Implementasi Algoritma Fungsi Hash Grostl Untuk Mendeteksi Orisinalitas Citra Digital
DOI:
https://doi.org/10.30865/komik.v4i1.2709Abstract
Image modification is the process of manipulating part or all of the image area with the help of digital image processing techniques. Image fakes are generally difficult to analyze with the naked eye because the resulting image from the image modification process is difficult to distinguish with the naked eye. The ease of creating and changing an image can damage the credibility of the authenticity of the image in various aspects, thus making it prone to be used for criminal acts because image changes in digital images can change the information conveyed to be different. This is the basis of this research to detect the authenticity of an image. The Grostl method is a hash function to detect changes in digital images, the Grostl hash function is used to determine whether an image has been modified or not. The application of the Grostl method to generate a hash code from a digital image begins by inputting the digital image as the object to be hashed.
Keywords: Image Originality, Hash, GrostlReferences
E. P. Purwandari, “deteksi pemalsuan copy-move duplicated region pada citra digital,†pp. 24–31, 2014.
K. A. Des, A. E. S. Rijndael, R. N. Ibrahim, K. A. Des, and A. Rijndael, “Blowfish untuk keamanan citra digital dengan menggunakan metode discrete wavelet transformation ( DWT ),†vol. 6, no. 2, pp. 82–95, 2012.
Kai Guo and Howard M. Heys “A Pipelined Implementation of The Grostl Hash Algorithm and The Advanced Encryption Standard†Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland,2013.
Team dosen pengampu Metode Penelitian, “Metode Penelitian Manajemen dan Teknik Informatika,†STMIK Budi Darma, 2017
Sumandri, “Studi Model Algoritma Kriptografi Klasik dan Modern,â€Universitas Negeri Yogyakarta, 2017
Arif Prayitno, Nurdin N“ANALISA DAN IMPLEMENTASI KRIPTOGRAFI PADA PESAN RAHASIA MENGGUNAKAN ALGORITMA CIPHER TRANSPOSITION,†Jurnal Elektronik Sistem Informasi dan Komputer, Vol.3 No.1 Januari-Juni 2017
Emy Setyaningsih, S.Si., M.Kom, “Kriptografi & Implementasinya menggunakan MATLAB,†Yogyakarta: Penerbit Andi, 2015.
G. G. Maulana, “Pembelajaran Dasar Algoritma Dan Pemrograman Menggunakan El-Goritma Berbasis Web,†J. Tek. Mesin, vol. 06, no. 2, pp. 69–73, 2017.
M. Albadr Lutan Nasution and 13508011,1†Studi dan Implementasi HMAC dengan Fungsi Hash Grøstl dan Perbandingannya dengan CMAC dengan Algoritma Cipher Blok AESâ€, Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia
Dani Rohpandi1), Asep Sugiharto2), Giri Aji Winara3â€Aplikasi Pengolahan Citra Dalam Pengenalan Pola Huruf Ngalagena Menggunakan MATLAB.†Konferensi Nasional Sistem & Informatika, STMIK STIKOM Bali, 9 – 10 Oktober 2015
Darma Putra, “Pengolahan Citra digital,â€Yogyakarta: Penerbit Andi, 2010.
Rosa A.S dan M. Shalahuddin, “Rekayasa Perangkat Lunak Struktur dan Berorientasi Objek," Bandung, 2014.
Wahana Komputer, “Ragam Aplikasi Pengolahan Image dengan MATLAB," Jakarta: PT Elex Media Komputindo, 2013.

