Research Article
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Figure 8
Comparison of MSE variation with (a) LSB, (b) GA, and (c) the method of Chen and Huang [1].
(a) |
(b) |
(c) |