-\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
-\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}}
-\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}}
+\newcommand{\JFC}[1]{\begin{color}{red}\textit{#1}\end{color}}
+\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}}
+\newcommand{\CG}[1]{\begin{color}{red}\textit{#1}\end{color}}
% make the title area
Its main advantage is to be much lighter than the so-called
HUGO, WOW, and UNIWARD schemes, the state of the art
steganographic processes.
-Additionally to this effectiveness,
-quite comparable results through noise measures like PSNR-HVS-M
-and weighted PSNR (wPSNR) are obtained.
+% Additionally to this effectiveness,
+% quite comparable results through noise measures like PSNR-HVS-M
+% and weighted PSNR (wPSNR) are obtained.
To achieve the proposed goal, famous experimented
components of signal processing,
coding theory, and cryptography are combined together, leading to
state of the art steganographic tools has shown that our approach
has the lowest computation cost among all.
This justifies the lightweight attribute of our scheme.
-The evaluation of introduced noise measures
-(namely, the PSNR, PSNR-HVS-M, and weighted PSNR),
-and of its embedding through stegenalysers (namely Ensemble Classifier)
+The evaluation of introduced noise and of
+% measures
+% (namely, the PSNR, PSNR-HVS-M, and weighted PSNR), and of
+its embedding through stegenalysers (namely Ensemble Classifier)
have shown that STABYLO is efficient enough to
produce qualitative images and
to face steganalysers.
For future work, the authors' intention is to investigate systematically
-all the existing edge detection methods, to see if the STABYLO evaluation scores can
-be improved by replacing Canny with another edge filter.
+all the existing edge detection methods,
+to see if the STABYLO evaluation scores can
+be improved by replacing Canny with another edge filter.
+Moreover, we plan to improve the distortion function by integrating
+into a numerical cost the gradient value of this kind of
+algorithm. We could thus transmit this value to STC contrary to the current
+version where the distortion that is transmited is either 1 in
+the adaptive strategy or 1,10, 100 in the fixed strategy.
+
Other steganalysers than the ones used in this document will be
examined for the sake of completeness. Finally, the
systematic replacement of all the LSBs of edges by binary digits provided
by the BBS generator will be investigated, and the consequences of such a
replacement, in terms of security, will be discussed.
-Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding.
+Furthermore, we plan to investigate information hiding on other models,
+such as high frequency for JPEG encoding.
-\bibliographystyle{spbasic}
+%\bibliographystyle{spbasic}
+\bibliographystyle{spmpsci}
\bibliography{abbrev,biblioand}