Skip to main content

Advances, Systems and Applications

Table 1 Comparison between Steganography and watermarking models

From: Digital image watermarking using discrete cosine transformation based linear modulation

 

Watermark model

Steganography model

Imperceptibility

Not significant

very significant

Robustness

Immune against active attacks

Immune against active and passive attacks

Capacity

Not significant

very significant

Relationship between hidden data /cover image

There is a relationship between hidden data and its carried image

There is no relationship between hidden data and its carried image