Research Article

Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding

Table 2

Analysis of various data hiding techniques.

ApproachImperceptibilityCapacityRobustnessTime Complexity

Spatial Domain[31]MediumHighLowLow

Frequency Domain[32]HighLowHighLow

Spread Spectrum [33]HighHighMediumHigh

Matrix Embedding [34]HighHighLowMedium

Difference Expansion[35]HighHighLowLow

Optimization Technique [36]HighMediumHighHigh

Histogram Modification [37]HighMediumLowLow