Research Article
Protecting Information with Subcodstanography
Table 1
The comparison of the proposed schemes.
| Experiment | Number of inserted bits | Number of used bits in steganography process | Result CV(%) |
| The first | 26,440 | 1 | 0,0132 | The second | 26,440 | 1 | 0,0987 | The third | 1,712,597 | 12 | 2,7854 |
|
|