X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/5b25d5109dc4414ee3430627eb426d63b8622b63..9ecf7d45bbfebb016c9a7a3b9b9ab313fc687a7d:/main.tex diff --git a/main.tex b/main.tex index 8a80a94..9c672af 100755 --- a/main.tex +++ b/main.tex @@ -1,47 +1,115 @@ -\documentclass[journal]{IEEEtran} +\documentclass[10pt]{NSP1} +\usepackage{url,floatflt} +\usepackage{helvet,times} +\usepackage{psfig,graphics} +\usepackage{mathptmx,amsmath,amssymb,bm} +\usepackage{float} +\usepackage[bf,hypcap]{caption} \usepackage{subfig} \usepackage{color} -\usepackage{graphicx} +%\usepackage{graphicx} \usepackage{url} \usepackage{cite} + +\tolerance=1 +\emergencystretch=\maxdimen +\hyphenpenalty=10000 +\hbadness=10000 + +\topmargin=0.00cm + +\def\sm{\smallskip} +\def\no{\noindent} + +\def\firstpage{1} +\setcounter{page}{\firstpage} +\def\thevol{7} +\def\thenumber{?} +\def\theyear{2013} + + + + % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} + \begin{document} + +\titlefigurecaption{{\large \bf \rm Applied Mathematics \& Information Sciences }\\ {\it\small An International Journal}} + + + + + + + \title{STABYLO: -a lightweight stego-secure edge-based steganographic approach} +a lightweight %stego-secure +edge-based steganographic approach} + +\titlerunning{STABYLO} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* + + +\institute{ FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC - University of Franche-Comt\'{e} - Besan\c con, France.\\ - \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, + Besan\c con, France. +} + + + + +\received{...} +\revised{...} +\accepted{...} +\published{...} + + + + +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ $*:$ Authors in alphabetic order.\\ } -\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} -\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux} + +\mail{jean-francois.couchot@femto-st.fr} + +\newcommand{\JFC}[1]{\begin{color}{green}\textit{}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}} % make the title area -\maketitle -\begin{IEEEkeywords} %IEEEtran, journal, \LaTeX, paper, template. -Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. -\end{IEEEkeywords} +\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code} -\begin{abstract} -Todo -\end{abstract} +\abstracttext{A novel steganographic method called STABYLO is introduced in +this research work. +Its main avantage for being is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) method, a well known state of the art +steganographic process in spatial domain. +Additionally to this effectiveness, +quite comparable results through noise measures like PSNR-HVS-M, +BIQI, and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented +components of signal processing, +coding theory, and cryptography are combined together, leading to +a scheme that can reasonably face up-to-date steganalysers.} + + +\maketitle + -\IEEEpeerreviewmaketitle @@ -49,7 +117,7 @@ Todo \input{intro.tex} -\section{Our Approach}\label{sec:ourapproach} +\section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} \section{Experiments}\label{sec:experiments} @@ -57,8 +125,30 @@ Todo \section{Conclusion}\label{sec:concl} -The conclusion goes here. +The STABYLO algorithm, whose acronym means STeganography +with cAnny, Bbs, binarY embedding at LOw cost, has been introduced +in this document as an efficient method having comparable, though +somewhat smaller, security than the well known +Highly Undetectable steGO (HUGO) steganographic scheme. +This edge-based steganographic approach embeds a Canny +detection filter, the Blum-Blum-Shub cryptographically secure +pseudorandom number generator, together with Syndrome-Treillis Codes +for minimizing distortion. +After having introduced with details the proposed method, +we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, +BIQI, and weighted PSNR) and using well established steganalysers. + +For future work, the authors' intention is to investigate systematically +all the existing edge detection methods, to see if the STABYLO evaluation scores can +be improved by replacing Canny with another edge filter. We will try +to take into account the least significant bits too during all the +stages of the algorithm, hoping by doing so to be closer to the HUGO scores against +steganalyzers. Other steganalyzers than the ones used in this document will be +examined for the sake of completeness. Finally, the +systematic replacement of all the LSBs of edges by binary digits provided +by the BBS generator will be investigated, and the consequences of such a +replacement, in terms of security, will be discussed. \bibliographystyle{plain}