Research Article

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

Table 1

The kind of image attacks used in the paper.

AttackThe specific parameters

JPEG compressionThe quality factors Q: 50%, 70%, 90%
Gauss noiseThe mean : 0, the variances : 0.1, 0.5
Salt and pepper noiseThe mean : 0, the variances : 0.01, 0.05
Mean filteringThe window size:
Median filteringThe window size:
ScalingThe scaling ratios: 0.3, 0.5, 0.75, 1.5, 3
SmoothingNone