Research Article
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer
Table 1
Comparison of audio steganography techniques.
| Techniques | Parameters | Imperceptibility | Capacity | Robustness | Complexity |
| LSB | Medium | High | Low | Low | Parity coding | Medium | Medium | Low | Low | Phase coding | High | Low | High | Medium | Spread spectrum | Low | Medium | High | High | Echo hiding | Low | Medium | Medium | Medium | Tone insertion | Low | Low | Medium | High |
|
|