The message length is thus defined to be the half of this set cardinality.
In this strategy, two methods are thus applied to extract bits that
are modified. The first one is a direct application of the STC algorithm.
This method is further referred as \emph{adaptive+STC}.
The message length is thus defined to be the half of this set cardinality.
In this strategy, two methods are thus applied to extract bits that
are modified. The first one is a direct application of the STC algorithm.
This method is further referred as \emph{adaptive+STC}.