Securing Text File on Audio Files using Least Significant Bit (LSB) and Blowfish

Ahmad Rizky Fauzan, Al Farissi, Muhammad Naufal Rachmatullah

Abstract

Along with the development of technology, communication can be done in various ways, one of which is digital messages. But often the messages sent do not reach their destination and are obtained by irresponsible parties. This happens because of the lack of security in the file. For this reason, security is needed so that messages cannot be stolen or seen by other parties. There are various ways to secure messages, including Steganography and Cryptography techniques. This study uses a combination of the Least Significant Bit method and the Blowfish algorithm to secure secret messages in audio files. This research will measure encryption and decryption time, analysis of message file size changes after encryption and decryption, and PSNR value of audio files. The result of encryption using blowfish is a change in the size of the message file caused by the size of the message file is less than the block cipher size, so additional bytes are given so that the message size matches the block cipher size. The speed of the encryption and decryption process using the blowfish algorithm results in an average time for encryption of 547.98ms while the average time for decryption is 538.19ms. The longest time for the encryption process is 557.30ms and the fastest is 534.50ms, while the longest time for the decryption process is 548.74ms and the fastest is 531.46ms. Hiding messages in audio files using LSB produces PSNR values above 30dB.

Full Text:

PDF

References

Sari, J. I., & Sihotang, H. T. (2017). Implementasi Penyembunyian Pesan Pada Citra Digital Dengan Menggabungkan Algoritma HILL Cipher Dan Metode Least Significant BIT (LSB). Jurnal Mantik Penusa, 1(2).

R. Munir, Kriptografi. Bandung : Informatika, 2006.

Nur’aini, S. (2019). Steganografi Pada Digital Image Menggunakan Metode Least Significant Bit Insertion. Walisongo Journal of Information Technology, 1(1), 75-90.

Budi Prasetiyo, I. U., Much Aziz Muslim, I. U., & Susanto, H. (2017). Penerapan Kriptografi Algoritma Blowfish pada Pengamanan Pesan Data Teks Implementation Of Blowfish Algorithm Cryptography On Text Message Data Security. Techno. COM, 16(4), 358-366.D. Abdullah, D. N. Saputro, “Implementasi Algoritma Blowfish dan Metode Least Significat Bit Insertion Pada Video Mp3”. Jurnal Pseudocode, Vol III. No 2. September 2016. ISSN 2355-5920, 2016.

Hemeida, F., Alexan, W., & Mamdouh, S. (2019, October). Blowfish–secured audio steganography. In 2019 Novel Intelligent and Leading Emerging Sciences Conference (NILES) (Vol. 1, pp. 17-20). IEEE.R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.

Bhalshankar, S., & Gulve, A. K. (2015). Audio steganography: LSB technique using a pyramid structure and range of bytes. arXiv preprint arXiv:1509.02630.

B. Schneier, Description of a New Variable-Length Key, 64-Bit Block Cipher (Blowfish), Springer-Verlag, 1996.

Chadha, A., & Satam, N. (2013). An efficient method for image and audio steganography using Least Significant Bit (LSB) substitution. arXiv preprint arXiv:1311.1083.

Indrayani, R. (2020, November). Modified LSB on Audio Steganography using WAV Format. In 2020 3rd International Conference on Information and Communications Technology (ICOIACT) (pp. 466-470). IEEE.

Refbacks

  • There are currently no refbacks.