Research Article

An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

Table 1

Comparison of audio steganography techniques.

TechniquesParameters
ImperceptibilityCapacityRobustnessComplexity

LSBMediumHighLowLow
Parity codingMediumMediumLowLow
Phase codingHighLowHighMedium
Spread spectrumLowMediumHighHigh
Echo hidingLowMediumMediumMedium
Tone insertionLowLowMediumHigh