scholarly journals Analisa Algoritma SHA-256 Untuk Mendeteksi Orisinalitas Citra Digital

Author(s):  
Imam Saputra ◽  
Surya Darma Nasution

In the digital era, changing human habits, one of the changing habits is in applying for someone's job. Before the digital era, applying for a job by sending an application to the address of the destination company. In the digital era, as now, applying for jobs can be done boldly, and sent in softcopy. This softcopy file forms a digital image that can be easily manipulated. How would it be difficult for the receiving committee to determine the original file with the manipulated a file. With the existing questions, we need a technique that can be used to request the originality of the job application file. One technique that can be used is the hash function that exists in cryptography. The hash function is a one-way function that can be used to find a message. If applied to digital images, the originality of the image can be recognized. The algorithm in the hash function used is Secure Hash Algorithm 256 (SHA256) until now this algorithm cannot be solved by cryptanalysts. By applying the Secure Hash Algorithm 256 algorithm, it will make it easier and faster to access the originality of digital images.

2021 ◽  
Vol 3 (2) ◽  
pp. 65-72
Author(s):  
Muhammad Rehan Anwar ◽  
Desy Apriani ◽  
Irsa Rizkita Adianita

The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message authentication codes (MACs). In the current development of certificate data security, there are 2 (two) types of hashes that are widely applied, namely, MD and SHA. However, when it comes to efficiency, in this study the hash type SHA-256 is used because it can be calculated faster with a better level of security. In the hypothesis, the Merkle-Damgård construction method is also proposed to support data integrity verification. Moreover, a cryptographic hash function is a one-way function that converts input data of arbitrary length and produces output of a fixed length so that it can be used to securely authenticate users without storing passwords locally. Since basically, cryptographic hash functions have many different uses in various situations, this research resulted in the use of hash algorithms in verifying the integrity and authenticity of certificate information.


Author(s):  
Muhammad Asghar Nazal ◽  
Reza Pulungan ◽  
Mardhani Riasetiawan

Data security is a very important compilation using cloud computing; one of the research that is running and using cloud technology as a means of storage is G-Connect. One of the developments made by the G-Connect project is about data security; most of the problems verification of the data sent. In previous studies, Keccak and RSA algorithms have implemented for data verification needs. But after a literature study of other algorithms that can make digital signatures, we found what is meant by an algorithm that is better than RSA in rectangular speeds, namely Digital Signature Algorithm (DSA).DSA is one of the key algorithms used for digital signatures, but because DSA still uses Secure Hash Algorithm (SHA-1) as an algorithm for hashes, DSA rarely used for data security purposes, so Keccak is used instead of the hash algorithm on DSA. Now, Keccak become the standard for the new SHA-3 hash function algorithm. Because of the above problems, the focus of this research is about data verification using Keccak and DSA. The results of the research are proven that Keccak can run on DSA work system, obtained a comparison of execution time process between DSA and RSA where both use Keccak.


2017 ◽  
Vol 3 (2) ◽  
Author(s):  
Adi Suheryadi

Digital watermarking is an important field of technological development that has now grown in the digital era. Digital era encourage the spread digital images on internet by the websites with a large scale. On the other hand, digital images are objects that are very easy to change or manipulate, and even copied irresponsibly. Meanwhile it is very difficult to prove the image has been changed by existing equipment at this time, and it is difficult to prove its ownership. This is an important issue, when the image is one of the evidences for legal cases, news reporting and medical filing, where the image must be ensured that the digital image is not subject to change or manipulation. In this paper, we present the application of digital watermarking to authentication and ownership validation of digital image so the image can be ascertained its validity. This research applies blind watermark scheme by using secret key that inserted at least-significant bits (LSB) of host image therefore the watermark is invisible watermark. The result of watermarked image has a small decrease in quality with the mean value of PSNR and MSE about 34.08 and 14.62.


Agribusiness is the most important process in our Nation. But nowadays, because of movement of individuals from provincial to urban there is prevention in agriculture. So to conquer this issue we go for shrewd horticulture procedures utilizing IoT. This undertaking incorporates different highlights like GPS based remote controlled checking, dampness and temperature detecting, gatecrashers startling, security, leaf wetness and legitimate water system offices. To ensure the safety of their financial transactions new crypto graphical algorithms was introduced already. We are making one such website and app for placing online auctions and providing an audience to them. The app has been designed using RESTful - API to sync its database with the website. And to encrypt the transactions we will be using SHA-256, a one way crypto-hash function, which only encrypts the data and doesn't decrypt it, making it a secure Hash Algorithm


2021 ◽  
Vol 2 (4) ◽  
pp. 227-234
Author(s):  
Dermawan Lumban Toruan

Document file is a means of transforming information from one person to another or from a group to another. The development of computerized technology has greatly increased. Document files are very vulnerable to fraud, eavesdropping or data theft by irresponsible parties. In order to maintain the security of document files, this can be done by using cryptographic techniques. Cryptography is the science of keeping data secure. Cryptography is one of the data security methods that can be used to maintain data authenticity, data confidentiality, and the authenticity of data transmission. SHA, which stands for Secure Hash Algorithm, is a standard hash function published by NIST (National Institute of Standards and Technology), (NIST, 1995a). This study will use the SHA-1 method to secure the authenticity of document files, document confidentiality, document integrity, and document authentication. This study describes the security process for detecting the authenticity of document files using the SHA-1 method in the form of detection so that confidential documents sent via public telecommunications cannot be changed or modified by unauthorized persons or unauthorized persons. This is done as an effort to minimize acts of fraud, hoaxes, or misuse of document files.


Author(s):  
Joslin Nababan ◽  
Pristiwanto Pristiwanto ◽  
M Sayuthi

In this era, land certificates are often used as collateral to apply for loan money, both directly and online, so the security of land certificates needs to be improved. Land certificates in digital form, the manipulation process is very easy. Today there is a lot of software that can be used to manipulate digital images. With the sophistication of the software it can make manipulated digital images difficult for humans to know directly. The process of manipulation of digital data is also easy to do, so it needs a mechanism to know that a digital certificate, does not change from the original. In cryptography, there are various methods that can be used to secure a data, both to maintain the confidentiality of the data, and detect the authenticity of the data. One technique that can be used is the hash function in cryptography. The hash function is a one-way function that can be used to determine the authentication of a message. To ensure an original document or not, there are several methods with the concept of authentication, and can detect document changes from the results of manipulation, one of which is the RIPEMD160 algorithm. Applying the RIPEMD160 algorithm will make it easier and faster to detect the authenticity of digital images.Keywords: cryptography, Hash Function, RIPEMD160


2022 ◽  
Vol 30 (1) ◽  
pp. 581-603
Author(s):  
Shamsiah Suhaili ◽  
Norhuzaimin Julai

Security has grown in importance as a study issue in recent years. Several cryptographic algorithms have been created to increase the performance of these information-protecting methods. One of the cryptography categories is a hash function. This paper proposes the implementation of the SHA-256 (Secure Hash Algorithm-256) hash function. The unfolding transformation approach was presented in this study to enhance the throughput of the SHA-256 design. The unfolding method is employed in the hash function by producing the hash value output based on modifying the SHA-256 structure. In this unfolding method, SHA-256 decreases the number of clock cycles required for traditional architecture by a factor of two, from 64 to 34 because of the delay. To put it another way, one cycle of the SHA-256 design can generate up to four parallel inputs for the output. As a result, the throughput of the SHA-256 design can be improved by reducing the number of cycles by 16 cycles. ModelSim was used to validate the output simulations created in Verilog code. The SHA-256 hash function factor four hardware implementation was successfully tested using the Altera DE2-115 FPGA board. According to timing simulation findings, the suggested unfolding hash function with factor four provides the most significant throughput of around 4196.30 Mbps. In contrast, the suggested unfolding with factor two surpassed the classic SHA-256 design in terms of maximum frequency. As a result, the throughput of SHA-256 increases 13.7% compared to unfolding factor two and 58.1% improvement from the conventional design of SHA-256 design.


Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Sign in / Sign up

Export Citation Format

Share Document