The tools include that involve manipulation of algorithms and image transforms such as discrete cosine transformation (DCT), and wavelet transformation. These methods hide messages in more significant areas of the cover and may manipulate image properties such as luminance. Watermarking tools Dig, JK, Med, and Sig. These techniques are typically far more robust than bit-wise techniques; however a tradeoff exists between the about of information added to the image and the robustness obtained . Many transform domain methods are independent to image format and may survive conversion between loss-less and lossly formats.
This links would help....http://www.jjtc.com/ihws98/jjgmu.html
Could you precise the words "algorithm" and "good" in your context?
You speak about LSB as an algorithm, so I guess that you mean rule to choose the modified bytes for algorithm right?
And depend on your context good could mean that the embedding does not alter the visual stego support, or could maximize the embedding efficiency, or the average efficiency, or a method which cannot failed...
Believe me, in steganography the best algorithm is the one that you only know, because once that algorithm goes public it is just a mater of time before it is broken.
because in steganography, the most important thing is concealing the very existence of the secret message, and once that logic is known, then it is broken.
Stochastic screens are analogous to the half-tone screens normally used in printing processes, but the dots that make up the stochastic screen are not regularly spaced, and are generally much smaller (on the order of 21 microns typically) (19). One could liken the stochastic screen to the algorithms used on digital images, with the exception that the screen would be considered firmware, thus the robustness of this technique.