From: couchot Date: Sun, 7 Oct 2012 19:02:18 +0000 (+0200) Subject: typos X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/commitdiff_plain/ded436ff1397fd455304cbae04f58e4c0703ea01?ds=sidebyside;hp=-c typos --- ded436ff1397fd455304cbae04f58e4c0703ea01 diff --git a/experiments.tex b/experiments.tex new file mode 100644 index 0000000..60b0f2f --- /dev/null +++ b/experiments.tex @@ -0,0 +1,6 @@ +\subsection{Steganalysis} + + +Détailler \cite{Fillatre:2012:ASL:2333143.2333587} + +Vainqueur du BOSS challenge~\cite{DBLP:journals/tifs/KodovskyFH12} diff --git a/intro.tex b/intro.tex index dd24570..54b59e2 100644 --- a/intro.tex +++ b/intro.tex @@ -1,12 +1,12 @@ This work considers digital images as covers and foundation is spatial least significant-bit (LSB) replacement. -I this data hiding scheme a subset of all the LSB of the cover image is modified +In this data hiding scheme a subset of all the LSB of the cover image is modified with a secret bit stream depending on to a key, the cover, and the message to embed. This well studied steganographic approach never decreases (resp. increases) pixel with even value (resp. odd value) and may break structural symmetry. These structural modification can be detected by statistical approaches -and thus by steganalysis methods~\cite{DBLP:journals/tsp/DumitrescuWW03,DBLP:conf/mmsec/FridrichGD01,Dumitrescu:2005:LSB:1073170.1073176} +and thus by steganalysis methods~\cite{DBLP:journals/tsp/DumitrescuWW03,DBLP:conf/mmsec/FridrichGD01,Dumitrescu:2005:LSB:1073170.1073176}. This drawback is avoided in LSB matching (LSBM) where the $+1$ or $-1$ is randomly added to the cover pixel LSB value @@ -32,7 +32,7 @@ changes to the cover image at the same payload compared to LSB replacement and LSBM. It is also shown that such a new scheme can avoid the LSB replacement style asymmetry, and thus it should make the detection slightly more difficult than the -LSBM approach based on our experiments +LSBM approach. % based on our experiments @@ -56,7 +56,7 @@ We argue that modifying edge pixels is an acceptable compromise. Edges form the outline of an object: they are the boundary between overlapping objects or between an object and the background. A small modification of pixel value in the stego image should not be harmful to the image quality: in cover image, edge pixels already break its continuity and thus already contains large variation with neighbouring -pixels. In other words, minor changes in regular area is more dramatic than larger modifications in edge ones. +pixels. In other words, minor changes in regular area are more dramatic than larger modifications in edge ones. Our proposal is thus to embed message bits into edge shapes while preserving other smooth regions. Edge based steganographic schemes have bee already studied~\cite{Luo:2010:EAI:1824719.1824720,DBLP:journals/eswa/ChenCL10}. diff --git a/main.tex b/main.tex index e68d1ca..2a08602 100755 --- a/main.tex +++ b/main.tex @@ -8,16 +8,17 @@ \begin{document} -\title{STABYLO: STeganography with cAnny, Bbs, binarY embedding at LOw cost} +\title{STABYLO: +a lightweight stego-secure edge-base steganography approach} \author{Jean-Fran\c cois Couchot, Raphael Couturier, and Christophe Guyeux* FEMTO-ST Institute, UMR 6174 CNRS\\ - Computer Science Laboratory DISC\\ - University of Franche-Comt\'{e}\\ - Besan\c con, France\\ + Computer Science Laboratory DISC + University of Franche-Comt\'{e} + Besan\c con, France.\\ \{jean-francois.couchot,raphael.couturier, christophe.guyeux\}@femto-st.fr\\ -* Authors in alphabetic order\\ +* Authors in alphabetic order.\\ } \newcommand{\JFC}[1]{\begin{color}{green}\textit{#1}\end{color}} % make the title area @@ -46,7 +47,7 @@ Steganography, least-significant-bit (LSB)-based steganography, edge detection, \input{ourapproach.tex} \section{Experiments}\label{sec:experiments} - +\input{experiments} \section{Conclusion}\label{sec:concl} diff --git a/ourapproach.tex b/ourapproach.tex index 28f8263..9626562 100644 --- a/ourapproach.tex +++ b/ourapproach.tex @@ -1,4 +1,4 @@ -The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as +The flowcharts given in Fig.~\ref{fig:sch} summarize our steganography scheme denoted as to STABYLO for STeganography with cAnny, Bbs, binarY embedding at LOw cost. What follows successively details all the inner steps and flow inside the embedding stage (Fig.\ref{fig:sch:emb}) @@ -31,12 +31,6 @@ and inside the extraction one(Fig.~\ref{fig:sch:ext}). \end{figure*} -\subsection{Steganalysis} - - -Détailler \cite{Fillatre:2012:ASL:2333143.2333587} - -Vainqueur du BOSS challenge~\cite{DBLP:journals/tifs/KodovskyFH12} \subsection{Data Embedding}