Anda di halaman 1dari 8

STEGANOGRAPHY PADA FILE AUDIO MPEG-1 LAYER III

DENGAN TEKNIK HYBRID LEAST SIGNIFICANT BIT

Diajukan Untuk Menyusun Tugas Akhir


di Jurusan Teknik Informatika Fakultas Ilmu Komputer UNSRI

Oleh:

Binahar Agust Trizani Pasaribu


NIM : 09061002011

Jurusan Teknik Informatika


FAKULTAS ILMU KOMPUTER UNIVERSITAS SRIWIJAYA
2010
LEMBAR PENGESAHAN TUGAS AKHIR
STEGANOGRAPHY PADA FILE AUDIO MPEG-1 LAYER III
DENGAN TEKNIK HYBRID LEAST SIGNIFICANT BIT

Oleh :

Binahar Agust Trizani Pasaribu


NIM : 09061002011

Palembang, Maret 2010

Pembimbing I Pembimbing II

Drs. Megah Mulya,M.T. Alvi Syahrini,S.Si,M.Kom.


NIP. 19660220 200604 1 001 NIP. 19781222 200604 2 003

Mengetahui
Ketua Jurusan Teknik Informatika

Drs. Megah Mulya,M.T.


NIP. 19660220 200604 1 001
DAFTAR ISI

ii
Halaman
HALAMAN JUDUL .............................................................................................i
HALAMAN PENGESAHAN ...............................................................................ii
DAFTAR ISI ..........................................................................................................iii
DAFTAR TABEL .................................................................................................v
DAFTAR GAMBAR..............................................................................................vi

BAB I PENDAHULUAN
1.1 Latar Belakang ......................................................................................I-1
1.2 Perumusan Masalah...............................................................................I-2
1.3 Tujuan ...................................................................................................I-2
1.4 Manfaat .................................................................................................I-2
1.5 Batasan Masalah....................................................................................I-3

BAB II TINJAUAN PUSTAKA


2.1 Kriptografi ............................................................................................II-1
2.1.1 Steganography ............................................................................II-2
2.1.2 Watermarking .............................................................................II-4
2.1.3 Audio Steganography ..................................................................II-5
2.1.3 Teknik Subtitusi LSB ..................................................................II-6
2.1.4 Teknik Transformasi Wavelet .....................................................II-7
2.2 Multimedia ...........................................................................................II-11
2.2.1 Kompresi .....................................................................................II-13
2.2.2 MP3..............................................................................................II-14
2.3 Rational Unified Process .....................................................................II-17

BAB III ANALISA DAN PERANCANGAN SISTEM

iii
3.1 Metode Pengembangan Perangkat Lunak..............................................III-1
3.2 Metode Pelaksanaan Penelitian .............................................................III-1
3.3 Penjadwalan Tugas Akhir......................................................................III-2

DAFTAR PUSTAKA ............................................................................................vii

DAFTAR TABEL

iv
Halaman
Tabel II-1 Wavelet ..................................................................................................II-9
Tabel III-1 Rencana Penjadwalan Tugas Akhir ......................................................III-3

DAFTAR GAMBAR

v
Halaman
Gambar II-1 Basic Steganography Model...............................................................II-4
Gambar II-2 Encoder Diagram................................................................................ II-
15
Gambar II-3 Fase RUP............................................................................................. II-
18

vi
DAFTAR PUSTAKA

Amin M.M., et al.2003.Information Hiding Using Steganography Approach.4th

National Conference on Telecommunication Technology Proceeding 2003

(NCTT2003), Concorde Hotel, Shah Alam, Selangor, 14-15 January 2003, pp.

21-25.

Anderson R.J., Petitcolas F.A.P.1998.On The Limits of Steganography. IEEE Journal

of Selected Areas in Communication, 16(4) pp. 474-481.

Bender W, et al.1997.Techniques for data.IBM Systems Journal, Vol 35, NOS 3&4.

Chahyati D.2003. Klasifikasi Citra Radar Berdasarkan Ciri Tekstur Gray Level

Cooccurrence Matrix, Semivariogram dan Wavelet Stasioner.Tesis Program

Magister Ilmu Komputer Fakultas Ilmu Komputer Universitas Indonesia(tidak

dipublikasikan).

Cvejic N. dan Seppanen T. 2004.Increasing Robustness of LSB Audio

Stegannography by Reduced Distortion LSB Coding.MediaTeam, Information

Processing Laboratory, University of Oulu, Finland.

Furon T, et al(Eds.).2007.Information Hiding. 9th International Workshop, IH 2007. Saint

Malo,France.

Gopalan K.2003.Audio Steganography Using Bit Modification. In: Proc. Of IEEE

International Conference on Acoustics, Speech & Signal Processing, 6-10 April

2003,Hongkong(Cancelled).

vii
Jacaba J.S.2001.Audio Compression Using Modified Discrette Cosine Transform:

The MP3 Coding Standard.In Partial Fulfillment of The Requirements For

The Bachelor of Science in Mathematics, The University of The Philipines.

Merdian M. dan Indarto W.2005.Implementasi Algoritma Run Length, Half Byte dan

Huffman untuk Kompresi File.In : Seminar Nasional Aplikasi Teknologi

Informasi,18 Juni 2005, Yogyakarta.

Munir R.2004.Bahan Kuliah IF5054 Kriptografi.Departemen Teknik Informatika,

Institut Teknologi Bandung.

Pressman R.S. 2001. Software Engineering: A Practitioner’s Approach (5th Edition).

Mc Graw-Hill Book Company, New York, USA.

Tzanetakis G, et al.2000.Audio Analysing Using Dicrete Wavelet Transform.

MARSYAS: Organised Sounds, Vol4(3).

viii

Anda mungkin juga menyukai