Open Access Open Access  Restricted Access Subscription or Fee Access

Fuzzy Logic and the Greatest Common Divisor on Audio-Based Data Hiding Method


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/iremos.v15i3.22235

Abstract


With the massive development of information technology, all data cannot be assumed to be safe from illegal parties. Data can have a very high vulnerability to being accessed by the public, even if the data are private or confidential. In order to overcome this problem, it is necessary to have a method to hide confidential data or information that others should not know. Many methods introduced have not overcome common problems in data hiding, namely the low quality produced after the embedding process. This study summarizes the problems and proposes a method that focuses on improving the quality of stego-audio files by developing a fuzzification method using Fuzzy Logic and the Greatest Common Divisor (GCD) to produce better audio quality. The final result shows that the stego-audio quality improves as evaluated using a Peak Signal-to-Noise Ratio (PSNR) without additional steps such as smoothing or payload distribution.
Copyright © 2022 Praise Worthy Prize - All rights reserved.

Keywords


Data Hiding; Information Security; Infrastructure; Fuzzy Logic

Full Text:

PDF


References


S. Sravani and R. Ranjith, Image Steganography For Confidential Data Communication, 12th International Conference on Computing Communication and Networking Technologies, pp. 01-05, Kharagpur, India, July 2021.
https://doi.org/10.1109/ICCCNT51525.2021.9579814

Shidik, G., Kusuma, E., Nuraisha, S., Andono, P., Heuristic vs Metaheuristic Method: Improvement of Spoofed Fingerprint Identification in IoT Devices, (2019) International Review on Modelling and Simulations (IREMOS), 12 (3), pp. 168-175.
https://doi.org/10.15866/iremos.v12i3.17330

Fan, W., Liao, Y., Power System NERC Reliability Compliance Study and Violation Mitigation, (2020) International Review on Modelling and Simulations (IREMOS), 13 (1), pp. 33-42.
https://doi.org/10.15866/iremos.v13i1.17204

N. Manohar and P. V. Kumar, Data Encryption Decryption Using Steganography, Int. Conf. Intell. Comput. Control Syst., pp. 697-702, Madurai, India, June 2020.
https://doi.org/10.1109/ICICCS48265.2020.9120935

S. Ilasariya, P. Patel, V. Patel, and S. Gharat, Image Steganography Using Blowfish Algorithm and Transmission via Apache Kafka, 4th International Conference on Smart Systems and Inventive Technology, pp. 1320-1325, Tirunelveli, India, February 2022.
https://doi.org/10.1109/ICSSIT53264.2022.9716292

A. Bobeica, I. C. Dragoi, I. Caciula, D. Coltuc, F. Albu, and F. Yang, Capacity control for prediction error expansion based audio reversible data hiding, 22nd Int. Conf. Syst. Theory, Control Comput., pp. 810-815, Sinaia, Romania, November 2018.
https://doi.org/10.1109/ICSTCC.2018.8540672

R. Setiawan and T. Ahmad, Improving the Capacity of Data Hiding by Modifying the Interpolation of Audio Samples, 8th Int. Conf. Inf. Commun. Technol., pp. 7-12, Yogyakarta, Indonesia, August 2020.
https://doi.org/10.1109/ICoICT49345.2020.9166336

A. Hussain Ali, M. Mohd Rosmadi Mokhtar, and L. George, Research article A Review on Audio Steganography Techniques, Res. J. Appl. Sci. Eng. Technol., Vol. 12(Issue 2):154-162, 2016.
https://doi.org/10.19026/rjaset.12.2316

T. Sarkar and S. Sanyal, Reversible and Irreversible Data Hiding Technique, arXiv:1405.2684v2, May 2014, [Online].
Available: http://arxiv.org/abs/1405.2684

T. Ahmad, J. N. Faruki, R. M. Ijtihadie, and W. Wibisono, Analyzing the effect of block size on the quality of the stego audio, 5th Int. Conf. Sci. Technol., pp. 1-6, Yogyakarta, Indonesia, July 2019.
https://doi.org/10.1109/ICST47872.2019.9166403

R. Indrayani, Modified LSB on Audio Steganography using WAV Format, 3rd International Conference on Information and Communications Technology, pp. 466-470, Yogyakarta, Indonesia, November 2020.
https://doi.org/10.1109/ICOIACT50329.2020.9332132

D. Tran, H.-J. Zepernick, and T. Chu, LSB Data Hiding in Digital Media: A Survey, EAI Endorsed Trans. Ind. Networks Intell. Syst., Vol. 9(Issue 30):1-50, April 2022.
https://doi.org/10.4108/eai.5-4-2022.173783

H. A. Abdulkadhim and J. N. Shehab, Audio steganography based on least significant bits algorithm with 4D grid multi-wing hyper-chaotic system, Int. J. Electr. Comput. Eng., Vol. 12,(Issue 1):320-330, 2022.
https://doi.org/10.11591/ijece.v12i1.pp320-330

K. Amarendra, V. N. Mandhala, B. C. Gupta, G. G. Sudheshna, and V. V. Anusha, Image steganography using LSB, Int. J. Sci. Technol. Res., Vol. 8(Issue 12):906-909, December 2019.

Z. S. Younus and G. T. Younus, Video steganography using knight tour algorithm and LSB method for encrypted data, J. Intell. Syst., Vol. 29(Issue 1):1216-1225, 2020.
https://doi.org/10.1515/jisys-2018-0225

K. H. Jung and K. Y. Yoo, Steganographic method based on interpolation and LSB substitution of digital images, Multimed. Tools Appl., Vol. 74(Issue 6):2143-2155, March 2015.
https://doi.org/10.1007/s11042-013-1832-y

M. M. Amrulloh and T. Ahmad, Minimizing Sample Space to Optimize Quality of Stego-Audio, Int. J. Intell. Eng. Syst., Vol. 15(Issue 3):205-214, 2022.
https://doi.org/10.22266/ijies2022.0630.17

F. A. Adhiyaksa, T. Ahmad, A. M. Shiddiqi, B. Jati Santoso, H. Studiawan, and B. A. Pratomo, Reversible Audio Steganography using Least Prime Factor and Audio Interpolation, International Seminar on Machine Learning, Optimization, and Data Science, pp. 97-102, Jakarta, Indonesia, January 2022.
https://doi.org/10.1109/ISMODE53584.2022.9743066

Y. Samudra and T. Ahmad, Mirroring-Based Data Hiding in Audio, Int. J. Intell. Eng. Syst., Vol. 14(Issue 5):550-558, October 2021.
https://doi.org/10.22266/ijies2021.1031.48

M. M. Amrulloh and T. Ahmad, Utilizing fuzzy logic in developing reversible data hiding method, Int. J. Intell. Eng. Syst., Vol. 13(Issue 5):327-336, 2020.
https://doi.org/10.22266/ijies2020.1031.30

F. A. Adhiyaksa, M. M. Amrulloh, T. Mustaqim, H. Tsaniya, H. Studiawan, and A. M. Shiddiqi, Reversible Audio Data Hiding using Samples Greatest Common Factor and Audio Interpolation, IEEE 12th Annual Computing and Communication Workshop and Conference, pp. 0659-0666, Las Vegas, NV, USA, January 2022.
https://doi.org/10.1109/CCWC54503.2022.9720763

IRMAS: a dataset for instrument recognition in musical audio signals, [Online- accessed Oct. 24, 2021].
Available: https://www.upf.edu/web/mtg/irmas/

K. Sharma and K. Gupta, Lossless data compression techniques and their performance, IEEE Int. Conf. Comput. Commun. Autom., pp. 256-261, Greater Noida, India, May 2017.
https://doi.org/10.1109/CCAA.2017.8229810

Lorem Ipsum, [Online-accessed Oct. 24, 2021].
Available: www.id.lipsum.com

S. S. Yadahalli, S. Rege, and R. Sonkusare, Implementation and analysis of image steganography using least significant bit and discrete wavelet transform techniques, 5th Int. Conf. Commun. Electron. Syst., pp. 1325-1330, Coimbatore, India, June 2020.
https://doi.org/10.1109/ICCES48766.2020.9137887

Bani Salameh, J., Al Tarawneh, M., A Secure Exchange Technique for Secret Information and Encryption Key Using Hybrid System, (2019) International Journal on Communications Antenna and Propagation (IRECAP), 9 (1), pp. 19-29.
https://doi.org/10.15866/irecap.v9i1.16115

Mowafi, M., Al-Omari, F., Kasasbeh, D., Data Hiding in Color Images Using Huffman Coding and Histogram Modification, (2019) International Journal on Communications Antenna and Propagation (IRECAP), 9 (1), pp. 68-73.
https://doi.org/10.15866/irecap.v9i1.15668


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize