Research Article

Improving Anticompression Robustness of JPEG Adaptive Steganography Based on Robustness Measurement and DCT Block Selection

Figure 2

The basic model of steganographic communication scenario where Alice tries to communicate covertly with bob. (a) The prisoner-warden model, where a point-to-point communication is established between Alice and Bob. The stego files Y and Y’ may be different which depend on whether active or passive mode of attack is used by Eve. (b) Illustration of the sharing-based model, in which the communication relationship between Alice and Bob is hiding.
(a)
(b)