Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri
In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different tech...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Book |
Published: |
Universiti Teknologi Mara Cawangan Pulau Pinang,
2018-12.
|
Subjects: | |
Online Access: | Link Metadata |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | repouitm_28897 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Ahmad Zukri, Nurul Hidayah |e author |
700 | 1 | 0 | |a Kamarudin, Nur Khairani |e author |
700 | 1 | 0 | |a Izraf Ishak, Mohd Enif |e author |
700 | 1 | 0 | |a Md Rashid, Nor Aimuni |e author |
245 | 0 | 0 | |a Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri |
260 | |b Universiti Teknologi Mara Cawangan Pulau Pinang, |c 2018-12. | ||
500 | |a https://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf | ||
520 | |a In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. Steganography is an interesting and effective method for concealing data throughout the history. In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. The proposed method is analyzed in terms of audio similarity analysis between the original file and the audio steganography file. The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file | ||
546 | |a en | ||
690 | |a QA Mathematics | ||
690 | |a Computers and civilization. Social aspects of computers. Hackers | ||
655 | 7 | |a Article |2 local | |
655 | 7 | |a PeerReviewed |2 local | |
787 | 0 | |n https://ir.uitm.edu.my/id/eprint/28897/ | |
787 | 0 | |n http://uppp.uitm.edu.my | |
856 | 4 | 1 | |u https://ir.uitm.edu.my/id/eprint/28897/ |z Link Metadata |