Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]

In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different tech...

Full description

Bibliographic Details
Main Authors: Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor Aimuni
Format: Article
Language:English
Published: Universiti Teknologi MARA Cawangan Pulau Pinang 2018
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/28897/
_version_ 1848807147400331264
author Ahmad Zukri, Nurul Hidayah
Kamarudin, Nur Khairani
Izraf Ishak, Mohd Enif
Md Rashid, Nor Aimuni
author_facet Ahmad Zukri, Nurul Hidayah
Kamarudin, Nur Khairani
Izraf Ishak, Mohd Enif
Md Rashid, Nor Aimuni
author_sort Ahmad Zukri, Nurul Hidayah
building UiTM Institutional Repository
collection Online Access
description In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. Steganography is an interesting and effective method for concealing data throughout the history. In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. The proposed method is analyzed in terms of audio similarity analysis between the original file and the audio steganography file. The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file
first_indexed 2025-11-14T22:38:12Z
format Article
id uitm-28897
institution Universiti Teknologi MARA
institution_category Local University
language English
last_indexed 2025-11-14T22:38:12Z
publishDate 2018
publisher Universiti Teknologi MARA Cawangan Pulau Pinang
recordtype eprints
repository_type Digital Repository
spelling uitm-288972025-07-11T02:08:57Z https://ir.uitm.edu.my/id/eprint/28897/ Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.] esteem Ahmad Zukri, Nurul Hidayah Kamarudin, Nur Khairani Izraf Ishak, Mohd Enif Md Rashid, Nor Aimuni QA Mathematics Computers and civilization. Social aspects of computers. Hackers In the era of technology, massive amount of data have been stored and exchanged over the internet. One of the most important factors of data communication has been the security of the credential information. Cryptography is a technique for securing the secrecy of the information. Many different techniques have been developed under the cryptography umbrella. However, it is not enough to keep the contents of a message secret. Thus, another algorithm should be implemented to keep the existence of a message secret. Steganography is an interesting and effective method for concealing data throughout the history. In this paper, Least Significant Bit (LSB) algorithm has been proposed. This algorithm can help users to protect their confidential information during transmission by embedding the data inside the audio .wav file. This application implements an Advance Encryption Standard (AES) to enhance the steganography security by encrypting the information and as such, only the intended recipient can read the data. The proposed method is analyzed in terms of audio similarity analysis between the original file and the audio steganography file. The result shows about 100% of similarity between both files. File integrity is also measured and the results show the hashing value of the encrypted file was different compared to the original file Universiti Teknologi MARA Cawangan Pulau Pinang 2018-12 Article PeerReviewed text en https://ir.uitm.edu.my/id/eprint/28897/1/AJ_NURUL%20HIDAYAH%20AHMAD%20ZUKRI%20EAJ%2018.pdf Ahmad Zukri, Nurul Hidayah and Kamarudin, Nur Khairani and Izraf Ishak, Mohd Enif and Md Rashid, Nor Aimuni (2018) Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]. (2018) ESTEEM Academic Journal <https://ir.uitm.edu.my/view/publication/ESTEEM_Academic_Journal.html>, 14 (Dec): 7. pp. 66-75. ISSN 2289-4934 http://uppp.uitm.edu.my
spellingShingle QA Mathematics
Computers and civilization. Social aspects of computers. Hackers
Ahmad Zukri, Nurul Hidayah
Kamarudin, Nur Khairani
Izraf Ishak, Mohd Enif
Md Rashid, Nor Aimuni
Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
title Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
title_full Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
title_fullStr Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
title_full_unstemmed Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
title_short Audio steganography using least significant bit and AES cryptographic algorithm / Nurul Hidayah Ahmad Zukri ... [et al.]
title_sort audio steganography using least significant bit and aes cryptographic algorithm / nurul hidayah ahmad zukri ... [et al.]
topic QA Mathematics
Computers and civilization. Social aspects of computers. Hackers
url https://ir.uitm.edu.my/id/eprint/28897/
https://ir.uitm.edu.my/id/eprint/28897/