X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/51df4be4d70fabf22f3abc0fe92b515086f74021..dd86a49a6884ba85ab2469757bbec464943ad7e5:/main.tex diff --git a/main.tex b/main.tex index f2c8449..10eaa19 100755 --- a/main.tex +++ b/main.tex @@ -1,4 +1,8 @@ -\documentclass[10pt]{article} +\documentclass{comjnl} +\usepackage{epsfig,psfrag} +\usepackage{graphicx} +\usepackage{color} +\usepackage{dsfont} \usepackage{url} \usepackage{graphicx} \usepackage{mathptmx,amsmath,amssymb,bm} @@ -7,7 +11,12 @@ \usepackage{mathtools,etoolbox} \usepackage{cite} \usepackage{setspace} -\usepackage[switch, modulo]{lineno} +\usepackage{lineno} + + +\begin{document} +%\doublespacing +%\linenumbers @@ -22,35 +31,29 @@ +\title[STABYLO]{STABYLO: +a lightweight edge-based steganographic approach} +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}} +\affiliation{ FEMTO-ST Institute, UMR 6174 CNRS\\ + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, + Besan\c con, France.} +\email{\{raphael.couturier, jean-francois.couchot, christophe.guyeux\}@univ-fcomte.fr} - - -\title{STABYLO: -a lightweight %stego-secure -edge-based steganographic approach} - - +\shortauthors{J.-F. Couchot, R. Couturier, and C. Guyeux} -\linenumbers +\received{...} +\revised{...} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ - $*:$ Authors in alphabetic order.\\ - FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC, - University of Franche-Comt\'{e}, - Besan\c con, France. -} -%\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux} -%\mail{jean-francois.couchot@femto-st.fr} \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} \newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}} @@ -67,13 +70,13 @@ edge-based steganographic approach} -\begin{document} -\maketitle -\doublespacing + + \begin{abstract} + A novel steganographic method called STABYLO is introduced in this research work. Its main advantage is to be much lighter than the so-called @@ -88,7 +91,7 @@ coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers. \end{abstract} - +\maketitle @@ -124,7 +127,7 @@ BIQI, and weighted PSNR) and we have used well-established steganalysers. % to investigate systematically all of these detectors in our next work. - +c For future work, the authors' intention is to investigate systematically all the existing edge detection methods, to see if the STABYLO evaluation scores can @@ -141,7 +144,7 @@ replacement, in terms of security, will be discussed. Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding. -\bibliographystyle{plain} +\bibliographystyle{compj} \bibliography{biblio}