Journal of Computer Networks and Communications / 2019 / Article / Tab 1

Research Article

An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer

Table 1

Comparison of audio steganography techniques.

TechniquesParameters
ImperceptibilityCapacityRobustnessComplexity

LSBMediumHighLowLow
Parity codingMediumMediumLowLow
Phase codingHighLowHighMedium
Spread spectrumLowMediumHighHigh
Echo hidingLowMediumMediumMedium
Tone insertionLowLowMediumHigh

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.