Analysis Of The Utilization Of Echo Hiding Algorithm In Hiding Secret Messages

##plugins.themes.academic_pro.article.main##

Cahaya Elyzabeth Pangaribuan
Ogy Kevinta Surbakti
Fera Sihotang
Yosafat Tamba
Yordan Daniel Ndruru
Paskah Marto Hasugian

Abstract

Steganography is a technique of hiding information in other media to maintain the confidentiality of the message. One of the challenges in steganography is finding a method that can insert data without being detected while maintaining the quality of the original media. This study discusses the application of the Echo Hiding algorithm in audio steganography, which utilizes acoustic properties to insert information into sound signals. The main objective of this study is to analyze the effectiveness and security of the Echo Hiding algorithm in hiding data in audio signals. To achieve this goal, this study uses a digital signal processing method, which includes the stages of message insertion, hidden message extraction, and audio quality evaluation using objective and subjective parameters. Testing was carried out with various scenarios to assess the capacity of insertion, resistance to attacks, and changes in sound quality. The results showed that the Echo Hiding algorithm was able to store information efficiently with little impact on audio quality. Signal analysis showed that the modifications made were not significant to the listener's perception, thus increasing the security and transparency aspects in audio steganography. Thus, this study contributes to the development of a safe and effective steganography method to maintain the confidentiality of information in sound media.

##plugins.themes.academic_pro.article.details##

How to Cite
Pangaribuan, C. E., Ogy Kevinta Surbakti, Fera Sihotang, Yosafat Tamba, Yordan Daniel Ndruru, & Paskah Marto Hasugian. (2024). Analysis Of The Utilization Of Echo Hiding Algorithm In Hiding Secret Messages. Login : Jurnal Teknologi Komputer, 18(01), 18-23. https://doi.org/10.58471/login.v18i01.108

References

Al Ihsan, R., & Sekti, B. A. (2024). Pentingnya Keamanan Data Dalam Era Digital: Refleksi Terhadap Serangan Hacker Pada Pusat Data Nasional Indonesia. Prosiding SISFOTEK, 8(1), 7–11.
Albantany, A. Q. (2021). Text Steganography Pada Media Audio Format M4A Dengan Menggunakan Metode Least Significant Bit. Universitas Islam Negeri Sumatera Utara.
Andika, D., & Darwis, D. (2020). Modifikasi Algoritma Gifshuffle Untuk Peningkatan Kualitas Citra Pada Steganografi. Jurnal Ilmiah Infrastruktur Teknologi Informasi, 1(2), 19–23.
Baso, F., Rais, N. A., Hatima, H., & Nur, P. A. A. (2024). Steganografi Berbasis Kecerdasan Buatan untuk Mengatasi Ancaman Terbaru dalam Keamanan Data. Jurnal MediaTIK, 145–149.
Octaviany, A. S., Suprayogi, S., & Fitriani, N. (2021). Optimasi Geometri Bahan Peredam Untuk Ruang Anti Gema Suara. EProceedings of Engineering, 8(5).
Permana, D. A., Fauzi, R., & Mulyana, R. (2021). Perancangan Tata Kelola Teknologi Informasi untuk Transformasi Digital di Industri Perbankan Menggunakan Framework COBIT 2019 Domain Align, Plan, and Organise: Studi Kasus di Bank XYZ. EProceedings of Engineering, 8(5).
Purba, Y. S., Budiman, G., & Ramatryana, I. N. A. (2016). Audio Watermarking Dengan Metode Discrete Wavelet Transform Dan Echo Hiding Pada Ambient Mode. EProceedings of Engineering, 3(3).
Rumahorbo, B., & Perangin-angin, R. (2021). OPTIMASI KETAHANAN WATERMARKING AUDIO DIGITAL MENGGUNAKAN ALGORITMA RSA DAN MSB. METHODIKA: Jurnal Teknik Informatika Dan Sistem Informasi, 7(1), 45–49.
Widianto, S. R. (2017). Algoritma Steganografi dengan Metode Spread Spectrum Berbasis PCMK. Jurnal Multinetics, 3(2), 32–37.
Wulansari, T., Putra, A., Rusliah, N., & Habibi, M. (2019). Pengaruh model pembelajaran berbasis masalah pada materi statistika terhadap kemampuan penalaran statistik siswa. AKSIOMA: Jurnal Matematika Dan Pendidikan Matematika, 10(1), 35–47.
Yel, M. B., & Nasution, M. K. M. (2022). Keamanan informasi data pribadi pada media sosial. Jurnal Informatika Kaputama (JIK), 6(1), 92–101.
Zen Munawar, S. T., Kom, S., Kom, M., Putri, N. I., Kharisma, I. L., Kom, M., Insany, G. P., ST, S., Kom, M., & Nurhadi, S. (2023). Keamanan Sistem Informasi: Prinsip Dasar, Teori, dan Rekayasa Penerapan Konsep. Kaizen Media Publishing.