scholarly journals Implementasi Algoritma Ripemd160 Untuk Mendeteksi Keaslian Sertifikat Tanah

Author(s):  
Joslin Nababan ◽  
Pristiwanto Pristiwanto ◽  
M Sayuthi

In this era, land certificates are often used as collateral to apply for loan money, both directly and online, so the security of land certificates needs to be improved. Land certificates in digital form, the manipulation process is very easy. Today there is a lot of software that can be used to manipulate digital images. With the sophistication of the software it can make manipulated digital images difficult for humans to know directly. The process of manipulation of digital data is also easy to do, so it needs a mechanism to know that a digital certificate, does not change from the original. In cryptography, there are various methods that can be used to secure a data, both to maintain the confidentiality of the data, and detect the authenticity of the data. One technique that can be used is the hash function in cryptography. The hash function is a one-way function that can be used to determine the authentication of a message. To ensure an original document or not, there are several methods with the concept of authentication, and can detect document changes from the results of manipulation, one of which is the RIPEMD160 algorithm. Applying the RIPEMD160 algorithm will make it easier and faster to detect the authenticity of digital images.Keywords: cryptography, Hash Function, RIPEMD160

Author(s):  
Imam Saputra ◽  
Surya Darma Nasution

In the digital era, changing human habits, one of the changing habits is in applying for someone's job. Before the digital era, applying for a job by sending an application to the address of the destination company. In the digital era, as now, applying for jobs can be done boldly, and sent in softcopy. This softcopy file forms a digital image that can be easily manipulated. How would it be difficult for the receiving committee to determine the original file with the manipulated a file. With the existing questions, we need a technique that can be used to request the originality of the job application file. One technique that can be used is the hash function that exists in cryptography. The hash function is a one-way function that can be used to find a message. If applied to digital images, the originality of the image can be recognized. The algorithm in the hash function used is Secure Hash Algorithm 256 (SHA256) until now this algorithm cannot be solved by cryptanalysts. By applying the Secure Hash Algorithm 256 algorithm, it will make it easier and faster to access the originality of digital images.


2021 ◽  
pp. 003452372098420
Author(s):  
Neil Selwyn ◽  
Luci Pangrazio ◽  
Bronwyn Cumbo

Contemporary schooling is seen to be altering significantly in light of a combined ‘digitisation’ and ‘datafication’ of key processes. This paper examines the nature and conditions of the datafied school by exploring how a relatively prosaic and longstanding school metric (student attendance data) is being produced and used in digital form. Drawing on empirical data taken from in-depth qualitative studies in three contrasting Australian secondary schools, the paper considers ‘anticipatory’, ‘analytical’ and ‘administrative’ aspects of how digitally-mediated attendance data is produced, used and imagined by school staff. Our findings foreground a number of constraints, compromises and inconsistencies that are usually glossed-over in enthusiasms for ‘data-driven’ education. It is argued that these findings highlight the messy realities of schools’ current relationships with digital data, and the broader logics of school datafications.


Thesis Eleven ◽  
2019 ◽  
Vol 153 (1) ◽  
pp. 9-23 ◽  
Author(s):  
Christopher John Müller

This essay traces the complex constellation of ideas that informs Anders's turn to the generalizing expression ‘the human’ in his postwar work. It mobilizes the properties of radioactive material and digital data, which are both curiously imperceptible to our senses, to discuss Anders’s insistence on the universalizing pronoun `we' and assess its significance in the contemporary world. To do so, it aligns Anders's work with current debates about the Anthropocene and critiques of the use of the term ‘the human’ in postcolonial settings.


2017 ◽  
Vol 10 (13) ◽  
pp. 385
Author(s):  
Jincy J Fernandez ◽  
Nithyanandam Pandian ◽  
Raghuvamsh Chavali ◽  
Ashwanth Kumar Appalaghe

In today’s internet world, all the data are represented and stored in digital form. Almost any entity in this world can be represented digitally, ranging from simple text to complex multimedia work. Now, the challenge is to claim the ownership and prevent theft of one’s own digital data. Multimedia theft has driven the attention of many stakeholders who spend huge money and precious time in creating or making such valuable digital data. Among all the multimedia entities, image files are more vulnerable for theft since it is the basic component of any visuals. The notion of this research work is to propose an image theft detection model which will determine whether partial theft or complete theft of an image has occurred or not. A biometric feature, i.e., fingerprint of the owner is embedded on the digital image at a micro level, such that even a very small portion of image theft can be determined, and the ownership of the image can be claimed by the owner. This research is limited to the spatial domain, i.e. raw image. Assessment metrics of the results shows that embedding the biometric feature on an image does not distort the image quality and its artifacts.


1988 ◽  
Vol 5 (2) ◽  
pp. 117-120
Author(s):  
Roger H. Greene

Abstract Airborne video data in digital form provides an inexpensive alternative to aerial photography to provide up-to-date information on the size, kinds, and distribution of forest types. Its capability to be incorporated into a geographic information system can augment the value of information produced during analysis. In Maine, Landmark Applied Technologies has developed and is using a system which includes acquiring the video imagery, extracting scenes in digital form, analyzing these data, and incorporating them into an Intergraph GIS to provide a mechanism for rapid updating of spatial data bases. North. J. Appl. For. 5:117-120, June 1988.


Information ◽  
2019 ◽  
Vol 10 (11) ◽  
pp. 332 ◽  
Author(s):  
Kenneth Thibodeau

This paper presents Constructed Past Theory, an epistemological theory about how we come to know things that happened or existed in the past. The theory is expounded both in text and in a formal model comprising UML class diagrams. The ideas presented here have been developed in a half century of experience as a practitioner in the management of information and automated systems in the US government and as a researcher in several collaborations, notably the four international and multidisciplinary InterPARES projects. This work is part of a broader initiative, providing a conceptual framework for reformulating the concepts and theories of archival science in order to enable a new discipline whose assertions are empirically and, wherever possible, quantitatively testable. The new discipline, called archival engineering, is intended to provide an appropriate, coherent foundation for the development of systems and applications for managing, preserving and providing access to digital information, development which is necessitated by the exponential growth and explosive diversification of data recorded in digital form and the use of digital data in an ever increasing variety of domains. Both the text and model are an initial exposition of the theory that both requires and invites further development.


2000 ◽  
Vol 29 (1) ◽  
Author(s):  
Robin Dale

The goal of this project report, sponsored by The National Endowment for the Humanities, Division of Preservation and Access, is “to offer some guidance to libraries, archives, and museums in their efforts to convert photographic collections to digital form.” To date, there are no standards for measuring the quality of digital images created from photographs. Therefore, this report is primarily concerned with developing tools to measure image quality. Other technical and managerial issues related to digital imaging projects in general are also addressed.


2021 ◽  
Vol 3 (2) ◽  
pp. 65-72
Author(s):  
Muhammad Rehan Anwar ◽  
Desy Apriani ◽  
Irsa Rizkita Adianita

The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message authentication codes (MACs). In the current development of certificate data security, there are 2 (two) types of hashes that are widely applied, namely, MD and SHA. However, when it comes to efficiency, in this study the hash type SHA-256 is used because it can be calculated faster with a better level of security. In the hypothesis, the Merkle-Damgård construction method is also proposed to support data integrity verification. Moreover, a cryptographic hash function is a one-way function that converts input data of arbitrary length and produces output of a fixed length so that it can be used to securely authenticate users without storing passwords locally. Since basically, cryptographic hash functions have many different uses in various situations, this research resulted in the use of hash algorithms in verifying the integrity and authenticity of certificate information.


2021 ◽  
Vol 2 ◽  
pp. 75-80
Author(s):  
Martin Misut ◽  
Pavol Jurik

The digital transformation of business in the light of opportunities and focusing on the challenges posed by the introduction of Big Data in enterprises allows for a more accurate reflection of the internal and external environmental stimuli. Intuition ceases to be present in the decision-making process, and decision-making becomes strictly data-based. Thus, the precondition for data-based decision-making is relevant data in digital form, resulting from data processing. Datafication is the process by which subjects, objects and procedures are transformed into digital data. Only after data collection can other natural steps occur to acquire knowledge to improve the company's results if we move in the industry's functioning context. The task of finding a set of attributes (selecting attributes from a set of available attributes) so that a suitable alternative can be determined in its decision-making is analogous to the task of classification. Decision trees are suitable for solving such a task. We verified the proposed method in the case of logistics tasks. The analysis subject was tasks from logistics and 80 well-described quantitative methods used in logistics to solve them. The result of the analysis is a matrix (table), in which the rows contain the values of individual attributes defining a specific logistic task. The columns contain the values of the given attribute for different tasks. We used Incremental Wrapper Subset Selection IWSS package Weka 3.8.4 to select attributes. The resulting classification model is suitable for use in DSS. The analysis of logistics tasks and the subsequent design of a classification model made it possible to reveal the contours of the relationship between the characteristics of a logistics problem explicitly expressed through a set of attributes and the classes of methods used to solve them.


2014 ◽  
Vol 577 ◽  
pp. 820-823
Author(s):  
Shu Jing Gao ◽  
Ting Qiang Song ◽  
Wei Zhang

Pseudorandom Generators is an important notion of cryptography. A new randomized iterating method of one-way function is proposed, after the analyzing of current research on pseudorandom generators based on one-way function. On the basis of this randomized iteration, a pseudorandom generator with linear seeds length is constructed using general regular one-way function and universal hash function. The output sequence of the proposed PRNG is unpredictable and the length of the seeds is linear to the input length of the one-way function.


Sign in / Sign up

Export Citation Format

Share Document