scholarly journals PENERAPAN DIGITAL WATERMARK SEBAGAI VALIDASI KEABSAHAN GAMBAR DIGITAL DENGAN SKEMA BLIND WATERMARK

2017 ◽  
Vol 3 (2) ◽  
Author(s):  
Adi Suheryadi

Digital watermarking is an important field of technological development that has now grown in the digital era. Digital era encourage the spread digital images on internet by the websites with a large scale. On the other hand, digital images are objects that are very easy to change or manipulate, and even copied irresponsibly. Meanwhile it is very difficult to prove the image has been changed by existing equipment at this time, and it is difficult to prove its ownership. This is an important issue, when the image is one of the evidences for legal cases, news reporting and medical filing, where the image must be ensured that the digital image is not subject to change or manipulation. In this paper, we present the application of digital watermarking to authentication and ownership validation of digital image so the image can be ascertained its validity. This research applies blind watermark scheme by using secret key that inserted at least-significant bits (LSB) of host image therefore the watermark is invisible watermark. The result of watermarked image has a small decrease in quality with the mean value of PSNR and MSE about 34.08 and 14.62.

Author(s):  
Lemcia Hutajulu ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD4 and SHA-384 methods to detect the originality of digital images, by using this method an image of doubtful authenticity can be found out that the image is authentic or fake.Keywords: Originality, Image, MD4 and SHA-384


Author(s):  
Gokma Lumbantoruan ◽  
Hery Sunandar ◽  
Imam Saputra

Cryptography is used to protect the contents of information from anyone except those who have the authority or secret key to open information that has been encoded. Along with the development of technology and computers, the increase in computer crime has also increased, especially in image manipulation. There are many ways that people use to manipulate images that have a detrimental effect on others.The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is genuine or fake. In this study, the authors used the MD2 and MD4 methods to detect the originality of digital images, by using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake. Keywords: Authenticity, Image, MD2 and MD4


Author(s):  
Imam Saputra ◽  
Surya Darma Nasution

In the digital era, changing human habits, one of the changing habits is in applying for someone's job. Before the digital era, applying for a job by sending an application to the address of the destination company. In the digital era, as now, applying for jobs can be done boldly, and sent in softcopy. This softcopy file forms a digital image that can be easily manipulated. How would it be difficult for the receiving committee to determine the original file with the manipulated a file. With the existing questions, we need a technique that can be used to request the originality of the job application file. One technique that can be used is the hash function that exists in cryptography. The hash function is a one-way function that can be used to find a message. If applied to digital images, the originality of the image can be recognized. The algorithm in the hash function used is Secure Hash Algorithm 256 (SHA256) until now this algorithm cannot be solved by cryptanalysts. By applying the Secure Hash Algorithm 256 algorithm, it will make it easier and faster to access the originality of digital images.


Author(s):  
Putri M Simanullang ◽  
Sinar Sinurat ◽  
Imam Saputra

Cryptography is used to maintain the security of content or information that is personal from anyone except those who have the authority or secret key to open the information that has been encoded. Along with the development of technology and computers now, the increase in computer crime has also increased, especially in image manipulation. Many methods are used and carried out by people to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the image in terms of colors, shapes, objects and information without the slightest change from the other party. Nowadays many digital images circulating on the internet have been manipulated and even images have been used for material fraud in the competition, so we need a method that can detect the image is authentic or fake like a diploma.In this study, the authors used the SHA-384 method to detect the originality of digital images, using this method an image that is still doubtful of its authenticity can be found out that the image is authentic or fake.Keywords: Originality, Citra, SHA-384


Author(s):  
D. P. Gangwar ◽  
Anju Pathania

This work presents a robust analysis of digital images to detect the modifications/ morphing/ editing signs by using the image’s exif metadata, thumbnail, camera traces, image markers, Huffman codec and Markers, Compression signatures etc. properties. The details of the whole methodology and findings are described in the present work. The main advantage of the methodology is that the whole analysis has been done by using software/tools which are easily available in open sources.


Water ◽  
2019 ◽  
Vol 11 (4) ◽  
pp. 649 ◽  
Author(s):  
Quansen Wang ◽  
Jianzhong Zhou ◽  
Kangdi Huang ◽  
Ling Dai ◽  
Gang Zha ◽  
...  

The risk inevitably exists in the process of flood control operation and decision-making of reservoir group, due to the hydrologic and hydraulic uncertain factors. In this study different stochastic simulation methods were applied to simulate these uncertainties in multi-reservoir flood control operation, and the risk caused by different uncertainties was evaluated from the mean value, extreme value and discrete degree of reservoir occupied storage capacity under uncertain conditions. In order to solve the conflict between risk assessment indexes and evaluate the comprehensive risk of different reservoirs in flood control operation schemes, the subjective weight and objective weight were used to construct the comprehensive risk assessment index, and the improved Mahalanobis distance TOPSIS method was used to select the optimal flood control operation scheme. The proposed method was applied to the flood control operation system in the mainstream and its tributaries of upper reaches of the Yangtze River basin, and 14 cascade reservoirs were selected as a case study. The results indicate that proposed method can evaluate the risk of multi-reservoir flood control operation from all perspectives and provide a new method for multi-criteria decision-making of reservoir flood control operation, and it breaks the limitation of the traditional risk analysis method which only evaluated by risk rate and cannot evaluate the risk of the multi-reservoir flood control operation system.


2021 ◽  
Vol 10 (2) ◽  
pp. 85
Author(s):  
Juan Reinoso-Gordo ◽  
Antonio Gámiz-Gordo ◽  
Pedro Barrero-Ortega

Suitable graphic documentation is essential to ascertain and conserve architectural heritage. For the first time, accurate digital images are provided of a 16th-century wooden ceiling, composed of geometric interlacing patterns, in the Pinelo Palace in Seville. Today, this ceiling suffers from significant deformation. Although there are many publications on the digital documentation of architectural heritage, no graphic studies on this type of deformed ceilings have been presented. This study starts by providing data on the palace history concerning the design of geometric interlacing patterns in carpentry according to the 1633 book by López de Arenas, and on the ceiling consolidation in the 20th century. Images were then obtained using two complementary procedures: from a 3D laser scanner, which offers metric data on deformations; and from photogrammetry, which facilitates the visualisation of details. In this way, this type of heritage is documented in an innovative graphic approach, which is essential for its conservation and/or restoration with scientific foundations and also to disseminate a reliable digital image of the most beautiful ceiling of this Renaissance palace in southern Europe.


2020 ◽  
Vol 60 (4) ◽  
pp. 612-622
Author(s):  
Rosina Lozano

The twenty-first century has seen a surge in scholarship on Latino educational history and a new nonbinary umbrella term, Latinx, that a younger generation prefers. Many of historian Victoria-María MacDonald's astute observations in 2001 presaged the growth of the field. Focus has increased on Spanish-surnamed teachers and discussions have grown about the Latino experience in higher education, especially around student activism on campus. Great strides are being made in studying the history of Spanish-speaking regions with long ties to the United States, either as colonies or as sites of large-scale immigration, including Puerto Rico, Cuba, and the Philippines. Historical inquiry into the place of Latinos in the US educational system has also developed in ways that MacDonald did not anticipate. The growth of the comparative race and ethnicity field in and of itself has encouraged cross-ethnic and cross-racial studies, which often also tie together larger themes of colonialism, language instruction, legal cases, and civil rights or activism.


2020 ◽  
Vol 30 (1) ◽  
pp. 240-257
Author(s):  
Akula Suneetha ◽  
E. Srinivasa Reddy

Abstract In the data collection phase, the digital images are captured using sensors that often contaminated by noise (undesired random signal). In digital image processing task, enhancing the image quality and reducing the noise is a central process. Image denoising effectively preserves the image edges to a higher extend in the flat regions. Several adaptive filters (median filter, Gaussian filter, fuzzy filter, etc.) have been utilized to improve the smoothness of digital image, but these filters failed to preserve the image edges while removing noise. In this paper, a modified fuzzy set filter has been proposed to eliminate noise for restoring the digital image. Usually in fuzzy set filter, sixteen fuzzy rules are generated to find the noisy pixels in the digital image. In modified fuzzy set filter, a set of twenty-four fuzzy rules are generated with additional four pixel locations for determining the noisy pixels in the digital image. The additional eight fuzzy rules ease the process of finding the image pixels,whether it required averaging or not. In this scenario, the input digital images were collected from the underwater photography fish dataset. The efficiency of the modified fuzzy set filter was evaluated by varying degrees of Gaussian noise (0.01, 0.03, and 0.1 levels of Gaussian noise). For performance evaluation, Structural Similarity (SSIM), Mean Structural Similarity (MSSIM), Mean Square Error (MSE), Normalized Mean Square Error (NMSE), Universal Image Quality Index (UIQI), Peak Signal to Noise Ratio (PSNR), and Visual Information Fidelity (VIF) were used. The experimental results showed that the modified fuzzy set filter improved PSNR value up to 2-3 dB, MSSIM up to 0.12-0.03, and NMSE value up to 0.38-0.1 compared to the traditional filtering techniques.


2014 ◽  
Vol 611 ◽  
pp. 490-495
Author(s):  
Martin Schrötter ◽  
Martin Hagara ◽  
Matúš Kalina

The aim of this article is to present the influence of stochastic pattern on results accuracy of digital image correlation method in plastic areas. The various types of stochastic patterns were applied on testing specimens which were then tensioned. There was correlated the intensity of black and white color (denoted as grey value) dispersed on a specimen, then the mean value of estimated error for unloaded state as well as state of highest measured deformation and finally the amount of non-correlated facets. Also the maximal deformation of specimens was compared by which the damage of stochastic pattern emerged.


Sign in / Sign up

Export Citation Format

Share Document