The Evaluation of Image Messages in MP3 Audio Steganography Using Modified Low-Bit Encoding

Ilham Firman Ashari

Abstract


Information security is an important aspect of maintaining the confidentiality of information. One type of document kept secret is images (.jpg, .png, .gif, dan .bmp). MP3 audio files are popular audio files that can be used as a medium for steganography. The method implemented in this study uses Base64 in the image and the insertion method used is using Low-Bit Encoding (LBE). In this study, the parameters of the value of LBE will be evaluated. The purpose of the evaluation is to compare the LBE parameter parameters that are the most optimal in securing the message while taking into account the quality of steganographic files. The results obtained from the study are the proposed method that supports the imperceptibility aspect seen from the image histogram and audio frequency spectrum. The fidelity aspect is seen from the PSNR and SNR values, where The optimal value on the LBE + 2 parameter is by considering the capacity of the picture message that can be inserted and audio quality. PSNR LBE + 2 values range from 50-60 dB with SNR different about 0.01% from LBE + 1. The proposed method does not support the robustness aspect because it is not resistant to attacks by bit rate manipulation and channel mode. The test results on the recovery aspect are worth 100%, meaning that the image's quality and size before and after extraction will be the same. And finally, the test results on the payload aspect, there is an increase in message capacity with LBE + 2 around 12.5% of LBE + 1, and using LBE + 3 will increase the maximum size around 25% of LBE + 1 and about 14% of LBE + 2. The insertion and extraction time for LBE + 3 is slower compared to the others.

Keywords


Steganography; Cryptography; Modified Low-Bit Encoding; Base64; Information Security

Full Text:

PDF (Indonesian)

References


Ashari, I. F. (2018). Graph Steganography Based On Multimedia Cover To Improve Security and Capacity. 2018 International Conference on Applied Information Technology and Innovation (ICAITI), April 2019, 194–201. doi: 10.1109/ICAITI.2018.8686741

Bansal K., Agrawal A., and Bansal N.. (2020) "A Survey on Steganography using Least Significant bit (LSB) Embedding Approach," 2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), pp. 64-69, doi: 10.1109/ICOEI48184.2020.9142896.

Chakraborty, R. (2019). Audio Steganography- A Review. International Journal of Trend in Research and Development, Volume 6(3), ISSN: 2394-9333, 6(July).

Choi, J. R., Straubhaar, J., Skouras, M., Park, S., Santillana, M., & Strover, S. (2020). Techno-capital: Theorizing media and information literacy through information technology capabilities. New Media & Society. https://doi.org/10.1177/1461444820925800

Chowdhury, R., Bhattacharyya, D., Bandyopadhyay, S. K., & Kim, T. H. (2016). A view on LSB based audio steganography. International Journal of Securitdy and Its Applications, 10(2), 51–62. https://doi.org/10.14257/ijsia.2016.10.2.05

Datta, B., Pal, P., & Bandyopadhyay, S. K. (2015). Robust multi layer audio steganography. 12th IEEE International Conference Electronics, Energy, Environment, Communication, Computer, Control: (E3-C3), INDICON 2015, 1–6. https://doi.org/10.1109/INDICON.2015.7443342

Denegri-knott, J. (2015). MP3. Taylor and Francis Group, 3866(September), 397–401. https://doi.org/10.1080/10253866.2015.1048962

Douglas, M., Bailey, K., Leeney, M., & Curran, K. (2018). An overview of steganography techniques applied to the protection of biometric data.

Multimedia Tools and Applications, 77(13), 17333–17373. https://doi.org/10.1007/s11042-017-5308-3

Dutta, H., Das, R. K., Nandi, S., & Prasanna, S. R. M. (2019). An Overview of Digital Audio Steganography. IETE Technical Review (Institution of Electronics and Telecommunication Engineers, India), 0(0), 1–19. https://doi.org/10.1080/02564602.2019.1699454

Gaikwad, T., Patil, M., Sagvekar, P. V., & Racha, P. D. (2015). Network Security : A Study Using Cryptography. International Journal for Research in Applied Science & Engineering Technology (IJRASET), 3(II), 392–398.

Gurgaon, I. (2017). International Journal of Computer Science and Mobile Computing An Overview Of Network Security-Its Types And Techniques Nishu SethI Types of Security: Fig: Types of Security. International Journal of Computer Science and Mobile Computing, 6(5), 235–237.

www.ijcsmc.com

Hussain, M., Wahab, A. W. A., Idris, Y. I. Bin, Ho, A. T. S., & Jung, K. H. (2018). Image steganography in spatial domain: A survey. Signal Processing: Image Communication, 65, 46–66. https://doi.org/10.1016/j.image.2018.03.012

Jasvir Singh, Gaganjot Kaur, & Manveer Kaur Garcha. (2015). Review of Spatial and Frequency Domain Steganographic Approaches. International Journal of Engineering Research And, 4(06), 1122–1124. https://doi.org/10.17577/ijertv4is061082

Jenkins, B., & Laurier, W. (2013). MP3: THE MEANING OF A FORMAT. Canadian Journal of Communication, 30(2), 1–2.

Kadhim, B. A. (2017). High Security Steganography Model Based on DWT,

DCT and RSA. Journal of Engineering and Applied Science, 10, 8875–8881.

Malviya, S., Saxena, M., & Khare, A. (2012). Audio Steganography by Different Methods. International Journal of Emerging Technology and Advanced Engineering, 2(7), 371--375. http://www.ijetae.com/files/Volume2Issue7/IJETAE_0712_64.pdf

Mulyono, I. U. W., Susanto, A., Anggraeny, T., & Sari, C. A. (2019). Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit). Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 4(1), 63–74. https://doi.org/10.22219/kinetik.v4i1.701

Parthasarathi, M., Shreekala, T., Nadu, T., & Nadu, T. (2017). Secured Data Hiding in Audio Files Using Audio Steganography Algorithm. International Journal of Pure and Applied Mathematics, 116(21), 619–627.

Payam H, Samira G and Masoud A. (2017). Impact of Information Technology on Lifestyle: A Literature Review and Classification Int. Journal of Virtual Communities and Social Networking (IJVCSN) 9 pp 1-23. doi: 10.1088/1757-899X/1073/1/012056

Rehman, A., Saba, T., Mahmood, T., Mehmood, Z., Shah, M., & Anjum, A. (2018). Data hiding technique in steganography for information security using number theory. Journal of Information Science, 45(6), 1–12. https://doi.org/10.1177/0165551518816303

Rojali, Salman, A. G., & George, G. (2017). Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods. AIP Conference Proceedings, 1867, 1–11. https://doi.org/10.1063/1.4994462

Rokhman, N., & Maharanti, J. (2011). Deteksi Steganografi Berbasis Least Significant Bit (LSB) Dengan Menggunakan Analisis Statistik. IJCSS (Indonesia Journal of Computing and Cybernatics Systems), 5(1), 57–62. https://doi.org/10.1111/een.12476

Roy, R., & Changder, S. (2016). Quality evaluation of image steganography techniques: A heuristics based approach. International Journal of Security and Its Applications, 10(4), 179–196. https://doi.org/10.14257/ijsia.2016.10.4.18

Sagarmay Deb. (2014). Information Technology, Its Impact on Society and

Its Future. Advances in Computing, 4(1), 25–29. https://doi.org/10.5923/j.ac.20140401.07

Sairam, T. ., & Bhoopaty, B. (2018). Comparative Analysis of Spatial and Frequency Domain Based Data Hiding 1. International Journal of Pure and Applied Mathematics, 119(15), 2353–2359.

Setiaji, H. C. F., Tjondronegoro, S., & Hidayat, B. (2015). Audio Steganography using Modified Enhanced Least Significant Bit in 802.11n. Journal of Measurements, Electronics, Communications, and Systems, 2(3), 7465–7474. https://doi.org/10.25124/jmecs.v1i1.1479

Taha, M. S., Mohd Rahim, M. S., Lafta, S. A., Hashim, M. M., & Alzuabidi, H. M. (2019). Combination of Steganography and Cryptography: A short Survey. IOP Conference Series: Materials Science and Engineering, 518(5), 1–13. https://doi.org/10.1088/1757-899X/518/5/052003




DOI: http://dx.doi.org/10.35671/telematika.v14i2.1031

Refbacks

  • There are currently no refbacks.




Indexed by:

     http://click.accelo.com/wf/click?upn=KMJOFt8368XHDV6m09YF-2BTGnIfzAj8ov81j3S3dKrgX-2FSP8SBOSe2Y-2FRl3XtyVdizj-2FkXxL-2F-2FBp-2BQ3h3JmTUMA-3D-3D_m-2BrHp932aZXzO0XgkbwedgKvn5QWlonE5sMgaivZdq7OsTVSTY4hEqzD-2Bq18nXAyLJBneuiZlt38H2UV92XxYUTcMxEriSXBXl4R62YQbqlgPCj4HTJTRlEeMBija8NFLIgPs2I1UuCR2UCZXSiKb2ocM6V4QaW-2FslHJUiSZesKuX9OlsnCNztILLyuQC4ZZvCegHVeQWDMYSYLvWzv-2FxgZ4v9s-2B2Ehf-2FEsLNi2Ea97Xe1t2vA4kmxioKhj90qGfUs7WlNUb-2B3FL0DjX8F4BTUuUiemqtsGMdQg-2By7qV9RY-3D       

Telematika

ISSN 2442-4528 (online) | ISSN 1979-925X (print)
Published by : Universitas Amikom Purwokerto
Jl. Let. Jend. POL SUMARTO Watumas, Purwonegoro - Purwokerto Telp (0281) 623321 Fax (0281) 621662
Email: telematika@amikompurwokerto.ac.id

Creative Commons License
This work is licensed under a  Creative Commons Attribution 4.0 International License.