Research Article
Disbursal of Text Steganography in the Space of Double-Secure Algorithm
Table 4
Comparing the cover text size of the proposed approaches for secret messages.
| ā | Message length in bytes | MDSTS (cover text length) | Compressed message length in bytes | CMPHM (cover text length) |
| 1 | 3 | 296 | 3 | 296 | 2 | 10 | 1061 | 10 | 1061 | 3 | 25 | 2437 | 21 | 2065 | 4 | 50 | 5030 | 44 | 4398 | 5 | 63 | 6251 | 54 | 5377 | 6 | 100 | 9973 | 81 | 8072 | 7 | 202 | 20118 | 143 | 14248 |
|
|