Research Article

Coverless Steganography Based on Motion Analysis of Video

Table 1

Capacity comparison.

MethodPixel method [6]Hash method [20]DCT method [22]DWT method [23]Proposed method

Capacity8 bit18 bit1∼15 bit1∼15 bit32 bit