X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/c3438d8c47f3989f6d0d0e6109a3c216cca0d7c7..5178f772a789c49b261c48acc466a982d413a9a9:/main.tex?ds=sidebyside diff --git a/main.tex b/main.tex index 06552df..0528ede 100755 --- a/main.tex +++ b/main.tex @@ -1,49 +1,95 @@ -\documentclass[journal]{IEEEtran} -\usepackage{subfig} +\documentclass[twocolumn]{svjour3} % twocolumn +\usepackage{epsfig,psfrag} +\usepackage{graphicx} \usepackage{color} -\usepackage{graphicx} +\usepackage{dsfont} \usepackage{url} +\usepackage{graphicx} +\usepackage{mathptmx,amsmath,amssymb,bm} +\usepackage{subfig} +\usepackage{color} +\usepackage{mathtools,etoolbox} \usepackage{cite} +\usepackage{setspace} +\usepackage{lineno} + + +\begin{document} +%\doublespacing +%\linenumbers + + + + + + +\DeclarePairedDelimiter{\abs}{\lvert}{\rvert} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} -\begin{document} + + \title{STABYLO: -a lightweight %stego-secure -edge-based steganographic approach} +STeganography with +Adaptive, Bbs, and binarY embedding at LOw cost} +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ + +\institute{ Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux \at FEMTO-ST Institute, UMR 6174 CNRS\\ Computer Science Laboratory DISC, University of Franche-Comt\'{e}, - Besan\c con, France.\\ - \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ - $*:$ Authors in alphabetic order.\\ + Besan\c con, France. +\email{\{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@univ-fcomte.fr} } + + +\date{Received: date / Accepted: date} + + + + + + + + + + \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} \newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} \newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}} % make the title area -\maketitle -\begin{IEEEkeywords} %IEEEtran, journal, \LaTeX, paper, template. -Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. -\end{IEEEkeywords} +\keywords{Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome trellis codes} + + + + + + + + +\maketitle + \begin{abstract} -A novel steganographic method called STABYLO is introduced in this research work. -Its main reason for being is to be much lighter than the so-called -Highly Undetectable steGO (HUGO) method, a well known state of the art -steganographic process. Additionally to this effectiveness, -quite comparable results through noise measures like PSNR-HVS-M, -BIQI, and weighted PSNR (wPSNR) are obtained. -To achieve the proposed goal, famous experimented components of signal processing, + +A new steganographic method called STABYLO is introduced in +this research work. +Its main advantage is to be much lighter than the so-called +HUGO, WOW, and UNIWARD schemes, the state of the art +steganographic processes. +% Additionally to this effectiveness, +% quite comparable results through noise measures like PSNR-HVS-M +% and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented +components of signal processing, coding theory, and cryptography are combined together, leading to a scheme that can reasonably face up-to-date steganalysers. \end{abstract} @@ -51,8 +97,6 @@ a scheme that can reasonably face up-to-date steganalysers. -\IEEEpeerreviewmaketitle - \section{Introduction}\label{sec:intro} @@ -62,34 +106,69 @@ a scheme that can reasonably face up-to-date steganalysers. \section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} + +\section{Complexity Analysis}\label{sub:complexity} +\input{complexity} + \section{Experiments}\label{sec:experiments} \input{experiments} \section{Conclusion}\label{sec:concl} -The STABYLO algorithm, whose acronym means STeganogra- -phy with Canny, Bbs, binarY embedding at LOw cost, has been introduced +The STABYLO algorithm, whose acronym means STeganography with +Adaptive, Bbs, and binarY embedding at LOw cost, has been introduced in this document as an efficient method having comparable, though -somewhat smaller, security than the well known -Highly Undetectable steGO (HUGO) steganographic scheme. +somewhat smaller, security than well-known +steganographic schemes +HUGO, WOW, and UNIWARD. This edge-based steganographic approach embeds a Canny -detection filter, the Blum-Blum-Shub cryptographically secure -pseudorandom number generator, together with Syndrome-Treillis Codes +detection filter, the secure Blum-Blum-Shub cryptosystem +with its pseudorandom number generator, +together with Syndrome-Trellis Codes for minimizing distortion. -After having introduced with details the proposed method, -we have evaluated it through noise measures (namely, the PSNR, PSNR-HVS-M, -BIQI, and weighted PSNR) and using well established steganalysers. +The complexity study of our proposed method and of the +state of the art steganographic tools has shown that our approach +has the lowest computation cost among all. +This justifies the lightweight attribute of our scheme. +The evaluation of introduced noise and of +% measures +% (namely, the PSNR, PSNR-HVS-M, and weighted PSNR), and of +its embedding through stegenalysers (namely Ensemble Classifier) +have shown that STABYLO is efficient enough to +produce qualitative images and +to face steganalysers. + + + + +% Of course, other detectors like the fuzzy edge methods +% deserve much further attention, which is why we intend +% to investigate systematically all of these detectors in our next work. + For future work, the authors' intention is to investigate systematically -all the existing edge detection methods, to see if the STABYLO evaluation scores can -be improved by replacing Canny with another edge filter. +all the existing edge detection methods, +to see if the STABYLO evaluation scores can +be improved by replacing Canny with another edge filter. +Moreover, we plan to improve the distortion function by integrating +into a numerical cost the gradient value of this kind of +algorithm. We could thus transmit this value to STC contrary to the current +version where the distortion that is transmited is either 1 in +the adaptive strategy or 1,10, 100 in the fixed strategy. -\bibliographystyle{plain} -\bibliography{biblio} +Other steganalysers than the ones used in this document will be +examined for the sake of completeness. Finally, the +systematic replacement of all the LSBs of edges by binary digits provided +by the BBS generator will be investigated, and the consequences of such a +replacement, in terms of security, will be discussed. +Furthermore, we plan to investigate information hiding on other models, such as high frequency for JPEG encoding. +%\bibliographystyle{spbasic} +\bibliographystyle{spmpsci} +\bibliography{abbrev,biblioand} -\end{document} +\end{document}