Research Article

Digital Image Steganography Using LSB Substitution, PVD, and EMD

Figure 8

PDH analysis for Shen and Huang’s technique.
(a) Shen and Huang
(b) Shen and Huang