Penerapan Metode Digital Watermarking dan Privilege pada Dokumen Skripsi
Abstract
Dengan perkembangan perangkat komputer dan internet yang semakin pesat menjadikan pertukaran data dan informasi secara digital semakin banyak digunakan. Namun sebagian dari data tersebut harusnya tidak dapat didistribusi atau dimodifikasi secara bebas (tanpa izin), karena mengandung hak kekayaan intelektual penciptanya. Secara garis besar sistem ini memiliki dua inputan yaitu dokumen dan gambar yang mana gambar dijadikan sebagai watermark pada dokumen, kemudian dilanjutkan dengan melakukan proses privilege/disable copy print. Hasil dari penelitian ini adalah sistem berhasil menerapkan layanan watermarking dan disable copy print terhadap file dokumen skripsi di semua flatfoam, kecuali disable copy print belum berhasil di terapkan pada priview di sistem operasi linux.
Downloads
References
H. Azis, “Network steganography system using covert channel for LSBS stego data on VOIP communication,” Int. J. Eng. Adv. Technol., vol. 8, no. 5, pp. 1448–1449, 2019.
H. Azis and F. Fattah, “Analisis Layanan Keamanan Sistem Kartu Transaksi Elektronik Menggunakan Metode Penetration Testing,” Ilk. J. Ilm., vol. 11, no. 2, p. 167, 2019.
H. Azis and R. Wardoyo, “Penerapan Network Steganography Menggunakan Metode Modifikasi LACK Dan Layanan Message Authentication Code Pada Voip Network Steganography System with modification of LACK and Message Authentication Code on VoIP,” Semin. Nas. Komun. dan Inform., pp. 13–19, 2015.
Y. Salim and H. Azis, “Metode Digital Watermark Pada File Penelitian Dosen,” Ilk. J. Ilm., vol. 9, no. 2, pp. 161–166, 2017.
M. Nazeri, A. Rezai, and H. Azis, “An Efficient Architecture for Golay Code Encoder,” Proc. - 2nd East Indones. Conf. Comput. Inf. Technol. Internet Things Ind. EIConCIT 2018, pp. 114–117, 2018.
F. Muharram, H. Azis, and A. R. Manga, “Analisis Algoritma pada Proses Enkripsi dan Dekripsi File Menggunakan Advanced Encryption Standard (AES),” Pros. Semin. Nas. Ilmu Komput. dan Teknol. Inf., vol. 3, no. 2, pp. 112–115, 2018.
A. Djamalilleil, M. Muslim, Y. Salim, E. I. Alwi, H. Azis, and Herman, “Modified Transposition Cipher Algorithm for Images Encryption,” Proc. - 2nd East Indones. Conf. Comput. Inf. Technol. Internet Things Ind. EIConCIT 2018, pp. 1–4, 2018.
Authors retain copyright and full publishing rights to their articles. Upon acceptance, authors grant Indonesian Journal of Data and Science a non-exclusive license to publish the work and to identify itself as the original publisher.
Self-archiving. Authors may deposit the submitted version, accepted manuscript, and version of record in institutional or subject repositories, with citation to the published article and a link to the version of record on the journal website.
Commercial permissions. Uses intended for commercial advantage or monetary compensation are not permitted under CC BY-NC 4.0. For permissions, contact the editorial office at [editorial email/contact form].
Legacy notice. Some earlier PDFs may display “Copyright © [Journal Name]” or only a CC BY-NC logo without the full license text. For the avoidance of doubt, authors hold copyright, and all articles are distributed under CC BY-NC 4.0. Where any discrepancy exists, this policy and the article landing-page license statement prevail.