IMPLEMENTATION OF LSB AND PLAYFAIR METHODS TO SECURE TEXT FILES INTO WAV AUDIO FILES

  • Arief Al Akbar Informatics Engineering, Faculty of Science and Technology, Universitas Muhammadiyah Kalimantan Timur, Indonesia
  • Muhammad Taufiq Sumadi Informatics Engineering, Faculty of Science and Technology, Universitas Muhammadiyah Kalimantan Timur, Indonesia
  • Faldi Informatics Engineering, Faculty of Science and Technology, Universitas Muhammadiyah Kalimantan Timur, Indonesia
Keywords: Encryption, Least Significant Bit (LSB), Playfair Cipher, Steganography

Abstract

In the rapidly evolving digital communication era, the demand for information security is escalating. Three main security techniques are required: cryptography, watermarking, and steganography. Despite cryptography and watermarking having detectability weaknesses, steganography emerges as a more reliable choice as it can conceal messages across various media without arousing suspicion. This article discusses the utilization of steganography, particularly the Least Significant Bit (LSB) technique, for embedding messages within audio wave files as the medium. In this research, the author combines steganography with encryption using the Playfair Cipher algorithm to enhance overall data confidentiality. Implementation results demonstrate that the combination of LSB and Playfair methods effectively conceals messages without compromising audio quality. Evaluation of stego quality using PSNR indicates that audio quality remains high after embedding secret messages, with PSNR exceeding 40 dB. Despite successful message extraction during decoding, the message content remains protected and requires decryption to be read. In conclusion, the use of steganography in audio wave files with a combination of Playfair Cipher encryption and LSB methods proves to be an effective approach in preserving privacy and data confidentiality during transmission.

Downloads

Download data is not yet available.

References

D. Tan, Y. Lu, X. Yan, and X. Wang, “A simple review of audio steganography,” Proc. 2019 IEEE 3rd Inf. Technol. Networking, Electron. Autom. Control Conf. ITNEC 2019, no. Itnec, pp. 1409–1413, 2019, doi: 10.1109/ITNEC.2019.8729476.

M. T. SUMADI, A. SUDARSONO, and M. YULIANA, “Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation,” ELKOMIKA J. Tek. Energi Elektr. Tek. Telekomun. Tek. Elektron., vol. 10, no. 1, p. 1, 2022, doi: 10.26760/elkomika.v10i1.1.

R. Indrayani, “Human perception evaluation toward end of file steganography method’s implementation using multimedia file (image, audio, and video),” 2019 4th Int. Conf. Inf. Technol. Inf. Syst. Electr. Eng. ICITISEE 2019, vol. 6, pp. 200–204, 2019, doi: 10.1109/ICITISEE48480.2019.9003759.

M. Anusha, K. N. Bhanu, and D. Divyashree, “Secured Communication of Text and Audio using Image Steganography,” Proc. Int. Conf. Electron. Sustain. Commun. Syst. ICESC 2020, no. Icesc, pp. 284–288, 2020, doi: 10.1109/ICESC48915.2020.9155715.

K. Bansal, A. Agrawal, and N. Bansal, “A Survey on Steganography using Least Significant bit ( LSB ) Embedding Approach,” no. Icoei, pp. 64–69, 2020.

D. Adhar, A. Syahputra, R. A. Sugianto, R. Oktari Batubara, A. Sanjaya, and A. Sabir, “Steganografi Pengamanan Data Teks Menggunakan Audio Wav Dengan Metode LSB,” CSRID J., vol. 13, no. 3A, pp. 211–220, 2021.

R. Indrayani, “Modified LSB on Audio Steganography using WAV Format,” 2020 3rd Int. Conf. Inf. Commun. Technol. ICOIACT 2020, pp. 466–470, 2020, doi: 10.1109/ICOIACT50329.2020.9332132.

R. Hussein and W. Alexan, “Secure Message Embedding in Audio,” 2nd Int. Conf. Comput. Appl. Inf. Secur. ICCAIS 2019, pp. 1–6, 2019, doi: 10.1109/CAIS.2019.8769505.

F. C. Venna, “Implementasi Steganografi Audio pada File Wav dengan metode Redundant Pattern Encoding (RPE) Berbasis Sndroid,” Repository.Uinjkt.Ac.Id, 2019, [Online]. Available: http://repository.uinjkt.ac.id/dspace/handle/123456789/47958

S. D. Surbakti, “Implementasi Algoritma Playfair Cipher pada Penyandian Data,” J. Tek. Inform. Unika St. Thomas, vol. 4, no. 2, pp. 166–123, 2019, [Online]. Available: https://core.ac.uk/download/pdf/267031349.pdf

S. Khasanah and T. Sutabri, “Analisis Pencegahan Pencurian Data Melalui Aplikasi Whatsapp Menggunakan Metode Kriptografi,” J. Sain dan Tek., vol. 5, no. 2, pp. 145–153, 2023.

M. Bertaccini, Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption. Packt Publishing, 2022. [Online]. Available: https://books.google.co.id/books?id=t1taEAAAQBAJ

Muhammad Pristiwanto, “Perancangan Aplikasi Enkripsi Kata Menggunakan Algoritma Playfair Cipher Berbasis Web,” J. Comput. Sci. Inf. Syst. Progr. Stud. Sist. Informasi, Fak. Sains Teknol. Univ. Labuhanbatu Vol. 2, Nomor 4, Novemb. 2021, Pages. 176-185 e-ISSN 2747-2221, vol. 5, no. 3, pp. 248–253, 2021.

G. Lasry, A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics. kassel University Press, 2018. [Online]. Available: https://books.google.co.id/books?id=YI9NDwAAQBAJ

R. M. Marzan and A. M. Sison, “An enhanced key security of playfair cipher algorithm,” ACM Int. Conf. Proceeding Ser., vol. Part F147956, no. February 2019, pp. 457–461, 2019, doi: 10.1145/3316615.3316689.

E. W. Abood et al., “Audio steganography with enhanced LSB method for securing encrypted text with bit cycling,” Bull. Electr. Eng. Informatics, vol. 11, no. 1, pp. 185–194, 2022, doi: 10.11591/eei.v11i1.3279.

A. D. Hendrata and A. Prihanto, “Analisis Kualitas Suara Stego Audio Penyisipan Informasi Tersembunyi dengan Metode Least Significant Bit,” J. Informatics Comput. Sci., vol. 2, no. 03, pp. 178–184, 2021, doi: 10.26740/jinacs.v2n03.p178-184.

Prudhvi Raj Budumuru, G Prasanna Kumar, and B Elisha Raju, “Hiding an Image in an Audio File using LSB Audio Technique,” Int. Conf. Comput. Commun. Informatics, pp. 5–8, 2021.

J. Mohajon, “An Improved Approach in Audio Steganography Using Genetic Algorithm with K-bit Symmetric Security Key,” Nucl. Phys., vol. 13, no. 1, pp. 104–116, 2018.

Published
2024-12-28
How to Cite
[1]
A. Al Akbar, M. T. Sumadi, and F. Faldi, “IMPLEMENTATION OF LSB AND PLAYFAIR METHODS TO SECURE TEXT FILES INTO WAV AUDIO FILES”, J. Tek. Inform. (JUTIF), vol. 5, no. 6, pp. 1529-1537, Dec. 2024.