An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hidi...

Full description

Saved in:
Bibliographic Details
Main Authors: Rohit Tanwar, Kulvinder Singh, Mazdak Zamani, Amit Verma, Prashant Kumar
Format: Article
Language:English
Published: Wiley 2019-01-01
Series:Journal of Computer Networks and Communications
Online Access:http://dx.doi.org/10.1155/2019/5124364
Tags: Add Tag
No Tags, Be the first to tag this record!