Cryptography Reference
In-Depth Information
FIGURE 15.6
(a) the target secret images; (b){(e) the four cover-images; (b
0
){(e
0
) the four
stego-images.
FIGURE 15.7
(a) and (b) the target secret images; (c){(h) the four cover-images; (c
0
){(h
0
)
the four stego-images.
Search WWH ::
Custom Search