This work considers digital images as covers and foundation is
spatial least significant-bit (LSB) replacement.
-I this data hiding scheme a subset of all the LSB of the cover image is modified
+In this data hiding scheme a subset of all the LSB of the cover image is modified
with a secret bit stream depending on to a key, the cover, and the message to embed.
This well studied steganographic approach never decreases (resp. increases)
pixel with even value (resp. odd value) and may break structural symmetry.
These structural modification can be detected by statistical approaches
-and thus by steganalysis methods~\cite{DBLP:journals/tsp/DumitrescuWW03,DBLP:conf/mmsec/FridrichGD01,Dumitrescu:2005:LSB:1073170.1073176}
+and thus by steganalysis methods~\cite{DBLP:journals/tsp/DumitrescuWW03,DBLP:conf/mmsec/FridrichGD01,Dumitrescu:2005:LSB:1073170.1073176}.
This drawback is avoided in LSB matching (LSBM) where
the $+1$ or $-1$ is randomly added to the cover pixel LSB value
LSB replacement and LSBM. It is also shown that such a new
scheme can avoid the LSB replacement style asymmetry, and
thus it should make the detection slightly more difficult than the
-LSBM approach based on our experiments
+LSBM approach. % based on our experiments
Edges form the outline of an object: they are the boundary between overlapping objects or between an object
and the background. A small modification of pixel value in the stego image should not be harmful to the image quality:
in cover image, edge pixels already break its continuity and thus already contains large variation with neighbouring
-pixels. In other words, minor changes in regular area is more dramatic than larger modifications in edge ones.
+pixels. In other words, minor changes in regular area are more dramatic than larger modifications in edge ones.
Our proposal is thus to embed message bits into edge shapes while preserving other smooth regions.
Edge based steganographic schemes have bee already studied~\cite{Luo:2010:EAI:1824719.1824720,DBLP:journals/eswa/ChenCL10}.
\begin{document}
-\title{STABYLO: STeganography with cAnny, Bbs, binarY embedding at LOw cost}
+\title{STABYLO:
+a lightweight stego-secure edge-base steganography approach}
\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*
FEMTO-ST Institute, UMR 6174 CNRS\\
- Computer Science Laboratory DISC\\
- University of Franche-Comt\'{e}\\
- Besan\c con, France\\
+ Computer Science Laboratory DISC
+ University of Franche-Comt\'{e}
+ Besan\c con, France.\\
\{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\
-* Authors in alphabetic order\\
+* Authors in alphabetic order.\\
}
\newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}}
% make the title area
\input{ourapproach.tex}
\section{Experiments}\label{sec:experiments}
-
+\input{experiments}
\section{Conclusion}\label{sec:concl}
-The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as
+The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as to
STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost.
What follows successively details all the inner steps and flow inside
the embedding stage (Fig.\ref{fig:sch:emb})
\end{figure*}
-\subsection{Steganalysis}
-
-
-Détailler \cite{Fillatre:2012:ASL:2333143.2333587}
-
-Vainqueur du BOSS challenge~\cite{DBLP:journals/tifs/KodovskyFH12}
\subsection{Data Embedding}