Research Article

An Adaptive Audio Steganography for Covert Wireless Communication

Figure 1

Embedding the secret message with different values of R. (a) ; (b) ; (c) .
(a)
(b)
(c)