We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Steganography: Combination of Least Significant Bit (LSB) and Bit-Plane Complexity Segmentation (BPCS) Methods for Hiding Massage on Image and Audio

by Randi Rizal, Alam Rahmatulloh, Nur Widiyasono, Ruuhwan, Dede Rizal Nursamsi
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 21
Year of Publication: 2023
Authors: Randi Rizal, Alam Rahmatulloh, Nur Widiyasono, Ruuhwan, Dede Rizal Nursamsi
10.5120/ijca2023922929

Randi Rizal, Alam Rahmatulloh, Nur Widiyasono, Ruuhwan, Dede Rizal Nursamsi . Steganography: Combination of Least Significant Bit (LSB) and Bit-Plane Complexity Segmentation (BPCS) Methods for Hiding Massage on Image and Audio. International Journal of Computer Applications. 185, 21 ( Jul 2023), 1-7. DOI=10.5120/ijca2023922929

@article{ 10.5120/ijca2023922929,
author = { Randi Rizal, Alam Rahmatulloh, Nur Widiyasono, Ruuhwan, Dede Rizal Nursamsi },
title = { Steganography: Combination of Least Significant Bit (LSB) and Bit-Plane Complexity Segmentation (BPCS) Methods for Hiding Massage on Image and Audio },
journal = { International Journal of Computer Applications },
issue_date = { Jul 2023 },
volume = { 185 },
number = { 21 },
month = { Jul },
year = { 2023 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number21/32813-2023922929/ },
doi = { 10.5120/ijca2023922929 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:26:38.401662+05:30
%A Randi Rizal
%A Alam Rahmatulloh
%A Nur Widiyasono
%A Ruuhwan
%A Dede Rizal Nursamsi
%T Steganography: Combination of Least Significant Bit (LSB) and Bit-Plane Complexity Segmentation (BPCS) Methods for Hiding Massage on Image and Audio
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 21
%P 1-7
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Currently, many groups are trying to steal data and information to disrupt privacy security. To maintain the confidentiality of information, one of which can be done with steganography techniques. Steganography hides information or data in other messages so that the existence of the first message is not known. This study aims to develop an application program that can secure messages with steganography techniques using the Least Significant Bit (LSB) and Bit-Plane Complexity Segmentation (BPCS) methods in digital image and audio files. This application was tested by hiding messages or confidential information in image and audio files and retrieving confidential messages or information that had been hidden. The steganography process that was carried out succeeded in hiding the message so that the size and sound quality of the original file did not change significantly.

References
  1. S. Quach, P. Thaichon, K. D. Martin, S. Weaven, and R. W. Palmatier, “Digital technologies: tensions in privacy and data,” J Acad Mark Sci, vol. 50, no. 6, pp. 1299–1323, Nov. 2022, doi 10.1007/s11747-022-00845-y.
  2. Maria José Garde and Zayda Manatta, “Confidentiality and Information Security Management Toolkit,” 2022.
  3. V. (J. R. ) Winkler, “Securing the Cloud: Data Security,” in Securing the Cloud, Elsevier, 2019, pp. 125–151. doi 10.1016/B978-1-59749-592-9.00005-1.
  4. U. Tariq, I. Ahmed, A. K. Bashir, and K. Shaukat, “A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review,” Sensors, vol. 23, no. 8, p. 4117, Apr. 2023, doi: 10.3390/s23084117.
  5. R. Hidayat, “Klasifikasi Bit-Plane Noise untuk Penyisipan Pesan pada Teknik Steganography BPCS Menggunakan Fuzzy Inference Sistem Mamdani,” Jurnal Rekayasa Elektrika, vol. 11, no. 3, Apr. 2015, doi: 10.17529/jre.v11i3.2238.
  6. D. Adhar, A. Syahputra, R. A. Sugianto, R. Oktari Batubara, A. Sanjaya, and A. Sabir, “Steganografi Pengamanan Data Teks Menggunakan Audio Wav Dengan Metode LSB,” CSRID, vol. 13, no. 6, pp. 211–220, 2021.
  7. D. Ratna Sari, “Perancangan Aplikasi Steganografi Pada Citra Digital Dengan Metode Bit Plane Complexity Segmentation (Bpcs),” 2017.
  8. Aliy Hafiz, “Steganografi Berbasis Citra Digital Untuk Menyembunyikan Data Menggunakan Metode Least Significant Bit (LSB),” Jurnal Cendikia, vol. 17, no. 1, pp. 194–198, 2019.
  9. S. Arunkumar, V. Subramaniyaswamy, V. Vijayakumar, N. Chilamkurti, and R. Logesh, “SVD-based robust image steganographic scheme using RIWT and DCT for secure transmission of medical images,” Measurement, vol. 139, pp. 426–437, Jun. 2019, doi: 10.1016/j.measurement.2019.02.069.
  10. E. W. Abood, W. A. Khudier, R. H. Jabber, and D. A. Abbas, “Securing Hill encrypted information With Audio steganography: a New Substitution Method,” J Phys Conf Ser, vol. 1591, no. 1, p. 012021, Jul. 2020, doi: 10.1088/1742-6596/1591/1/012021.
  11. E. Ardhianto, “Improvement of Steganography Technique: A Survey,” in Advances in Social Science, Education, and Humanities Research, 2020. [Online]. Available: www.scimagojr.com.
  12. M. A. Majeed, R. Sulaiman, Z. Shukur, and M. K. Hasan, “A Review on Text Steganography Techniques,” Mathematics, vol. 9, no. 21, p. 2829, Nov. 2021, doi: 10.3390/math9212829.
  13. S. S. Khaire, “Review: Steganography-Bit Plane Complexity Segmentation (BPCS) Technique,” 2010.
  14. N. Subramanian, O. Elharrouss, S. Al-Maadeed, and A. Bouridane, “Image Steganography: A Review of the Recent Advances,” IEEE Access, vol. 9, pp. 23409–23423, 2021, doi: 10.1109/ACCESS.2021.3053998.
  15. M. A. Aslam et al., “Image Steganography using Least Significant Bit (LSB) - A Systematic Literature Review,” in 2022 2nd International Conference on Computing and Information Technology (ICCIT), IEEE, Jan. 2022, pp. 32–38. doi: 10.1109/ICCIT52419.2022.9711628.
  16. H. K. Tayyeh and A. S. Ahmed AL-Jumaili, “A combination of least significant bit and deflate compression for image steganography,” International Journal of Electrical and Computer Engineering (IJECE), vol. 12, no. 1, p. 358, Feb. 2022, doi: 10.11591/piece.v12i1.pp358-364.
  17. E. Kawaguchi, “BPCS-Steganography – Principle and Applications,” 2005, pp. 289–299. doi 10.1007/11554028_41.
  18. A. P. Ratnasari and F. A. Dwiyanto, “Metode Steganografi Citra Digital,” Sains, Aplikasi, Komputasi dan Teknologi Informasi, vol. 2, no. 2, p. 52, Apr. 2020, doi: 10.30872/jsakti.v2i2.3300.
  19. J. Erfurt, C. R. Helmrich, S. Bosse, H. Schwarz, D. Marpe, and T. Wiegand, “A Study of the Perceptually Weighted Peak Signal-To-Noise Ratio (WPSNR) for Image Compression,” in 2019 IEEE International Conference on Image Processing (ICIP), IEEE, Sep. 2019, pp. 2339–2343. doi: 10.1109/ICIP.2019.8803307.
  20. S. Rodríguez-López, M. F. Escobedo Martínez, L. Junquera, and M. García-Pola, “Two-Dimensional Analysis of Digital Images through Vector Graphic Editors in Dentistry: New Calibration and Analysis Protocol Based on a Scoping Review,” Int J Environ Res Public Health, vol. 18, no. 9, p. 4497, Apr. 2021, doi: 10.3390/ijerph18094497.
  21. M. Yağanoğlu and C. Köse, “Real-Time Detection of Important Sounds with a Wearable Vibration Based Device for Hearing-Impaired People,” Electronics (Basel), vol. 7, no. 4, p. 50, Apr. 2018, doi: 10.3390/electronics7040050.
Index Terms

Computer Science
Information Sciences

Keywords

Audio BPCS Citra Digital LSB Steganography.