X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/0ce669382db1b4f5b595dee0b9758b82afdedba7..51df4be4d70fabf22f3abc0fe92b515086f74021:/main.tex diff --git a/main.tex b/main.tex index b4b8aea..f2c8449 100755 --- a/main.tex +++ b/main.tex @@ -1,49 +1,89 @@ -\documentclass[journal]{IEEEtran} +\documentclass[10pt]{article} +\usepackage{url} +\usepackage{graphicx} +\usepackage{mathptmx,amsmath,amssymb,bm} \usepackage{subfig} \usepackage{color} -\usepackage{graphicx} -\usepackage{url} +\usepackage{mathtools,etoolbox} \usepackage{cite} +\usepackage{setspace} +\usepackage[switch, modulo]{lineno} + + + + + + +\DeclarePairedDelimiter{\abs}{\lvert}{\rvert} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} -\begin{document} + + + + + + + + \title{STABYLO: a lightweight %stego-secure edge-based steganographic approach} + + + + + +\linenumbers + + \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ + $*:$ Authors in alphabetic order.\\ FEMTO-ST Institute, UMR 6174 CNRS\\ Computer Science Laboratory DISC, University of Franche-Comt\'{e}, - Besan\c con, France.\\ - \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ - $*:$ Authors in alphabetic order.\\ + Besan\c con, France. } +%\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux} + +%\mail{jean-francois.couchot@femto-st.fr} + \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} -\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} -\newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}} % make the title area -\maketitle -\begin{IEEEkeywords} %IEEEtran, journal, \LaTeX, paper, template. -Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. -\end{IEEEkeywords} +%\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes} + + + + + + +\begin{document} + +\maketitle + +\doublespacing \begin{abstract} -A novel steganographic method called STABYLO is introduced in this research work. -Its main reason for being is to be much lighter than the so-called -Highly Undetectable steGO (HUGO) method, a well known state of the art -steganographic process. Additionally to this effectiveness, +A novel steganographic method called STABYLO is introduced in +this research work. +Its main advantage is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) scheme, a well-known state of the art +steganographic process in the spatial domain. +Additionally to this effectiveness, quite comparable results through noise measures like PSNR-HVS-M, -BIQI, and weighted PSNR (wPSNR) are obtained. -To achieve the proposed goal, famous experimented components of signal processing, +and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented +components of signal processing, coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers. \end{abstract} @@ -51,8 +91,6 @@ a scheme that can reasonably face up-to-date steganalysers. -\IEEEpeerreviewmaketitle - \section{Introduction}\label{sec:intro} @@ -67,8 +105,40 @@ a scheme that can reasonably face up-to-date steganalysers. \section{Conclusion}\label{sec:concl} -The conclusion goes here. +The STABYLO algorithm, whose acronym means STeganography +with cAnny, Bbs, binarY embedding at LOw cost, has been introduced +in this document as an efficient method having comparable, though +somewhat smaller, security than the well-known +Highly Undetectable steGO (HUGO) steganographic scheme. +This edge-based steganographic approach embeds a Canny +detection filter, the Blum-Blum-Shub cryptographically secure +pseudorandom number generator, together with Syndrome-Trellis Codes +for minimizing distortion. +After having introduced with details the proposed method, +we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, +BIQI, and weighted PSNR) and we have used well-established steganalysers. + +% Of course, other detectors like the fuzzy edge methods +% deserve much further attention, which is why we intend +% to investigate systematically all of these detectors in our next work. + + + + +For future work, the authors' intention is to investigate systematically +all the existing edge detection methods, to see if the STABYLO evaluation scores can +be improved by replacing Canny with another edge filter. +% We will try +% to take into account the least significant bits too during all the +% stages of the algorithm, hoping by doing so to be closer to the HUGO scores against +% steganalyzers. +Other steganalysers than the ones used in this document will be +examined for the sake of completeness. Finally, the +systematic replacement of all the LSBs of edges by binary digits provided +by the BBS generator will be investigated, and the consequences of such a +replacement, in terms of security, will be discussed. +Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding. \bibliographystyle{plain}