Audio Steganography Using Two LSB Modification and RSA For Security Data Transmission

Authors

  • Bambang Harjito Department of Informatics, Universitas Sebelas Maret, Surakarta, Indonesia.
  • Beni Sulistyarso Department of Informatics, Universitas Sebelas Maret, Surakarta, Indonesia.
  • Esti Suryani Department of Informatics, Universitas Sebelas Maret, Surakarta, Indonesia.

Keywords:

Data Security, Least Significant Bit Modification, RSA, Steganography,

Abstract

Data security is the practice of keeping data protected from unauthorized access and it is one of the important keys to communication and transmission. In order to achieve to ensure privacy while protecting data. The security must be guaranteed. Cryptography is a method of providing security for data information in a particular form so that only those for whom it is intended can read and process it. While steganography is a method to secure data by hiding the message in another media. Many researches have already been done to develop a design involving both these methods, however these design does not resist to message attack and reduced capacity. In this paper, we purpose of using two-bit LSB is to increase the space for hidden message, and RSA to give one more security layer. The result shows that the steganography using two LSB modification and RSA is successfully achieved to protect data. The stego audio is robust to noise and crop attack, but it does not suffer on resampling. To evaluate the stego audio, we perform Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR) and Bit Error Rate (BER). The result show MSE, PSNR, and BER sequentially is 9.08875, 34.2775 db, and 17.995%.

Downloads

Download data is not yet available.

Downloads

Published

2018-07-03

How to Cite

Harjito, B., Sulistyarso, B., & Suryani, E. (2018). Audio Steganography Using Two LSB Modification and RSA For Security Data Transmission. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(2-4), 107–111. Retrieved from https://jtec.utem.edu.my/jtec/article/view/4326