Research Article

Protecting Information with Subcodstanography

Table 1

The comparison of the proposed schemes.

ExperimentNumber of inserted bitsNumber of used bits in steganography processResult CV(%)

The first26,44010,0132
The second26,44010,0987
The third1,712,597122,7854