Please use this identifier to cite or link to this item: http://repository.ipb.ac.id/handle/123456789/56067
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorGiri, Endang Purnama
dc.contributor.authorMusthofa, Panji Adhie
dc.date.accessioned2012-07-25T06:38:33Z
dc.date.available2012-07-25T06:38:33Z
dc.date.issued2012
dc.identifier.urihttp://repository.ipb.ac.id/handle/123456789/56067
dc.description.abstractThe rapid development of the internet and the digital information revolution caused significant changes in the global society, ranging from the influence on the world economy to the way people communicate. Digital communication strongly supports the ease of message exchange transactions, but on the other hand has a risk of security, especially for confidential messages. This research proposed implementation of steganography audio in WAV files transformed using DCT. The results of DCT coefficients are divided into an arbitrary number of segments and the energy of each segment is calculated. Text message are then embedded into the selected peaks of the highest energy segment with values ranging peaks from -0.4 – 0.4. Recovery text message from Stego-audio are extracted by performing the inverse operation of steganography embedding process. Simulation results indicate that a selected steganography technique meet the primary criteria of imperceptibility and recovery. In addition, the result of Signal-to-Noise Ratio (SNR) values range from 12dB – 40dB. The test quality of stego-audio makes use of objective and subjective analysis. The objective analysis uses Euclidean distance and the subjective analysis is based on surveyen
dc.subjectBogor Agricultural University (IPB)en
dc.subjectSNRen
dc.subjectEuclidean distanceen
dc.subjectDiscrete Cosine Transformen
dc.titleImplementasi dan Analisis Steganografi Audio Menggunakan Discrete Cosine Transform (DCT)en
Appears in Collections:UT - Computer Science

Files in This Item:
File Description SizeFormat 
G12pam.pdf
  Restricted Access
Full text2.16 MBAdobe PDFView/Open
G12pam_Abstrak.pdf
  Restricted Access
Abstrak332.84 kBAdobe PDFView/Open
G12pam_BAB I Pendahuluan.pdf
  Restricted Access
BAB I321.86 kBAdobe PDFView/Open
G12pam_BAB II Tinjauan Pustaka.pdf
  Restricted Access
BAB II458.24 kBAdobe PDFView/Open
G12pam_BAB III Metode Penelitian.pdf
  Restricted Access
BAB III494.12 kBAdobe PDFView/Open
G12pam_BAB IV Hasil dan Pembahasan.pdf
  Restricted Access
BAB IV741.96 kBAdobe PDFView/Open
G12pam_BAB V Kesimpulan dan Saran.pdf
  Restricted Access
BAB V379.59 kBAdobe PDFView/Open
G12pam_Cover.pdf
  Restricted Access
Cover378.83 kBAdobe PDFView/Open
G12pam_Daftar Pustaka.pdf
  Restricted Access
daftar pustaka297.72 kBAdobe PDFView/Open
G12pam_Lampiran.pdf
  Restricted Access
Lampiran1.41 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.