Data security and secure communication are a top priority in an age of digital communication, where new technologies are emerging daily. Information sharing using digital means with increased availability of the Internet has made it easy and effortless. However, data protection and security are an ongoing challenge as information sharing takes place over unsecured networks.Information hiding is also known as data hiding and it can be broadly put across with the varied implications: First, secret information is imperceptible. Secondly, the presence of information is concealed. Third, the recipient and sender details are hidden, and fourth, the transmission channel is hidden [1]. Thus, hiding information is a process in which secret information is hidden in such a way that its existence is not known and thus does not attract the attention of the attackers.Information hiding is used in applications such as legal, medical and law enforcement military, intelligence agencies, online elections, internet banking, artwork preservation, law enforcement, satellite imagery, and remote sensing.Information hiding has different branches and is primarily categorized as steganography, copyright marketing, covert channel, subliminal channel, and anonymous communication [1]. Information hiding is applied to text, audio, video, and digital images.Information hiding techniques for digital images are classified into four categories [1], steganography for covert communication, robust watermarking for copyright protection, fragile watermarking for content authentication and finger-