X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/100ac9908382b8de480dae1fd68829f2a7778b5d..0ce669382db1b4f5b595dee0b9758b82afdedba7:/main.tex diff --git a/main.tex b/main.tex index e28afc1..b4b8aea 100755 --- a/main.tex +++ b/main.tex @@ -3,6 +3,7 @@ \usepackage{color} \usepackage{graphicx} \usepackage{url} +\usepackage{cite} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} @@ -10,18 +11,21 @@ \begin{document} \title{STABYLO: -a lightweight stego-secure edge-base steganography approach} +a lightweight %stego-secure +edge-based steganographic approach} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC - University of Franche-Comt\'{e} + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, Besan\c con, France.\\ - \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order.\\ + \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ + $*:$ Authors in alphabetic order.\\ } \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}} % make the title area \maketitle @@ -32,6 +36,17 @@ a lightweight stego-secure edge-base steganography approach} Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. \end{IEEEkeywords} +\begin{abstract} +A novel steganographic method called STABYLO is introduced in this research work. +Its main reason for being is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) method, a well known state of the art +steganographic process. Additionally to this effectiveness, +quite comparable results through noise measures like PSNR-HVS-M, +BIQI, and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented components of signal processing, +coding theory, and cryptography are combined together, leading to +a scheme that can reasonably face up-to-date steganalysers. +\end{abstract} @@ -44,7 +59,7 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, \input{intro.tex} -\section{Our Approach}\label{sec:ourapproach} +\section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} \section{Experiments}\label{sec:experiments}