Research Article

Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association

Table 2

Comparison of ability to resist the JPEG compression attack among the CSD, CBZS, and the proposed algorithm (BER).

Compression qualityCBZSCSDProposed algorithm

900.0480.0020
700.080.0090
500.0980.0170