Research Article

Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

Table 4

Security analysis of the steganography process.

Analysis Original soundEmbedded sound

Correlation0.99940.9994
Entropy13.492613.4926
MSE0
MAXERR0
L2RAT1