approaches being detailed in~\cite{Luo:2010:EAI:1824719.1824720} and
in~\cite{DBLP:journals/eswa/ChenCL10}.
In the former, the authors presents the Edge Adaptive
-Image Steganography based on lsb matching revisited further denoted as to
+Image Steganography based on LSB matching revisited further denoted as to
EAISLSBMR. This approach selects sharper edge
regions with respect
to a given embedding rate: the larger the number of bits to be embedded, the coarser
To sum up, in this research work, well studied and experimented
techniques of signal processing (adaptive edges detection),
-coding theory (syndrome-treillis codes), and cryptography
+coding theory (syndrome-trellis codes), and cryptography
(Blum-Goldwasser encryption protocol) are combined
to compute an efficient steganographic
scheme, whose principal characteristic is to take into