Cryptography Reference
In-Depth Information
FIGURE 15.6
(a) the target secret images; (b){(e) the four cover-images; (b 0 ){(e 0 ) the four
stego-images.
FIGURE 15.7
(a) and (b) the target secret images; (c){(h) the four cover-images; (c 0 ){(h 0 )
the four stego-images.
 
 
Search WWH ::




Custom Search