Research Article

Study on Strengthening Plan of Safety Network CCTV Monitoring by Steganography and User Authentication

Figure 10

Before (a) and after (b) the insertion of steganography.
(a)
(b)