An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hidi...
Saved in:
Main Authors: | Rohit Tanwar, Kulvinder Singh, Mazdak Zamani, Amit Verma, Prashant Kumar |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2019-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2019/5124364 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
James Ellroy’s American Tabloid: Conspiracy Theory and Chaos Theory
by: Isabelle Boof-Vermesse
Published: (2004-12-01) -
A Secure Image Steganography Using Shark Smell Optimization and Edge Detection Technique
by: Omar Y. Abdulhammed, et al.
Published: (2022-10-01) -
Steven Mann’s “Chaos Theory” and Corporate Governance
by: A. V. Savchenko
Published: (2017-03-01) -
Application of Chaos Theory in Trucks' Overloading Enforcement
by: Abbas Mahmoudabadi, et al.
Published: (2013-01-01) -
Conformal field theory and the web of quantum chaos diagnostics
by: Jonah Kudler-Flam, et al.
Published: (2020-01-01)