Research Article
Coverless Steganography Based on Motion Analysis of Video
| Input: video index database , secret information bitstream | | Output: mapping index set , number of index items m | (1) | Padding the secret information bitstream: | (2) | Divide to m segments | (3) | For i = 1 : m | (4) | Search the corresponding index item and update the index set as | (5) | End for | (6) | Send the mapping index set Im to the receiver |
|