X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/70660073a3e38d00d230d6be415339e48cc23ead..f9ab101f6a209bfd67ee84f3aea5bf5ca2582d9b:/main.tex?ds=sidebyside diff --git a/main.tex b/main.tex index fcbcdbb..002666a 100755 --- a/main.tex +++ b/main.tex @@ -1,114 +1,161 @@ -\documentclass[draft,journal]{IEEEtran} +\documentclass[10pt]{NSP1} +\usepackage{url} +\usepackage{graphicx} +\usepackage{mathptmx,amsmath,amssymb,bm} \usepackage{subfig} \usepackage{color} -\usepackage{graphicx} +\usepackage{mathtools,etoolbox} +\usepackage{cite} + + +\tolerance=1 +\emergencystretch=\maxdimen +\hyphenpenalty=10000 +\hbadness=10000 + +\topmargin=0.00cm + +\def\sm{\smallskip} +\def\no{\noindent} + +\def\firstpage{1} +\setcounter{page}{\firstpage} +\def\thevol{7} +\def\thenumber{?} +\def\theyear{2013} + + +\DeclarePairedDelimiter{\abs}{\lvert}{\rvert} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} -\begin{document} -% -% paper title -% can use linebreaks \\ within to get better formatting as desired -\title{Bare Demo of IEEEtran.cls for Journals} -% -% -% author names and IEEE memberships -% note positions of commas and nonbreaking spaces ( ~ ) LaTeX will not break -% a structure at a ~ so this keeps an author's name from being broken across -% two lines. -% use \thanks{} to gain access to the first footnote area -% a separate \thanks must be used for each paragraph as LaTeX2e's \thanks -% was not built to handle multiple paragraphs -% - -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* + +\titlefigurecaption{{\large \bf \rm Applied Mathematics \& Information Sciences }\\ {\it\small An International Journal}} + + + + + + + +\title{STABYLO: +a lightweight %stego-secure +edge-based steganographic approach} + + +\titlerunning{STABYLO} + + + +\institute{ FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC\\ - University of Franche-Comt\'{e}\\ - Besan\c con, France\\ - \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order\\ + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, + Besan\c con, France. } -\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} -% make the title area -%\maketitle -\begin{abstract} -%\boldmath -The abstract goes here. -\end{abstract} -\begin{IEEEkeywords} -%IEEEtran, journal, \LaTeX, paper, template. -Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. -\end{IEEEkeywords} +\received{...} +\revised{...} +\accepted{...} +\published{...} -\IEEEpeerreviewmaketitle +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ + $*:$ Authors in alphabetic order.\\ +} +\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux} +\mail{jean-francois.couchot@femto-st.fr} +\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}} +% make the title area -\section{Introduction} -\input{intro.tex} -\section{Analysis of Steganographic Approaches} -\input{analysis.tex} -This work considers digital images as covers and fondation is -spatial least significant-bit (LSB) replacement. -I this data hiding scheme a subset of all the LSB of the cover image is modified -with a secret bit stream depending on to a key, the cover, and the message to embed. -This well studied steganographic approach never decreases (resp. increases) -pixel with even value (resp. odd value) and may break structural symetry. -This structure modification is detectable by statistical approaches -and thus by steganalysis methods~\cite{Dumitrescu:2005:LSB:1073170.1073176,DBLP:conf/ih/2005,FK12}. +%IEEEtran, journal, \LaTeX, paper, template. +\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes} + + + + +\abstracttext{A novel steganographic method called STABYLO is introduced in +this research work. +Its main advantage is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) scheme, a well-known state of the art +steganographic process in spatial domain. +Additionally to this effectiveness, +quite comparable results through noise measures like PSNR-HVS-M, +and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented +components of signal processing, +coding theory, and cryptography are combined together, leading to +a scheme that can reasonably face up-to-date steganalysers.} -random LSB selection: coarse, easily tractable, easilly detactable +\begin{document} + +\maketitle -feature-based : precise but time consuming -security need : message has to be encrypted before beeing introduced. Using efficient and secured cryptographic approach -LSBR: to coarse (apply hugo breaker on it) +\section{Introduction}\label{sec:intro} +\input{intro.tex} -\section{Our Approach} + +\section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} -% Image Quality: Edge Image Steganography +\section{Experiments}\label{sec:experiments} +\input{experiments} + -% Security aspect: -% BBS-based cprotographic version of the message +\section{Conclusion}\label{sec:concl} -% Enlarging embeding efficiency: -% Syndrome treillis code +The STABYLO algorithm, whose acronym means STeganography +with cAnny, Bbs, binarY embedding at LOw cost, has been introduced +in this document as an efficient method having comparable, though +somewhat smaller, security than the well-known +Highly Undetectable steGO (HUGO) steganographic scheme. +This edge-based steganographic approach embeds a Canny +detection filter, the Blum-Blum-Shub cryptographically secure +pseudorandom number generator, together with Syndrome-Trellis Codes +for minimizing distortion. +After having introduced with details the proposed method, +we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, +BIQI, and weighted PSNR) and using well-established steganalysers. -\input{stc.tex} -\section{Conclusion} -The conclusion goes here. +% Of course, other detectors like the fuzzy edge methods +% deserve much further attention, which is why we intend +% to investigate systematically all of these detectors in our next work. -\appendices -\section{Proof of the First Zonklar Equation} -Appendix one text goes here. -% you can choose not to have a title for an appendix -% if you want by leaving the argument blank -\section{} -Appendix two text goes here. +For future work, the authors' intention is to investigate systematically +all the existing edge detection methods, to see if the STABYLO evaluation scores can +be improved by replacing Canny with another edge filter. +% We will try +% to take into account the least significant bits too during all the +% stages of the algorithm, hoping by doing so to be closer to the HUGO scores against +% steganalyzers. +Other steganalysers than the ones used in this document will be +examined for the sake of completeness. Finally, the +systematic replacement of all the LSBs of edges by binary digits provided +by the BBS generator will be investigated, and the consequences of such a +replacement, in terms of security, will be discussed. +Furthermore, we plan to investigate information hiding on other models, high frequency for JPEG encoding for instance. -% use section* for acknowledgement -\section*{Acknowledgment} -The authors would like to thank... \bibliographystyle{plain} \bibliography{biblio}