Research Article
A Graph Theory Practice on Transformed Image: A Random Image Steganography
Table 3
Comparative analysis.
| Method | Total number of iterations to extract data (TI) |
| Proposed method | (1024! * 3! * 64! * 4 * 64 * 3) * 1024 |
Fazli et al. [16] | TI = 256 * 256 * 3 |
Song et al. [17] | TI = 64! * 64 |
Sakkara et al. [18] | TI = 16! * 64 * 64 * 3 |
|
|