Wijaya, Andy (2020) Analysis of Spread Spectrum Steganography. Other thesis, UNIKA SOEGIJAPRANATA SEMARANG.
|
Text
15.K1.0060 ANDY WIJAYA_ COVER_a.pdf Download (3MB) | Preview |
|
|
Text
15.K1.0060 ANDY WIJAYA_ BAB I_a.pdf Download (1MB) | Preview |
|
Text
15.K1.0060 ANDY WIJAYA_ BAB II_a.pdf Restricted to Registered users only Download (1MB) |
||
|
Text
15.K1.0060 ANDY WIJAYA_ BAB III_a.pdf Download (1MB) | Preview |
|
|
Text
15.K1.0060 ANDY WIJAYA_ BAB IV_a.pdf Download (1MB) | Preview |
|
|
Text
15.K1.0060 ANDY WIJAYA_ BAB V_a.pdf Download (1MB) | Preview |
|
|
Text
15.K1.0060 ANDY WIJAYA_ BAB VI_a.pdf Download (1MB) | Preview |
|
|
Text
15.K1.0060 ANDY WIJAYA_ DAPUS_a.pdf Download (1MB) | Preview |
|
|
Text
15.K1.0060 ANDY WIJAYA_ LAMPIRAN_a.pdf Download (1MB) | Preview |
Abstract
Steganography is a tecnique to secure data in a way so that only sender and receiver that can be see it. Steganography need media that used to hide data inside it like sound and image. There will be no different between media with the result of steganography if it seen by eyes. So, nobody will realize that there is a hidden data on it. There are many methods in Steganography. Some of them are Least Significant Bit (LSB), Algorithms and Transformation, Redundant Pattern Encoding, and Spread Spectrum. This project will be focus on Spread Spectrum method. The reason why this project choose Spread Spectrum because this method rarely used when people talking about Steganography. The application of spread spectrum is spread out all of data to the place that already provided. Because of the spread, the data will be wider than before so its increasing the resistance of detection. This project is focusing on method analyzing and try to find the weakness of this method. The parameter used in this project to calculate the image quality is Peak Signal to Noise Ratio (PSNR). This parameter will be used to compare the stego image with original image. The PSNR value measured in decibels (dB). Then to find the weakness of Spread Spectrum, this project will examine it with several tests that will focus on examining the message and the key.
Item Type: | Thesis (Other) |
---|---|
Subjects: | 000 Computer Science, Information and General Works > 005 Computer programming, programs & data |
Divisions: | Faculty of Computer Science > Department of Informatics Engineering |
Depositing User: | Ms Agustin Hesti Pertiwi |
Date Deposited: | 23 Jun 2020 04:31 |
Last Modified: | 23 Sep 2020 02:13 |
URI: | http://repository.unika.ac.id/id/eprint/21393 |
Actions (login required)
View Item |