z-logo
open-access-imgOpen Access
RANCANG BANGUN APLIKASI DETEKSI KEASLIAN FILE AUDIO MENERAPKAN METODE CRC 32
Author(s) -
Dian Paramita Br Perangin-angin
Publication year - 2019
Publication title -
komik (konferensi nasional teknologi informasi dan komputer)
Language(s) - English
Resource type - Journals
eISSN - 2597-4645
pISSN - 2597-4610
DOI - 10.30865/komik.v3i1.1599
Subject(s) - computer science , file format , hash function , digital audio , key (lock) , torrent file , authentication (law) , computer file , operating system , computer hardware , journaling file system , audio signal , computer security , digital signal processing
The authenticity of a digital file is something that must be able to be guaranteed its existence, considering that there are so many devices that can be used to carry out manipulation of the digital file. One of the digital files discussed in this study is an audio file with MP3 file extension. Please note that MP3 audio files are now very easy to obtain, even very easy to manipulate and insert objects in, so we need a safety technique to maintain the authenticity of the audio file. Overcoming the problem that has been explained in the previous paragraph, the appropriate security technique used is the hash cryptographic technique, by applying the CRC 32 algorithm. The application of CRC 32 aims to generate hash codes from MP3 audio files that can be used as key codes for authentication (key authenticity) of MP3 audio files. The results of this study are a representation of the technical explanation of the application of the CRC 32 algorithm in generating MP3 audio file hash codes, which the CRC 32 algorithm is applied to applications that have been designed and built using the help of MATLAB software version 6.1.Keywords: File Authenticity, Audio File, CRC 32, MATLAB 6.1

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here