scholarly journals STEGANOGRAFI AUDIO (WAV) MENGGUNAKAN METODE LSB (LEAST SIGNIFICANT BIT)

CCIT Journal ◽  
2016 ◽  
Vol 9 (2) ◽  
pp. 214-224
Author(s):  
Sugeng Santoso ◽  
Arisman Arisman ◽  
Windy Sentanu

Security of distributed information is essential for maintaining the confidentiality of the information. The process of securing is done by hiding the information on other digital media that are not visible existence. This technique is called steganography, the art of hiding data into digital media with a particular method so that other people do not realize there is something in the digital media. In this paper conducted a study to hide information into digital audio file is not compressed (. Wav) as a carrier file using the Least Significant Bit Modification. Least Significant Bit Modification is a method of hiding information by modifying the last bits of carrier files with the bits of information and only cause changes in the value of a bit higher or a lower one. The system was designed with two main processes, namely phase Embedding and Extracting stage

Author(s):  
Dakhaz Mustafa Abdullah ◽  
Siddeeq Y. Ameen ◽  
Naaman Omar ◽  
Azar Abid Salih ◽  
Dindar Mikaeel Ahmed ◽  
...  

Whether it's for work or personal well-being, keeping secrets or private information has become part of our everyday existence. Therefore, several researchers acquire an entire focus on secure transmitting secret information. Confidential information is collectively referred to as Steganography for inconspicuous digital media such as video, audio, and images. In disguising information, Steganography plays a significant role. Traditional Steganography faces a further concern of discovery as steganalysis develops. The safety of present steganographic technologies thus has to be improved. In this research, some of the techniques that have been used to hide information inside images have been reviewed. According to the hiding domain, these techniques can be divided into two main parts: The spatial Domain and Transform Domain. In this paper, three methods for each Domain have been chosen to be studied and evaluated. These are; Least Significant Bit (LSB), Pixel Value Difference (PVD), Exploiting Modification Direction (EMD), contourlet transform, Discrete Wavelet Transformation (DWT), and, Discrete Cosine Transformation (DCT). Finally, the best results that have been obtained in terms of higher PSNR, Capacity, and more robustness and security are discussed.


2019 ◽  
Vol 17 (71) ◽  
pp. 1-12
Author(s):  
Naseef Husam Mohammad ◽  
Ahmed Abdul-latief Mohammed

This paper, will overview the use of data hiding techniques in JPEG digital image file format. In particular, will describe how one can use Steganography to hide information in a JPEG digital image. This research will review of hiding data by using Least Significant Bit (LSB) as a method, and hiding a text (document) in a JPEG image as a media cover. This paper was implemented by using matlab to complete hiding data. Data hiding is a technique that is used to embed secret information into a cover media. However, the transmitted images may be compressed or not. When it is transmitted, an errors transmitting may occur. If such errors occurred, the receiver cannot extract the information correctly from the cover_image. Digital media have been massively produced, easily manipulated, and swiftly transmitted to almost anywhere in the world at anytime.


2021 ◽  
Vol 7 (1) ◽  
pp. 45-49
Author(s):  
Benget Rumahorbo ◽  
◽  
Resianta Perangin-angin

Copyright is a serious problem in the digital world, the process of sending and distributing digital media is so easy nowadays, copyright in the digital world is very detrimental to those who feel that their digital rights are copied and pasted or taken without the consent of the creator. Therefore we need a way where when a digital file can be identified as original as a product, one of the right ways is to use a watermark technique. But often this watermark process can be lost or cannot be extracted because the digital file has gone through a compression process, duplicate, or something else. So in this study, it will be tried to increase the durability of a watermark in digital audio as a solution for identifying copyrighted digital works. Where the watermark process will use the RSA and MSB algorithms to enter information into a digital audio file, later this information can be extracted to view copyright ownership information from the digital audio. And it is hoped that this watermarking is resistant to various digital audio processes such as compression, duplication, and editing carried out on the file. the information that is inserted into is maintained without compromising the quality of the digital audio.


Author(s):  
Musa. M. Yahaya ◽  
Aminat Ajibola

Recently, the rate of data transfer over the internet globally has increased and this called for more data security as security of data is of great concern for individuals as well as business owners. Cryptography and steganography are two major key players for data security technique. Cryptography is use to perform encryption on the secrete message while steganography hides the secrete message in digital media, image in this regards. This paper employed these two techniques using Advanced Encryption Standard (AES) for the cryptography and Least Significant Bit (LSB) for the steganography. Combining the two algorithms ensured data integrity, data security, and flexibility. The changes in the secrete message carrier (Stego) is insignificant and is often not noticeable by the nicked eyes, thus this make the interception of the message often difficult by intruder.


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
Meenakshi S Arya ◽  
Meenu Rani ◽  
Charndeep Singh Bedi

<p>With the intrusion of internet into the lives of every household and terabytes of data being transmitted over the internet on daily basis, the protection of content being transmitted over the internet has become an extremely serious concern. Various measures and methods are being researched and devised everyday to ensure content protection of digital media. To address this issue of content protection, this paper proposes an RGB image steganography based on sixteen-pixel differencing with n-bit Least Significant Bit (LSB) substitution. The proposed technique provides higher embedding capacity without sacrificing the imperceptibility of the host data. The image is divided into 4×4 non overlapping blocks and in each block the average difference value is calculated. Based on this value the block is classified to fall into one of four levels such as, lower, lower-middle, higher-middle and higher. If block belongs to lower level then 2-bit LSB substitution is used in it. Similarly, for lower-middle, higher-middle and higher level blocks 3, 4, and 5 bit LSB substitution is used. In our proposed method there is no need of pixel value readjustment for minimizing distortion. The experimental results show that stego-images are imperceptible and have huge hiding capacity.</p>


Author(s):  
M. HOLOVIN ◽  
◽  
N. HOLOVINA ◽  

The paper presents a steganographic method of hiding textual information in an audio file. Hiding is implemented by a program in Python. The introduction of individual letters of the text into the sound is carried out by the method of «the least significant bit». The program can be used for both educational and practical purposes. The commonly used wave library was used to work with sound files. It is not a library specialized for cryptographic and steganographic needs. Its use and the conciseness of the program code makes it possible to visualize the mechanism of hiding information in the classroom and demonstrate in the process of creating a program its debugging and testing. It is also important for educational purposes that working within the library allows you to see the state of an empty and filled audio container at the level of individual bits. To assess the practical value of the program, it was tested with texts of different lengths and with sound containers of different grades. In particular, the sound of a tuning fork, the sound of a guitar string, classical music, rap, jazz, and an audiobook were used. The experiment showed the correct reproduction of texts. It was found that if you listen carefully to the «pure sound» of the tuning fork, when the container is overloaded with information, suspicions of a text bookmark may arise. A text bookmark in the sound, in which the volume, tempo and frequency change quickly, does not reveal the suspicion of a possible bookmark. However, if the party who intercepted the masked message has guesses about how to bookmark the text, then the text is easily removed. Therefore, the use of the program for practical purposes requires additional manipulations in the code, in particular related to the order of text input and the choice of location. Additional text encryption is also desirable. Analysis of sound and its manipulation at the level of individual bits also has educational value in the sense that it gives an idea of the noise level, the magnitude of the useful physical signal and the sensitivity of the human ear. Key words: Python language, steganography, hiding information, masking information in an audio file, educational example.


2020 ◽  
Vol 4 (6) ◽  
pp. 15-26
Author(s):  
Abdullah Abdullah ◽  
Sardar Ali ◽  
Ramadhan Mstafa ◽  
Vaman Haji

Digital communication has become a vital part of daily life nowadays, many applications are using internet-based communication and here the importance of security rose to have a secure communication between two parties to prevent authorized access to sensitive data. These requirements led to a number of research in information security that has been done in the past two decades. Cryptography and steganography are the two main methods that are being used for information security. Cryptography refers to techniques that encrypt a message to be sent to a destination using different methods to be done. On the other hand, steganography is the science of hiding information from others using another cover message or media such as image, audio, video, and DNA sequence. This paper proposed a new method to hide information in an image using the least significant bit (LSB) based on Deoxyribonucleic Acid (DNA) sequence. To accomplish this, the proposed scheme used properties of DNA sequence when codons that consist of three nucleotides are translated to proteins. The LSB of two pixels from the image are taken to represent a codon and then translate them to protein. The secret message bits are injected into codons before the translation process which slightly distorts the image and makes the image less suspicious and hard to detect the hidden message. The experimental results indicate the effeteness of the proposed method.


Author(s):  
Arief Bramanto Wicaksono Putra ◽  
Muhammad Taher Jufri ◽  
Dirgahayu Lantara ◽  
Anugrah Assyauqi ◽  
Agusma Wajiansyah ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document