X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/e1c34dc36c5b5d8e9470b0baa3b5e5f80a8647e9..0ce669382db1b4f5b595dee0b9758b82afdedba7:/main.tex?ds=sidebyside diff --git a/main.tex b/main.tex index e68d1ca..b4b8aea 100755 --- a/main.tex +++ b/main.tex @@ -2,24 +2,30 @@ \usepackage{subfig} \usepackage{color} \usepackage{graphicx} +\usepackage{url} +\usepackage{cite} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} \begin{document} -\title{STABYLO: STeganography with cAnny, Bbs, binarY embedding at LOw cost} +\title{STABYLO: +a lightweight %stego-secure +edge-based steganographic approach} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC\\ - University of Franche-Comt\'{e}\\ - Besan\c con, France\\ - \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order\\ + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, + Besan\c con, France.\\ + \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ + $*:$ Authors in alphabetic order.\\ } \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} +\newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}} % make the title area \maketitle @@ -30,6 +36,17 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. \end{IEEEkeywords} +\begin{abstract} +A novel steganographic method called STABYLO is introduced in this research work. +Its main reason for being is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) method, a well known state of the art +steganographic process. Additionally to this effectiveness, +quite comparable results through noise measures like PSNR-HVS-M, +BIQI, and weighted PSNR (wPSNR) are obtained. +To achieve the proposed goal, famous experimented components of signal processing, +coding theory, and cryptography are combined together, leading to +a scheme that can reasonably face up-to-date steganalysers. +\end{abstract} @@ -42,11 +59,11 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, \input{intro.tex} -\section{Our Approach}\label{sec:ourapproach} +\section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} \section{Experiments}\label{sec:experiments} - +\input{experiments} \section{Conclusion}\label{sec:concl}