“…There are various type of extraction performance criteria frequently used in data hiding. Security [9], [11]- [19] S Imperceptibility [11], [20] IM Capacity [11]- [13][21]- [23] C Robust [9], [19], [24] R Efficiency [16], [18], [25] E Invisibility [26] IN Accuracy [27], [28] AC Speed [15] SP Complexity [21] CP Reversibility [25], [29] RV Realitibility RL Integrity [24], [30] IG Perceptibility [11] PC Assumption [24] AS Confidentiality [31] CF Availability [32] V…”