Please use this identifier to cite or link to this item:
http://repository.ipb.ac.id/handle/123456789/50043
Title: | Steganografi Video Dengan Menggunakan Metode Discrete Cosine Transform (DCT) |
Authors: | Rachmaniah, Meuthia Qadarisman, Aditya Yuda |
Issue Date: | 2011 |
Publisher: | IPB (Bogor Agricultural University) |
Abstract: | Information security nowadays has become a very important thing to note. A lot of confidential information such as personal data, financial data, and even state secrets confidential data needs to be protected so it cannot be misused by other people who are not authorized to do so. There are various methods to protect certain information, such as with cryptography and steganography. Cryptography change the original message into a meaningless message. This is important because with meaningless message, an unauthorized person can not know the contents of the message. But with the message is not meaningful, people would suspect that there is a hidden secret information inside the message and will try to break it. Therefore, this suspicion must be avoided and a suitable method to avoid suspicion is steganography which disguise a message so that its presence is not recognized by the other people. This research is about steganography applied in video using DCT method. Basically this method is modifying the DC coefficient bits in each byte of cover file. Text messages was inserted into video of .avi type format and then the message was retrieved from the video file. From the test results, it can be proved that the DCT method can be implemented in a video steganography. This method can qualify most criteria of steganography such as imperceptible, fidelity and recovery but not yet qualify the criteria of robustness. Nevertheless, there is still plenty of space that can be used in conducting the development of video steganography using DCT. |
URI: | http://repository.ipb.ac.id/handle/123456789/50043 |
Appears in Collections: | UT - Computer Science |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G11ayq.pdf Restricted Access | Full Text | 2.92 MB | Adobe PDF | View/Open |
Abstract_ G11ayq.pdf Restricted Access | Abstract | 353.54 kB | Adobe PDF | View/Open |
BAB I Pendahuluan_ G11ayq.pdf Restricted Access | BAB I | 375.51 kB | Adobe PDF | View/Open |
BAB II Tinjauan Pustaka_ G11ayq.pdf Restricted Access | BAB II | 473.27 kB | Adobe PDF | View/Open |
BAB III Metode Penelitian_ G11ayq.pdf Restricted Access | BAB III | 434.06 kB | Adobe PDF | View/Open |
BAB IV Hasil dan Pembahasan_ G11ayq.pdf Restricted Access | BAB IV | 609.36 kB | Adobe PDF | View/Open |
BAB V Simpulan_ G11ayq.pdf Restricted Access | BAB V | 439.35 kB | Adobe PDF | View/Open |
Cover_ G11ayq.pdf Restricted Access | Cover | 368.51 kB | Adobe PDF | View/Open |
Daftar Pustaka_ G11ayq.pdf Restricted Access | Daftar Pustaka | 362.76 kB | Adobe PDF | View/Open |
Lampiran_G11ayq.pdf Restricted Access | Lampiran | 2.58 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.