X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/e477428ed31d945b364bd9064476c1f0a34f86ef..93faa138ef3fae7589a5dc3ba0d8862f7b54c4cb:/intro.tex diff --git a/intro.tex b/intro.tex index e385cc9..deecdb7 100644 --- a/intro.tex +++ b/intro.tex @@ -73,7 +73,7 @@ the most interesting approaches being detailed in~\cite{Luo:2010:EAI:1824719.1824720} and in~\cite{DBLP:journals/eswa/ChenCL10}. In the former, the authors presents the Edge Adaptive -Image Steganography based on lsb matching revisited further denoted as to +Image Steganography based on LSB matching revisited further denoted as to EAISLSBMR. This approach selects sharper edge regions with respect to a given embedding rate: the larger the number of bits to be embedded, the coarser @@ -115,7 +115,7 @@ Doing so makes our steganographic protocol, to a certain extend, an asymmetric o To sum up, in this research work, well studied and experimented techniques of signal processing (adaptive edges detection), -coding theory (syndrome-treillis codes), and cryptography +coding theory (syndrome-trellis codes), and cryptography (Blum-Goldwasser encryption protocol) are combined to compute an efficient steganographic scheme, whose principal characteristic is to take into