Sinkron : Jurnal dan Penelitian Teknik Informatika
Vol. 6 No. 1 (2021): Article Research Volume 6 Issue 1: January 2021

IMPLEMENTASI METODE DISCRETE COSINE TRANSFORM (DCT) DAN BLOWFISH DALAM KEAMANAN VIDEO DIGITAL

Khairani, Mufida (Unknown)
Harahap , Herlina (Unknown)
Siregar, Yunita Sari (Unknown)
Lubis, Yessy Fitri Annisa (Unknown)



Article Info

Publish Date
02 Feb 2022

Abstract

Collecting data partially or completely illegally without the permission of the owner causes losses to the copyright owner. This has a big impact in proving ownership of a digital media. To be able to prove ownership of the copyright, the Discrete Cosine Transform watermarking technique can be used by inserting the Blowfish cryptographic algorithm. Discrete Cosine Transform (DCT) is a method that converts digital data into the form of a frequency domain. The method used in the DCT transformation technique is to break the digital image into small blocks with a fixed size and then convert it from the spatial domain to the frequency domain. Blowfish works by dividing the message into 64-bit blocks of equal length with varying aty lengths that encrypt the data in 8 byte blocks. Messages that are not multiples of 8 bytes will be added extra bits (padding), so that the size for each block is the same. After the final result is obtained, the value is inserted into the digital video without destroying the original digital video. From the research that has been done in the implementation of digital video watermarking, it can be concluded that the Blowfish cryptography method and the Discrete Cosine Transform (DCT) watermarking cryptography method can be applied properly. In the watermarking process, digital image insertion does not damage the watermaratd video and at the security level it is provided with blowfish cryptographic encryption, so that it can increase security in copyright protection

Copyrights © 2021






Journal Info

Abbrev

sinkron

Publisher

Subject

Computer Science & IT

Description

Scope of SinkrOns Scientific Discussion 1. Machine Learning 2. Cryptography 3. Steganography 4. Digital Image Processing 5. Networking 6. Security 7. Algorithm and Programming 8. Computer Vision 9. Troubleshooting 10. Internet and E-Commerce 11. Artificial Intelligence 12. Data Mining 13. Artificial ...