Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals
The human ear is aware of a wide range of sound signal amplitudes, so signal-based amplitude marking techniques have their own complexity. This article uses Watermarking to insert the message in the audio coverage and its main purpose is to keep this information hidden for others. There are many benchmarks for evaluating insertion and extraction algorithms that, by performing multiple attacks on an algorithm, increase the ability of the method. (Resilience, Transparency and Capacity for Use). Although the LSB method is superior to other encryption techniques, it is highly vulnerable to all kinds of attacks and attacks, including Additive White Gaussian Noise. This article introduces a new idea for Watermarking voice data encryption, based on the LSB method, which follows similar bits with bits instead of pasting information. The message will be in 16-bit samples, given the introduction of the distortion reduction algorithm for the changes we have made to the signal bits for the receiver's awareness, which could be a new way of causing F Of its resistance additive white Gaussian noise and LSB standard will also improve the transparency of the procedure and the method for reducing the capacity has been used.
 Prita Roy: New Steganography approach using encrypted secret message inside Audio and Video media International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 12, December 2014.
 Verma, S.S., R. Gupta and G. Shrivastava. A novel technique for data hiding in audio carrier by using sample comparison in DWT domain. Proceeding of the 4th International Conference on Communication Systems and Network Technologies 2014.
 Ratul Chowdhury: A View on LSB Based Audio Steganography international Journal of Security and Its Applications Vol. 10, No. 2 2016
 Mohsen Bazyar: A Robust Data Embedding Method for MPEG Layer III Audio Steganography, Faculty of Electrical Engineering, University Teknologi Malaysia, 81310 UTM Johor Bahru, Malaysia 2015.
 Youssef Bassil: “A two intermediates Audio steganography technique” LACSC—Lebanese Association for Computational Sciences Registered under No. 957, Beirut, Lebanon November 2012.
 Dong L, Yan Q, Lv Y, "Deng S Full band watermarking in DCT domain with Weibull model. Multimed Tools Apl "2018.
. Aljuaid N, Gutub A, Khan E “ Enhancing PC Data Security via Combining RSA Cryptography and Video Based Steganography", Journal of Information Security and Cybercrimes Research (JISCR), Vol. 1, No. 1, Pages: 8–18 June 2018.
 Christian, Kraetzer. Jana, Dittmann. “Mel-Cepstrum Based Steganalysis for VoIP-Steganography”. Paper.12.(2009)