Research Article

A Robust Coverless Image Steganography Algorithm Based on Image Retrieval with SURF Features

Table 4

Types of attacks performed on images in experiments and their parameters.

Image processingThe specific parameters

JPEG compressionThe quality factors Q: 10%, 50%, and 90%

Gauss noiseThe mean μ: 0, the variance σ: 0.001 and 0.005

Salt and pepper noiseThe mean μ: 0, the variance σ: 0.001 and 0.005

Speckle noiseThe mean μ: 0, the variance σ: 0.001 and 0.005

Gauss low-pass filteringThe window size: 3 × 3

Mean filteringThe window size: 3 × 3

Median filteringThe window size: 3 × 3

Centered croppingRatio: 20% and 50%

Edge croppingRatio: 10% and 20%

RotationRotation angles: 10°, 30°, and 50°

TranslationIn holidays: (80, 50), (160, 100), and (320, 200)
In ImageNet, Caltech-256: (16, 10), (32, 20), and (40, 25)

ScalingRatio: 0.5, 0.75, 1.5, and 3

Color histogram equalizationNone

Gamma correctionFactor: 0.8