Research Article
Coverless Steganography Based on Motion Analysis of Video
| | Input: video index database , secret information bitstream | | | Output: mapping index set , number of index items m | | (1) | Padding the secret information bitstream: | | (2) | Divide to m segments | | (3) | For i = 1 : m | | (4) | Search the corresponding index item and update the index set as | | (5) | End for | | (6) | Send the mapping index set Im to the receiver |
|