An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Being easy to understand and simple to implement, substitution technique of performing steganography has gain wide popularity among users as well as attackers. Steganography is categorized into different types based on the carrier file being used for embedding data. The audio file is focused on hidi...
Main Authors: | Rohit Tanwar, Kulvinder Singh, Mazdak Zamani, Amit Verma, Prashant Kumar |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi Limited
2019-01-01
|
Series: | Journal of Computer Networks and Communications |
Online Access: | http://dx.doi.org/10.1155/2019/5124364 |
Similar Items
-
Genetic based substitution techniques for audio steganography
by: Zamani, Mazdak
Published: (2010) -
Adaptive LSB Steganography Based on Chaos Theory and Random Distortion
by: TUTUNCU, K., et al.
Published: (2018-08-01) -
IMPROVEMENT METHODS FOR AUDIO STEGANOGRAPHY
by: Chao-Kuo Huang, et al.
Published: (2018) -
Algorithms for audio watermarking and steganography
by: Cvejic, N. (Nedeljko)
Published: (2004) -
STEGANOGRAPHY – THEORY AND PRACTICE
by: Vladimir Barannik, et al.
Published: (2019-03-01)