Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256


  • Rewindo Siregar * Mail Universitas Budi Darma, Medan, Indonesia
  • (*) Corresponding Author
Keywords: Cryptography; SHA-256 Algorithm; MPEG-4; Encryption Decryption

Abstract

In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4. MP4 Player can make a person listen to video digitally, no need to use cassettes or CDs like in the past and allows millions of people around the world to exchange music recordings through computers connected to computer networks. MP4 format which is commonly played by MP4 Player is one of the most frequently used video formats in video data storage. In cryptography there is a hash function which is a one-way encryption that produces a value that has a fixed length of a message. In this case the intended message is a video file. The hash function can be used to generate the identity of a video file, where if there are two or more video files that have the same hash value, it can be concluded that the video file is duplicate or duplicate. This will certainly make it easier for users to delete duplicate or duplicate video files.

References

Imam Saputra, “Analisa Algoritma SHA-256 Untuk Mendekteksi Orisinalitas Citra Digital,” In Seminar Nasional Riset Information Science (SENARIS), 2019.

S.J Patil, N.P Jagtap, S.H Rajput, and R.B Sangore,, “A Duplicate File Finder System,” International Journal of Scienci Spirituality Business and Tecnology, pp. 10-14, 2017.

Hellman, Whitfield Diffie and Martin E, “New Direction in Cryptography,” Vol.dari IT 22,no 6, November 1976.

D. Ariyus, PengantarIlmu Kriptografi, 2008.

Prayudi, Yudi, and Idham Halik, “Studi Analisis Algoritma Rivest Code 6 (RC6) Dalam Enkripsi/Dekripsi Data,” Seminar Nasional Aplikasi Teknologi Informasi 2005(SNATI 2005, 2005.

M Syafriadi, “Analisa Kecepatan dan Keamanan Algoritma Secure Hash Algoritma 256 (SHA-256) Untuk Otentikasi pesan Teks,” 2006.

Booch, G James, and R Ivar, “The Unified Modeling Language User Guide Second Edition,” addison Wesley Profesional, 2005.

Adi Nugroho,, “Rekayasa Perangkat Lunak Menggunakan UML dan Java,” Andi Offset, 2010.

A. R. a. M. Shalahuddin, “Rekayasa Perangkat Lunak Struktur dan berorientasi Objek,” Informatika, 2014.


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256

Article History
Published: 2022-04-30
Abstract View: 64 times
PDF Download: 93 times
Section
Articles