Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri

In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different tech...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni
Format: Article
Language:English
Published: Universiti Teknologi Mara Cawangan Pulau Pinang 2018
Subjects:
Online Access:http://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf
http://ir.uitm.edu.my/id/eprint/28897/
http://uppp.uitm.edu.my
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uitm.ir.28897
record_format eprints
spelling my.uitm.ir.288972020-03-19T14:04:22Z http://ir.uitm.edu.my/id/eprint/28897/ Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri Ahmad Zukri, Nurul Hidayah Kamarudin, Nur Khairani Izraf Ishak, Mohd Enif Md Rashid, Nor Aimuni QA Mathematics Computers and civilization. Social aspects of computers. Hackers In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. Steganography is an interesting and effective method for concealing data throughout the history. In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. The proposed method is analyzed in terms of audio similarity analysis between the original file and the audio steganography file. The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file Universiti Teknologi Mara Cawangan Pulau Pinang 2018-12 Article PeerReviewed text en http://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf Ahmad Zukri, Nurul Hidayah and Kamarudin, Nur Khairani and Izraf Ishak, Mohd Enif and Md Rashid, Nor Aimuni (2018) Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri. ESTEEM Academic Journal, 14. pp. 66-75. ISSN 1675-7939 http://uppp.uitm.edu.my
institution Universiti Teknologi Mara
building Tun Abdul Razak Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Mara
content_source UiTM Institutional Repository
url_provider http://ir.uitm.edu.my/
language English
topic QA Mathematics
Computers and civilization. Social aspects of computers. Hackers
spellingShingle QA Mathematics
Computers and civilization. Social aspects of computers. Hackers
Ahmad Zukri, Nurul Hidayah
Kamarudin, Nur Khairani
Izraf Ishak, Mohd Enif
Md Rashid, Nor Aimuni
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
description In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. Steganography is an interesting and effective method for concealing data throughout the history. In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. The proposed method is analyzed in terms of audio similarity analysis between the original file and the audio steganography file. The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file
format Article
author Ahmad Zukri, Nurul Hidayah
Kamarudin, Nur Khairani
Izraf Ishak, Mohd Enif
Md Rashid, Nor Aimuni
author_facet Ahmad Zukri, Nurul Hidayah
Kamarudin, Nur Khairani
Izraf Ishak, Mohd Enif
Md Rashid, Nor Aimuni
author_sort Ahmad Zukri, Nurul Hidayah
title Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
title_short Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
title_full Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
title_fullStr Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
title_full_unstemmed Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
title_sort audio steganography using least significant bit and aes cryptographic algorithm / nurul hidayah ahmad zukri
publisher Universiti Teknologi Mara Cawangan Pulau Pinang
publishDate 2018
url http://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf
http://ir.uitm.edu.my/id/eprint/28897/
http://uppp.uitm.edu.my
_version_ 1685650471963852800
score 13.211869