Research Article

An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

Algorithm 1

Optim_Audio, input: Audio file, image file, output: stego file.
Step 1: procedure Embed_Optimize(aud_file, img_file)
Step 2: if(capacity_check(aud_file, img_file) = TRUE) then
Step 3: Temp_aud⟵transform(aud_file)
Step 4:  Temp_img⟵Binary(img_file)
Step 5:  seed⟵random()
Step 6:  key⟵seed
Step 7:  count⟵0
Step 8:  while no_of_iteration ≤ 100 do
Step 9:   if count < length(Temp_img) then
Step 10:    key⟵SITO_OPT(key)
Step 11:   hide(Temp_aud, key, Temp_img)
Step 12:    count⟵update(count)
Step 13:   else
Step 14:    Write“Message got embedded successfully”.
Step 15:  repeat
Step 16:  return Temp_aud
Step 17:  else
Step 18:  exit()
Step 19:  return