Protecting Data by Improving the Performance of Controlling Expansion Method

Tohari Ahmad*, Herdito Ibnu Dewangkoro, Waskitho Wibisono, Royyana Muslim Ijtihadie

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)


Significant development of information technology has brought many advantages for people to communicate and transfer data more comfortable than before. Nevertheless, this easiness requires users to protect their data to prevent them from illegal access. Data hiding has been introduced to do this data protection; however, the quality of the generated stego data and the capacity of the payload are still the challenges. In this research, we work on these two problems by developing a method base on the Controlling Expansion. Here, the use of various base numbers has been explored along with the corresponding modulus values. The experimental results obtained by using a public database show that this proposed scheme can improve the original method’s performance. An increase of about 0.5 dB can be achieved by still maintaining the amount of the payload size.

Original languageEnglish
Title of host publicationAdvances in Cyber Security - Second International Conference, ACeS 2020, Revised Selected Papers
EditorsMohammed Anbar, Nibras Abdullah, Selvakumar Manickam
PublisherSpringer Science and Business Media Deutschland GmbH
Number of pages11
ISBN (Print)9789813368347
Publication statusPublished - 2021
Event2nd International Conference on Advances in Cyber Security, ACeS 2020 - Penang, Malaysia
Duration: 8 Dec 20209 Dec 2020

Publication series

NameCommunications in Computer and Information Science
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937


Conference2nd International Conference on Advances in Cyber Security, ACeS 2020


  • Data hiding
  • Data protection
  • Information security
  • Secret data


Dive into the research topics of 'Protecting Data by Improving the Performance of Controlling Expansion Method'. Together they form a unique fingerprint.

Cite this