Main Article Content
Abstract
When sending a message to a specific party and do not want the message to be known by other parties, it is important to avoid information leakage. However, the problem identified is that there is a lack of knowledge to detect audio Ste-ganography which requires technical methods that can read and view secret messages. One method that can be used in steganography is Masking and Filtering. Masking as a media marker on audio that can insert messages. Filtering gives value to the parts that have been given a mark. This method is one that is often used because it is simple, fast in the data insertion process, and has a large enough storage capacity. The Masking and Filtering method is able to hide messages by inserting them into the audio Spectrogram as a storage medium. The filter is used to ensure that the hidden message is within the previously analyzed frequency range, thus making humans unable to clearly hear the additional audio that has been inserted which is the hidden message. After the insertion is complete, the audio file is saved, and tests are performed to ensure that the audio quality is not compromised, and the hidden message remains undetected such as making modifications to the stego file to test the robustness and security of the hidden message. Based on research, steganography is difficult to detect by the naked eye, to retrieve messages that have been hidden, it can be done by displaying an audio Spectrogram that contains a secret message. How to see the hidden message using the Audacity application that can see sound waves. The result is that the message embedded in the audio is not damaged even though compression, cutting, and some of the processes carried out in the audio have been carried out.
Keywords
Article Details
Copyright (c) 2025 Permadi Kusuma, Yudi Prayudi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).
PLAGIARISM CHECK
All manuscripts submitted to AJIE will be checked free of plagiarism elements. Manuscripts that do not meet the requirements will be returned to the author for further correction or will be rejected immediately.
The plagiarism check used by AJIE is Turnitin.
References
- Achmady, S., & Qadriah, L. (2020). Optimalisasi steganografi audio untuk pengamanan informasi. Science of the Total Environment, 9(1), 1–10.
- Darwis, D. (2015). Implementasi Steganografi pada Berkas Audio Wav untuk Penyisipan Pesan Gambar Menggunakan Metode Low Bit Coding. EXPERT: Jurnal Manajemen Sistem Informasi dan Teknologi, 5(1). https://doi.org/10.36448/jmsit.v5i1.715
- El Rezen Purba, D., & Desinta Purba. (2021). Text Insertion by Utilizing Masking-Filtering Algorithms as Part of Text Message Security. Jurnal Info Sains: Informatika dan Sains, 11(1), 1–4. https://doi.org/10.54209/infosains.v11i1.18
- Fitriyah, N. Q., & Prayudi, Y. Y. (2017). Implementasi Steganografi Audio File Wav Dengan Metode Discrete Cosine Transform (DCT). Prosiding SENSEI, 1(1), 144–153.
- Gallagher, S. (2012). Steganography: How al-Qaeda hid secret documents in a porn video. Ars Technica. https://arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video
- Laksono, A. W., Suhada, S., & Zakaria, A. (2024). Implementasi Metode Least Significant Bit (Lsb) Dalam Teknik Steganografi Pada Citra Digital Menggunakan Matlab. 4(1).
- Nugraha, R. M. (2011). Implementasi Direct Sequence Spread Spectrum Steganography pada Data Audio. Transform.
- Rohayah, S. (2022). Implementasi Teknik Steganography Pada File Gambar Dan Audio Dengan Menggunakan Metode LSB. OKTAL: Jurnal Ilmu Komputer dan Science, 2(2), 496–503.
- Ro’isa, F., & Suartana, I. M. (2019). Implementasi Steganografi dengan Menggunakan Metode Masking and Filtering untuk Menyisipkan Gambar ke dalam Citra Digital. Journal of Informatics and Computer Science (JINACS), 1(01), 9–15. https://doi.org/10.26740/jinacs.v1n01.p9-15
- Santoso, S., Arisman, A., & Sentanu, W. (2016). Steganografi Audio (Wav) Menggunakan Metode Lsb (Least Significant Bit). CCIT Journal, 9(2), 214–224. https://doi.org/10.33050/ccit.v9i2.500
- Yuniati, T. (2023). Implementasi audio steganografi menggunakan algoritma discrete cosine transform. Jurnal Teknoinfo, 17(1), 10. https://doi.org/10.33365/jti.v17i1.2232
References
Achmady, S., & Qadriah, L. (2020). Optimalisasi steganografi audio untuk pengamanan informasi. Science of the Total Environment, 9(1), 1–10.
Darwis, D. (2015). Implementasi Steganografi pada Berkas Audio Wav untuk Penyisipan Pesan Gambar Menggunakan Metode Low Bit Coding. EXPERT: Jurnal Manajemen Sistem Informasi dan Teknologi, 5(1). https://doi.org/10.36448/jmsit.v5i1.715
El Rezen Purba, D., & Desinta Purba. (2021). Text Insertion by Utilizing Masking-Filtering Algorithms as Part of Text Message Security. Jurnal Info Sains: Informatika dan Sains, 11(1), 1–4. https://doi.org/10.54209/infosains.v11i1.18
Fitriyah, N. Q., & Prayudi, Y. Y. (2017). Implementasi Steganografi Audio File Wav Dengan Metode Discrete Cosine Transform (DCT). Prosiding SENSEI, 1(1), 144–153.
Gallagher, S. (2012). Steganography: How al-Qaeda hid secret documents in a porn video. Ars Technica. https://arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video
Laksono, A. W., Suhada, S., & Zakaria, A. (2024). Implementasi Metode Least Significant Bit (Lsb) Dalam Teknik Steganografi Pada Citra Digital Menggunakan Matlab. 4(1).
Nugraha, R. M. (2011). Implementasi Direct Sequence Spread Spectrum Steganography pada Data Audio. Transform.
Rohayah, S. (2022). Implementasi Teknik Steganography Pada File Gambar Dan Audio Dengan Menggunakan Metode LSB. OKTAL: Jurnal Ilmu Komputer dan Science, 2(2), 496–503.
Ro’isa, F., & Suartana, I. M. (2019). Implementasi Steganografi dengan Menggunakan Metode Masking and Filtering untuk Menyisipkan Gambar ke dalam Citra Digital. Journal of Informatics and Computer Science (JINACS), 1(01), 9–15. https://doi.org/10.26740/jinacs.v1n01.p9-15
Santoso, S., Arisman, A., & Sentanu, W. (2016). Steganografi Audio (Wav) Menggunakan Metode Lsb (Least Significant Bit). CCIT Journal, 9(2), 214–224. https://doi.org/10.33050/ccit.v9i2.500
Yuniati, T. (2023). Implementasi audio steganografi menggunakan algoritma discrete cosine transform. Jurnal Teknoinfo, 17(1), 10. https://doi.org/10.33365/jti.v17i1.2232