Research Article
Coverless Steganography Based on Motion Analysis of Video
Table 6
Comparison of transmission data load.
| | Transmission data load for n byte secret information |
| Pixel method [6] | n cover images | Hash method [20] | cover images | DCT method [22] | N + 1 cover images + side information | DWT method [23] | n + 1 cover images + auxiliary information | Proposed method | n indexes |
|
|