Research Article

Coverless Steganography Based on Motion Analysis of Video

Table 6

Comparison of transmission data load.

Transmission data load for n byte secret information

Pixel method [6]n cover images
Hash method [20] cover images
DCT method [22]N + 1 cover images + side information
DWT method [23]n + 1 cover images + auxiliary information
Proposed methodn indexes