answersLogoWhite

0

The method depends on the forbidden zone (FZ) concept,

which is defined as the host signal range where no alteration

is allowed during data hiding process

User Avatar

Wiki User

12y ago

What else can I help you with?