Main Article Content

Ray Sanjaya Gulo
Reni Lusiana Simangunsong
Stephen Boy Kristian Tafonao
Muhammad Yusuf
Yennimar Yennimar

Abstract

The transmission of information from one place to another is mostly constrained by the security problems of the information itself. Moreover, this information is very confidential, so not just anyone can open it. One of the ways that can be done to hide confidential information is by using cryptographic techniques, namely by encoding the information using certain algorithms. The second way is to insert the information into certain media, such as digital images or audio, so that the information will be hidden and what will appear is the media only, while the information is disguised. In this study, the comparison of the Spread Spectrum steganography algorithm with the Redundant Pattern Coding algorithm to secure text messages in audio files. The data used are audio files with a size between 200 Kb to 265 Kb and text with a size of 50 bytes to 275 bytes. The experimental results obtained stego audio files from the insertion of the Spread Spectrum algorithm with an average PSNR value of 41,138 db and for the Redundant Pattern Coding algorithm the average PSNR value was 29,885 db.

Downloads

Download data is not yet available.

Article Details

How to Cite
Gulo, R. S., Simangunsong, R. L., Tafonao, S. B. K., Yusuf, M. and Yennimar, Y. (2020) “Comparison of Spread Spectrum with Redundant Pattern Coding In Securing Text Messages Into Audio: Comparison of Spread Spectrum with Redundant Pattern Coding In Securing Text Messages Into Audio”, Jurnal Mantik, 4(2), pp. 1237-1242. doi: 10.35335/mantik.Vol4.2020.928.pp1237-1242.
References
[1] Amalia, R. & Rosyani, P. 2018. Implementasi Algoritma AES Dan Algoritma Xor Pada Aplikasi Pengamanan Teks Berbasis Mobile. Jurnal Faktor Exacta 11 (4): 369-378, 2018 p-ISSN: 1979-276X e- ISSN: 2502-339X. Program Studi Teknik Informatika Fakultas Teknik, Universitas Pamulang.
[2] Bhuiyan, T., Sarower, A. H. & Karim, R. 2019. An Image Steganography Algorithm using LSB Replacement through XOR Substitution. 2019 International Conference on Information and Communications Technology (ICOIACT).
[3] Firdaus, V. A. H., Mustofa, A., & Aswin, M. 2015. Studi Dan Implementasi Steganografi Pada File Audio Dengan Teknik Spread Spectrum. Jurnal Teknik Elektro Univ. Brawijaya.
[4] Johri, P & Mishra, A. 2016. Survey on Steganography Methods (Text, Image, Audio, Video, Protocok and Network Steganography). International Conference on Computing for Sustainable Global Development (INDIACom) 2016 IEEE.
[5] Kurniawan, A. K. A. 2016. Digital Watermarking pada Gambar Digital dengan Metode Redundant Pattern Encoding. Jurnal Program Studi Teknik Informatika 2016.
[6] Mstafa, R. J. & Elleithy, K. M. 2016. A DCT-based Robust Video Steganographic Method Using BCH Error Correcting Codes. Journal IEEE. IEEE Student Member Department of Computer Science and Engineering University of Bridgeport, CT 6604, USA.
[7] Widianto, S. R. 2017. Algoritma Steganografi dengan Metode Spread Spectrum Berbasis PCMK. Jurnal Multinetics Vol. 3 NO. 2 Nopember 2017.
[8] Suhendrik. 2014. Perancangan Aplikasi Steganografi File Audio Menggunakan Metode Redundant Pattern Coding. Pelita Informatika Budi Darma, Vol. VIII NO. 3333, Desember 2014.
[9] Noercholis Achmad & Nugraha Yohanes. 2016. Pengamanan Pesan Teks Menggunakan Teknik steganografi Spread Spectrum Berbasis Android. Jurnal Antivirus, Vol. 10 No. 1 Mei 2016. Teknik Informatika STIMIK Asia Malang.
[10] Aksani Luthfi M. & Manurung Fredrik Ignatius. 2017. Studi Dan Implementasi Steganografi Pada Citra JPEG Dengan Metode Spread Spectrum. Jurnal Teknik Informatika (JIKA) Universitas Muhammadiyah Tangerang.
[11] Sannawira Fikri Rahmandhita & Purnomo Sidiq Agus. 2016. Penyisipan Citra Pesan Ke Dalam Citra Berwarna Menggunakan Metode Least Significant Bit dan Redundant Pattern Encoding. Informatics Journal Vol 1 NO 1 (2016).
[12] Sihombing, Oloan, Niskarto Zendrato, Yonata Laia, Marlince Nababan, Delima Sitanggang, Windania Purba, Diarmansyah Batubara, Siti Aisyah, Evta Indra, and Saut Siregar. "Smart home design for electronic devices monitoring based wireless gateway network using cisco packet tracer." JPhCS 1007, no. 1 (2018): 012021.
[13] Siregar, S. D., Banjarnahor, J., Dharshinni, N. P., & Tamba, S. P. (2019, July). Understanding group signature methods in making digital signatures to maintain the validity of messages. In Journal of Physics: Conference Series (Vol. 1230, No. 1, p. 012072). IOP Publishing.
[14] Banjarnahor, J., Siregar, S. D., Sihombing, O., Turnip, M., Purba, W., Aisyah, S., & Banjarnahor, J. (2019, July). Audio steganography applications using auditory features watermarking. In Journal of Physics: Conference Series (Vol. 1230, No. 1, p. 012073). IOP Publishing.