P. Acbarjya, D. Ritaban, and D. Ghoshal, A study on image edge detection using the gradients, International Journal of Scientific and Research Publications, vol.2, issue.12, p.2012

M. Agarwal, Text steganographic approaches: a comparison. arXiv preprint arXiv:1302, 2013.
DOI : 10.5121/ijnsa.2013.5107

URL : http://arxiv.org/abs/1302.2718

H. Al-dmour and A. , A steganography embedding method based on edge identification and xor coding. Expert systems with Applications, pp.293-306, 2016.

R. Amirtharajan, P. Akila, and . Deepikachowdavarapu, A Comparative Analysis of Image Steganography, International Journal of Computer Applications, vol.2, issue.3, pp.41-47, 2010.
DOI : 10.5120/644-900

?. Ismail-avc?bas¸, M. Avc?bas¸, N. Kharrazi, B. Memon, and . Sankur, Image steganalysis with binary similarity measures, EURASIP Journal on Advances in Signal Processing, issue.17, pp.1-9, 2005.

P. Azad, Fundamentals of image processing In Visual Perception for Manipulation and Imitation in Humanoid Robots, pp.67-89, 2009.

L. Bar, N. Sochen, and N. Kiryati, Image Deblurring in the Presence of Salt-and-Pepper Noise, International Conference on Scale-Space Theories in Computer Vision, pp.107-118, 2005.
DOI : 10.1007/11408031_10

J. Barbier, E. Filiol, and K. Mayoura, Universal JPEG Steganalysis in the Compressed Frequency Domain, International Workshop on Digital Watermarking, pp.253-267, 2006.
DOI : 10.1007/11922841_21

S. Bedi and R. Khandelwal, Various image enhancement techniques-a critical review, International Journal of Advanced Research in Computer and Communication Engineering, vol.2, issue.3, p.2013

S. Bhattacharyya, A survey of steganography and steganalysis technique in image, text, audio and video as cover carrier, Journal of global research in computer science, vol.2, issue.4, 2011.

A. Bitar and R. Darazi, Jean-François Couchot, and Raphä el Couturier. Blind digital watermarking in pdf documents using spread transform dither modulation

O. Pavithra-bonam and S. Godavarthy, Edge detection, Computer Vision (CAP, vol.6415, issue.2, 2003.

A. Kumar-boyat and B. , A review paper: Noise models in digital image processing. arXiv preprint, 2015.

Y. Jina-chanu, K. M. Singh, and T. Tuithung, Image steganography and steganalysis: A survey, International Journal of Computer Applications, vol.52, issue.2, p.2012

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010.
DOI : 10.1016/j.sigpro.2009.08.010

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, Digital image steganography: Survey and analysis of current methods, Signal Processing, vol.90, issue.3, pp.727-752, 2010.
DOI : 10.1016/j.sigpro.2009.08.010

R. Chhikara and L. Singh, A review on digital image steganalysis techniques categorised by features extracted, image, vol.3, issue.4, p.2013

J. Couchot, R. Couturier, and C. Guyeux, Stabylo: steganography with adaptive, bbs, and binary embedding at low cost. annals of telecommunications-annales des t ´ eí ecommunications, pp.9-10441, 2015.
DOI : 10.1007/s12243-015-0466-7

URL : https://hal.archives-ouvertes.fr/hal-01303419

T. Denemark, V. Sedighi, V. Holub, R. ´. Emi-cogranne, and J. Fridrich, Selection-channel-aware rich model for Steganalysis of digital images, 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp.48-53, 2014.
DOI : 10.1109/WIFS.2014.7084302

D. Kshetrimayum-jenita, A Sesure Image Steganography Using LSB Technique and Pseudo Random Encoding Technique, 2013.

N. Nameer, M. El-emam, and . Al-diabat, A novel algorithm for colour image steganography using a new intelligent technique based on three phases, Appl. Soft Comput, vol.37, pp.830-846, 2015.

V. Ficarra, G. Novara, W. Artibani, A. Cestari, A. Galfano et al., Retropubic, Laparoscopic, and Robot-Assisted Radical Prostatectomy: A Systematic Review and Cumulative Analysis of Comparative Studies, European Urology, vol.55, issue.5, pp.551037-1063, 2009.
DOI : 10.1016/j.eururo.2009.01.036

T. Filler and J. Fridrich, Gibbs construction in steganography Information Forensics and Security, IEEE Transactions on, vol.5, issue.4, pp.705-720, 2010.

J. Fridrich, Feature-Based Steganalysis for JPEG Images and Its Implications for Future Design of Steganographic Schemes, International Workshop on Information Hiding, pp.67-81, 2004.
DOI : 10.1007/978-3-540-30114-1_6

J. Fridrich, M. Goljan, and R. Du, Reliable detection of LSB steganography in color and grayscale images, Proceedings of the 2001 workshop on Multimedia and security new challenges, MM&Sec '01, pp.27-30, 2001.
DOI : 10.1145/1232454.1232466

J. Fridrich, M. Goljan, and D. Hogea, Attacking the outguess, Proceedings of the ACM Workshop on Multimedia and Security, 2002.

J. Fridrich and J. Kodovsky, Rich models for steganalysis of digital images. Information Forensics and Security, IEEE Transactions on, vol.7, issue.3, pp.868-882, 2012.

J. Fridrich and J. Kodovsky, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

J. Fridrich, T. Pevn-`-pevn-`-y, and J. Kodovsk, Kodovsk`y. Statistically undetectable jpeg steganography: dead ends challenges, and opportunities, Proceedings of the 9th workshop on Multimedia & security, pp.3-14, 2007.

J. J. Fridrich and J. Kodovsk´ykodovsk´y, Rich Models for Steganalysis of Digital Images, IEEE Transactions on Information Forensics and Security, vol.7, issue.3, pp.868-882, 2012.
DOI : 10.1109/TIFS.2012.2190402

J. Jessica, J. Fridrich, and . Kodovsk, Kodovsk`y. Multivariate gaussian model for designing additive distortion for steganography, ICASSP, pp.2949-2953, 2013.

M. Garg and A. Jangra, An overview of different type of data hiding scheme in image using steganographic techniques, International Journal of Advanced Research in Computer Science and Software Engineering, vol.4, issue.1, p.2014

T. Gebreyohannes and D. Kim, Adaptive noise reduction scheme for salt and pepper. arXiv preprint arXiv:1201, 2012.
DOI : 10.5121/sipij.2011.2405

C. Rafael, . Gonzalez, E. Richard, and . Woods, Digital image processing, Nueva Jersey, 2008.

N. Hamid, A. Yahya, and O. Ahmad, Image steganography techniques: an overview, International Journal of Computer Science and Security (IJCSS), vol.6, issue.3, pp.168-187, 2012.

K. Ali, . Hmood, A. Hamid, . Jalab, . Zm-kasirun et al., On the capacity and security of steganography approaches: An overview, Journal of Applied Sciences, vol.10, pp.1825-1833, 2010.

V. Holub and J. Fridrich, Low-Complexity Features for JPEG Steganalysis Using Undecimated DCT, IEEE Transactions on Information Forensics and Security, vol.10, issue.2, pp.219-228, 2015.
DOI : 10.1109/TIFS.2014.2364918

V. Holub, J. Fridrich, and T. Denemark, Random projections of residuals as an alternative to co-occurrences in steganalysis, Media Watermarking, Security, and Forensics 2013, 2013.
DOI : 10.1117/12.1000330

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.1-13, 2014.
DOI : 10.1007/978-3-642-55760-6

V. Holub, J. Fridrich, and T. Denemark, Universal distortion function for steganography in an arbitrary domain, EURASIP Journal on Information Security, vol.5, issue.2, pp.1-13, 2014.
DOI : 10.1007/978-3-642-55760-6

V. Holub and J. J. Fridrich, Designing steganographic distortion using directional filters, 2012 IEEE International Workshop on Information Forensics and Security (WIFS), pp.234-239, 2012.
DOI : 10.1109/WIFS.2012.6412655

URL : http://dde.binghamton.edu/vholub/pdf/WIFS12_Designing_Steganographic_Distortion_Using_Directional_Filters.pdf

J. Hossain, Information-hiding using image steganography with pseudorandom permutation, Bangladesh Research Publications Journal, ISSN, pp.215-225, 1998.

H. Donghui, W. Lina, J. Xiaqiu, Y. Dengpan, and L. Shiguo, A specific steganalysis approach to effective attacking the mb1, Chinese Journal of Electronics, vol.18, issue.4, 2009.

. Md, A. W. Islam, A. A. Naji, B. B. Zaidan, and . Zaidan, New system for secure cover file of hidden data in the image page within executable file using statistical steganography techniques, 2010.

S. Islam, M. R. Modi, and P. Gupta, Edge-based image steganography, EURASIP Journal on Information Security, vol.7, issue.2, 2014.
DOI : 10.1109/TIFS.2011.2175918

URL : https://doi.org/10.1186/1687-417x-2014-8

J. Matú?mat´matú?, T. Okay, and . Morav´cíkmorav´cík, Image-based jpeg steganography, Tatra Mountains Mathematical Publications, vol.45, issue.1, pp.65-74, 2010.

M. Juneja, S. Parvinder, E. Sandhu, and . Walia, Application of lsb based steganographic technique for 8-bit color images, World Academy of Science, Engineering and Technology, vol.50, pp.423-425, 2009.

G. Kasana, K. Singh, and S. Bhatia, Block-Based High Capacity Multilevel Image Steganography, Journal of Circuits, Systems and Computers, vol.2, issue.4, pp.1-21, 2016.
DOI : 10.1109/TIFS.2005.863485

G. Kaur and A. Kochhar, Transform domain analysis of image steganography, International Journal for Science and Emerging Technologies with Latest Trends, vol.6, issue.1, pp.29-37, 2013.

M. Stephen and . Keating, Digital image enhancement, US Patent, vol.6, p.72538, 2000.

O. Kobylin and V. Lyashenko, Comparison of standard image edge detection techniques and of method based on wavelet transform, International Journal of Advanced Research, vol.2, issue.8, pp.572-580, 2014.

J. Kodovsk-`-kodovsk-`-y, Steganalysis of Digital Images Using Rich Image Representations and Ensemble Classifiers

J. Kodovsk-`-kodovsk-`-y and J. Fridrich, Calibration revisited, Proceedings of the 11th ACM workshop on Multimedia and security, MM&Sec '09, pp.63-74, 2009.
DOI : 10.1145/1597817.1597830

J. Kodovsk-`-kodovsk-`-y and J. Fridrich, Steganalysis of JPEG images using rich models, Media Watermarking, Security, and Forensics 2012, 2012.
DOI : 10.1117/12.907495

J. Kodovsky, J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

J. Kodovsky, J. Fridrich, and V. Holub, Ensemble classifiers for steganalysis of digital media. Information Forensics and Security, IEEE Transactions on, vol.7, issue.2, pp.432-444, 2012.

J. Kodovsk´ykodovsk´y, J. J. Fridrich, and V. Holub, Ensemble Classifiers for Steganalysis of Digital Media, IEEE Transactions on Information Forensics and Security, vol.7, issue.2, pp.432-444, 2012.
DOI : 10.1109/TIFS.2011.2175919

J. Kodovsk-`-kodovsk-`-y and T. Pevn, Pevn`y, and Jessica Fridrich. Modern steganalysis can detect yass, IS&T/SPIE Electronic Imaging International Society for Optics and Photonics, pp.754102-754102, 2010.

K. Lakhani, B. Minocha, and N. Gugnani, Analyzing edge detection techniques for feature extraction in dental radiographs, Perspectives in Science, vol.8, 2016.
DOI : 10.1016/j.pisc.2016.04.087

C. Lee, Y. Wang, and C. Chang, A Steganographic Method with High Embedding Capacity by Improving Exploiting Modification Direction, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), pp.497-500, 2007.
DOI : 10.1109/IIH-MSP.2007.62

K. James and . Lein, Fundamentals of image processing, Environmental Sensing, pp.83-109, 2012.

B. Li, J. He, J. Huang, and Y. Shi, A survey on image steganography and steganalysis, Journal of Information Hiding and Multimedia Signal Processing, pp.142-172, 2011.

B. Li, A. Jevtic, S. Ulrik, S. Oderströmoderstr¨oderström, R. ´. Ur et al., Fast Edge Detection by Center of Mass, Proceedings of the 1st IEEE/IIAE International Conference on Intelligent Systems and Image Processing 2013, pp.103-110, 2013.
DOI : 10.12792/icisip2013.024

Y. Jiu-fen-liu, T. Tian, J. Han, X. Wang, and . Luo, Stego key searching for LSB steganography on JPEG decompressed image, SCIENCE CHINA Information Sciences, vol.59, issue.3, pp.321051-3210515, 2016.

W. Luo, F. Huang, and J. Huang, Edge adaptive image steganography based on lsb matching revisited, IEEE Transactions on information forensics and security, vol.5, issue.2, pp.201-214, 2010.

R. Maini and H. Aggarwal, Study and comparison of various image edge detection techniques, International journal of image processing (IJIP), vol.3, issue.1, pp.1-11, 2009.

R. Maini and H. Aggarwal, A comprehensive review of image enhancement techniques. arXiv preprint, 2010.

A. Makandar and B. Halalli, Image Enhancement Techniques using Highpass and Lowpass Filters, International Journal of Computer Applications, vol.109, issue.14, p.2015
DOI : 10.5120/19256-0999

URL : https://doi.org/10.5120/19256-0999

Y. Miche, Developing fast machine learning techniques with applications to steganalysis problems, 2010.
URL : https://hal.archives-ouvertes.fr/tel-00737353

R. Muthukrishnan and M. Radha, Edge Detection Techniques For Image Segmentation, International Journal of Computer Science and Information Technology, vol.3, issue.6, p.259, 2011.
DOI : 10.5121/ijcsit.2011.3620

H. Noda, M. Niimi, and E. Kawaguchi, High-performance JPEG steganography using quantization index modulation in DCT domain, Pattern Recognition Letters, vol.27, issue.5, pp.455-461, 2006.
DOI : 10.1016/j.patrec.2005.09.008

K. Patel, S. Utareja, and H. Gupta, Information Hiding using Least Significant Bit Steganography and Blowfish Algorithm, International Journal of Computer Applications, vol.63, issue.13, p.2013
DOI : 10.5120/10527-5510

URL : http://research.ijcaonline.org/volume63/number13/pxc3885510.pdf

P. Pathak and S. Selvakumar, Blind Image Steganalysis of JPEG images using feature extraction through the process of dilation, Digital Investigation, pp.67-77, 2014.
DOI : 10.1016/j.diin.2013.12.002

T. Pevny, P. Bas, and J. Fridrich, Steganalysis by Subtractive Pixel Adjacency Matrix, IEEE Transactions on Information Forensics and Security, vol.5, issue.2, pp.215-224, 2010.
DOI : 10.1109/TIFS.2010.2045842

URL : https://hal.archives-ouvertes.fr/hal-00541410

T. Pevn´ypevn´y, T. Filler, and P. Bas, Break our steganographic system, 2010.

T. Pevny and J. Fridrich, Merging Markov and DCT features for multi-class JPEG steganalysis, Security, Steganography, and Watermarking of Multimedia Contents IX, pp.650503-650503, 2007.
DOI : 10.1117/12.696774

URL : http://dde.binghamton.edu/tomas/pdfs/Pev07-SPIE.pdf

I. Pitas, Digital image processing algorithms and applications, 2000.

S. Prewitt, Scharr gradient 5x5 convolution matrices guennadi (henry) levkine email: hlevkin at yahoo. com vancouver, canada, 2011.

N. Provos, Defending against statistical steganalysis, Usenix security symposium, pp.323-336, 2001.

K. Qazanfari and R. Safabakhsh, A new steganography method which preserves histogram: Generalization of LSB++, Information Sciences, vol.277, pp.90-101, 2014.
DOI : 10.1016/j.ins.2014.02.007

M. Indra, S. Reddy, and A. Kumar, Secured data transmission using wavelet based steganography and cryptography by using aes algorithm, Procedia Computer Science, vol.85, pp.62-69, 2016.

S. Sakkara, . Dh-akkamahadevi, K. Somashekar, and . Raghu, Integer Wavelet based Secret Data Hiding by Selecting Variable Bit Length, International Journal of Computer Applications, vol.48, issue.19, pp.7-11, 2012.
DOI : 10.5120/7454-0458

URL : http://research.ijcaonline.org/volume48/number19/pxc3880458.pdf

S. Abdul and S. , Survey on color image enhancement techniques using spatial filtering, International Journal of Computer Applications, vol.94, issue.9, p.2014

P. Sallee, Model-Based Steganography, International workshop on digital watermarking, pp.154-167, 2003.
DOI : 10.1007/978-3-540-24624-4_12

S. Savant, A review on edge detection techniques for image segmentation [86] HK Sawant and Mahentra Deore. A comprehensive review of image enhancement techniques, Int. J. Comp. Sci. Inform. Technol International Journal of Computer Technology and Electronics Engineering (IJCTEE), vol.5, issue.12, pp.5898-590039, 2010.

A. Schmeißer, R. Wegener, D. Hietel, and H. Hagen, Smooth convolution-based distance functions, Graphical Models, vol.82, pp.67-76, 2015.
DOI : 10.1016/j.gmod.2015.06.004

N. Senthilkumaran and R. Rajesh, Edge detection techniques for image segmentation?a survey of soft computing approaches, International journal of recent trends in engineering, vol.1, issue.2, 2009.

M. Setayesh, M. Zhang, and M. Johnston, Detection of continuous, smooth and thin edges in noisy images using constrained particle swarm optimisation, Proceedings of the 13th annual conference on Genetic and evolutionary computation, GECCO '11, pp.45-52, 2011.
DOI : 10.1145/2001576.2001584

J. Shah and N. Patel, Hiral Tandel, Neelam Soni, and Ghanshyam I Prajapati. A hybrid approach for edge detection using fuzzy logic and canny method, International Journal of Engineering Research & Technology (IJERT), vol.2, issue.3, p.2013

P. Sharma, G. Singh, and A. Kaur, Different techniques of edge detection in digital image processing, International Journal of Engineering research and Applications, vol.3, issue.3, pp.458-461, 2013.

M. Falesh, . Shelke, A. Ashwini, . Dongre, D. Pravin et al., Comparison of different techniques for steganography in images, International Journal of Application or Innovation in Engineering & Management, vol.3, issue.2, p.2014

K. Sathish-shet and . Aswath, Image steganography using integer wavelet transform based on color space approach, Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, pp.839-848, 2015.

K. Solanki, K. Sullivan, U. Madhow, S. Manjunath, and . Chandrasekaran, Statistical restoration for robust and secure steganography, IEEE International Conference on Image Processing 2005, p.1118, 2005.
DOI : 10.1109/ICIP.2005.1530256

C. Solomon and T. Breckon, Fundamentals of Digital Image Processing: A practical approach with examples in Matlab, 2011.
DOI : 10.1002/9780470689776

G. Sravanthi, M. Devi, . Sm-riyazoddin, and . Reddy, A spatial domain image steganography technique based on plane bit substitution method, Global Journal of Computer Science and Technology Graphics & Vision, issue.15, pp.12-2012

J. Starck, D. Fionn, A. Murtagh, and . Bijaoui, Image processing and data analysis: the multiscale approach, 1998.
DOI : 10.1017/CBO9780511564352

. High-capacity-despite-better, A. Steganalysis, and . Westfeld, F5?a steganographic algorithm, Information Hiding: 4th International Workshop Proceedings, p.289, 2001.

C. P. Sumathi, T. Santhanam, and G. Umamaheswari, A study of various steganographic techniques used for information hiding, 1401.

T. Thivakaran and R. Chandrasekaran, Nonlinear filter based image denoising using amf approach. arXiv preprint, 2010.

E. Scott and . Umbaugh, Computer imaging: digital image analysis and processing, 2005.

D. Upham, Steganographic algorithm jsteg Software available at http://zooid. org, 1993.

R. Verma and D. Ali, A comparative study of various types of image noise and efficient noise removal techniques. International journal of advanced research in computer science and software engineering, pp.617-622, 2013.

A. Brian, . Wandell, B. Gamal, and . Girod, Common principles of image acquisition systems and biological vision, Proceedings of the IEEE, vol.90, issue.1, pp.5-17, 2002.

A. Westfeld and A. Pfitzmann, Attacks on Steganographic Systems, International workshop on information hiding, pp.61-76, 1999.
DOI : 10.1007/10719724_5

Z. Xia, L. Yang, X. Sun, and W. Liang, Decai Sun, and Zhiqiang Ruan. A learning-based steganalytic method against lsb matching steganography, Radioengineering, vol.20, issue.1, pp.102-109, 2011.

P. Xu and H. Xu, Filter selection based on representative training samples for multispectral imaging, Optik - International Journal for Light and Electron Optics, vol.127, issue.20, pp.9743-9754, 2016.
DOI : 10.1016/j.ijleo.2016.07.061

J. Zheng, S. Peng, and F. Yang, A novel edge detection for buried target extraction after SVD-2D wavelet processing, Journal of Applied Geophysics, vol.106, pp.106-113, 2014.
DOI : 10.1016/j.jappgeo.2014.04.016

H. Zong, F. Liu, and X. Luo, Blind image steganalysis based on wavelet coefficient correlation Document generated with L AT E X and: the L AT E X style for PhD Thesis created by S. Galland ? http, Digital Investigation, pp.58-68, 2012.