X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/ded436ff1397fd455304cbae04f58e4c0703ea01..0ce669382db1b4f5b595dee0b9758b82afdedba7:/main.tex?ds=inline diff --git a/main.tex b/main.tex index 2a08602..b4b8aea 100755 --- a/main.tex +++ b/main.tex @@ -2,6 +2,8 @@ \usepackage{subfig} \usepackage{color} \usepackage{graphicx} +\usepackage{url} +\usepackage{cite} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} @@ -9,18 +11,21 @@ \begin{document} \title{STABYLO: -a lightweight stego-secure edge-base steganography approach} +a lightweight %stego-secure +edge-based steganographic approach} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC - University of Franche-Comt\'{e} + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, Besan\c con, France.\\ - \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order.\\ + \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ + $*:$ Authors in alphabetic order.\\ } \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}} % make the title area \maketitle @@ -31,6 +36,17 @@ a lightweight stego-secure edge-base steganography approach} Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. \end{IEEEkeywords} +\begin{abstract} +A novel steganographic method called STABYLO is introduced in this research work. +Its main reason for being is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) method, a well known state of the art +steganographic process. Additionally to this effectiveness, +quite comparable results through noise measures like PSNR-HVS-M, +BIQI, and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented components of signal processing, +coding theory, and cryptography are combined together, leading to +a scheme that can reasonably face up-to-date steganalysers. +\end{abstract} @@ -43,7 +59,7 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, \input{intro.tex} -\section{Our Approach}\label{sec:ourapproach} +\section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} \section{Experiments}\label{sec:experiments}