Research Article

A Modification-Free Steganography Method Based on Image Information Entropy

Table 3

Statistical analysis of attack at different scale.

ā€‰Figure 5(a)Figure 5(b)Figure 5(c)Figure 5(d)

(%)003.1256.25
(%)001.253.125