Hiding Messages in Audio using Modulus Operation and Simple Partition

Ilyas Bintang Prayogi, Tohari Ahmad, Ntivuguruzwa Jean De La Croix, Pascal Maniriho

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

24 Citations (Scopus)

Abstract

Today's information technology tools allow people to share personal data and information through online media. Data security techniques are also developed to protect confidential messages that are only intended for certain parties, one of which is by embedding those data in a specific medium. The hiding method proposed in this study uses a simple partition to split the 16-bit audio cover file into two groups of the same length. The simple partition technique is applied to improve the quality of the resulting stego file. Furthermore, it is also developing an adaptive modulus operation calculation method, whose implementation on the difference of sample can increase the embedding capacity of the secret messages. The final result of the proposed method shows that all secret messages at the 700 kb payload file size can be successfully embedded, and the PSNR can be maintained up to 120.55 dB.

Original languageEnglish
Title of host publicationProceedings of 2021 13th International Conference on Information and Communication Technology and System, ICTS 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages51-55
Number of pages5
ISBN (Electronic)9781665440592
DOIs
Publication statusPublished - 2021
Event13th International Conference on Information and Communication Technology and System, ICTS 2021 - Virtual, Online, Indonesia
Duration: 20 Oct 202121 Oct 2021

Publication series

NameProceedings of 2021 13th International Conference on Information and Communication Technology and System, ICTS 2021

Conference

Conference13th International Conference on Information and Communication Technology and System, ICTS 2021
Country/TerritoryIndonesia
CityVirtual, Online
Period20/10/2121/10/21

Keywords

  • Data hiding
  • Information security
  • Modulus operation
  • Network infrastructure

Fingerprint

Dive into the research topics of 'Hiding Messages in Audio using Modulus Operation and Simple Partition'. Together they form a unique fingerprint.

Cite this