-
-
-In this research work, we thus propose to combine tried and
-tested techniques of signal theory (the adaptive edge detection), coding (the binary embedding), and cryptography
-(encryption of the hidden message) to compute an efficient steganographic
-scheme, which takes into consideration the cover image
-and that can be executed on small devices.
+Doing so makes our steganographic protocol an asymetric one.
+
+To sum up, in this research work, well studied and experimented
+techniques of signal treatment (adaptive edge detection),
+coding theory (binary embedding), and cryptography
+(Blum-Goldwasser encryption protocol) are combined
+to compute an efficient steganographic
+scheme, whose principal characteristics is to take into
+consideration the cover image and to be compatible with small computation resources.