Research Article
Coverless Steganography Based on Motion Analysis of Video
Table 2
Number of needed images with the same hidden information.
| Size of hidden information | 1 B | 10 B | 100 B | 1 kB |
| Pixel method [6] | 1 | 10 | 100 | 1024 | Hash method [20] | 2 | 6 | 46 | 457 | DCT method [22] | 2∼9 | 7∼81 | 55∼801 | 548∼8193 | DWT method [23] | 2∼9 | 7∼81 | 55∼801 | 548∼8193 | Proposed method | 1 | 3 | 25 | 256 |
|
|