Figure 7From: Performance analysis and improvement of dither modulation under the composite attacksBER versus the number of host samples to conceal one bit information.Back to article page