X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/a0f4d76521ca0d84f0de9ba71ecb094fc9e1af33..25660891acf240f523434aed3481b240c32f1ad1:/main.tex?ds=sidebyside diff --git a/main.tex b/main.tex index 5a7e01e..c4bb7fc 100755 --- a/main.tex +++ b/main.tex @@ -5,6 +5,8 @@ \usepackage{subfig} \usepackage{color} \usepackage{mathtools,etoolbox} +\usepackage{cite} + \tolerance=1 \emergencystretch=\maxdimen @@ -80,15 +82,15 @@ edge-based steganographic approach} %IEEEtran, journal, \LaTeX, paper, template. -\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis code} +\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes} \abstracttext{A novel steganographic method called STABYLO is introduced in this research work. -Its main advantage for being is to be much lighter than the so-called -Highly Undetectable steGO (HUGO) scheme, a well known state of the art +Its main advantage is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) scheme, a well-known state of the art steganographic process in spatial domain. Additionally to this effectiveness, quite comparable results through noise measures like PSNR-HVS-M, @@ -123,7 +125,7 @@ a scheme that can reasonably face up-to-date steganalysers.} The STABYLO algorithm, whose acronym means STeganography with cAnny, Bbs, binarY embedding at LOw cost, has been introduced in this document as an efficient method having comparable, though -somewhat smaller, security than the well known +somewhat smaller, security than the well-known Highly Undetectable steGO (HUGO) steganographic scheme. This edge-based steganographic approach embeds a Canny detection filter, the Blum-Blum-Shub cryptographically secure @@ -131,7 +133,7 @@ pseudorandom number generator, together with Syndrome-Trellis Codes for minimizing distortion. After having introduced with details the proposed method, we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, -BIQI, and weighted PSNR) and using well established steganalysers. +BIQI, and weighted PSNR) and using well-established steganalysers. % Of course, other detectors like the fuzzy edge methods % deserve much further attention, which is why we intend