Audio Steganography Using Two LSB Modification and RSA For Security Data Transmission

Authors

  • Bambang Harjito Department of Informatics, Universitas Sebelas Maret, Surakarta, Indonesia.
  • Beni Sulistyarso Department of Informatics, Universitas Sebelas Maret, Surakarta, Indonesia.
  • Esti Suryani Department of Informatics, Universitas Sebelas Maret, Surakarta, Indonesia.

Keywords:

Data Security, Least Significant Bit Modification, RSA, Steganography,

Abstract

Data security is the practice of keeping data protected from unauthorized access and it is one of the important keys to communication and transmission. In order to achieve to ensure privacy while protecting data. The security must be guaranteed. Cryptography is a method of providing security for data information in a particular form so that only those for whom it is intended can read and process it. While steganography is a method to secure data by hiding the message in another media. Many researches have already been done to develop a design involving both these methods, however these design does not resist to message attack and reduced capacity. In this paper, we purpose of using two-bit LSB is to increase the space for hidden message, and RSA to give one more security layer. The result shows that the steganography using two LSB modification and RSA is successfully achieved to protect data. The stego audio is robust to noise and crop attack, but it does not suffer on resampling. To evaluate the stego audio, we perform Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER). The result show MSE, PSNR, and BER sequentially is 9.08875, 34.2775 db, and 17.995%.

References

KOMINFO RI, Panduan Penerapan Tata Kelola Keamanan Informasi Bagi Penyelenggara Pelayanan Publik, Jakarta, 2011.

S. H. Monalisa, "Steganografi Pada File Citra Untuk Pengamanan Data Menggunakan Metode Spead Spectrum," Pelita Informatika Budi Darma, pp. 75-79, 2014.

A. Prihanto and S. S. Wahyuningsih, "Penyembunyian dan Pengacakan Data Text Menggunakan Steganografi dan Kriptografi Triple DES Pada Image," 2009.

R. B. Vyavahare, A. J. Bajaj, H. P. Fuse and P. K. Patil, "Study of Secure Data Transmission Using Audio File," International Journal of Advanced Research in Computer and Communication Engineering , pp. 146-149, 2015.

B. G. B. Prof. Samir Kumar, "LSB Modification and Phase Encoding Technique of Audio Steganography Revisited," International Journal of Advanced Research in Computer and Communication Engineering, pp. 1-4, 2012.

D. A. Listiyoningsih. Modifikasi Least Significant Bit Untuk meningkatkan Ketahanan Pesan terhadap Cropping dan Noise. Surakarta, 2014.

E. Cole, Hidden In Plain Sight: Stegaography and the Art of Cover Communication. United States: Wiley Publishing, 2003.

D. S. B. P. P. B. Sheetal A. Kulkarni, "An Optimized and Secure Audio Steganography for Hiding Secret Information - Review," Journal of Electronics and Communication Engineering, pp. 12-16, 2013.

M. I. Khan, I. H. Sarker, K. Deb and H. Furhad, "A NEW Audio Watermarking Method Based on Discrete Cosine Transform With a Gray Image," International Journal of Computer Science & Information Technology (IJCSIT) , pp. 119-128, 2012.

S. V. Asyani and T. Rahajoeningroem, "Transceiver Audio Wireless One Point to Multipoint untuk Laboratorium Bahasa," TELEKONTRAN, pp. 62-73, 2014.

N. N. Alfiah, "Digitalisasi Koleksi Audio Dengan Aplikasi Software Magix Audio Cleaning Lab Dalam Pustaka Pandang Dengar (Audio Visual) di UPT PerpustakaanInstitut Seni Indonesia Surakarta ,", Surakarta, 2010, [Unpublished].

J. Filipus, "Perbandingan Digital Steganografi Pada Media Image, Audio, Video dan Teks serta Kekuatannya Terhadap Steganalisis," 2010.

M. M. A. Azim and X. Jiang. Wireless Sensor Multimedia Networks, Boca raton: CRC Press, 2015.

Downloads

Published

2018-07-03

How to Cite

Harjito, B., Sulistyarso, B., & Suryani, E. (2018). Audio Steganography Using Two LSB Modification and RSA For Security Data Transmission. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(2-4), 107–111. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4326