PERBANDINGAN METODE MD4 DAN SHA 384 UNTUK MENDETEKSI ORISINALITAS CITRA DIGITAL

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384

Author(s):  
Gokma Lumbantoruan ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others.The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD2 and MD4 methods to detect the originality of digital images, by using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake. Keywords: Authenticity, Image, MD2 and MD4


Author(s):  
Putri M Simanullang ◽  
Sinar Sinurat ◽  
Imam Saputra

Cryptography is used to maintain the security of content or information that is personal from anyone except those who have the authority or secret key to open the information that has been encoded. Along with the development of technology and computers now, the increase in computer crime has also increased, especially in image manipulation. Many methods are used and carried out by people to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is authentic or fake like a diploma.In this study, the authors used the SHA-384 method to detect the originality of digital images, using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake.Keywords: Originality, Citra, SHA-384


2017 ◽  
Vol 3 (2) ◽  
Author(s):  
Adi Suheryadi

Digital watermarking is an important field of technological development that has now grown in the digital era. Digital era encourage the spread digital images on internet by the websites with a large scale. On the other hand, digital images are objects that are very easy to change or manipulate, and even copied irresponsibly. Meanwhile it is very difficult to prove the image has been changed by existing equipment at this time, and it is difficult to prove its ownership. This is an important issue, when the image is one of the evidences for legal cases, news reporting and medical filing, where the image must be ensured that the digital image is not subject to change or manipulation. In this paper, we present the application of digital watermarking to authentication and ownership validation of digital image so the image can be ascertained its validity. This research applies blind watermark scheme by using secret key that inserted at least-significant bits (LSB) of host image therefore the watermark is invisible watermark. The result of watermarked image has a small decrease in quality with the mean value of PSNR and MSE about 34.08 and 14.62.


2020 ◽  
Vol 55 (2) ◽  
Author(s):  
Azal Habeeb

Information is always being transmitted through the internet. Securing that information is an important issue that programmers need to take into consideration. There are several ways to protect digital images, one of which is steganography, a method of encryption that encrypts information inside another type of information such as images. In this research, we propose a new technique to protect information from hacking. We have used the process of hiding. There are many techniques to secure the image such as hiding information inside other information as in steganography. In this paper, we introduce a new method to protect the information from theft. We used encryption to encrypt the text by using the password between the sender and the receiver. After that we used the least significant bit technique to hide the text in the image. Finally, we applied the proposed method in the MATLAB program.


2009 ◽  
Vol 133 (1) ◽  
pp. 57-61 ◽  
Author(s):  
Jeffery Pinco ◽  
Robert A. Goulart ◽  
Christopher N. Otis ◽  
Jane Garb ◽  
Liron Pantanowitz

Abstract Context.—Digital images have become an important component of cytology practice. They are used in telecytology, automated screening, educational material, and Web sites and have potential for use in proficiency testing. However, there has been no formal evaluation to date to determine if digital image manipulation (intentional or unintentional) can affect their interpretation. Objective.—To investigate whether alteration of digital cytology images affects diagnosis. Design.—Acquired digital images of ThinPrep Papanicolaou test slides were manipulated (rotated 90;dg and brightness, contrast, red-green-blue color, and luminosity adjusted) using Photoshop. A test composed of these altered images, along with their original (unaltered) image and exact duplicates was given to 22 cytologists (13 cytotechnologists, 8 cytopathologists, and 1 fellow). All images were rated as negative, atypical (atypical squamous cells of undetermined significance), low-grade squamous intraepithelial lesion, high-grade squamous intraepithelial lesion, or positive for cancer. Weighted κ and heterogeneity χ2 statistics were used to measure levels of agreement and assess concordance between groups. Results.—The level of agreement for identical duplicate images was excellent (κ = 0.81), compared with the poor agreement for manipulated image pairs (κ = 0.21), a statistically significant difference (P < .001). For all altered image types agreement was poor. There was no significant difference between cytotechnologists and cytopathologists in level of agreement (P = .56). Conclusions.—Manipulation of a Papanicolaou test digital image, irrespective of the specific category of cytologic material photographed, significantly affects its interpretation by both cytotechnologists and cytopathologists. This suggests that care needs to be taken when digital cytology images are used, to specifically ensure that their alteration does not affect diagnosis.


Cyber Crime ◽  
2013 ◽  
pp. 587-599
Author(s):  
Nikos Tsirakis

This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the ease by which images can be duplicated and distributed has led to the need for effective copyright protection tools and techniques in order to provide a secure way to the producers and the owners of these media files. These techniques are described below with an introduction to information hiding. Various software products have been introduced with an aim to address these growing concerns; some categories are presented here. The fundamental technique which allows an individual to add hidden copyright notices or other verification messages to digital images is called digital image watermarking and constitutes the main part of the chapter. Finally authors provide future trends and directions of image watermarking.


The process of hiding data and information is known to be steganography it is done to provide secure communication, in present world there is a demand of sending and displaying data in a hidden format especially when the exchange of information and data is taking place publically, and this is the reason because of which many methods have been proposed for data and information hiding. In this paper data and information are being hidden in digital image format, as it is mostly in demand on the internet. For data hiding there are so many techniques developed some are easy, some are bit tedious as compared to the other and all of these techniques have their own benefits, use and limitation. This paper mainly focuses to present Steganography overview, its demand, advantages and the techniques involved in it. In this paper there is also an attempt to identify which Steganography techniques are more useful and what are their requirements and also it shows which application will have more compatibility with which steganography technique.


2019 ◽  
Vol 21 (1) ◽  
pp. 54-63
Author(s):  
Irwansyah Irwansyah ◽  
Helda Yudiastuti

The development of information technology is not only beneficial for humans, but often also used for negative purposes. Crime by utilizing digital image technology is very easy to do using a computer, so it is not surprising if more and more cases of cybercrime occur. The spread of digital images on social media in the form of images or videos raises public anxiety that these images or videos cannot be considered reliable evidence, because both images and videos can be easily engineered. The purpose of this study is to analyze a digital image that has been manipulated or engineered using a particular software or program. Image manipulation techniques that will be used are: Image splicing, copy-move, and retouching images. While the analysis tool uses the ELA method introduced by Krawetz which is available online from the website (https://29a.ch/photo-forensics/#forensic-magnifier) ​​and Jpegsnoop software.


Author(s):  
Nikos Tsirakis

This chapter describes image watermarking, the most common and widespread category of media files are images. The evolution of the Internet and the ease by which images can be duplicated and distributed has led to the need for effective copyright protection tools and techniques in order to provide a secure way to the producers and the owners of these media files. These techniques are described below with an introduction to information hiding. Various software products have been introduced with an aim to address these growing concerns; some categories are presented here. The fundamental technique which allows an individual to add hidden copyright notices or other verification messages to digital images is called digital image watermarking and constitutes the main part of the chapter. Finally authors provide future trends and directions of image watermarking.


2000 ◽  
Vol 29 (2) ◽  
Author(s):  
John R. Stokes

JJT, Inc. (JJT) has been digitizing images from pictorial collections since shortly after its incorporation in 1995. However, its key imaging personnel's experience with digital images dates back to 1989 when they first used a Sony digital video camera and Targa board to capture images from 35mm film and generated digital intermediates in the process of creating videotape masters for making videodisc. At the time, digital images were a byproduct of the transfer process. These images have since been recovered and placed on the Internet as part of the Library of Congress American Memory project. They have continued to participate in the evolution of the digital image process.


Sign in / Sign up

Export Citation Format

Share Document