Research Article

Coverless Steganography Based on Motion Analysis of Video

Table 2

Number of needed images with the same hidden information.

Size of hidden information1 B10 B100 B1 kB

Pixel method [6]1101001024
Hash method [20]2646457
DCT method [22]2∼97∼8155∼801548∼8193
DWT method [23]2∼97∼8155∼801548∼8193
Proposed method1325256