3. The Proposed Scheme
In this section, we shall present the proposed the VDX
method for extracting hiding a color or a grayscale secret
image in a true color host image.
The proposed method is described below.
3.1. Requirements of Hiding Information Digitally
There are many different protocols and embedding techniques
that enable us to hide data in a given object. However,
all of the protocols and techniques must satisfy a number
of requirements so that steganography can be applied
correctly. The following is a list of main requirements
that steganography techniques must satisfy: