Research Article
Multimedia Communication Security in 5G/6G Coverless Steganography Based on Image Text Semantic Association
Table 4
Robustness comparison of different carrier-free methods (error rate) (%).
| Attack | SIFT_Hash | SIFG + BOW + HASH | Pixel | DCT + LDA | Our method |
| JPEG compression (10) | 84.77 | 99.61 | 0.78 | 1.17 | 0.00 | JPEG compression (30) | 84.77 | 99.61 | 0.78 | 1.17 | 0.00 | JPEG compression (50) | 84.77 | 99.61 | 0.78 | 1.17 | 0.00 | JPEG compression (70) | 84.77 | 99.61 | 0.78 | 1.17 | 0.00 | JPEG compression (90) | 84.77 | 99.61 | 0.78 | 1.17 | 0.00 | Mean filter (3 × 3) | 99.61 | 100.00 | 0.00 | 0.00 | 0.017 | Mean filter (5 × 5) | 99.22 | 100.00 | 0.00 | 0.00 | 0.032 | Mean filter (7 × 7) | 99.61 | 100.00 | 0.00 | 1.17 | 0.049 | Gauss noise (0.001) | 73.83 | 99.61 | 0.00 | 0.78 | 0.00 | Gauss noise (0.005) | 73.83 | 99.61 | 0.00 | 0.78 | 0.00 | Gauss noise (0.1) | 73.83 | 99.22 | 0.00 | 0.78 | 0.00 | Original | 0.00 | 0.00 | 0.00 | 0.00 | 0.00 | Salt and pepper (0.001) | 83.59 | 100.00 | 0.39 | 0.78 | 0.00 | Salt and pepper (0.005) | 95.70 | 99.61 | 0.39 | 1.17 | 0.00 | Salt and pepper (0.1) | 100.00 | 99.61 | 4.30 | 7.03 | 0.00 |
|
|