Research Article
Crypto-Stego-Real-Time (CSRT) System for Secure Reversible Data Hiding
Table 2
Analysis of various data hiding techniques.
| Approach | Imperceptibility | Capacity | Robustness | Time Complexity |
| Spatial Domain[31] | Medium | High | Low | Low |
| Frequency Domain[32] | High | Low | High | Low |
| Spread Spectrum [33] | High | High | Medium | High |
| Matrix Embedding [34] | High | High | Low | Medium |
| Difference Expansion[35] | High | High | Low | Low |
| Optimization Technique [36] | High | Medium | High | High |
| Histogram Modification [37] | High | Medium | Low | Low |
|
|