X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/8290657e61738a93b7b6eb60966c49efbc4f0af8..ded436ff1397fd455304cbae04f58e4c0703ea01:/ourapproach.tex?ds=sidebyside diff --git a/ourapproach.tex b/ourapproach.tex index 5fc4f7e..9626562 100644 --- a/ourapproach.tex +++ b/ourapproach.tex @@ -1,4 +1,4 @@ -The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as +The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as to STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost. What follows successively details all the inner steps and flow inside the embedding stage (Fig.\ref{fig:sch:emb}) @@ -10,7 +10,8 @@ and inside the extraction one(Fig.~\ref{fig:sch:ext}). \subfloat[Data Embedding.]{ \begin{minipage}{0.49\textwidth} \begin{center} - \includegraphics[width=5cm]{emb.pdf} +% \includegraphics[width=5cm]{emb.pdf} + \includegraphics[width=5cm]{emb.ps} \end{center} \end{minipage} \label{fig:sch:emb} @@ -18,7 +19,8 @@ and inside the extraction one(Fig.~\ref{fig:sch:ext}). \subfloat[Data Extraction.]{ \begin{minipage}{0.49\textwidth} \begin{center} - \includegraphics[width=5cm]{rec.pdf} +% \includegraphics[width=5cm]{rec.pdf} + \includegraphics[width=5cm]{rec.ps} \end{center} \end{minipage} \label{fig:sch:ext} @@ -29,24 +31,6 @@ and inside the extraction one(Fig.~\ref{fig:sch:ext}). \end{figure*} -\subsection{Steganalysis} - -LSB : -"Adaptive steganalysis of Least Significant Bit replacement in grayscale natural images" - -Structural LSB Detectors: -\verb+http://dde.binghamton.edu/download/structural_lsb_detectors/+ - -Vainqueur du BOSS challenge - - -ensemble: - - -G. Gül and F. Kurugollu. A new methodology in steganalysis : Breaking highly -undetactable steganograpy (HUGO). In Information Hiding, 13th International -Workshop, volume 6958 of LNCS, pages 71–84, Prague, Czech Republic, May 18– -20, 2011. \subsection{Data Embedding} @@ -58,7 +42,7 @@ Workshop, volume 6958 of LNCS, pages 71–84, Prague, Czech Republic, May 18– Image Quality: Edge Image Steganography \JFC{Raphael, les fuzzy edge detection sont souvent utilisés. il faudrait comparer les approches en terme de nombre de bits retournés, - en terme de complexité. } + en terme de complexité. } \cite{KF11} Presentation des algos de detection de contour