Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri

In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different tech...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad Zukri, Nurul Hidayah (Author), Kamarudin, Nur Khairani (Author), Izraf Ishak, Mohd Enif (Author), Md Rashid, Nor Aimuni (Author)
Format: Book
Published: Universiti Teknologi Mara Cawangan Pulau Pinang, 2018-12.
Subjects:
Online Access:Link Metadata
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 repouitm_28897
042 |a dc 
100 1 0 |a Ahmad Zukri, Nurul Hidayah  |e author 
700 1 0 |a Kamarudin, Nur Khairani  |e author 
700 1 0 |a Izraf Ishak, Mohd Enif  |e author 
700 1 0 |a Md Rashid, Nor Aimuni  |e author 
245 0 0 |a Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri 
260 |b Universiti Teknologi Mara Cawangan Pulau Pinang,   |c 2018-12. 
500 |a https://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf 
520 |a In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. Steganography is an interesting and effective method for concealing data throughout the history. In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. The proposed method is analyzed in terms of audio similarity analysis between the original file and the audio steganography file. The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file 
546 |a en 
690 |a QA Mathematics 
690 |a Computers and civilization. Social aspects of computers. Hackers 
655 7 |a Article  |2 local 
655 7 |a PeerReviewed  |2 local 
787 0 |n https://ir.uitm.edu.my/id/eprint/28897/ 
787 0 |n http://uppp.uitm.edu.my 
856 4 1 |u https://ir.uitm.edu.my/id/eprint/28897/  |z Link Metadata