Research Article
Data Hiding Based on Mini Program Code
Figure 5
Two examples of the proposed scheme. (a) Cover image. (b) Embedding position. (c) Marked image. (d) Modified position. (e) Cover image. (f) Embedding position. (g) Marked image. (h) Modified position.
(a) |
(b) |
(c) |
(d) |
(e) |
(f) |
(g) |
(h) |