Research Article
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association
Table 1
The kind of image attacks used in the paper.
| Attack | The specific parameters |
| JPEG compression | The quality factors Q: 50%, 70%, 90% | Gauss noise | The mean : 0, the variances : 0.1, 0.5 | Salt and pepper noise | The mean : 0, the variances : 0.01, 0.05 | Mean filtering | The window size: | Median filtering | The window size: | Scaling | The scaling ratios: 0.3, 0.5, 0.75, 1.5, 3 | Smoothing | None |
|
|