Research Article

Data Hiding Based on Mini Program Code

Figure 5

Two examples of the proposed scheme. (a) Cover image. (b) Embedding position. (c) Marked image. (d) Modified position. (e) Cover image. (f) Embedding position. (g) Marked image. (h) Modified position.
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)