Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256
Abstract
In this increasingly advanced era, new technologies that have never been imagined before are increasingly emerging, starting from the emergence of computers, cellphones, and many more. One of the emerging technologies is MPEG4 (Moving Picture Expert Group)-4 Video Player 3 or better known as MP4. MP4 Player can make a person listen to video digitally, no need to use cassettes or CDs like in the past and allows millions of people around the world to exchange music recordings through computers connected to computer networks. MP4 format which is commonly played by MP4 Player is one of the most frequently used video formats in video data storage. In cryptography there is a hash function which is a one-way encryption that produces a value that has a fixed length of a message. In this case the intended message is a video file. The hash function can be used to generate the identity of a video file, where if there are two or more video files that have the same hash value, it can be concluded that the video file is duplicate or duplicate. This will certainly make it easier for users to delete duplicate or duplicate video files.
References
Imam Saputra, “Analisa Algoritma SHA-256 Untuk Mendekteksi Orisinalitas Citra Digital,” In Seminar Nasional Riset Information Science (SENARIS), 2019.
S.J Patil, N.P Jagtap, S.H Rajput, and R.B Sangore,, “A Duplicate File Finder System,” International Journal of Scienci Spirituality Business and Tecnology, pp. 10-14, 2017.
Hellman, Whitfield Diffie and Martin E, “New Direction in Cryptography,” Vol.dari IT 22,no 6, November 1976.
D. Ariyus, PengantarIlmu Kriptografi, 2008.
Prayudi, Yudi, and Idham Halik, “Studi Analisis Algoritma Rivest Code 6 (RC6) Dalam Enkripsi/Dekripsi Data,” Seminar Nasional Aplikasi Teknologi Informasi 2005(SNATI 2005, 2005.
M Syafriadi, “Analisa Kecepatan dan Keamanan Algoritma Secure Hash Algoritma 256 (SHA-256) Untuk Otentikasi pesan Teks,” 2006.
Booch, G James, and R Ivar, “The Unified Modeling Language User Guide Second Edition,” addison Wesley Profesional, 2005.
Adi Nugroho,, “Rekayasa Perangkat Lunak Menggunakan UML dan Java,” Andi Offset, 2010.
A. R. a. M. Shalahuddin, “Rekayasa Perangkat Lunak Struktur dan berorientasi Objek,” Informatika, 2014.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Perancangan Aplikasi Duplicate Video Scanner Menerapkan Algoritma Sha-256
Pages: 25-32
Copyright (c) 2022 Armansyah Ritonga

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).

