\subsection{Security considerations}\label{sub:bbs}
Among the methods of message encryption/decryption
(see~\cite{DBLP:journals/ejisec/FontaineG07} for a survey)
-we implement the Blum-Goldwasser cryptosystem~\cite{Blum:1985:EPP:19478.19501}
+we implement the asymmetric
+Blum-Goldwasser cryptosystem~\cite{Blum:1985:EPP:19478.19501}
that is based on the Blum Blum Shub~\cite{DBLP:conf/crypto/ShubBB82}
pseudorandom number generator (PRNG) and the
XOR binary function.
-It has been proven~\cite{DBLP:conf/crypto/ShubBB82} that this PRNG
+The main justification of this choice
+is that it has been proven~\cite{DBLP:conf/crypto/ShubBB82} that this PRNG
has the property of cryptographical security, \textit{i.e.},
for any sequence of $L$ output bits $x_i$, $x_{i+1}$, \ldots, $x_{i+L-1}$,
there is no algorithm, whose time complexity is polynomial in $L$, and
the Canny algorithm computes derivatives
in the two directions with respect to a mask of size $T$.
The higher $T$ is, the coarse the approach is. Practically,
-$T$ is set with $3$, $3$, or $7$.
+$T$ is set with $3$, $5$, or $7$.
In our flowcharts, this step is represented by ``Edge Detection(b, T, X)''.
Let $x$ be the sequence of these bits.
The next section presents how to adapt our scheme
-when the size of $x$ is not sufficient for the message $m$ to embed.
+with respect to the size
+of the message $m$ to embed and the size of the cover $x$.
+
\subsection{Adaptive embedding rate}\label{sub:adaptive}
Two strategies have been developed in our approach,
-depending on the embedding rate that is either \emph{adaptive} or \emph{fixed}.
+depending on the embedding rate that is either \emph{Adaptive} or \emph{Fixed}.
In the former the embedding rate depends on the number of edge pixels.
The higher it is, the larger the message length that can be inserted is.
Practically, a set of edge pixels is computed according to the
-\subsection{Minimizing distortion with syndrome-trellis codes}\label{sub:stc}
+\subsection{Minimizing distortion with Syndrome-Trellis Codes}\label{sub:stc}
\input{stc}
which bits to change among the 36,910 ones.
In the two cases, about the third part of the poem is hidden into the cover.
-Results with \emph{adaptive} and \textit{STC} strategies are presented in
+Results with {Adaptive} and {STC} strategies are presented in
Fig.~\ref{fig:lenastego}.
\begin{figure}[t]
\right..
$$
This function allows to emphasize differences between contents.
-Notice that
+Notice that since $b$ is 7 in Fig.~\ref{fig:diff7}, the embedding is binary
+and this image only contains 0 and 75 values.
+Similarly, if $b$ is 6 as in Fig.~\ref{fig:diff6}, the embedding is ternary
+and the image contains all the values in $\{0,75,150,225\}$.
+
\begin{figure}[t]
\end{figure}
-Notice that since $b$ is 7 in Fig.~\ref{fig:diff7}, the embedding is binary
-and this image only contains 0 and 75 values.
-Similarly, when $b$ is 6 as in Fig.~\ref{fig:diff6}, the embedding is ternary
-and the image contains all the values in $\{0,75,150,225\}$.