Research Article
Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications
Figure 7
Comparison between the obtained stego-image: (a), (c), (e), (g), (i), (k), (m), and (o) and the cover image: (b) (d), (f), (h), (j), (l), (n), and (p) in each test.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |
(i) |
(j) |
(k) |
(l) |
(m) |
(n) |
(o) |
(p) |