Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery
Journal Title: EMITTER International Journal of Engineering Technology - Year 2013, Vol 1, Issue 1
Abstract
In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .
Authors and Affiliations
Afany Zeinata Firdaus, Mike Yuliana, Mochamman Zen Samsono Hadi
An Augmented Reality Application for the Community Learning about the Risk of Earthquake in a Multi-storey Building Area
Area surrounding tower is a danger area when earthquake attack. It has an enermous risk. People in this area have to know the risk for their safety. Socialization, simulation, and learning media need to be provided conti...
Semantic Songket Image Search with Cultural Computing of Symbolic Meaning Extraction and Analytical Aggregation of Color and Shape Features
The term "Songket" comes from the Malay word "Sungkit", which means "to hook" or "to gouge". Every motifs names and variations was derived from plants and animals as source of inspiration to create many patterns of songk...
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management
Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information abo...
Determination of Nearest Emergency Service Office using Haversine Formula Based on Android Platform
Emergency Reporting Application is an Android-based application that serves to help the community in reporting the emergency condition. This application allows users to choose and contact the emergency services office, w...
Performance Analysis of CP-Based and CAZAC Training Sequence-Based Synchronization in OFDM System
Orthogonal Frequency Division Multiplexing (OFDM) is a popular wireless data transmission scheme. However, its synchronization is still being a major problem when it is applied in real hardware. Cyclic Prefix (CP) based...