Audio Steganography Using Two LSB Modification and RSA For Security Data Transmission
Keywords:Data Security, Least Significant Bit Modification, RSA, Steganography,
AbstractData security is the practice of keeping data protected from unauthorized access and it is one of the important keys to communication and transmission. In order to achieve to ensure privacy while protecting data. The security must be guaranteed. Cryptography is a method of providing security for data information in a particular form so that only those for whom it is intended can read and process it. While steganography is a method to secure data by hiding the message in another media. Many researches have already been done to develop a design involving both these methods, however these design does not resist to message attack and reduced capacity. In this paper, we purpose of using two-bit LSB is to increase the space for hidden message, and RSA to give one more security layer. The result shows that the steganography using two LSB modification and RSA is successfully achieved to protect data. The stego audio is robust to noise and crop attack, but it does not suffer on resampling. To evaluate the stego audio, we perform Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER). The result show MSE, PSNR, and BER sequentially is 9.08875, 34.2775 db, and 17.995%.
KOMINFO RI, Panduan Penerapan Tata Kelola Keamanan Informasi Bagi Penyelenggara Pelayanan Publik, Jakarta, 2011.
S. H. Monalisa, "Steganografi Pada File Citra Untuk Pengamanan Data Menggunakan Metode Spead Spectrum," Pelita Informatika Budi Darma, pp. 75-79, 2014.
A. Prihanto and S. S. Wahyuningsih, "Penyembunyian dan Pengacakan Data Text Menggunakan Steganografi dan Kriptografi Triple DES Pada Image," 2009.
R. B. Vyavahare, A. J. Bajaj, H. P. Fuse and P. K. Patil, "Study of Secure Data Transmission Using Audio File," International Journal of Advanced Research in Computer and Communication Engineering , pp. 146-149, 2015.
B. G. B. Prof. Samir Kumar, "LSB Modification and Phase Encoding Technique of Audio Steganography Revisited," International Journal of Advanced Research in Computer and Communication Engineering, pp. 1-4, 2012.
D. A. Listiyoningsih. Modifikasi Least Significant Bit Untuk meningkatkan Ketahanan Pesan terhadap Cropping dan Noise. Surakarta, 2014.
E. Cole, Hidden In Plain Sight: Stegaography and the Art of Cover Communication. United States: Wiley Publishing, 2003.
D. S. B. P. P. B. Sheetal A. Kulkarni, "An Optimized and Secure Audio Steganography for Hiding Secret Information - Review," Journal of Electronics and Communication Engineering, pp. 12-16, 2013.
M. I. Khan, I. H. Sarker, K. Deb and H. Furhad, "A NEW Audio Watermarking Method Based on Discrete Cosine Transform With a Gray Image," International Journal of Computer Science & Information Technology (IJCSIT) , pp. 119-128, 2012.
S. V. Asyani and T. Rahajoeningroem, "Transceiver Audio Wireless One Point to Multipoint untuk Laboratorium Bahasa," TELEKONTRAN, pp. 62-73, 2014.
N. N. Alfiah, "Digitalisasi Koleksi Audio Dengan Aplikasi Software Magix Audio Cleaning Lab Dalam Pustaka Pandang Dengar (Audio Visual) di UPT PerpustakaanInstitut Seni Indonesia Surakarta ,", Surakarta, 2010, [Unpublished].
J. Filipus, "Perbandingan Digital Steganografi Pada Media Image, Audio, Video dan Teks serta Kekuatannya Terhadap Steganalisis," 2010.
M. M. A. Azim and X. Jiang. Wireless Sensor Multimedia Networks, Boca raton: CRC Press, 2015.
How to Cite
TRANSFER OF COPYRIGHT AGREEMENT
The manuscript is herewith submitted for publication in the Journal of Telecommunication, Electronic and Computer Engineering (JTEC). It has not been published before, and it is not under consideration for publication in any other journals. It contains no material that is scandalous, obscene, libelous or otherwise contrary to law. When the manuscript is accepted for publication, I, as the author, hereby agree to transfer to JTEC, all rights including those pertaining to electronic forms and transmissions, under existing copyright laws, except for the following, which the author(s) specifically retain(s):
- All proprietary right other than copyright, such as patent rights
- The right to make further copies of all or part of the published article for my use in classroom teaching
- The right to reuse all or part of this manuscript in a compilation of my own works or in a textbook of which I am the author; and
- The right to make copies of the published work for internal distribution within the institution that employs me
I agree that copies made under these circumstances will continue to carry the copyright notice that appears in the original published work. I agree to inform my co-authors, if any, of the above terms. I certify that I have obtained written permission for the use of text, tables, and/or illustrations from any copyrighted source(s), and I agree to supply such written permission(s) to JTEC upon request.