proposed. Such a combination leads to lower power and time consumption comparing with
being performed separately. In the proposed method, bits are arranged in a special order
employing a Sudoku pattern. Results indicate that this arrangement increases robustness
against JPEG compression attack.