“…In general, information-hiding techniques are categorised into two classes: invisible watermarking [1][2][3] and steganography [4][5][6][7]. Invisible watermarking is employed for copyright protection, traitor tracing, and digital authentication.…”