From: couchot Date: Thu, 20 Jun 2013 19:56:40 +0000 (+0200) Subject: modif bibtex X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/canny.git/commitdiff_plain/f4086cd758c530e5056b03d442f1cb5cf07b447b?ds=sidebyside;hp=--cc modif bibtex --- f4086cd758c530e5056b03d442f1cb5cf07b447b diff --git a/biblio.bib b/biblio.bib index 89cddc2..a237dee 100644 --- a/biblio.bib +++ b/biblio.bib @@ -1,31 +1,40 @@ @inproceedings{DBLP:conf/ih/PereiraVMMP01, + editor = {Ira S. Moskowitz}, author = {Shelby Pereira and Sviatoslav Voloshynovskiy and Maribel Madueno and St{\'e}phane Marchand-Maillet and Thierry Pun}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, + Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, title = {Second Generation Benchmarking and Application Oriented Evaluation}, - booktitle = {Information Hiding}, year = {2001}, pages = {340-353}, - ee = {http://dx.doi.org/10.1007/3-540-45496-9_25}, - crossref = {DBLP:conf/ih/2001}, - bibsource = {DBLP, http://dblp.uni-trier.de} + series = {Lecture Notes in Computer Science}, + publisher = {Springer}, + volume = {2137}, } -@proceedings{DBLP:conf/ih/2001, - editor = {Ira S. Moskowitz}, - title = {Information Hiding, 4th International Workshop, IHW 2001, + + +@inproceedings{DBLP:conf/ih/Westfeld01, + added-at = {2011-06-28T00:00:00.000+0200}, + author = {Westfeld, Andreas}, + booktitle = {Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings}, - booktitle = {Information Hiding}, + editor = {Ira S. Moskowitz}, + pages = {289-302}, publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - volume = {2137}, - year = {2001}, - isbn = {3-540-42733-3}, - bibsource = {DBLP, http://dblp.uni-trier.de} + series = {Lecture Notes in Computer Science}, + title = {F5-A Steganographic Algorithm.}, + volume = 2137, + year = 2001 } + + + + @article{Chang20101286, title = "Hybrid wet paper coding mechanism for steganography employing n-indicator and fuzzy edge detector", journal = "Digital Signal Processing", @@ -66,62 +75,60 @@ keywords = "Fuzzy edge detector" address = {New York, NY, USA}, keywords = {Edge detector, Fuzzy If-Then inference rule, Fuzzy maximum entropy principle, Linguistic variables}, } + + @inproceedings{Dumitrescu:2005:LSB:1073170.1073176, - author = {Dumitrescu, Sorina and Wu, Xiaolin}, - title = {LSB steganalysis based on high-order statistics}, - booktitle = {Proceedings of the 7th workshop on Multimedia and security}, - series = {MMSec '05}, - year = {2005}, - isbn = {1-59593-032-9}, - location = {New York, NY, USA}, - pages = {25--32}, - numpages = {8}, - url = {http://doi.acm.org/10.1145/1073170.1073176}, - doi = {10.1145/1073170.1073176}, - acmid = {1073176}, - publisher = {ACM}, - address = {New York, NY, USA}, - keywords = {LSB steganography, digital media, steganalysis}, -} + author = {Sorina Dumitrescu and + Xiaolin Wu}, + editor = {Ahmet M. Eskicioglu and + Jessica J. Fridrich and + Jana Dittmann}, + title = {LSB steganalysis based on high-order statistics}, + booktitle = {Proceedings of the 7th workshop on Multimedia {\&} Security, + MM{\&}Sec 2005, New York, NY, USA, August 1-2, 2005, 2006}, + year = {2005}, + publisher = {ACM}, + pages = {25-32}, + ee = {http://doi.acm.org/10.1145/1073170.1073176}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} @inproceedings{DBLP:conf/ih/Ker05, author = {Andrew D. Ker}, title = {A General Framework for Structural Steganalysis of LSB Replacement}, - booktitle = {Information Hiding}, - year = {2005}, - pages = {296-311}, - ee = {http://dx.doi.org/10.1007/11558859_22}, - crossref = {DBLP:conf/ih/2005}, - bibsource = {DBLP, http://dblp.uni-trier.de} -} -@proceedings{DBLP:conf/ih/2005, editor = {Mauro Barni and Jordi Herrera-Joancomart\'{\i} and Stefan Katzenbeisser and Fernando P{\'e}rez-Gonz{\'a}lez}, - title = {Information Hiding, 7th International Workshop, IH 2005, + booktitle = {Information Hiding, 7th International Workshop, IH 2005, Barcelona, Spain, June 6-8, 2005, Revised Selected Papers}, - booktitle = {Information Hiding}, + year = {2005}, + pages = {296-311}, + ee = {http://dx.doi.org/10.1007/11558859_22}, publisher = {Springer}, series = {Lecture Notes in Computer Science}, volume = {3727}, - year = {2005}, - isbn = {3-540-29039-7}, - bibsource = {DBLP, http://dblp.uni-trier.de} } + @inproceedings{FK12, -author = {Jessica J. Fridrich and + editor = {Matthias Kirchner and + Dipak Ghosal}, + booktitle = {Information Hiding - 14th International Conference, IH 2012, + Berkeley, CA, USA, May 15-18, 2012, Revised Selected Papers}, + author = {Jessica J. Fridrich and Jan Kodovsk{\'y}}, - title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, - booktitle = {14th Information Hiding Conference}, - year = {2012}, - month=may, - publisher = {Springer}, - address = {Berkeley, CA}, - note = {to appear} + title = {Steganalysis of LSB Replacement Using Parity-Aware Features}, + year = {2012}, + pages = {31-45}, + ee = {http://dx.doi.org/10.1007/978-3-642-36373-3_3}, + volume = {7692}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + bibsource = {DBLP, http://dblp.uni-trier.de} } + @article{DBLP:journals/tsp/DumitrescuWW03, added-at = {2012-02-06T00:00:00.000+0100}, author = {Dumitrescu, Sorina and Wu, Xiaolin and Wang, Zhe}, @@ -140,73 +147,67 @@ author = {Jessica J. Fridrich and year = 2003 } -@inproceedings{DBLP:conf/mmsec/FridrichGD01, - added-at = {2007-10-26T00:00:00.000+0200}, - author = {Fridrich, Jessica J. and Goljan, Miroslav and Du, Rui}, - biburl = {http://www.bibsonomy.org/bibtex/21c12d6fb5f949f98fabe4ee75cab4f8b/dblp}, - booktitle = {MMSec}, - crossref = {DBLP:conf/mmsec/2001}, - date = {2007-10-26}, - description = {dblp}, - editor = {Georganas, Nicolas D. and Popescu-Zeletin, Radu}, - ee = {http://doi.acm.org/10.1145/1232454.1232466}, - interhash = {de49b3b9958119616eee66f14060f47f}, - intrahash = {1c12d6fb5f949f98fabe4ee75cab4f8b}, - isbn = {1-58113-393-6}, - keywords = {dblp}, - pages = {27-30}, - publisher = {ACM}, - timestamp = {2007-10-26T00:00:00.000+0200}, - title = {Reliable detection of LSB steganography in color and grayscale images.}, - url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2001.html#FridrichGD01}, - year = 2001 -} -@proceedings{DBLP:conf/mmsec/2001, + +@inproceedings{DBLP:conf/mmsec/FridrichGD01, editor = {Nicolas D. Georganas and Radu Popescu-Zeletin}, - title = {Proceedings of the 4th workshop on Multimedia {\&} Security: + booktitle = {Proceedings of the 4th workshop on Multimedia {\&} Security: New Challenges, MM{\&}Sec 2001, Ottawa, Ontario, Canada, October 5, 2001}, - booktitle = {MM{\&}Sec}, - publisher = {ACM}, + author = {Jessica J. Fridrich and + Miroslav Goljan and + Rui Du}, + title = {Reliable detection of LSB steganography in color and grayscale + images}, year = {2001}, - isbn = {1-58113-393-6}, + pages = {27-30}, + ee = {http://doi.acm.org/10.1145/1232454.1232466}, + publisher = {ACM}, bibsource = {DBLP, http://dblp.uni-trier.de} } + + + + @inproceedings{DBLP:conf/ih/PevnyFB10, - added-at = {2010-10-08T00:00:00.000+0200}, - author = {Pevn{\'y}, Tom{\'a}s and Filler, Tom{\'a}s and Bas, Patrick}, - biburl = {http://www.bibsonomy.org/bibtex/28d83b7eac2c22ed5e7e072fd43a34248/dblp}, - booktitle = {Information Hiding}, - crossref = {DBLP:conf/ih/2010}, - editor = {Böhme, Rainer and Fong, Philip W. L. and Safavi-Naini, Reihaneh}, - ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, - interhash = {b30869c1bb39a2c15b33e05e5139e58b}, - intrahash = {8d83b7eac2c22ed5e7e072fd43a34248}, - isbn = {978-3-642-16434-7}, - keywords = {dblp}, - pages = {161-177}, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + title = {Using High-Dimensional Image Models to Perform Highly Undetectable + Steganography}, + editor = {Rainer B{\"o}hme and + Philip W. L. Fong and + Reihaneh Safavi-Naini}, + booktitle = {Information Hiding - 12th International Conference, IH 2010, + Calgary, AB, Canada, June 28-30, 2010, Revised Selected + Papers}, + year = {2010}, + pages = {161-177}, publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - timestamp = {2010-10-08T00:00:00.000+0200}, - title = {Using High-Dimensional Image Models to Perform Highly Undetectable Steganography.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ih2010.html#PevnyFB10}, - volume = 6387, - year = 2010 + series = {Lecture Notes in Computer Science}, + volume = {6387}, + ee = {http://dx.doi.org/10.1007/978-3-642-16435-4_13}, + bibsource = {DBLP, http://dblp.uni-trier.de} } + + + @Misc{Boss10, OPTkey = {}, - author = {Pevný, Tomáš and Filler, Tomáš and Bas, Patrick}, + author = {Tom{\'a}s Pevn{\'y} and + Tom{\'a}s Filler and + Patrick Bas}, + title = {Break Our Steganographic System}, OPThowpublished = {}, OPTmonth = {}, year = {2010}, - note = { available at \url{http://www.agents.cz/boss/}}, + note = {Available at \url{http://www.agents.cz/boss/}}, OPTannote = {} } @@ -236,7 +237,7 @@ author = {Jessica J. Fridrich and ee = {http://dx.doi.org/10.1016/j.eswa.2009.09.050}, interhash = {bc34a5f04661fee24ee62c39e76361be}, intrahash = {28889a4ab329da28559f0910469f054b}, - journal = {Expert Syst. Appl.}, + journal = {Expert Systems with Applications}, keywords = {dblp}, number = 4, pages = {3292-3301}, @@ -267,28 +268,6 @@ author = {Jessica J. Fridrich and -@inproceedings{DBLP:conf/ih/Westfeld01, - added-at = {2011-06-28T00:00:00.000+0200}, - author = {Westfeld, Andreas}, - biburl = {http://www.bibsonomy.org/bibtex/2fea2c6aabf7eba19ceaec93f913e5d8d/dblp}, - booktitle = {Information Hiding}, - crossref = {DBLP:conf/ih/2001}, - editor = {Moskowitz, Ira S.}, - ee = {http://dx.doi.org/10.1007/3-540-45496-9_21}, - interhash = {e7eaa917e995dc9373f10304d3e79255}, - intrahash = {fea2c6aabf7eba19ceaec93f913e5d8d}, - isbn = {3-540-42733-3}, - keywords = {dblp}, - pages = {289-302}, - publisher = {Springer}, - series = {Lecture Notes in Computer Science}, - timestamp = {2011-06-28T00:00:00.000+0200}, - title = {F5-A Steganographic Algorithm.}, - url = {http://dblp.uni-trier.de/db/conf/ih/ihw2001.html#Westfeld01}, - volume = 2137, - year = 2001 -} - @inproceedings{DBLP:conf/ih/KimDR06, added-at = {2007-09-20T00:00:00.000+0200}, @@ -331,65 +310,64 @@ author = {Jessica J. Fridrich and bibsource = {DBLP, http://dblp.uni-trier.de} } -@inproceedings{DBLP:conf/mmsec/FridrichPK07, - added-at = {2007-10-26T00:00:00.000+0200}, - author = {Fridrich, Jessica J. and Pevn{\'y}, Tom{\'a}s and Kodovsk{\'y}, Jan}, - biburl = {http://www.bibsonomy.org/bibtex/26123ac512b5e1fe72a44e73d101d8b95/dblp}, - booktitle = {MMSec}, - crossref = {DBLP:conf/mmsec/2007}, - date = {2007-10-26}, - description = {dblp}, - editor = {Kundur, Deepa and Prabhakaran, Balakrishnan and Dittmann, Jana and Fridrich, Jessica J.}, - ee = {http://doi.acm.org/10.1145/1288869.1288872}, - interhash = {35c4a20b41b7861bcb09c9ff335ac601}, - intrahash = {6123ac512b5e1fe72a44e73d101d8b95}, - isbn = {978-1-59593-857-2}, - keywords = {dblp}, - pages = {3-14}, - publisher = {ACM}, - timestamp = {2007-10-26T00:00:00.000+0200}, - title = {Statistically undetectable jpeg steganography: dead ends challenges, and opportunities.}, - url = {http://dblp.uni-trier.de/db/conf/mmsec/mmsec2007.html#FridrichPK07}, - year = 2007 -} -@proceedings{DBLP:conf/mmsec/2007, + +@inproceedings{DBLP:conf/mmsec/FridrichPK07, + author = {Jessica J. Fridrich and + Tom{\'a}s Pevn{\'y} and + Jan Kodovsk{\'y}}, + title = {Statistically undetectable jpeg steganography: dead ends + challenges, and opportunities}, + pages = {3-14}, + ee = {http://doi.acm.org/10.1145/1288869.1288872}, + crossref = {DBLP:conf/mmsec/2007}, editor = {Deepa Kundur and Balakrishnan Prabhakaran and Jana Dittmann and Jessica J. Fridrich}, - title = {Proceedings of the 9th workshop on Multimedia {\&} Security, + booktitle = {Proceedings of the 9th workshop on Multimedia {\&} Security, MM{\&}Sec 2007, Dallas, Texas, USA, September 20-21, 2007}, - booktitle = {MM{\&}Sec}, publisher = {ACM}, year = {2007}, isbn = {978-1-59593-857-2}, bibsource = {DBLP, http://dblp.uni-trier.de} } +@proceedings{DBLP:conf/mmsec/2007, + +} + + + @inproceedings{DBLP:conf/mediaforensics/FillerJF10, - added-at = {2010-08-21T00:00:00.000+0200}, - author = {Filler, Tomás and Judas, Jan and Fridrich, Jessica J.}, - biburl = {http://www.bibsonomy.org/bibtex/23405985533dce431b5013941a2c2c2cc/dblp}, - booktitle = {Media Forensics and Security}, - crossref = {DBLP:conf/mediaforensics/2010}, - editor = {Memon, Nasir D. and Dittmann, Jana and Alattar, Adnan M. and Delp, Edward J.}, - ee = {http://dx.doi.org/10.1117/12.838002}, - interhash = {a3d2215b959361a30f0b48f15c012bc9}, - intrahash = {3405985533dce431b5013941a2c2c2cc}, - isbn = {978-0-8194-7934-1}, - keywords = {dblp}, - pages = 754105, + editor = {Nasir D. Memon and + Jana Dittmann and + Adnan M. Alattar and + Edward J. Delp}, + booktitle = {Media Forensics and Security II, part of the IS{\&}T-SPIE + Electronic Imaging Symposium, San Jose, CA, USA, January + 18-20, 2010, Proceedings}, + author = {Tom{\'a}s Filler and + Jan Judas and + Jessica J. Fridrich}, + title = {Minimizing embedding impact in steganography using trellis-coded + quantization}, + year = {2010}, + pages = {754105}, + ee = {http://dx.doi.org/10.1117/12.838002}, + bibsource = {DBLP, http://dblp.uni-trier.de}, publisher = {SPIE}, - series = {SPIE Proceedings}, - timestamp = {2010-08-21T00:00:00.000+0200}, - title = {Minimizing embedding impact in steganography using trellis-coded quantization.}, - url = {http://dblp.uni-trier.de/db/conf/mediaforensics/mediaforensics2010.html#FillerJF10}, - volume = 7541, - year = 2010 + series = {SPIE Proceedings}, + volume = {7541}, } + + + + + + @proceedings{DBLP:conf/mediaforensics/2010, editor = {Nasir D. Memon and Jana Dittmann and @@ -499,29 +477,34 @@ author = {Jessica J. Fridrich and bibsource = {DBLP, http://dblp.uni-trier.de} } + @inproceedings{Blum:1985:EPP:19478.19501, - author = {Blum, Manuel and Goldwasser, Shafi}, - title = {An efficient probabilistic public key encryption scheme which hides all partial information}, - booktitle = {Proceedings of CRYPTO 84 on Advances in cryptology}, - year = {1985}, - isbn = {0-387-15658-5}, - location = {Santa Barbara, California, United States}, - pages = {289--302}, - numpages = {14}, - url = {http://dl.acm.org/citation.cfm?id=19478.19501}, - acmid = {19501}, - publisher = {Springer-Verlag New York, Inc.}, - address = {New York, NY, USA}, - keywords = {chosen cyphertext attack, integer factorization, partial information, passive adversaries, probabilistic encryption}, -} + booktitle = {Advances in Cryptology, Proceedings of CRYPTO '84, Santa + Barbara, California, USA, August 19-22, 1984, Proceedings}, + author = {Manuel Blum and + Shafi Goldwasser}, + title = {An Efficient Probabilistic Public-Key Encryption Scheme + Which Hides All Partial Information}, + year = {1985}, + pages = {289-302}, + editor = {G. R. Blakley and + David Chaum}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + volume = {196} +} + + @article{DBLP:journals/ejisec/FontaineG07, author = {Caroline Fontaine and Fabien Galand}, title = {A Survey of Homomorphic Encryption for Nonspecialists}, - journal = {EURASIP J. Information Security}, + journal = {EURASIP Journal on Information Security}, volume = {2007}, year = {2007}, + NUMBER = {1}, + PAGES = {013801}, ee = {http://dx.doi.org/10.1155/2007/13801}, bibsource = {DBLP, http://dblp.uni-trier.de} } @@ -530,8 +513,7 @@ author = {Jessica J. Fridrich and @article{Luo:2010:EAI:1824719.1824720, author = {Luo, Weiqi and Huang, Fangjun and Huang, Jiwu}, title = {Edge adaptive image steganography based on LSB matching revisited}, - journal = {Trans. Info. For. Sec.}, - issue_date = {June 2010}, + journal = {IEEE Transactions on Information Forensics and Security}, volume = {5}, number = {2}, month = jun, @@ -550,7 +532,7 @@ author = {Jessica J. Fridrich and @article{Mielikainen06, author = {Mielikainen, J.}, title = {LSB Matching Revisited}, - journal = {Signal Processing Letters}, + journal = {IEEE Signal Processing Letters}, year = {2006}, OPTkey = {}, volume = {13}, @@ -647,12 +629,11 @@ author = {Jessica J. Fridrich and @article{Fillatre:2012:ASL:2333143.2333587, author = {Fillatre, Lionel}, title = {Adaptive Steganalysis of Least Significant Bit Replacement in Grayscale Natural Images}, - journal = {Trans. Sig. Proc.}, - issue_date = {February 2012}, + journal = {IEEE Transactions on Signal Processing}, + year = {2012}, volume = {60}, number = {2}, month = feb, - year = {2012}, issn = {1053-587X}, pages = {556--569}, numpages = {14}, @@ -683,9 +664,9 @@ author = {Jessica J. Fridrich and @article{Canny:1986:CAE:11274.11275, author = {Canny, J}, title = {A Computational Approach to Edge Detection}, - journal = {IEEE Trans. Pattern Anal. Mach. Intell.}, + journal = {IEEE Transactions on Pattern Analysis and Machine Intelligence}, issue_date = {June 1986}, - volume = {8}, + volume = {PAMI-8}, number = {6}, month = jun, year = {1986}, diff --git a/experiments.tex b/experiments.tex index aed0505..0c08d69 100644 --- a/experiments.tex +++ b/experiments.tex @@ -3,7 +3,7 @@ of the BOSS contest~\cite{Boss10} database is taken. In this set, each cover is a $512\times 512$ grayscale digital image in a RAW format. We restrict experiments to -this set of cover images since this paper is more focussed on +this set of cover images since this paper is more focused on the methodology than benchmarking. Our approach is always compared to Hugo~\cite{DBLP:conf/ih/PevnyFB10} and to EAISLSBMR~\cite{Luo:2010:EAI:1824719.1824720}. @@ -69,22 +69,28 @@ The other ones have been designed to tackle this problem. \hline Schemes & \multicolumn{3}{|c|}{STABYLO} & \multicolumn{2}{|c|}{HUGO}& \multicolumn{2}{|c|}{EAISLSBMR} \\ \hline -Embedding & \multicolumn{2}{|c||}{Adaptive} & Fixed & \multicolumn{2}{|c|}{Fixed}& \multicolumn{2}{|c|}{Fixed} \\ +Embedding & Fixed & \multicolumn{2}{|c|}{Adaptive} & \multicolumn{2}{|c|}{Fixed}& \multicolumn{2}{|c|}{Fixed} \\ \hline -Rate & + STC & + sample & 10\% & 10\%&6.35\%& 10\%&6.35\%\\ +Rate & 10\% & + sample & + STC & 10\%&6.35\%& 10\%&6.35\%\\ \hline -PSNR & 66.55 (\textbf{-0.8\%}) & 63.48 & 61.86 & 64.65 & {67.08} & 60.8 & 62.9\\ +PSNR & 61.86 & 63.48 & 66.55 (\textbf{-0.8\%}) & 64.65 & {67.08} & 60.8 & 62.9\\ \hline -PSNR-HVS-M & 78.6 (\textbf{-0.8\%}) & 75.39 & 72.9 & 76.67 & {79.23} & 61.3 & 63.4\\ +PSNR-HVS-M & 72.9 & 75.39 & 78.6 (\textbf{-0.8\%}) & 76.67 & {79.23} & 61.3 & 63.4\\ %\hline %BIQI & 28.3 & 28.28 & 28.4 & 28.28 & 28.28 & 28.2 & 28.2\\ \hline -wPSNR & 86.43(\textbf{-1.6\%}) & 80.59 & 77.47& 83.03 & {87.8} & & 80.6\\ +wPSNR & 77.47 & 80.59 & 86.43(\textbf{-1.6\%}) & 83.03 & {87.8} & 76.7 & 80.6\\ \hline \end{tabular} + +\begin{footnotesize} +\vspace{2em} +Variances given in bold font express the quality differences between +HUGO and STABYLO with STC+adaptive parameters. +\end{footnotesize} + \end{center} \caption{Quality Measures of Steganography Approaches\label{table:quality}} -\label{table:quality} \end{table*} @@ -101,7 +107,7 @@ into the edge detection. Let us focus on the quality of HUGO images: with a given fixed embedding rate (10\%), HUGO always produces images whose quality is higher than the STABYLO's one. -However our appraoch always outperforms EAISLSBMR since this one may modify +However our approach always outperforms EAISLSBMR since this one may modify the two least significant bits whereas STABYLO only alter LSB. If we combine \emph{adaptive} and \emph{STC} strategies @@ -126,7 +132,7 @@ give quality metrics for fixed embedding rates from a large base of images. -The quality of our approach has been evaluated through the two +The steganalysis quality of our approach has been evaluated through the two AUMP~\cite{Fillatre:2012:ASL:2333143.2333587} and Ensemble Classifier~\cite{DBLP:journals/tifs/KodovskyFH12} based steganalysers. Both aims at detecting hidden bits in grayscale natural images and are @@ -141,7 +147,6 @@ machine learning step, which is often implemented as support vector machine, can be favorably executed thanks to an ensemble classifier. -%citer le second tableau, comparer avec EAISLSBMR \begin{table*} \begin{center} @@ -150,13 +155,13 @@ can be favorably executed thanks to an ensemble classifier. \hline Schemes & \multicolumn{3}{|c|}{STABYLO} & \multicolumn{2}{|c|}{HUGO}& \multicolumn{2}{|c|}{EAISLSBMR}\\ \hline -Embedding & \multicolumn{2}{|c|}{Adaptive} & Fixed & \multicolumn{2}{|c|}{Fixed}& \multicolumn{2}{|c|}{Fixed} \\ +Embedding & Fixed & \multicolumn{2}{|c|}{Adaptive} & \multicolumn{2}{|c|}{Fixed}& \multicolumn{2}{|c|}{Fixed} \\ \hline -Rate & + STC & + sample & 10\% & 10\%& 6.35\%& 10\%& 6.35\%\\ +Rate & 10\% & + sample & + STC & 10\%& 6.35\%& 10\%& 6.35\%\\ \hline -AUMP & 0.39 & 0.33 & 0.22 & 0.50 & 0.50 & 0.49 & 0.50 \\ +AUMP & 0.22 & 0.33 & 0.39 & 0.50 & 0.50 & 0.49 & 0.50 \\ \hline -Ensemble Classifier & \textbf{0.47} & 0.44 & 0.35 & 0.48 & 0.49 & 0.43 & 0.46 \\ +Ensemble Classifier & 0.35 & 0.44 & 0.47 & 0.48 & 0.49 & 0.43 & 0.46 \\ \hline \end{tabular} @@ -166,8 +171,14 @@ Ensemble Classifier & \textbf{0.47} & 0.44 & 0.35 & 0.48 & 0.49 & 0.43 & \end{table*} -Results show that our approach is more easily detectable than HUGO, which -is the most secure steganographic tool, as far as we know. However due to its +Results are summarized in Table~\ref{table:steganalyse}. +First of all, STC outperforms the sample strategy for the two steganalysers, as +already noticed in the quality analysis presented in the previous section. +Next, our approach is more easily detectable than HUGO, which +is the most secure steganographic tool, as far as we know. +However by combining \emph{adaptive} and \emph{STC} strategies +our approach obtains similar results than HUGO ones. +However due to its huge number of features integration, it is not lightweight, which justifies in the authors' opinion the consideration of the proposed method. diff --git a/intro.tex b/intro.tex index a8433e5..71eebb9 100644 --- a/intro.tex +++ b/intro.tex @@ -20,7 +20,7 @@ only if this one does not correspond to the secret bit. %TODO : modifier ceci Since it is possible to make that probabilities of increasing or decreasing the pixel value, for instance by considering well encrypted hidden messages, usual statistical approaches cannot be applied here to discover stego-contents in LSBM. -The most accurate detectors for this matching are universal steganalysers such as~\cite{LHS08,DBLP:conf/ih/2005,FK12}, +The most accurate detectors for this matching are universal steganalysers such as~\cite{LHS08,DBLP:conf/ih/Ker05,FK12}, which classify images according to extracted features from neighboring elements of residual noise.