Research Article
Improving Anticompression Robustness of JPEG Adaptive Steganography Based on Robustness Measurement and DCT Block Selection
Figure 2
The basic model of steganographic communication scenario where Alice tries to communicate covertly with bob. (a) The prisoner-warden model, where a point-to-point communication is established between Alice and Bob. The stego files Y and Y’ may be different which depend on whether active or passive mode of attack is used by Eve. (b) Illustration of the sharing-based model, in which the communication relationship between Alice and Bob is hiding.
(a) |
(b) |