From: couchot Date: Mon, 9 Sep 2013 07:56:38 +0000 (+0200) Subject: je sais plus X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/commitdiff_plain/b0534e341c42eebb42cbace375bde097a699c771?ds=inline;hp=--cc je sais plus --- b0534e341c42eebb42cbace375bde097a699c771 diff --git a/biblio.bib b/biblio.bib index bf2fc7e..780ab67 100644 --- a/biblio.bib +++ b/biblio.bib @@ -1,3 +1,41 @@ + + +@String{elsevier={Elsevier Science Publishers B. V.}} + +@String{springer={Springer-Verlag}} +@String{springer_loc={Berlin}} +@String{lncs={Lecture Notes in Computer Science}} + +@String{ieecs={IEEE Computer Society}} +@String{ieecs_loc={Washington, DC}} + +@String{isoc={The Internet Society}} +@String{isoc_loc={Washington DC/Reston}} + +@String{westpress={Westview Press}} +@String{westpress_loc={Boulder, CO}} + +@String{spie={Society of Photo-Optical Instrumentation Engineers}} +@String{spie_loc={Bellingham, WA}} + + + +@String{NC = {Neural Computation}} +@String{TNN= {IEEE Transactions on Neural Networks}} +@String{STTT= {International Journal on Software Tools for Technology Transfer}} +@string{JACM={Journal of ACM}} +@String{JCAM={Journal of Computational and Applied Mathematics}} + +@String{tcs={Theoretical Computer Science}} +@String{jtb={Journal of Theoretical Biology}} +@string{prenticeHall={Prentice-Hall, Inc.}} +@string{discreteapplMath={Discrete Applied Mathematics}} +@string{advapplMath={Advances in Applied Mathematics}} +@string{ijma= {International Journal of Mathematical Algorithms}} +@string{cs= {Cognitive Science}} +@string{siam={SIAM Journal on Computing}} + + @inproceedings{DBLP:conf/ih/PereiraVMMP01, editor = {Ira S. Moskowitz}, author = {Shelby Pereira and @@ -11,8 +49,10 @@ Evaluation}, year = {2001}, pages = {340-353}, - series = {Lecture Notes in Computer Science}, - publisher = {Springer}, + series = lncs, + publisher = springer, + address = springer_loc, + month = apr, volume = {2137}, } @@ -24,8 +64,10 @@ Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, editor = {Ira S. Moskowitz}, pages = {289-302}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + month=apr, + series = lncs, title = {F5-A Steganographic Algorithm.}, volume = 2137, year = 2001 @@ -88,6 +130,8 @@ keywords = "Fuzzy edge detector" MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, year = {2005}, publisher = {ACM}, + address = {New York, NY, USA}, + month=aug, pages = {25-32}, ee = {http://doi.acm.org/10.1145/1073170.1073176}, bibsource = {DBLP, http://dblp.uni-trier.de} @@ -105,8 +149,10 @@ keywords = "Fuzzy edge detector" year = {2005}, pages = {296-311}, ee = {http://dx.doi.org/10.1007/11558859_22}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + month= jun, + series = lncs, volume = {3727}, } @@ -119,12 +165,14 @@ keywords = "Fuzzy edge detector" author = {Jessica J. Fridrich and Jan Kodovsk{\'y}}, title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, + month=may, year = {2012}, pages = {31-45}, ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3}, volume = {7692}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + series = lncs, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -165,6 +213,8 @@ keywords = "Fuzzy edge detector" pages = {27-30}, ee = {http://doi.acm.org/10.1145/1232454.1232466}, publisher = {ACM}, + address = {New York, NY, USA}, + month = oct, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -186,8 +236,10 @@ keywords = "Fuzzy edge detector" Papers}, year = {2010}, pages = {161-177}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + month=jun, + publisher = springer, + address = springer_loc, + series = lncs, volume = {6387}, ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, bibsource = {DBLP, http://dblp.uni-trier.de} @@ -219,8 +271,9 @@ keywords = "Fuzzy edge detector" Calgary, AB, Canada, June 28-30, 2010, Revised Selected Papers}, booktitle = {Information Hiding}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + series = lncs, volume = {6387}, year = {2010}, isbn = {978-3-642-16434-7}, @@ -284,8 +337,10 @@ keywords = "Fuzzy edge detector" isbn = {978-3-540-74123-7}, keywords = {dblp}, pages = {314-327}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + month=jul, + publisher = springer, + address = springer_loc, + series = lncs, timestamp = {2007-09-20T00:00:00.000+0200}, title = {Modified Matrix Encoding Technique for Minimal Distortion Steganography.}, url = {http://dblp.uni-trier.de/db/conf/ih/ih206.html#KimDR06}, @@ -302,8 +357,9 @@ keywords = "Fuzzy edge detector" title = {Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, booktitle = {Information Hiding}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + series = lncs, volume = {4437}, year = {2007}, isbn = {978-3-540-74123-7}, @@ -320,7 +376,6 @@ keywords = "Fuzzy edge detector" challenges, and opportunities}, pages = {3-14}, ee = {http://doi.acm.org/10.1145/1288869.1288872}, - crossref = {DBLP:conf/mmsec/2007}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and @@ -328,13 +383,12 @@ keywords = "Fuzzy edge detector" booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, publisher = {ACM}, + address = {New York, NY, USA}, + month=sep, year = {2007}, isbn = {978-1-59593-857-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } -@proceedings{DBLP:conf/mmsec/2007, - -} @@ -356,7 +410,9 @@ keywords = "Fuzzy edge detector" pages = {754105}, ee = {http://dx.doi.org/10.1117/12.838002}, bibsource = {DBLP, http://dblp.uni-trier.de}, - publisher = {SPIE}, + publisher = spie, + address = spie_loc, + month = jan, series = {SPIE Proceedings}, volume = {7541}, } @@ -377,7 +433,8 @@ keywords = "Fuzzy edge detector" Electronic Imaging Symposium, San Jose, CA, USA, January 18-20, 2010, Proceedings}, booktitle = {Media Forensics and Security}, - publisher = {SPIE}, + publisher = spie, + address = spie_loc, series = {SPIE Proceedings}, volume = {7541}, year = {2010}, @@ -466,7 +523,9 @@ keywords = "Fuzzy edge detector" Barbara, California, USA, August 23-25, 1982}, pages = {61-78}, bibsource = {DBLP, http://dblp.uni-trier.de}, - publisher = {Plenum Press, New York}, + publisher = {Plenum Press}, + address={New York, NY, USA}, + month=aug, year = {1983}, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -479,12 +538,14 @@ keywords = "Fuzzy edge detector" Shafi Goldwasser}, title = {An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information}, + month=aug, year = {1985}, pages = {289-302}, editor = {G. R. Blakley and David Chaum}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + series = lncs, volume = {196} } @@ -569,6 +630,8 @@ keywords = "Fuzzy edge detector" OPTcrossref = {}, OPTkey = {}, booktitle = {Proc. SPIE 6819}, + publisher = spie, + address = spie_loc, pages = {12}, year = {2008}, OPTeditor = {}, @@ -590,6 +653,10 @@ keywords = "Fuzzy edge detector" OPTcrossref = {}, OPTkey = {}, booktitle = { Proc. SPIE, Electronic Imaging, Media Watermarking, Security, and Forensics XIII}, + publisher = spie, + address = spie_loc, + month=feb, + pages = {78800L-78800L-13}, OPTpages = {}, year = {2011}, OPTeditor = {}, @@ -641,7 +708,8 @@ keywords = "Fuzzy edge detector" @inproceedings{Tyan1993, abstract = {{Novel algorithms for image enhancement, filtering and edge detection using the fuzzy logic approach are proposed. An enhancement technique based on various combinations of fuzzy logic linguistic statements in the form of if-then rules modifies the image contrast and provides a linguistic approach to image enhancement. A fuzzy filtering technique based on the tuning of fuzzy membership functions in the frequency domain results in improved restoration of an image which is degraded by additive random noise. An improved performance compared with traditional mask convolution filtering is also evident from the SNR improvement of 4.03 dB. The fuzzy edge detection algorithm provides a variety of edge information. The fuzzy edge detection algorithm is compared with some existing edge detection algorithms to show its novelty}}, - address = {{San Francisco, CA, USA}}, + address = ieecs_loc, + publisher=ieecs, author = {Tyan, C. Y. and Wang, P. P.}, booktitle = {{Proceedings of the Second IEEE International Conference on Fuzzy Systems}}, citeulike-article-id = {7936501}, @@ -649,6 +717,7 @@ keywords = "Fuzzy edge detector" pages = {600--605}, posted-at = {2010-10-01 17:27:48}, priority = {0}, + month=apr, title = {{Image processing-enhancement, filtering and edge detection using the fuzzy logic approach}}, volume = {1}, year = {1993} @@ -699,8 +768,9 @@ keywords = "Fuzzy edge detector" Prague, Czech Republic, May 18-20, 2011, Revised Selected Papers}, booktitle = {Information Hiding}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + series = lncs, volume = {6958}, year = {2011}, isbn = {978-3-642-24177-2}, @@ -726,8 +796,9 @@ keywords = "Fuzzy edge detector" Workshop, IWDW 2011, Atlantic City, NJ, USA, October 23-26, 2011, Revised Selected Papers}, booktitle = {IWDW}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, + publisher = springer, + address = springer_loc, + series = lncs, volume = {7128}, year = {2012}, isbn = {978-3-642-32204-4}, diff --git a/intro.tex b/intro.tex index ccdad75..73a315b 100644 --- a/intro.tex +++ b/intro.tex @@ -19,7 +19,7 @@ can be corrected considering the LSB matching (LSBM) subcategory, in which the $+1$ or $-1$ is randomly added to the cover pixel LSB value only if this one does not correspond to the secret bit. %TODO : modifier ceci -Since it is possible to make that probabilities of increasing or decreasing the pixel value, for instance by considering well-encrypted hidden messages, usual statistical approaches +By considering well-encrypted hidden messages, probabilities of increasing or ofdecreasing value of pixels are equal. Then usual statistical approaches cannot be applied here to discover stego-contents in LSBM. The most accurate detectors for this matching are universal steganalysers such as~\cite{LHS08,DBLP:conf/ih/Ker05,FK12}, which classify images according to extracted features from neighboring elements of residual noise. diff --git a/main.tex b/main.tex index 002666a..b2b72fa 100755 --- a/main.tex +++ b/main.tex @@ -1,4 +1,8 @@ -\documentclass[10pt]{NSP1} +\documentclass{comjnl} +\usepackage{epsfig,psfrag} +\usepackage{graphicx} +\usepackage{color} +\usepackage{dsfont} \usepackage{url} \usepackage{graphicx} \usepackage{mathptmx,amsmath,amssymb,bm} @@ -6,73 +10,41 @@ \usepackage{color} \usepackage{mathtools,etoolbox} \usepackage{cite} +\usepackage{setspace} +\usepackage{lineno} -\tolerance=1 -\emergencystretch=\maxdimen -\hyphenpenalty=10000 -\hbadness=10000 - -\topmargin=0.00cm - -\def\sm{\smallskip} -\def\no{\noindent} - -\def\firstpage{1} -\setcounter{page}{\firstpage} -\def\thevol{7} -\def\thenumber{?} -\def\theyear{2013} - - -\DeclarePairedDelimiter{\abs}{\lvert}{\rvert} - -% correct bad hyphenation here -\hyphenation{op-tical net-works semi-conduc-tor} - - - -\titlefigurecaption{{\large \bf \rm Applied Mathematics \& Information Sciences }\\ {\it\small An International Journal}} - - - - - +\begin{document} +%\doublespacing +%\linenumbers +\title[STABYLO]{STABYLO: +a lightweight edge-based steganographic approach} -\title{STABYLO: -a lightweight %stego-secure -edge-based steganographic approach} +\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux\thanks{Authors in alphabetic order}} -\titlerunning{STABYLO} -\institute{ - FEMTO-ST Institute, UMR 6174 CNRS\\ +\affiliation{ FEMTO-ST Institute, UMR 6174 CNRS\\ Computer Science Laboratory DISC, University of Franche-Comt\'{e}, - Besan\c con, France. -} + Besan\c con, France.} +\email{\{raphael.couturier, jean-francois.couchot, christophe.guyeux\}@univ-fcomte.fr} + +\shortauthors{J.-F. Couchot, R. Couturier, and C. Guyeux} + \received{...} \revised{...} -\accepted{...} -\published{...} -\author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux*\\ - $*:$ Authors in alphabetic order.\\ -} -\authorrunning{J.-F. Couchot, R. Couturier, and C. Guyeux} - -\mail{jean-francois.couchot@femto-st.fr} \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} \newcommand{\RC}[1]{\begin{color}{red}\textit{}\end{color}} @@ -87,7 +59,10 @@ edge-based steganographic approach} -\abstracttext{A novel steganographic method called STABYLO is introduced in +\begin{abstract} + + +A novel steganographic method called STABYLO is introduced in this research work. Its main advantage is to be much lighter than the so-called Highly Undetectable steGO (HUGO) scheme, a well-known state of the art @@ -98,10 +73,11 @@ and weighted PSNR (wPSNR) are obtained. To achieve the proposed goal, famous experimented components of signal processing, coding theory, and cryptography are combined together, leading to -a scheme that can reasonably face up-to-date steganalysers.} +a scheme that can reasonably face up-to-date steganalysers. +\end{abstract} + -\begin{document} \maketitle @@ -140,7 +116,7 @@ BIQI, and weighted PSNR) and using well-established steganalysers. % to investigate systematically all of these detectors in our next work. - +c For future work, the authors' intention is to investigate systematically all the existing edge detection methods, to see if the STABYLO evaluation scores can @@ -157,7 +133,7 @@ replacement, in terms of security, will be discussed. Furthermore, we plan to investigate information hiding on other models, high frequency for JPEG encoding for instance. -\bibliographystyle{plain} +\bibliographystyle{compj} \bibliography{biblio} diff --git a/ourapproach.tex b/ourapproach.tex index 9cce7a2..d62a204 100644 --- a/ourapproach.tex +++ b/ourapproach.tex @@ -334,9 +334,9 @@ $$ V_{ij}= \left\{ \begin{array}{rcl} 0 & \textrm{if} & X_{ij} = Y_{ij} \\ -75 & \textrm{if} & \abs{ X_{ij} - Y_{ij}} = 1 \\ -150 & \textrm{if} & \abs{ X_{ij} - Y_{ij}} = 2 \\ -225 & \textrm{if} & \abs{ X_{ij} - Y_{ij}} = 3 +75 & \textrm{if} & \vert X_{ij} - Y_{ij} \vert = 1 \\ +150 & \textrm{if} & \vert X_{ij} - Y_{ij} \vert = 2 \\ +225 & \textrm{if} & \vert X_{ij} - Y_{ij} \vert = 3 \end{array} \right.. $$