X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/70660073a3e38d00d230d6be415339e48cc23ead..69853fcf95c4cb941d699fd5f1ca32540189b8a9:/main.tex diff --git a/main.tex b/main.tex index fcbcdbb..cc6454b 100755 --- a/main.tex +++ b/main.tex @@ -1,45 +1,32 @@ -\documentclass[draft,journal]{IEEEtran} +\documentclass[journal]{IEEEtran} \usepackage{subfig} \usepackage{color} \usepackage{graphicx} +\usepackage{url} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} \begin{document} -% -% paper title -% can use linebreaks \\ within to get better formatting as desired -\title{Bare Demo of IEEEtran.cls for Journals} -% -% -% author names and IEEE memberships -% note positions of commas and nonbreaking spaces ( ~ ) LaTeX will not break -% a structure at a ~ so this keeps an author's name from being broken across -% two lines. -% use \thanks{} to gain access to the first footnote area -% a separate \thanks must be used for each paragraph as LaTeX2e's \thanks -% was not built to handle multiple paragraphs -% +\title{STABYLO: +a lightweight stego-secure edge-based steganography approach} + \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC\\ - University of Franche-Comt\'{e}\\ - Besan\c con, France\\ + Computer Science Laboratory DISC + University of Franche-Comt\'{e} + Besan\c con, France.\\ \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order\\ +* Authors in alphabetic order.\\ } \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} % make the title area -%\maketitle +\maketitle -\begin{abstract} -%\boldmath -The abstract goes here. -\end{abstract} \begin{IEEEkeywords} %IEEEtran, journal, \LaTeX, paper, template. @@ -54,61 +41,21 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, -\section{Introduction} +\section{Introduction}\label{sec:intro} \input{intro.tex} -\section{Analysis of Steganographic Approaches} -\input{analysis.tex} - -This work considers digital images as covers and fondation is -spatial least significant-bit (LSB) replacement. -I this data hiding scheme a subset of all the LSB of the cover image is modified -with a secret bit stream depending on to a key, the cover, and the message to embed. -This well studied steganographic approach never decreases (resp. increases) -pixel with even value (resp. odd value) and may break structural symetry. -This structure modification is detectable by statistical approaches -and thus by steganalysis methods~\cite{Dumitrescu:2005:LSB:1073170.1073176,DBLP:conf/ih/2005,FK12}. - - -random LSB selection: coarse, easily tractable, easilly detactable - - - -feature-based : precise but time consuming -security need : message has to be encrypted before beeing introduced. Using efficient and secured cryptographic approach - -LSBR: to coarse (apply hugo breaker on it) - -\section{Our Approach} +\section{Our Approach}\label{sec:ourapproach} \input{ourapproach.tex} -% Image Quality: Edge Image Steganography - -% Security aspect: -% BBS-based cprotographic version of the message +\section{Experiments}\label{sec:experiments} +\input{experiments} -% Enlarging embeding efficiency: -% Syndrome treillis code -\input{stc.tex} -\section{Conclusion} +\section{Conclusion}\label{sec:concl} The conclusion goes here. -\appendices -\section{Proof of the First Zonklar Equation} -Appendix one text goes here. - -% you can choose not to have a title for an appendix -% if you want by leaving the argument blank -\section{} -Appendix two text goes here. - - -% use section* for acknowledgement -\section*{Acknowledgment} -The authors would like to thank... \bibliographystyle{plain} \bibliography{biblio}