Please use this identifier to cite or link to this item:
http://repository.ipb.ac.id/handle/123456789/58036| Title: | Implementasi dan Analisis Video Watermarking Menggunakan Discrete Cosine Transform dan Logika Fuzzy Berdasarkan Human Visual System |
| Authors: | Giri, Endang Purnama Nisa, Karlina Khiyarin Kurniawaty, Syahrany |
| Keywords: | Bogor Agricultural University (IPB) mean structural similarity human visual system fuzzy logic Discrete cosine transform |
| Issue Date: | 2012 |
| Abstract: | Nowadays, usage of digital data format has become more popular, because digital data is easier to distribute. Unfortunately, it makes easier to pirate it. Watermarking is a technique of information hiding in a specific media. This research is to implement and analyze video watermarking using Discrete Cosine Transform and fuzzy logic based on Human Visual System. Discrete cosine transform is a compression technique used to transform digital image and digital signal. Discrete cosine transform separates each data byte into two groups, namely high-frequency (DC) coefficient and low frequency (AC) coefficients. DC coefficient is used to insert a watermark. Fuzzy logic is an appropriate way to map an input space into an output space. Human Visual System is a method of image compression techniques, which is based on human visual characteristics. Human Visual System is used to calculate the sensitivity of the luminance and texture sensitivity. Fuzzy logic is used to determine the amount of insertion on each DC coefficient. The result of the experiment showed that the execution time for insertion is longer than the execution time for extraction. Moreover, the watermarked video has a Mean Structural Similarity of 0.934. This is a relatively good result. The whole watermarked message is always successfully extracted with 100% similarity. Also, the test result confirmed that the watermark video is invulnerable to cutting and adding attack. It is proven by the undamaged watermark message. |
| URI: | http://repository.ipb.ac.id/handle/123456789/58036 |
| Appears in Collections: | UT - Computer Science |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| G12sku.pdf Restricted Access | Full text | 1.19 MB | Adobe PDF | View/Open |
| G12sku_Abstrak.pdf Restricted Access | Abstrak | 294.19 kB | Adobe PDF | View/Open |
| G12sku_BAB I Pendahuluan.pdf Restricted Access | BAB I | 362.8 kB | Adobe PDF | View/Open |
| G12sku_BAB II Tinjauan Pustaka.pdf Restricted Access | BAB II | 737.41 kB | Adobe PDF | View/Open |
| G12sku_BAB III Metode Penelitian.pdf Restricted Access | BAB III | 597.36 kB | Adobe PDF | View/Open |
| G12sku_BAB IV Hasil dan Pembahasan.pdf Restricted Access | BAB IV | 684.9 kB | Adobe PDF | View/Open |
| G12sku_BAB V Kesimpulan dan Saran.pdf Restricted Access | BAB V | 363.76 kB | Adobe PDF | View/Open |
| G12sku_Cover.pdf Restricted Access | Cover | 297.22 kB | Adobe PDF | View/Open |
| G12sku_Lampiran.pdf Restricted Access | Lampiran | 466.46 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.