Research Article

Steganography Algorithm Based on the Nonlocal Maximum Likelihood Noise Estimation for Mobile Applications

Figure 8

Comparison between the original image to be hidden: (b), (d), (f), (h), (j), (l), (n), and (p) and the recovered image: (a), (c), (e), (g), (i), (k), (m), and (o) in each test.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
(j)
(k)
(l)
(m)
(n)
(o)
(p)