically all of these detectors in our next work.
-\bibliographystyle{plain}
-\bibliography{biblio}
+For future work, the authors' intention is to investigate systematically
+all the existing edge detection methods, to see if the STABYLO evaluation scores can
+be improved by replacing Canny with another edge filter.
+Other steganalysers than the ones used in this document will be
+examined for the sake of completeness. Finally, the
+systematic replacement of all the LSBs of edges by binary digits provided
+by the BBS generator will be investigated, and the consequences of such a
+replacement, in terms of security, will be discussed.
+Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding.
-\end{document}
+\bibliographystyle{spbasic}
+\bibliography{abbrev,biblioand}
+
+\end{document}