The Implementation Of Discrete Cosine Transform (DCT) And Blowfish Methods In Digital Video Security
DOI:
10.33395/sinkron.v7i1.11286Keywords:
Watermarking, Discrete Cosine Transform (DCT),, Cryptography,, Blowfish Algorithm, Digital VideoAbstract
Collecting data partially or completely illegally without the permission of the owner causes losses to the copyright owner. This has a big impact in proving ownership of a digital media. To be able to prove ownership of the copyright, the Discrete Cosine Transform watermarking technique can be used by inserting the Blowfish cryptographic algorithm. Discrete Cosine Transform (DCT) is a method that converts digital data into the form of a frequency domain. The method used in the DCT transformation technique is to break the digital image into small blocks with a fixed size and then convert it from the spatial domain to the frequency domain. Blowfish works by dividing the message into 64-bit blocks of equal length with varying aty lengths that encrypt the data in 8 byte blocks. Messages that are not multiples of 8 bytes will be added extra bits (padding), so that the size for each block is the same. After the final result is obtained, the value is inserted into the digital video without destroying the original digital video. From the research that has been done in the implementation of digital video watermarking, it can be concluded that the Blowfish cryptography method and the Discrete Cosine Transform (DCT) watermarking cryptography method can be applied properly. In the watermarking process, digital image insertion does not damage the watermaratd video and at the security level it is provided with blowfish cryptographic encryption, so that it can increase security in copyright protection
Downloads
References
Abdullah, D., & Saputro, D. N. (2016). Implementasi Algoritma Blowfish Dan Metode Least Significant Bit Insertion Pada Video Mp4. Jurnal Pseudocode, 3(2), 137–145. https://doi.org/10.33369/pseudocode.3.2.137-145
Agustina, R., & Asmara, R. A. (2015). Penyisipan Watermark Menggunakan Metode Discrete Cosine Transform Pada Citra Digital. Jurnal Informatika Polinema, 2(1), 29–34.
Himawan, Usup, Irfansyah, P., & Lukman. (2012). Penggunaan Teknik Watermarking Menggunakan Metode Discrete Cosine Transform (DCT) dalam Perlindungan Hak Cipta Dokumen Citra Digital. Konferensi Nasional ICT-M Politeknik Telkom (KNIP), 281–287.
Irfan, & AZ, N. (2013). Prototipe Teknik Penyisipan Dokumen Citra Digital Menggunakan Watermarking dengan Metode DCT ( Discrete Cosine Transform ). Jurnal TICOM, 2(1), 21–27.
Khairani, M., & Nurwulan, N. (2018). Algoritma Blowfish Pada Watermarking Video Digital. JURIKOM (Jurnal …, 5(4), 357–361. http://ejurnal.stmik-budidarma.ac.id/index.php/jurikom/article/view/842
Maradona, H., & Basorudin. (2017). Analisis Algoritma Blowfish Pada Proses Enkripsi dan Deskripsi File. Riau Journal Of Computer Science, 3(2), 156–166.
Moonlight, L. S., Irfansyah, A., & Widyarini, R. (2021). Digital Image Watermarking Pada Citra Medis Menggunakan Discrete Cosine Transform (Dct), Dan Metode Spread Spectrum. Scan, 16(1), 27–33.
Putrana, C. B., Budiman, G., Nyoman, I., & Ramatryana, A. (2016). Merancang Citra Watermark Menggunakan DCT dan Terenkripsi – Kompresi Teks Menggunakan RSA-HUFFMAN Code. Seminar Nasional Inovasi Dan Aplikasi Teknologi Di Industri (SENIATI), 128–133.
Reva, E. Y., Susilo, B., & Purwandari, E. P. (2016). Aplikasi Watermark Pada Citra Digital Menggunakan Kombinasi Metode Discrete Cosine Transform , Discrete Wavelet Transform Dan Singular Value Decomposition. Jurnal Rekursif, 4(2), 152–160. ejournal.unib.ac.id
Sari, C. A., Sukamto, T. S., & Rachmawanto, E. H. (2018). Analisa Robustness Citra Digital Pada Watermarking DCT-DWT. Prosiding SNST, 1(1), 19–22.
Siregar, K. P., & Ariwibowo, E. (2014). Implementasi Keamanan Data Menggunakan Algoritma Blowfish dan LSB Pada Citra. Jurnal Sarjana Teknik Informatika, 2(3), 140–150.
Solikhin, M. (2017). WATERMARKING MENGGUNAKAN METODE DISCRETE COSINE TRANSFORM. Jurnal Riset Dan Aplikasi Matematika, 1(1), 27–39.
Suhandinata, S., Rizal, R. A., Wijaya, D. O., Warren, P., & Srinjiwi. (2019). Analisis Performa Kriptografi Hybrid Algoritma Blowfish dan Algoritma RSA. Jurteksi, VI(1), 1–10.
Sutardi. (2015). Implementasi Algoritma Blowfish Untuk Keamanan Data Suara. Jurnal Ilmiah Teknik Mesin, 6(2), 51–58.
Wulanningrum, R., & Lelitavistara, N. V. W. (2015). Discrete Cosine Transform Untuk Identifikasi Citra Hylocereus Costaricensis. Simetris : Jurnal Teknik Mesin, Elektro Dan Ilmu Komputer, 6(2), 353–360. https://doi.org/10.24176/simet.v6i2.472
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2022 Yunita Sari Siregar, Mufida Khairani, Herlina Harahap , Yessy Fitri Annisa Lubis
![Creative Commons License](http://i.creativecommons.org/l/by-nc/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.