X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/7aeb1ab6cc41dd51a6dbe4c844c8983809205186..HEAD:/main.tex diff --git a/main.tex b/main.tex index 2996baf..19fdfa1 100755 --- a/main.tex +++ b/main.tex @@ -58,9 +58,9 @@ Adaptive, Bbs, and binarY embedding at LOw cost} -\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} -\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}} -\newcommand{\CG}[1]{\begin{color}{blue}\textit{}\end{color}} +\newcommand{\JFC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\newcommand{\CG}[1]{\begin{color}{red}\textit{#1}\end{color}} % make the title area @@ -85,9 +85,9 @@ this research work. Its main advantage is to be much lighter than the so-called HUGO, WOW, and UNIWARD schemes, the state of the art steganographic processes. -Additionally to this effectiveness, -quite comparable results through noise measures like PSNR-HVS-M -and weighted PSNR (wPSNR) are obtained. +% Additionally to this effectiveness, +% quite comparable results through noise measures like PSNR-HVS-M +% and weighted PSNR (wPSNR) are obtained. To achieve the proposed goal, famous experimented components of signal processing, coding theory, and cryptography are combined together, leading to @@ -131,9 +131,10 @@ The complexity study of our proposed method and of the state of the art steganographic tools has shown that our approach has the lowest computation cost among all. This justifies the lightweight attribute of our scheme. -The evaluation of introduced noise measures -(namely, the PSNR, PSNR-HVS-M, and weighted PSNR), -and of its embedding through stegenalysers (namely Ensemble Classifier) +The evaluation of introduced noise and of +% measures +% (namely, the PSNR, PSNR-HVS-M, and weighted PSNR), and of +its embedding through stegenalysers (namely Ensemble Classifier) have shown that STABYLO is efficient enough to produce qualitative images and to face steganalysers. @@ -161,7 +162,8 @@ examined for the sake of completeness. Finally, the systematic replacement of all the LSBs of edges by binary digits provided by the BBS generator will be investigated, and the consequences of such a replacement, in terms of security, will be discussed. -Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding. +Furthermore, we plan to investigate information hiding on other models, +such as high frequency for JPEG encoding. %\bibliographystyle{spbasic}