%0 Journal Article %T A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Akhaee, M. A. %A Marvasti, F. %D 2013 %\ 01/01/2013 %V 5 %N 1 %P 5-36 %! A Survey on Digital Data Hiding Schemes: Principals, Algorithms, and Applications %K Data hiding %K watermarking %K Capacity %K robustness %K Security %K Steganalysis %R 10.22042/isecure.2013.5.1.2 %X This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, or video and the final receiver, which is Human Auditory System (HAS) or Human Visual System (HVS), is also beneficial. For the speech/audio case, HAS will be briefly reviewed to find out how to make the most of its weaknesses for embedding as much data as possible. The same discussion also holds for the image watermarking. Although several audio and image data hiding schemes have been proposed so far, they can be divided into a few categories. Hence, conventional schemes along with their recently published extensions are introduced. Besides, a general comparison is made among these methods leading researchers/designers to choose the appropriate schemes based on their applications. Regarding the old scenario of the prisoner-warden and the evil intention of the warden to eavesdrop and/or destroy the data that Alice sends to Bob, there are both intentional and unintentional attacks to digital information hiding systems, which have the same effect based on our definition. These attacks can also be considered for testing the performance or benchmarking, of the watermarking algorithm. They are also known as steganalysis methods which will be discussed at the end of the paper. %U https://www.isecure-journal.com/article_39134_fa8d8264a6ef71d410a75af0365ec2fe.pdf