Aplikasi Deteksi Keaslian File Audio Dengan Menerapkan Metode SHA-512
Keywords:
Teks, Editor, Lexical, AnalyzerAbstract
In the era of information technology that is developing very rapidly, audio is often used as evidence by legal parties, along with the emergence of the need to authenticate data or files that are used digitally. audio is a mathematical scheme for indicating the authenticity of digital or recorded sound. A valid audioonly gives reason to believe that the audio receiver is made by a known sender, that it was not modified in transit. The Secure Hash Algorithm (SHA-512) method is a hash algorithm of the SHA-512 type that produces a 256-bit message digest. The SHA-512 algorithm can be used to check data integrity, create digital signatures, and so on.
References
P. G. F. M. C. Q. F. R. Rigoni, ""Tampering detection of audio-visual content using encrypted watermarks,”," "Tampering detection of audio-visual content using encrypted watermarks,”, p. 8, 2014.
NIST, national institute of standart and Technology, American : Dede Djuhana, Ph.D, 1999.
W. Dai, "Speed Benchmarks for Various Ciphers and Hash Functions.," algoritma SHA-512, 2009.
Yeni Agusti, "PERANCANGAN," PERANCANGAN APLIKASI PEMBELAJARAN FISIKA TINGKAT, p. 6, 2013.
Donny Yulianto, "Tahapan Perancangan," ANALISIS & PERANCANGAN SISTEM, p. 40, 2015.
Mariyana, "Langkah-langkash dalam tahap perencanaan sistem," Langkah-langkash dalam tahap perencanaan sistem, p. 8, 2015.
s. sembiring, "PERANCANGAN SISTEM INFORMASI PEMBELIAN PADA PT. TEKNOTAMA LINGKUNGAN INTERNUSA," PERANCANGAN , p. 31, 2013.
R. A. d. M. Shalahudin, " Rekayasa Perangkat Lunak Struktur dan Berorientasi Objek," Rekayasa Perangkat Lunak Struktur dan Berorientasi Objek, p. 10, 2014.
P. P. Widodo, "UML," VOL.I NO.1 FEBRUARI 2015JURNAL TEKNIK KOMPUTER AMIK BSI11ISSN. 2442-2436 // SISTEM PAKAR PENDETEKSIAN ....SISTEM PAKAR PENDETEKSIAN PERMASALAHAN KOMPUTER PADA PT. PASIFIK SATELIT NUSANTARA CIKARANG, 2011.
Indraja, "Bagian alir (Flowchart)," Penggunaan Citra Penginderaan Jauh untuk Mendukung Mitigasi Dampak Perubahan Iklim di Sektor Pertanian, p. 14, 2015.
Wicaksono, "deteksi," deteksi, p. 17, 2013.
Nurasyiah, " Struktur File WAV dalam bentuk Hexa," Struktur File WAV dalam bentuk Hexa, p. 7, 2013.
Nurasyiah, " Perancangan Aplikasi Kompresi File," APLIKASI KEAMANAN FILE AUDIO WAV (WAVEFORM) DENGAN, p. 7, 2013.
D. Arius, "Pengantar Ilmu Kriptografi," Jurnal Teknik Informatika Kaputama (JTIK), Vol 1 No 1, Januari 2017ISSN :2548-97041PERANCANGAN APLIKASI KEAMANAN PESAN MENGGUNAKAN ALGORITMA ELGAMAL DENGAN MEMANFAATKAN ALGORITMA ONE TIMEPADSEBAGAI PEMBANGKIT KUNCI, p. 7, 2008.
R. Sadikin, " Kriptografi untuk Keamanan Jaringan dan Implementasinya dalam Bahasa Java," Perbandingan, p. 5, 2012.
R. Munir, " Kriptografi," PEMANFAATAN KRIPTOGRAFI DALAM MEWUJUDKAN KEAMANAN INFORMASI PADA e-VOTING DI INDONESIA, p. 7, 2006.
Novi dian Natasyah,anang eko wicaksono, "Penerapan Teknik Kriptografi Stream Cipher Untuk Pengaman Basis Data," Penerapan Teknik Kriptografi Stream Cipher Untuk Pengaman Basis Data, p. 22, 2011.
D. Arius, "Pengantar Ilmu Kriptografi," KRIPTOGRAFI FILE CITRA MENGGUNAKAN, p. 23, 2018.
P. H. Arjana, "Penerapan Algoritma Vernam Cipher (One Time) untuk Pengamanan Login," Penerapan Algoritma Vernam Cipher (One Time) untuk Pengamanan Login, p. 4, 2019.
d. Arius, "Pengantar Ilmu Kriptografi," KRIPTOGRAFI FILE CITRA MENGGUNAKAN, p. 23, 2008.
Menezes, " Handbook ofApplied Cryptography," DESAIN DAN IMPLEMENTASI PROTOKOL KRIPTOGRAFI UNTUK APLIKASI SECURECHATPADA MULTIPLATFORMSISTEM OPERASI , p. 9, 1996.
Kelvin, "Fungsi Hash dan Metode," Fungsi Hash dan Metode , no. , p. 5, 2016.
Noldi Krisandi, "KONSEP KRIPTOGRAFI DAN FUNGSI HASH," KONSEP KRIPTOGRAFI DAN FUNGSI HASH, p. 25, 2018.
I. R. Meiliana Sumagita, "notasi Heksa desimal," notasi Heksa desimal, p. 15, 2018.
H. w. m. a. h. SHA-512, "Halaman website mengenai algoritma hash SHA-512," Halaman website mengenai algoritma hash SHA-512, pp. 2 : http://en.wikipedia.org/wiki/SHA-2 , 8 Mei 201.
T.Indra Wardana ,Eko Aribowo , "Visuan studio Basic 2008," PERANCANGAN DAN IMPLEMENTASI SISTEM INFORMASI MANAJEMEN KEGIATAN MASJID , p. 25, 2018.
M. Wardana, "Visual Studio 2008," RUANG LINGKUP KERJA VISUAL BASIC 2008, p. 17, 2008.
F. H, "Mendeteksi pemalsuan digital menggunakan analisis bispectral [R]," 1999.
. Karim, S. Esabella, M. Hidayatullah, and T. Andriani, “Sistem Pendukung Keputusan Aplikasi Bantu Pembelajaran Matematika Menggunakan Metode EDAS,” vol. 4, no. 3, 2022, doi: 10.47065/bits.v4i3.2494.
. M. Bobbi, K. Nasution, S. Suryadi, and A. Karim, “Sistem Pendukung Keputusan Dalam Rekomendasi Kelayakan nasabah Penerima Kredit Menerapkan Metode MOORA dan MOOSRA,” vol. 4, no. 3, pp. 1284–1292, 2022, doi: 10.47065/bits.v4i3.2610.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).








