From a6350e30f8efdf33a4e00b8ed090373edbce4edc Mon Sep 17 00:00:00 2001
From: cguyeux <cguyeux@iut-bm.univ-fcomte.fr>
Date: Wed, 30 Jan 2013 19:14:07 +0100
Subject: [PATCH 1/1] Repouetpouet de l'intro

---
 intro.tex | 16 +++++++++-------
 1 file changed, 9 insertions(+), 7 deletions(-)

diff --git a/intro.tex b/intro.tex
index 17a618a..7fef201 100644
--- a/intro.tex
+++ b/intro.tex
@@ -100,13 +100,15 @@ This is why we add to our scheme a reasonable
 message encryption stage, to be certain that,
 even in the worst case scenario, the attacker
 will not be able to obtain the message content.
-
-
-In this research work, we thus propose to combine tried and 
-tested techniques of signal theory (the adaptive edge detection), coding (the binary embedding), and cryptography 
-(encryption of the hidden message) to compute an efficient steganographic
-scheme, which takes into consideration the cover image 
-and that can be executed on small devices.  
+Doing so makes our steganographic protocol an asymetric one.
+
+To sum up, in this research work, well studied and experimented
+techniques of signal treatment (adaptive edge detection), 
+coding theory (binary embedding), and cryptography 
+(Blum-Goldwasser encryption protocol) are combined 
+to compute an efficient steganographic
+scheme, whose principal characteristics is to take into 
+consideration the cover image and to be compatible with small computation resources.  
 
 The remainder of this document is organized as follows. 
 Section~\ref{sec:ourapproach} presents the details of our steganographic scheme.
-- 
2.39.5