X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/7a5cfcedac1d5f62100f0a4535d215af419cbafa..03f2db2f776786ee6e9435d3c0f603b248cdd2ae:/main.tex?ds=inline diff --git a/main.tex b/main.tex index 65e8a4a..7d0132e 100755 --- a/main.tex +++ b/main.tex @@ -1,4 +1,4 @@ -\documentclass[twocolumn,draft]{svjour3} % twocolumn +\documentclass[twocolumn]{svjour3} % twocolumn \usepackage{epsfig,psfrag} \usepackage{graphicx} \usepackage{color} @@ -31,18 +31,20 @@ -\title[STABYLO]{STABYLO: +\title{STABYLO: STeganography with -Adaptive, Bbs, and binarY embedding at LOw cost.} +Adaptive, Bbs, and binarY embedding at LOw cost} \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}} -\institute{ FEMTO-ST Institute, UMR 6174 CNRS\\ +\institute{ Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux \at + FEMTO-ST Institute, UMR 6174 CNRS\\ Computer Science Laboratory DISC, University of Franche-Comt\'{e}, - Besan\c con, France.} + Besan\c con, France. \email{\{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@univ-fcomte.fr} +} \date{Received: date / Accepted: date} @@ -84,7 +86,7 @@ Its main advantage is to be much lighter than the so-called Highly Undetectable steGO (HUGO) scheme, a well-known state of the art steganographic process in the spatial domain. Additionally to this effectiveness, -quite comparable results through noise measures like PSNR-HVS-M, +quite comparable results through noise measures like PSNR-HVS-M and weighted PSNR (wPSNR) are obtained. To achieve the proposed goal, famous experimented components of signal processing, @@ -124,8 +126,8 @@ detection filter, the Blum-Blum-Shub cryptographically secure pseudorandom number generator, together with Syndrome-Trellis Codes for minimizing distortion. After having introduced with details the proposed method, -we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, -BIQI, and weighted PSNR), we have used well-established steganalysers. +we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, +and weighted PSNR), we have used well-established steganalysers. % Of course, other detectors like the fuzzy edge methods % deserve much further attention, which is why we intend @@ -143,11 +145,9 @@ replacement, in terms of security, will be discussed. Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding. -\bibliographystyle{compj} +\bibliographystyle{spbasic} \bibliography{abbrev,biblioand} \end{document} - -