z-logo
open-access-imgOpen Access
The Implementation Of Discrete Cosine Transform (DCT) And Blowfish Methods In Digital Video Security
Author(s) -
Yunita Sari Siregar,
Mufida Khairani,
Herlina Jasa Putri Harahap,
Yessy Fitri Annisa Lubis
Publication year - 2022
Publication title -
sinkron
Language(s) - English
Resource type - Journals
eISSN - 2541-2019
pISSN - 2541-044X
DOI - 10.33395/sinkron.v7i1.11286
Subject(s) - discrete cosine transform , computer science , digital watermarking , encryption , cryptography , byte , block (permutation group theory) , algorithm , computer hardware , image (mathematics) , computer security , computer vision , mathematics , geometry
Collecting data partially or completely illegally without the permission of the owner causes losses to the copyright owner. This has a big impact in proving ownership of a digital media. To be able to prove ownership of the copyright, the Discrete Cosine Transform watermarking technique can be used by inserting the Blowfish cryptographic algorithm. Discrete Cosine Transform (DCT) is a method that converts digital data into the form of a frequency domain. The method used in the DCT transformation technique is to break the digital image into small blocks with a fixed size and then convert it from the spatial domain to the frequency domain. Blowfish works by dividing the message into 64-bit blocks of equal length with varying aty lengths that encrypt the data in 8 byte blocks. Messages that are not multiples of 8 bytes will be added extra bits (padding), so that the size for each block is the same. After the final result is obtained, the value is inserted into the digital video without destroying the original digital video. From the research that has been done in the implementation of digital video watermarking, it can be concluded that the Blowfish cryptography method and the Discrete Cosine Transform (DCT) watermarking cryptography method can be applied properly. In the watermarking process, digital image insertion does not damage the watermaratd video and at the security level it is provided with blowfish cryptographic encryption, so that it can increase security in copyright protection

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here