ABSTRACT

According to the paradigm described in chapter 1, the aim of any data hiding scheme consists in the imperceptible embedding of a string of bits, namely the watermark code b, within a host asset A. Embedding is achieved by modifying a set of host features according to the content of b.