+The STABYLO algorithm, whose acronym means STeganography with
+Adaptive, Bbs, and binarY embedding at LOw cost, has been introduced
+in this document as an efficient method having comparable, though
+somewhat smaller, security than well-known
+steganographic schemes
+HUGO, WOW, and UNIWARD.
+This edge-based steganographic approach embeds a Canny
+detection filter, the secure Blum-Blum-Shub cryptosystem
+with its pseudorandom number generator,
+together with Syndrome-Trellis Codes
+for minimizing distortion.
+The complexity study of our proposed method and of the
+state of the art steganographic tools has shown that our approach
+has the lowest computation cost among all.
+This justifies the lightweight attribute of our scheme.
+The evaluation of introduced noise and of
+% measures
+% (namely, the PSNR, PSNR-HVS-M, and weighted PSNR), and of
+its embedding through stegenalysers (namely Ensemble Classifier)
+have shown that STABYLO is efficient enough to
+produce qualitative images and
+to face steganalysers.
+
+
+
+
+% Of course, other detectors like the fuzzy edge methods
+% deserve much further attention, which is why we intend
+% to investigate systematically all of these detectors in our next work.
+
+
+For future work, the authors' intention is to investigate systematically
+all the existing edge detection methods,
+to see if the STABYLO evaluation scores can
+be improved by replacing Canny with another edge filter.
+Moreover, we plan to improve the distortion function by integrating
+into a numerical cost the gradient value of this kind of
+algorithm. We could thus transmit this value to STC contrary to the current
+version where the distortion that is transmited is either 1 in
+the adaptive strategy or 1,10, 100 in the fixed strategy.
+
+Other steganalysers than the ones used in this document will be
+examined for the sake of completeness. Finally, the
+systematic replacement of all the LSBs of edges by binary digits provided
+by the BBS generator will be investigated, and the consequences of such a
+replacement, in terms of security, will be discussed.
+Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding.
+
+
+%\bibliographystyle{spbasic}
+\bibliographystyle{spmpsci}
+\bibliography{abbrev,biblioand}