“…However, the schemes presented in [ 12 , 15 , 17 , 21 , 22 , 26 ] optimize watermarking characteristics but ignore watermark security. For watermark security, schemes in [ 16 , 27 , 28 , 29 , 30 , 31 , 32 ] use entropy, histogram, pseudo random key, DDFA, d-sequence, and GBA, respectively, for adaptively locating embedding blocks, but provide lower security. Similarly, schemes proposed in [ 11 , 14 , 18 , 20 , 30 , 31 ] have high imperceptibility but are less secure.…”