Abstract: A well-known data hiding scheme, Remainder with Threshold substitution (RT), is analyzed. RT uses a threshold value, T, and two moduli numbers, mu, and ml, ml ...