+
+
+
+\section{Complexity Analysis}\label{sub:complexity}
+This section aims at justifying the leightweight attribute of our approach.
+To be more precise, we compare the complexity of our schemes to the
+state of the art steganography, namely HUGO~\cite{DBLP:conf/ih/PevnyFB10}.
+
+
+In what folllows, we consider an $n \times n$ square image.
+First of all, HUGO starts with computing the second order SPAM Features.
+This steps is in $O(n^2 + 2.343^2)$ due to the calculation
+of the difference arrays and next of the 686 features (of size 343).
+Next for each pixel, the distortion measure is calculated by +1/-1 modifying
+its value and computing again the SPAM
+features. Pixels are thus selected according to their ability to provide
+an image whose SPAM features are close to the original one.
+The algorithm is thus computing a distance between each Feature,
+which is at least in $O(343)$ and an overall distance between these
+metrics which is in $O(686)$. Computing the distance is thus in
+$O(2\time 343^2)$ and this mdification is thus in $O(2\time 343^2 \time n^2)$.
+Ranking these results may be achieved with a insertion sort which is in $2.n^2 \ln(n)$.
+The overall complexity of the pixel selection is thus
+$O(n^2 +2.343^2 + 2\time 343^2 \time n^2 + 2.n^2 \ln(n))$, \textit{i.e}
+$O(2.n^2(343^2 + \ln(n)))$.
+
+Our edge selection is based on a Canny Filter,
+whose complexity is in $O(2n^2.\ln(n))$ thanks to the convolution step
+which can be implemented with FFT.
+The complexity of Hugo is at least $343^2/\ln{n}$ times higher than our scheme.
+
+
+
+
+