“…This scheme can efficiently detect and locate modifications and ensure the completeness of data streams. In [3], Xiangrong Xiao, et al, proposed a novel secure transmission strategy based on information hiding (IH). They acquire sensitive data security using the advantage of IH technique without encryption.…”