Analyzing the effect of block size on the quality of the stego audio

Tohari Ahmad, Jeffry Nasri Faruki, Royyana M. Ijtihadie, Waskitho Wibisono

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

A rapid technological development of information technology has many advantages to the public. Transferring data which may be previously difficult to do, now can be done easier. Nevertheless, this convenience has brought many consequences, including the security aspect of the data being transmitted. It is possible that the transferred data are intercepted by an attacker. In order to prevent this issue, some methods have been introduced, for example the data hiding method. The existing approaches, however, still have problems in terms of the size of the protected data and the quality of the stego data. In this research, we provide an improvement in the performance and analyzing the effect of the block sizes which carry the protected data. The experimental results show that the proposed method is able to get better results, especially for the bigger block sizes.

Original languageEnglish
Title of host publicationProceedings - 2019 5th International Conference on Science and Technology, ICST 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728123691
DOIs
Publication statusPublished - Jul 2019
Event5th International Conference on Science and Technology, ICST 2019 - Yogyakarta, Indonesia
Duration: 30 Jul 201931 Jul 2019

Publication series

NameProceedings - 2019 5th International Conference on Science and Technology, ICST 2019

Conference

Conference5th International Conference on Science and Technology, ICST 2019
Country/TerritoryIndonesia
CityYogyakarta
Period30/07/1931/07/19

Keywords

  • Confidentiality
  • Data hiding
  • Data protection
  • Data security
  • Information security

Fingerprint

Dive into the research topics of 'Analyzing the effect of block size on the quality of the stego audio'. Together they form a unique fingerprint.

Cite this