Implementasi Metode Enhanced Audio Steganogafi (EAS) Untuk Penyembunyian Text Terenkripsi Algoritma Gost
DOI:
https://doi.org/10.30865/klik.v2i1.220Keywords:
Cryptography; Steganography; EAS; Text; Audio; GOSTAbstract
Audio files in the Mp3 format are used as cover media. To be able to insert a secret message into the container media requires a method that can modify the object into a new object with confidential information in it without any noticeable changes from the initial object. The method used in this study is the EAS (Enhanced Audio Steganography) method and to encrypt the message using the GOST algorithm. EAS (Enhanced Audio Steganography) which is a method for inserting an encrypted message first to strengthen a secret message and then inserting it into an audio file. Encryption is done on the message using the GOST algorithm. The GOST method is a block cipher algorithm developed by a Soviet national. GOST is an abbreviation of "Gosudarstvennyi Standard" or "Government Standard". This algorithm is a simple encryption algorithm that has 32 rounds of processes and uses 64 bit block cipher with 256 bit keys. The GOST method also uses 8 different S-Boxes and XOR and Left Circular Shift operations. However, modifying audio file bits sequentially can create huge noise and invite suspicion for others that there is a message embedded in it. The method that is able to reduce the occurrence of noise in audio files after inserting a message is the EAS (Enhanced Audio Steganography) method. The EAS method is a modification of the LSB method. Where in the EAS method, the bytes that are used as containers only selective bytes, that is, the insertion of bits in the storage media is only done in blocks that are 254 or 255 bytes only, so that the storage media will not experience significant damage. The first input message format *. Doc or *. Pdf, will be encrypted using the Gost algorithm, the encryption process begins with input plaintext and key. After the message is encrypted then the embedding process uses the EAS method. Input audio file that will be used as a container, after that the encrypted file will be inserted in the audio file. In the embedding process, a large number of locations are available on the audio file. Audio files that are used as storage media must have a number of bytes worth 254 or 255 which are sufficient to hold the message file.
Downloads
References
T. Zebua, “Pengamanan Data Teks Dengan Kombinasi Cipher Block Chainning dan LSB-1,” , Seminar Nasional Inovasi Dan Informasi .979-458-808-3, 2015.
Fresly,Indah,Awang, "Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokmen Mengunakan Algoritma AES", Jurnal Informatika Mulawarman, 2015.
Budiman, "Aplikasi Steganografi Pada Audio Dengan metode LSB", Bandung, Unikom, 2010.
Akabid, Tarigan, "Implementasi Kebijakan Apa, Mengapa, Dimana", Jurnal administrasi Public, 2010.
S. Aripin dan M. Syahrizal, “Pengaman File Video Menggunakan Algoritma Merkle Hellman Knapsack,” J. MEDIA Inform. BUDIDARMA, vol. 4, no. April, hal. 461–465, 2020, doi: 10.30865/mib.v4i2.2039.
Deni Mahdiana, "analisa Dan Perancangan sitem Informasi Pegadaian Barang dengan Metodologi Berorientasi Objek", jurnal Telematika MKom 2011, sep.2.
Dony Ariyus, & Rum Andri K.R, “Komunikasi Data” Ed.I, Yogyakarta : Andi, 2008, pp. 447–448.
M. K. Emy Setyaningsih, S.Si., “Kriptografi & Implementasinya Menggunakan Matlab,” Jakarta, 2015, pp. 71–132.
irfananas, putraarya, abdul, "Implementasi Algoritma Vigeneere Cipher Dan GOST Dalam Keaman Data", sinkron, 2018, april.
Oos M.Anwas, "Model Buku teks pembelajaran Berbasis Teknologi Informasi dan komunikasi", balitang Kemendikbud, 2016, ap.17.
A. Pulung Nurtantio, " Pengolahan citra Digital", Steganografi, Yogyakarta, 2017 .
Noviyanti, " Pengembangan Aplikasi Live Chat Dengan Menggunakan Webrtc Sebagai Pemanfaatan Teknologi Informasi Dan Komunikasi Untuk Media Pembelajaran Jarak Jauh (E-Learning)"; 2014.
I B Adisimakrisna Peling, N Putra Sastra, " Enhanced Audio Steganografi dengan Algoritma Advanced Encryption Standard Untuk Pengamanan Data Pada File Audio", Majalah Ilmiah dan Teknologi Elektro, 2018, jan-april.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implementasi Metode Enhanced Audio Steganogafi (EAS) Untuk Penyembunyian Text Terenkripsi Algoritma Gost
ARTICLE HISTORY
How to Cite
Issue
Section
Copyright (c) 2021 Selamat G M Siregar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).















