Peningkatan Kapasitas Penyisipan Audio Data Hiding Berbasiskan Modifikasi Metode Least Significant Digit
Nowadays, the needs of data security is proportional to the amount of data usage as the effect from easiness in internet access. There are many ways to protect data in order to avoid data leakage, such as cryptography, watermarking, and data hiding. The latter is conducted by hiding secret data into a carrier. A popular method in data hiding is Least significant digit (LSD). The hiding is carried out by changing the value of binary secret data into decimal in specific segment. Then, the decimal value of secret data is inserted into the carrier. The process in LSD method is relatively simple and easier to implement, but the LSD has weakness in pivoting point as reference of data changes. This results in a change into the original data carrier. Additionally, this also has limited amount of data capacity that can be inserted.
On the other hand, Global-Section Search method (GSS) is an optimization method used to find an optimum value between two signals. Newly acquired signal GSS is further used as a pivoting point and slot area to paste the data secret.
This study proposes a new method of data hiding by using Least Significant Digit and Global-section search (LSD-GSS) to increase the capacity of secret data insertion. The performance of LSD-GSS as proposed method is tested by comparing the LSD method and using 15 data sets of audio in various genres as carrier media and various large capacity of 12 secret data. SNR is used to find out the quality of hidden data audio. The experimental result shows that the LSD-GSS has increased the capacity of secret data that can be inserted without changing the original data carrier.
“Internet live stats,” [Online]. Available:
http://www.internetlivestats.com/internet-users/. [Accessed 5 April 2017].
C. P. Pfleeger dan S. L. Pfleeger, Security in Computing, fourth edition, New Jersey: Prentice Hall PTR Upper Saddle River, 2006.
E. K. Marnani, Z. Karami, dan M. E. Jazi, “A Comparison of Some Audio Watermarking Methods,” International Conference on Electrical Engineering, Computing Science and Automatic Control, Toluca, Mexico, 2009.
Bhateja, Ashok K. Chaudhury, dan S. Saxena, “Robust Online Signature Based Cryptosystem,” 14th International Conference on Frontiers in Handwriting Recognition, 2014.
Liang, B. Wu, dan Z. Linyou, “A Novel Fingerprint-Based Biometric Encryption.,” Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2014.
Thangadurai, K. Devi, dan G. Sudha, “An analysis of LSB based image steganography techniques,” International Conference on Computer Communication and Informatics, 2014.
H. J. Kim, Y. H. Choi, J. W. Seok, dan J. W. Hong, “Audio watermarking techniques,” Intelligent Watermarking Techniques, 2004.
H. J. Kim, dan Y. H. Choi, “A novel echo-hiding scheme with backward and forward kernels,” IEEE Transactions on circuits and Systems for video and technology, vol. 13, no. 8, pp. 885-889, 2003.
W. Bender, D. Gruhl, N. Marimoto, dan A. Lu, “Techniques for data hiding,” IBM Systems Journal, vol. 35, pp. 313-336, 1996.
M. Swanson, B. Zhu, A. Tewfik, dan L. Boney, “Robust audio
watermarking using perceptual masking,” Signal Processing, vol. 66, pp. 337-355, 1998.
G. W. Wornell, dan B. Chen , “Quantization index modulation: a class of provably good methods for digital watermarking,” IEEE Transaction on Information Theory, vol. 47, pp. 1423-1443, 2001.
S. K. Lee dan Y. S. Ho, “Digital audio watermarking in the cepstrum domain,” IEEE Transactions on Consumer Electronics, vol. 46, pp. 744-750, 2000.
I. K. Yeo dan H. J. Kim, “Modified patchwork algorithm: A novel audio watermarking scheme,” IEEE Transactions on Speech and audio Processing, vol. 11, pp. 381-386, 2003.
M. L. M. Kiah, A. A. Zaidan, B. B. Zaidan, A. M. Ahmed, dan S. M. Al-bakri, “A review of audio based steganography and digital watermaking,” International Journal of the Physical Sciences, vol. 6, pp. 3837-3850, 2011.
D. Gruhl, dan W. Bender, “Echo hiding,” Proceeding of Information Hiding Workshop, 1996.
L. Gang, A. N. Akansu, dan M. Ramkumar, “MP3 resistant oblivious steganography,” Proceedings of IEEE International Conference onAcoustics, Speech, and Signal Processing, Salt Lake City, 2001.
F. Djebbar, B. Ayady, dan H. H. K. A. Meraimx, “A view on latest audio steganography techniques,” International Conference on Innovations in Information Technology, 2011.
B. Paillard, P. Mabilleau, S. Morissette, dan J. Soumagne,
“PERCEVAL : Perceptual Evaluation of the Quality of AudioSignals,” journal of Audio Engeneering Society, vol. 40, pp. 21-31, 1992.
J. Liu, K. Zhou, dan H. Tian, “Least-significant-digit Steganography in Low Bitrate Speech,” IEEE ICC 2012 - Communication and Information Systems Security Symposium, 2012.
R. Ansari, H. Malik, dan A. Khokhar, “Data-hiding in audio using frequency-selective phase alteration,” IEEE International Conference on Acoustics, Speech, and Signal Processing, Montreal, Quebec, Canada, 2004.
D. Yadav, M. Agrawal, dan A. Arora, “Performance Evaluation of LSB and LSD in Steganography,” IEEE 2014 5th International Conference-Confluence The Next Generation Information Technology Summit, Nioda, India, 2014.
J. J. Bosch, J. Janer, F. Fuhrman, dan P. Herrera , “A Comparation of Sound Segregation Techniques for Predominant Instrument Recognition in Musical Audio Signals,” Int Proc. ISMIR., 2012.
- There are currently no refbacks.
Copyright (c) 2017 Jurnal Nasional Teknik Elektro dan Teknologi Informasi (JNTETI)
JNTETI (Jurnal Nasional Teknik Elektro dan Teknologi Informasi)
Departemen Teknik Elektro dan Teknologi Informasi, Fakultas Teknik Universitas Gadjah Mada
Jl. Grafika No 2. Kampus UGM Yogyakarta 55281
+62 274 552305