Research Article
Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT
Figure 7
Visual performance of extracted under LSBs replacement attacks, JPEG attack, and white noise attacks corresponding to Figure 6: (a) deleting 3 LSBs; (b) deleting 4 LSBs; (c) deleting 5 LSBs; (d) JPEG attack; (e) white noise attack under = 0.02; (f) white noise attack under = 0.1; (g) white noise attack under = 0.2; (h) white noise attack under = 0.5.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |