X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/blobdiff_plain/fdf9d8855582d89072dcd1339af9f5b74a167ac6..e556b479316abe0d4183c94c28a84f07f9f64c9c:/main.tex?ds=inline diff --git a/main.tex b/main.tex index 9b13032..fb10cbd 100755 --- a/main.tex +++ b/main.tex @@ -3,6 +3,7 @@ \usepackage{color} \usepackage{graphicx} \usepackage{url} +\usepackage{cite} % correct bad hyphenation here \hyphenation{op-tical net-works semi-conduc-tor} @@ -10,19 +11,21 @@ \begin{document} \title{STABYLO: -a lightweight stego-secure edge-base steganography approach} +a lightweight %stego-secure +edge-based steganographic approach} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC - University of Franche-Comt\'{e} + Computer Science Laboratory DISC, + University of Franche-Comt\'{e}, Besan\c con, France.\\ - \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order.\\ + \{jean-francois.couchot, raphael.couturier, christophe.guyeux\}@femto-st.fr\\ + $*:$ Authors in alphabetic order.\\ } \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} \newcommand{\RC}[1]{\begin{color}{red}\textit{#1}\end{color}} +\newcommand{\CG}[1]{\begin{color}{blue}\textit{#1}\end{color}} % make the title area \maketitle @@ -33,6 +36,16 @@ a lightweight stego-secure edge-base steganography approach} Steganography, least-significant-bit (LSB)-based steganography, edge detection, Canny filter, security, syndrome treillis code. \end{IEEEkeywords} +\begin{abstract} +A novel steganographic method called STABYLO is introduced in this research work. +Its main reason for being is to be much lighter than the so-called +Highly Undetectable steGO (HUGO) method, a well known state of the art +steganographic process, while presenting quite comparable results through +noise measures like PSNR-HVS-M, BIQI, and weighted PSNR (wPSNR). +To achieve this goal, famous experimented components of signal processing, +coding theory, and cryptography are combined together, leading to +a scheme that can reasonably face up-to-date steganalysers. +\end{abstract} @@ -45,7 +58,7 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, \input{intro.tex} -\section{Our Approach}\label{sec:ourapproach} +\section{Presentation of the Proposed Approach}\label{sec:ourapproach} \input{ourapproach.tex} \section{Experiments}\label{sec:experiments}