Analysis of techniques involving data hiding and watermarking | IEEE Conference Publication | IEEE Xplore