Claim Missing Document
Check
Articles

Found 4 Documents
Search

Analysis Of The Utilization Of Echo Hiding Algorithm In Hiding Secret Messages Pangaribuan, Cahaya Elyzabeth; Ogy Kevinta Surbakti; Fera Sihotang; Yosafat Tamba; Yordan Daniel Ndruru; Paskah Marto Hasugian
Login : Jurnal Teknologi Komputer Vol. 18 No. 01 (2024): Jurnal Teknologi Komputer, Edition June 2024
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/login.v18i01.108

Abstract

Steganography is a technique of hiding information in other media to maintain the confidentiality of the message. One of the challenges in steganography is finding a method that can insert data without being detected while maintaining the quality of the original media. This study discusses the application of the Echo Hiding algorithm in audio steganography, which utilizes acoustic properties to insert information into sound signals. The main objective of this study is to analyze the effectiveness and security of the Echo Hiding algorithm in hiding data in audio signals. To achieve this goal, this study uses a digital signal processing method, which includes the stages of message insertion, hidden message extraction, and audio quality evaluation using objective and subjective parameters. Testing was carried out with various scenarios to assess the capacity of insertion, resistance to attacks, and changes in sound quality. The results showed that the Echo Hiding algorithm was able to store information efficiently with little impact on audio quality. Signal analysis showed that the modifications made were not significant to the listener's perception, thus increasing the security and transparency aspects in audio steganography. Thus, this study contributes to the development of a safe and effective steganography method to maintain the confidentiality of information in sound media.
Analysis Of The Utilization Of Echo Hiding Algorithm In Hiding Secret Messages Pangaribuan, Cahaya Elyzabeth; Ogy Kevinta Surbakti; Fera Sihotang; Yosafat Tamba; Yordan Daniel Ndruru; Paskah Marto Hasugian
Login : Jurnal Teknologi Komputer Vol. 18 No. 01 (2024): Jurnal Teknologi Komputer, Edition June 2024
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/login.v18i01.108

Abstract

Steganography is a technique of hiding information in other media to maintain the confidentiality of the message. One of the challenges in steganography is finding a method that can insert data without being detected while maintaining the quality of the original media. This study discusses the application of the Echo Hiding algorithm in audio steganography, which utilizes acoustic properties to insert information into sound signals. The main objective of this study is to analyze the effectiveness and security of the Echo Hiding algorithm in hiding data in audio signals. To achieve this goal, this study uses a digital signal processing method, which includes the stages of message insertion, hidden message extraction, and audio quality evaluation using objective and subjective parameters. Testing was carried out with various scenarios to assess the capacity of insertion, resistance to attacks, and changes in sound quality. The results showed that the Echo Hiding algorithm was able to store information efficiently with little impact on audio quality. Signal analysis showed that the modifications made were not significant to the listener's perception, thus increasing the security and transparency aspects in audio steganography. Thus, this study contributes to the development of a safe and effective steganography method to maintain the confidentiality of information in sound media.
Cryptography with the Ring-LWE (Learning With Errors) Algorithm Hesty Sitohang; Roy Untung Pratama Saing; Agnes Selaras Osabela Sarahono; Joy Sofater Purba; Petrus Tebai; Paskah Marto Hasugian
Jurnal Teknik Indonesia Vol. 3 No. 01 (2024): Jurnal Teknik Indonesia (JU-TI), June 2024
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.58471/ju-ti.v3i01.653

Abstract

Ring-LWE (Ring Learning With Errors) is a post-quantum cryptography algorithm based on mathematical problems in number theory and algebra. It is an extension of LWE (Learning With Errors) first introduced by Oded Regev and is used for secure data encryption from quantum computer attacks. The process consists of three main steps: key generation, encryption, and decryption. Key generation uses random polynomials and noise to create public and private keys. While encryption produces ciphertext in the form of polynomial pairs, decryption uses the private key to return the ciphertext to the original message. To conduct the experiment, the modulus value q = 17, the modulus polynomial f(x) = x2 + 1, and the private key and random polynomial have been determined. The results of the experiment show that the message can be accurately decrypted using the private key, thus proving the success of this algorithm in maintaining data security. With its security properties that are resistant to quantum attacks, Ring-LWE is a promising alternative for future cryptography.
Analysis Of The Utilization Of Echo Hiding Algorithm In Hiding Secret Messages Cahaya Elyzabeth Pangaribuan; Ogy Kevinta Surbakti; Fera Sihotang; Yosafat Tamba; Yordan Daniel Ndruru; Paskah Marto Hasugian
Journal Majelis Paspama Vol. 2 No. 2 (2024): Journal Majelis Paspama, July 2024
Publisher : Journal Majelis Paspama

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Steganography is a technique of hiding information in other media to maintain the confidentiality of the message. One of the challenges in steganography is finding a method that can insert data without being detected while maintaining the quality of the original media. This study discusses the application of the Echo Hiding algorithm in audio steganography, which utilizes acoustic properties to insert information into sound signals. The main objective of this study is to analyze the effectiveness and security of the Echo Hiding algorithm in hiding data in audio signals. To achieve this goal, this study uses a digital signal processing method, which includes the stages of message insertion, hidden message extraction, and audio quality evaluation using objective and subjective parameters. Testing was carried out with various scenarios to assess the capacity of insertion, resistance to attacks, and changes in sound quality. The results showed that the Echo Hiding algorithm was able to store information efficiently with little impact on audio quality. Signal analysis showed that the modifications made were not significant to the listener's perception, thus increasing the security and transparency aspects in audio steganography. Thus, this study contributes to the development of a safe and effective steganography method to maintain the confidentiality of information in sound media.