Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/50043
Title: Steganografi Video Dengan Menggunakan Metode Discrete Cosine Transform (DCT)
Authors: Rachmaniah, Meuthia
Qadarisman, Aditya Yuda
Issue Date: 2011
Publisher: IPB (Bogor Agricultural University)
Abstract: Information security nowadays has become a very important thing to note. A lot of confidential information such as personal data, financial data, and even state secrets confidential data needs to be protected so it cannot be misused by other people who are not authorized to do so. There are various methods to protect certain information, such as with cryptography and steganography. Cryptography change the original message into a meaningless message. This is important because with meaningless message, an unauthorized person can not know the contents of the message. But with the message is not meaningful, people would suspect that there is a hidden secret information inside the message and will try to break it. Therefore, this suspicion must be avoided and a suitable method to avoid suspicion is steganography which disguise a message so that its presence is not recognized by the other people. This research is about steganography applied in video using DCT method. Basically this method is modifying the DC coefficient bits in each byte of cover file. Text messages was inserted into video of .avi type format and then the message was retrieved from the video file. From the test results, it can be proved that the DCT method can be implemented in a video steganography. This method can qualify most criteria of steganography such as imperceptible, fidelity and recovery but not yet qualify the criteria of robustness. Nevertheless, there is still plenty of space that can be used in conducting the development of video steganography using DCT.
URI: http://repository.ipb.ac.id/handle/123456789/50043
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
G11ayq.pdf
  Restricted Access
Full Text2.92 MBAdobe PDFView/Open
Abstract_ G11ayq.pdf
  Restricted Access
Abstract353.54 kBAdobe PDFView/Open
BAB I Pendahuluan_ G11ayq.pdf
  Restricted Access
BAB I375.51 kBAdobe PDFView/Open
BAB II Tinjauan Pustaka_ G11ayq.pdf
  Restricted Access
BAB II473.27 kBAdobe PDFView/Open
BAB III Metode Penelitian_ G11ayq.pdf
  Restricted Access
BAB III434.06 kBAdobe PDFView/Open
BAB IV Hasil dan Pembahasan_ G11ayq.pdf
  Restricted Access
BAB IV609.36 kBAdobe PDFView/Open
BAB V Simpulan_ G11ayq.pdf
  Restricted Access
BAB V439.35 kBAdobe PDFView/Open
Cover_ G11ayq.pdf
  Restricted Access
Cover368.51 kBAdobe PDFView/Open
Daftar Pustaka_ G11ayq.pdf
  Restricted Access
Daftar Pustaka362.76 kBAdobe PDFView/Open
Lampiran_G11ayq.pdf
  Restricted Access
Lampiran2.58 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.