Analisa Fungsi Hash Untuk Mendeteksi Otentikasi File Video Menerapkan Metode N-Hash
Abstract
The problem with the video scope is that the video can be watched by unauthorized people if the video file needs to be secured with good security. So it is necessary to design a video player application and apply encryption and description to the designed application. N-HASH can only produce 16 bytes of ciphertext while the input is different, namely if the input is 4 bytes then the output is 16 bytes and if the input is 16 bytes then the output is 4 bytes. The results of detecting authentication of video files have a lot of data if in bytes the data is very difficult to encrypt with N-HASH.
References
K. W. Argakusumah and S. Hansun, “Implementasi Algoritma Boyer-Moore pada Aplikasi Kamus Kedokteran Berbasis Android,” J. Ultim., vol. 6, no. 2, pp. 70–78, 2014.
A. Mushofan, I. T. Bandung, and J. G. Bandung, “Pengembangan Algoritma Boyer Moore,” 2014.
R. fitri riyanarto sarwono, yeni Anistyasari, SEMANTIC SEARCH, Andi Offse. Yogyakarta, 2012.
K. W. Argakusumah and S. Hansun, “Implementasi Algoritma Boyer-Moore pada Aplikasi Kamus Kedokteran Berbasis Android,” J. Ultim., vol. 6, no. 2, pp. 70–78, 2014.
S. S. Wicida, “PENELUSURAN KATALOG PERPUSTAKAAN PADA SMA IT YABIS BONTANG DENGAN ALGORITMA BOYER-MOORE,” pp. 15–21, 2008.
K. W. Argakusumah and S. Hansun, “Implementasi Algoritma Boyer-Moore pada Aplikasi Kamus Kedokteran Berbasis Android,” J. Ultim., vol. 6, no. 2, pp. 70–78, 2014.
rosa A. S. M.shalahuddin, Rekayasa perangkat lunak. Bandung: informatika bandung, 2016.
Murtiwiyati and G. Lauren, “J U R N A L I L M I A H KOMPUTASI Komputer & Sistem Informasi 1-10,” J. Ilm., vol. 12, p. 2,3, 2013.
S. K. Alfa Satyaputra, M.cs & Eva maulina Aritonang, java for beginners with eclipse 4.2 juno. jakarta: PT. Elex Media komputindo, 2012.
M. R. Arief, "AUTENTIKASI, KENDALI AKSES, AUDIT SISTEM," AUTENTIKASI, KENDALI AKSES, AUDIT SISTEM, vol. 11, pp. 73-76, 2010.
C. Y.-m. Z. Mei-ling, "Sampling Based N-Hash Algorithm for Searching," Sampling Based N-Hash Algorithm for Searching, vol. 12, pp. 1-4, 2015.
] a. r. r. Hasan abdurahman, "aplikasi pinjaman pembayaran secara kredit kepada bank yudha bhakti," aplikasi pinjaman pembayaran secara kredit kepada bank yudha bhakti, vol. 8, pp. 61-69, 2014.
Copyright (c) 2023 Marjadi Hebert Harianja

This work is licensed under a Creative Commons Attribution 4.0 International License.



