“…One of the authors of this paper, in Chang et al [18], proposed substituting the secret message by dynamic programming optimisation and then embedding the transformed message by modulus function. Chan and Chang [19] improved the dynamic programming algorithm to a one-to-two substitution function. Zhang et al [20] and Wang and Zhang [21] proposed an optimisation scheme for the look-up table-based steganography using dynamic programming.…”