Please use this identifier to cite or link to this item:
http://repository.ipb.ac.id/handle/123456789/56067Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.advisor | Giri, Endang Purnama | |
| dc.contributor.author | Musthofa, Panji Adhie | |
| dc.date.accessioned | 2012-07-25T06:38:33Z | |
| dc.date.available | 2012-07-25T06:38:33Z | |
| dc.date.issued | 2012 | |
| dc.identifier.uri | http://repository.ipb.ac.id/handle/123456789/56067 | |
| dc.description.abstract | The rapid development of the internet and the digital information revolution caused significant changes in the global society, ranging from the influence on the world economy to the way people communicate. Digital communication strongly supports the ease of message exchange transactions, but on the other hand has a risk of security, especially for confidential messages. This research proposed implementation of steganography audio in WAV files transformed using DCT. The results of DCT coefficients are divided into an arbitrary number of segments and the energy of each segment is calculated. Text message are then embedded into the selected peaks of the highest energy segment with values ranging peaks from -0.4 – 0.4. Recovery text message from Stego-audio are extracted by performing the inverse operation of steganography embedding process. Simulation results indicate that a selected steganography technique meet the primary criteria of imperceptibility and recovery. In addition, the result of Signal-to-Noise Ratio (SNR) values range from 12dB – 40dB. The test quality of stego-audio makes use of objective and subjective analysis. The objective analysis uses Euclidean distance and the subjective analysis is based on survey | en |
| dc.subject | Bogor Agricultural University (IPB) | en |
| dc.subject | SNR | en |
| dc.subject | Euclidean distance | en |
| dc.subject | Discrete Cosine Transform | en |
| dc.title | Implementasi dan Analisis Steganografi Audio Menggunakan Discrete Cosine Transform (DCT) | en |
| Appears in Collections: | UT - Computer Science | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| G12pam.pdf Restricted Access | Full text | 2.16 MB | Adobe PDF | View/Open |
| G12pam_Abstrak.pdf Restricted Access | Abstrak | 332.84 kB | Adobe PDF | View/Open |
| G12pam_BAB I Pendahuluan.pdf Restricted Access | BAB I | 321.86 kB | Adobe PDF | View/Open |
| G12pam_BAB II Tinjauan Pustaka.pdf Restricted Access | BAB II | 458.24 kB | Adobe PDF | View/Open |
| G12pam_BAB III Metode Penelitian.pdf Restricted Access | BAB III | 494.12 kB | Adobe PDF | View/Open |
| G12pam_BAB IV Hasil dan Pembahasan.pdf Restricted Access | BAB IV | 741.96 kB | Adobe PDF | View/Open |
| G12pam_BAB V Kesimpulan dan Saran.pdf Restricted Access | BAB V | 379.59 kB | Adobe PDF | View/Open |
| G12pam_Cover.pdf Restricted Access | Cover | 378.83 kB | Adobe PDF | View/Open |
| G12pam_Daftar Pustaka.pdf Restricted Access | daftar pustaka | 297.72 kB | Adobe PDF | View/Open |
| G12pam_Lampiran.pdf Restricted Access | Lampiran | 1.41 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.