+
+
+@String{elsevier={Elsevier Science Publishers B. V.}}
+
+@String{springer={Springer-Verlag}}
+@String{springer_loc={Berlin}}
+@String{lncs={Lecture Notes in Computer Science}}
+
+@String{ieecs={IEEE Computer Society}}
+@String{ieecs_loc={Washington, DC}}
+
+@String{isoc={The Internet Society}}
+@String{isoc_loc={Washington DC/Reston}}
+
+@String{westpress={Westview Press}}
+@String{westpress_loc={Boulder, CO}}
+
+@String{spie={Society of Photo-Optical Instrumentation Engineers}}
+@String{spie_loc={Bellingham, WA}}
+
+
+
+@String{NC = {Neural Computation}}
+@String{TNN= {IEEE Transactions on Neural Networks}}
+@String{STTT= {International Journal on Software Tools for Technology Transfer}}
+@string{JACM={Journal of ACM}}
+@String{JCAM={Journal of Computational and Applied Mathematics}}
+
+@String{tcs={Theoretical Computer Science}}
+@String{jtb={Journal of Theoretical Biology}}
+@string{prenticeHall={Prentice-Hall, Inc.}}
+@string{discreteapplMath={Discrete Applied Mathematics}}
+@string{advapplMath={Advances in Applied Mathematics}}
+@string{ijma= {International Journal of Mathematical Algorithms}}
+@string{cs= {Cognitive Science}}
+@string{siam={SIAM Journal on Computing}}
+
+
@inproceedings{DBLP:conf/ih/PereiraVMMP01,
editor = {Ira S. Moskowitz},
author = {Shelby Pereira and
Evaluation},
year = {2001},
pages = {340-353},
- series = {Lecture Notes in Computer Science},
- publisher = {Springer},
+ series = lncs,
+ publisher = springer,
+ address = springer_loc,
+ month = apr,
volume = {2137},
}
Pittsburgh, PA, USA, April 25-27, 2001, Proceedings},
editor = {Ira S. Moskowitz},
pages = {289-302},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ month=apr,
+ series = lncs,
title = {F5-A Steganographic Algorithm.},
volume = 2137,
year = 2001
MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006},
year = {2005},
publisher = {ACM},
+ address = {New York, NY, USA},
+ month=aug,
pages = {25-32},
ee = {http://doi.acm.org/10.1145/1073170.1073176},
bibsource = {DBLP, http://dblp.uni-trier.de}
year = {2005},
pages = {296-311},
ee = {http://dx.doi.org/10.1007/11558859_22},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ month= jun,
+ series = lncs,
volume = {3727},
}
author = {Jessica J. Fridrich and
Jan Kodovsk{\'y}},
title = {Steganalysis of LSB Replacement Using Parity-Aware Features},
+ month=may,
year = {2012},
pages = {31-45},
ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3},
volume = {7692},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
bibsource = {DBLP, http://dblp.uni-trier.de}
}
pages = {27-30},
ee = {http://doi.acm.org/10.1145/1232454.1232466},
publisher = {ACM},
+ address = {New York, NY, USA},
+ month = oct,
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Papers},
year = {2010},
pages = {161-177},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ month=jun,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {6387},
ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13},
bibsource = {DBLP, http://dblp.uni-trier.de}
Calgary, AB, Canada, June 28-30, 2010, Revised Selected
Papers},
booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {6387},
year = {2010},
isbn = {978-3-642-16434-7},
isbn = {978-3-540-74123-7},
keywords = {dblp},
pages = {314-327},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ month=jul,
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
timestamp = {2007-09-20T00:00:00.000+0200},
title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.},
url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06},
title = {Information Hiding, 8th International Workshop, IH 2006,
Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers},
booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {4437},
year = {2007},
isbn = {978-3-540-74123-7},
challenges, and opportunities},
pages = {3-14},
ee = {http://doi.acm.org/10.1145/1288869.1288872},
- crossref = {DBLP:conf/mmsec/2007},
editor = {Deepa Kundur and
Balakrishnan Prabhakaran and
Jana Dittmann and
booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security,
MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007},
publisher = {ACM},
+ address = {New York, NY, USA},
+ month=sep,
year = {2007},
isbn = {978-1-59593-857-2},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
-@proceedings{DBLP:conf/mmsec/2007,
-
-}
pages = {754105},
ee = {http://dx.doi.org/10.1117/12.838002},
bibsource = {DBLP, http://dblp.uni-trier.de},
- publisher = {SPIE},
+ publisher = spie,
+ address = spie_loc,
+ month = jan,
series = {SPIE Proceedings},
volume = {7541},
}
Electronic Imaging Symposium, San Jose, CA, USA, January
18-20, 2010, Proceedings},
booktitle = {Media Forensics and Security},
- publisher = {SPIE},
+ publisher = spie,
+ address = spie_loc,
series = {SPIE Proceedings},
volume = {7541},
year = {2010},
Barbara, California, USA, August 23-25, 1982},
pages = {61-78},
bibsource = {DBLP, http://dblp.uni-trier.de},
- publisher = {Plenum Press, New York},
+ publisher = {Plenum Press},
+ address={New York, NY, USA},
+ month=aug,
year = {1983},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Shafi Goldwasser},
title = {An Efficient Probabilistic Public-Key Encryption Scheme
Which Hides All Partial Information},
+ month=aug,
year = {1985},
pages = {289-302},
editor = {G. R. Blakley and
David Chaum},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {196}
}
OPTcrossref = {},
OPTkey = {},
booktitle = {Proc. SPIE 6819},
+ publisher = spie,
+ address = spie_loc,
pages = {12},
year = {2008},
OPTeditor = {},
OPTcrossref = {},
OPTkey = {},
booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII},
+ publisher = spie,
+ address = spie_loc,
+ month=feb,
+ pages = {78800L-78800L-13},
OPTpages = {},
year = {2011},
OPTeditor = {},
@inproceedings{Tyan1993,
abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}},
- address = {{San Francisco, CA, USA}},
+ address = ieecs_loc,
+ publisher=ieecs,
author = {Tyan, C. Y. and Wang, P. P.},
booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}},
citeulike-article-id = {7936501},
pages = {600--605},
posted-at = {2010-10-01 17:27:48},
priority = {0},
+ month=apr,
title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}},
volume = {1},
year = {1993}
Prague, Czech Republic, May 18-20, 2011, Revised Selected
Papers},
booktitle = {Information Hiding},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {6958},
year = {2011},
isbn = {978-3-642-24177-2},
Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26,
2011, Revised Selected Papers},
booktitle = {IWDW},
- publisher = {Springer},
- series = {Lecture Notes in Computer Science},
+ publisher = springer,
+ address = springer_loc,
+ series = lncs,
volume = {7128},
year = {2012},
isbn = {978-3-642-32204-4},
-\documentclass[10pt]{NSP1}
+\documentclass{comjnl}
+\usepackage{epsfig,psfrag}
+\usepackage{graphicx}
+\usepackage{color}
+\usepackage{dsfont}
\usepackage{url}
\usepackage{graphicx}
\usepackage{mathptmx,amsmath,amssymb,bm}
\usepackage{color}
\usepackage{mathtools,etoolbox}
\usepackage{cite}
+\usepackage{setspace}
+\usepackage{lineno}
-\tolerance=1
-\emergencystretch=\maxdimen
-\hyphenpenalty=10000
-\hbadness=10000
-
-\topmargin=0.00cm
-
-\def\sm{\smallskip}
-\def\no{\noindent}
-
-\def\firstpage{1}
-\setcounter{page}{\firstpage}
-\def\thevol{7}
-\def\thenumber{?}
-\def\theyear{2013}
-
-
-\DeclarePairedDelimiter{\abs}{\lvert}{\rvert}
-
-% correct bad hyphenation here
-\hyphenation{op-tical net-works semi-conduc-tor}
-
-
-
-\titlefigurecaption{{\large \bf \rm Applied Mathematics \& Information Sciences }\\ {\it\small An International Journal}}
-
-
-
-
-
+\begin{document}
+%\doublespacing
+%\linenumbers
+\title[STABYLO]{STABYLO:
+a lightweight edge-based steganographic approach}
-\title{STABYLO:
-a lightweight %stego-secure
-edge-based steganographic approach}
+\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}}
-\titlerunning{STABYLO}
-\institute{
- FEMTO-ST Institute, UMR 6174 CNRS\\
+\affiliation{ FEMTO-ST Institute, UMR 6174 CNRS\\
Computer Science Laboratory DISC,
University of Franche-Comt\'{e},
- Besan\c con, France.
-}
+ Besan\c con, France.}
+\email{\{raphael.couturier, jean-francois.couchot, christophe.guyeux\}@univ-fcomte.fr}
+
+\shortauthors{J.-F. Couchot, R. Couturier, and C. Guyeux}
+
\received{...}
\revised{...}
-\accepted{...}
-\published{...}
-\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\
- $*:$ Authors in alphabetic order.\\
-}
-\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux}
-
-\mail{jean-francois.couchot@femto-st.fr}
\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
\newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}}
-\abstracttext{A novel steganographic method called STABYLO is introduced in
+\begin{abstract}
+
+
+A novel steganographic method called STABYLO is introduced in
this research work.
Its main advantage is to be much lighter than the so-called
Highly Undetectable steGO (HUGO) scheme, a well-known state of the art
To achieve the proposed goal, famous experimented
components of signal processing,
coding theory, and cryptography are combined together, leading to
-a scheme that can reasonably face up-to-date steganalysers.}
+a scheme that can reasonably face up-to-date steganalysers.
+\end{abstract}
+
-\begin{document}
\maketitle
% to investigate systematically all of these detectors in our next work.
-
+c
For future work, the authors' intention is to investigate systematically
all the existing edge detection methods, to see if the STABYLO evaluation scores can
Furthermore, we plan to investigate information hiding on other models, high frequency for JPEG encoding for instance.
-\bibliographystyle{plain}
+\bibliographystyle{compj}
\bibliography{biblio}