Main Article Content

Abstract

When sending a message to a specific party and do not want the message to be known by other parties, it is important to avoid information leakage. However, the problem identified is that there is a lack of knowledge to detect audio Ste-ganography which requires technical methods that can read and view secret messages. One method that can be used in steganography is Masking and Filtering. Masking as a media marker on audio that can insert messages. Filtering gives value to the parts that have been given a mark.  This method is one that is often used because it is simple, fast in the data insertion process, and has a large enough storage capacity. The Masking and Filtering method is able to hide messages by inserting them into the audio Spectrogram as a storage medium. The filter is used to ensure that the hidden message is within the previously analyzed frequency range, thus making humans unable to clearly hear the additional audio that has been inserted which is the hidden message.  After the insertion is complete, the audio file is saved, and tests are performed to ensure that the audio quality is not compromised, and the hidden message remains undetected such as making modifications to the stego file to test the robustness and security of the hidden message. Based on research, steganography is difficult to detect by the naked eye, to retrieve messages that have been hidden, it can be done by displaying an audio Spectrogram that contains a secret message. How to see the hidden message using the Audacity application that can see sound waves. The result is that the message embedded in the audio is not damaged even though compression, cutting, and some of the processes carried out in the audio have been carried out.

Keywords

Masking and Filtering Spectrogram Steganografi Audio

Article Details

References

  1. Achmady, S., & Qadriah, L. (2020). Optimalisasi steganografi audio untuk pengamanan informasi. Science of the Total Environment, 9(1), 1–10.
  2. Darwis, D. (2015). Implementasi Steganografi pada Berkas Audio Wav untuk Penyisipan Pesan Gambar Menggunakan Metode Low Bit Coding. EXPERT: Jurnal Manajemen Sistem Informasi dan Teknologi, 5(1). https://doi.org/10.36448/jmsit.v5i1.715
  3. El Rezen Purba, D., & Desinta Purba. (2021). Text Insertion by Utilizing Masking-Filtering Algorithms as Part of Text Message Security. Jurnal Info Sains: Informatika dan Sains, 11(1), 1–4. https://doi.org/10.54209/infosains.v11i1.18
  4. Fitriyah, N. Q., & Prayudi, Y. Y. (2017). Implementasi Steganografi Audio File Wav Dengan Metode Discrete Cosine Transform (DCT). Prosiding SENSEI, 1(1), 144–153.
  5. Gallagher, S. (2012). Steganography: How al-Qaeda hid secret documents in a porn video. Ars Technica. https://arstechnica.com/information-technology/2012/05/steganography-how-al-qaeda-hid-secret-documents-in-a-porn-video
  6. Laksono, A. W., Suhada, S., & Zakaria, A. (2024). Implementasi Metode Least Significant Bit (Lsb) Dalam Teknik Steganografi Pada Citra Digital Menggunakan Matlab. 4(1).
  7. Nugraha, R. M. (2011). Implementasi Direct Sequence Spread Spectrum Steganography pada Data Audio. Transform.
  8. Rohayah, S. (2022). Implementasi Teknik Steganography Pada File Gambar Dan Audio Dengan Menggunakan Metode LSB. OKTAL: Jurnal Ilmu Komputer dan Science, 2(2), 496–503.
  9. Ro’isa, F., & Suartana, I. M. (2019). Implementasi Steganografi dengan Menggunakan Metode Masking and Filtering untuk Menyisipkan Gambar ke dalam Citra Digital. Journal of Informatics and Computer Science (JINACS), 1(01), 9–15. https://doi.org/10.26740/jinacs.v1n01.p9-15
  10. Santoso, S., Arisman, A., & Sentanu, W. (2016). Steganografi Audio (Wav) Menggunakan Metode Lsb (Least Significant Bit). CCIT Journal, 9(2), 214–224. https://doi.org/10.33050/ccit.v9i2.500
  11. Yuniati, T. (2023). Implementasi audio steganografi menggunakan algoritma discrete cosine transform. Jurnal Teknoinfo, 17(1), 10. https://doi.org/10.33365/jti.v17i1.2232