Claim Missing Document
Check
Articles

Found 3 Documents
Search
Journal : Bulletin of Electrical Engineering and Informatics

The evaluation performance of letter-based technique on text steganography system Roshidi Din; Rosmadi Bakar; Sunariya Utama; Jamaluddin Jasmis; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (522.055 KB) | DOI: 10.11591/eei.v8i1.1440

Abstract

Steganography is a part of information hiding in covering the hidden message in any medium such as text, image, audio, video and others. This paper concerns about the implementation of steganography in text domain called text steganography. It intends to concentrate on letter-based technique as one of the representative techniques in text steganography. This paper displays some techniques of letter-based that is integrated in one system technique displayeed in a logical and physical design. The integrated system is evaluated using some parameter that is used in order to discover the performance in term of capacity after embedding process and the time consuming in the development process. This paper is anticipated to contribute in describing the implementation of the techniques in one system and to display the performance some parameter evaluation.
Performance analysis on secured data method in natural language steganography Roshidi Din; Rosmadi Bakar; Raihan Sabirah Sabri; Mohamad Yusof Darus; Shamsul Jamel Elias
Bulletin of Electrical Engineering and Informatics Vol 8, No 1: March 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (791.722 KB) | DOI: 10.11591/eei.v8i1.1441

Abstract

The rapid amount of exchange information that causes the expansion of the internet during the last decade has motivated that a research in this field.  Recently, steganography approaches have received an unexpected attention. Hence, the aim of this paper is to review different performance metric; covering the decoding, decrypting and extracting performance metric. The process of data decoding interprets the received hidden message into a code word. As such, data encryption is the best way to provide a secure communication. Decrypting take an encrypted text and converting it back into an original text. Data extracting is a process which is the reverse of the data embedding process. The effectiveness evaluation is mainly determined by the performance metric aspect. The intention of researchers is to improve performance metric characteristics. The evaluation success is mainly determined by the performance analysis aspect.  The objective of this paper is to present a review on the study of steganography in natural language based on the criteria of the performance analysis. The findings review will clarify the preferred performance metric aspects used. This review is hoped to help future research in evaluating the performance analysis of natural language in general and the proposed secured data revealed on natural language steganography in specific.
Steganography analysis techniques applied to audio and image files Roshidi Din; Alaa Jabbar Qasim
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (214.361 KB) | DOI: 10.11591/eei.v8i4.1626

Abstract

The present work carries out a descriptive analysis of the main steganography techniques used in specific digital media such as audio and image files. For this purpose, a literary review of the domains, methods, and techniques as part of this set was carried out and their functioning, qualities, and weaknesses are identified. Hence, it is concluded that there is a wide relationship between audio and image steganography techniques in their implementation form. Nevertheless, it is determined that LSB is one of the weakest techniques, but the safest and the most robust technique within each type of the presented medium.