Research Article
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Algorithm 1
Optim_Audio, input: Audio file, image file, output: stego file.
| Step 1: procedure Embed_Optimize(aud_file, img_file) | | Step 2: if(capacity_check(aud_file, img_file) = TRUE) then | | Step 3: Temp_aud⟵transform(aud_file) | | Step 4: Temp_img⟵Binary(img_file) | | Step 5: seed⟵random() | | Step 6: key⟵seed | | Step 7: count⟵0 | | Step 8: while no_of_iteration ≤ 100 do | | Step 9: if count < length(Temp_img) then | | Step 10: key⟵SITO_OPT(key) | | Step 11: hide(Temp_aud, key, Temp_img) | | Step 12: count⟵update(count) | | Step 13: else | | Step 14: Write“Message got embedded successfully”. | | Step 15: repeat | | Step 16: return Temp_aud | | Step 17: else | | Step 18: exit() | | Step 19: return |
|