Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Keamanan multimedia
Bookmark Share

Text

Keamanan multimedia

Dony Ariyus - Personal Name;

Sinopsis

Buku ini bertujuan mengenalkan cara mengamankan konten multimedia dan menggunakan konten multimedia tersebut sebagai media penyimpanan pesan ataupun sebagai hak kepemilikan.

DAFTAR ISI

Kata Pengantar
Daftar Isi
BAB 1 Pendahuluan
1.1 Pendahuluan
1.2 Multimedia
1.2.1 Ciri-ciri Umum Sistem computer Multimedia
1.2.2 Sifat Pentingya Produk Multimedia
1.2.3 Sejarah perkembangan Mmultimedia
1.2.4 Multimedia dan Manfaat Bagi Industri
1.3 Masalah Keamanan
1.4 Ancaman Keamanan
1.4.1 Aspek-aspek Keamanan
1.4.2 Informasi Rahasia
1.4.3 Pentingkah Informasi Rahasia
1.4.4 Password
BAB 2 Pemahaman Dasar Keamanan Multimedia
2.1 Pendahuluan
2.2 Cryptography
2.2.1 Komponen Cryptography
2.2.2 Sejarah Cryptography
2.2.3 Macam-macam Algoritma Cryptography
2.2.4 Algoritma Cryptography Klasik
2.2.5 Algoritma Cryptography Modern
2.3 Steganography
2.3.1 Apa itu Steganography
Perbedaan Antara Steganography dan Cryptography
2.4 Digital Watermarking
BAB 3 STEGANOGRAPHY
3.1 Pendahuluan
3.2 Sejarah Steganography
3.2.1 Yunani
3.2.2 aenals
3.2.3 Chinese
3.2.4 Gaspar Schott
3.2.5 Johannes Trithemius
3.2.6 Giovanni porta
3.2.7 Girolamo Cardano
3.2.8 Blaise de Vigenere
3.2.9 Bishop John Wilkins
3.2.10 Mary Queen
3.2.11 Culpers dan George Washington
3.3 Teknik Steganography
3.3.1 Tipe Steganography
3.3.2 Technical Steganography
3.4 Embedding Methods
3.5 Metode Least Significant Bit
3.6 Metode Domain Transformasi
3.7 Spread-spectrum Encoding
BAB 4 Penerapan Steganography Pada Berbagai Media
4.1 Pendahuluan
4.2 Teks File
4.3 Audio File
4.3.1 MP3
4.3.2 MIDI
4.4 Citra File
4.4.1 Citra File Format GIF
4.4.2 Citra Format JPEG
4.5 Vidio file
BAB 5 Steganography Tools
5.1 Pendahuluan
5.2 Hermetic Stego
5.2.1 Menyembunyikan File
5.2.2 Extract File
5.2.3 Konfigurasi Saving dan Restore
5.2.4 Menggunakan Default Stego Key
5.2.5 Menyembunyikan Image File
5.3 Paronia
5.4 Camouflage
5.5 MP3 Stego
5.6 MSU Stego Vidio
5.7 BitCrypt
5.7.1 Proses Enkripsi Pada BitCrypt
5.7.2 proses dekripsi Pada BitCrypt
5.7.3 Proses Analisis BitCrypt
5.8 Invisible Secrets
5.8.1 Algoritma
5.8.2 Email Encryption
5.8.3 File Shredder
5.8.4 Internet Trace Destructor
5.8.5 Password Manager
5.8.6 Random Password Generator
5.8.7 Mengirim Password – IP to IP Secure Password Transfer
5.8.8 Cryptboard
5.8.9 Lock Software
5.9 Steganography
BAB 6 Watermarking
6.1 Pendahuluan
6.2 Sejarah Watermarking
6.3 Klasifikasi Watermark
6.4 Tipe Watermark
6.5 Tujuan Penggunaan Watermark
6.6 Karakteristik Watermark
6.7 Cara Kerja Watermark
6.7.1 Watermark Pada dokumen Teks Digital
6.7.2 Video Watermarking
6.7.3 Watermarking untuk Broadcast Monitoring
6.7.4 Audio Watermarking
6.8 Hardware Watermarking
BAB 7 Watermarking Tools
7.1 Pendahuluan
7.2 PDF Watermark
7.3 Drop Watermark
7.4 Photo Watermark
7.5 Watermark Master
BAB 8 Tanda Tangan Digital Dan Algoritmanya
8.1 Pendahuluan
8.2 Algoritma Tanda Tangan Digital
8.2.1 Algoritma ElGamal untuk Tanda Tangan Digital
8.2.2 Metode-metode Serangan Terhadap Stegoimage
8.2.3 Elliptic Curve Criptosystem (ECC)
8.2.4 Penggunaan Elliptic Curve Criptosystem
BAB 9 Serangan Pada Stegonografi & Watermark
9.1 Pendahuluan Steganalysis
9.2 Steganalisis
9.2.1 Klasifikasi Serangan
9.2.2 Metode-metode Serangan Terhadap Stegoimage
9.2.3 Steganalisis RS (Regular dan Singular)
9.2.4 Kompabilitas JPEG
9.2.5 Palette Checking
9.2.6 Metode RQP
9.2.7 Analisis Histogram
9.2.8 Universal Blind Detection
9.2.9 Chi-Square Attack
9.3 Serangan pada Watermark
9.4 Kejahatan Memanfaatkan Stego dan Watermark
Daftar Pustaka
Lampiran


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.82 DON k
00001550
Available
Detail Information
Series Title
-
Call Number
005.82 DON k
Publisher
Yogyakarta : ANDI., 2009
Collation
xii, 338 hlm.; 23 cm.
Language
Indonesia
ISBN/ISSN
9789792902891
Classification
005.82
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Kriptografi
Komputer multimedia
Specific Detail Info
-
Statement of Responsibility
Dony Ariyus
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?