Journals
Publish with us
Publishing partnerships
About us
Blog
Security and Communication Networks
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Security and Communication Networks
/
2021
/
Article
/
Fig 6
/
Research Article
Data Hiding Based on Mini Program Code
Figure 6
Six modification versions of embedding. (a) 10 points. (b) 15 points. (c) 20 points. (d) 3 lines. (e) 5 lines. (f) 7 lines.
(a)
(b)
(c)
(d)
(e)
(f)