Advances, Systems and Applications
From: Digital image watermarking using discrete cosine transformation based linear modulation
 | Watermark model | Steganography model |
---|---|---|
Imperceptibility | Not significant | very significant |
Robustness | Immune against active attacks | Immune against active and passive attacks |
Capacity | Not significant | very significant |
Relationship between hidden data /cover image | There is a relationship between hidden data and its carried image | There is no relationship between hidden data and its carried image |