X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/457be557d1bb33d5d169605464822243e0ed6232..5236cd14f48ed25df1f329837d51f079064b3c1c:/main.tex diff --git a/main.tex b/main.tex index 422a796..249436f 100755 --- a/main.tex +++ b/main.tex @@ -1,4 +1,4 @@ -\documentclass{comjnl} +\documentclass[twocolumn]{svjour3} % twocolumn \usepackage{epsfig,psfrag} \usepackage{graphicx} \usepackage{color} @@ -31,27 +31,29 @@ -\title[STABYLO]{STABYLO: +\title{STABYLO: STeganography with Adaptive, Bbs, and binarY embedding at LOw cost.} \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}} -\affiliation{ FEMTO-ST Institute, UMR 6174 CNRS\\ +\institute{ Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux \at + FEMTO-ST Institute, UMR 6174 CNRS\\ Computer Science Laboratory DISC, University of Franche-Comt\'{e}, - Besan\c con, France.} -\email{\{raphael.couturier, jean-francois.couchot, christophe.guyeux\}@univ-fcomte.fr} + Besan\c con, France. +\email{\{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@univ-fcomte.fr} +} + + +\date{Received: date / Accepted: date} -\shortauthors{J.-F. Couchot, R. Couturier, and C. Guyeux} -\received{...} -\revised{...} @@ -64,8 +66,7 @@ Adaptive, Bbs, and binarY embedding at LOw cost.} %IEEEtran, journal, \LaTeX, paper, template. -%\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes} - +\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes} @@ -74,11 +75,12 @@ Adaptive, Bbs, and binarY embedding at LOw cost.} +\maketitle \begin{abstract} -A novel steganographic method called STABYLO is introduced in +A new steganographic method called STABYLO is introduced in this research work. Its main advantage is to be much lighter than the so-called Highly Undetectable steGO (HUGO) scheme, a well-known state of the art @@ -92,7 +94,7 @@ coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers. \end{abstract} -\maketitle + @@ -144,7 +146,7 @@ Furthermore, we plan to investigate information hiding on other models, such as \bibliographystyle{compj} -\bibliography{biblio} +\bibliography{abbrev,biblioand}