“Computer Crime” Discussed

2007 ◽  
pp. 23-47
Author(s):  
Anthony Reyes ◽  
Kevin O'Shea ◽  
Jim Steele ◽  
Jon R. Hansen ◽  
Benjamin R. Jean ◽  
...  
Keyword(s):  
Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


2000 ◽  
Vol 30 (3) ◽  
pp. 3-9 ◽  
Author(s):  
Herman T. Tavani
Keyword(s):  

1996 ◽  
Author(s):  
J. Austen
Keyword(s):  

Criminology ◽  
1988 ◽  
Vol 26 (1) ◽  
pp. 101-126 ◽  
Author(s):  
RICHARD C. HOLLINGER ◽  
LONN LANZA-KADUCE
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document