Implementasi Algoritma Fungsi Hash Grostl Untuk Mendeteksi Orisinalitas Citra Digital

 (*)Wahyu Satria Putra Zega Mail (Universitas Budi Darma, Medan, Indonesia)
 Herry Sunandar (Universitas Budi Darma, Medan, Indonesia)
 Suginam Suginam (Universitas Budi Darma, Medan, Indonesia)

(*) Corresponding Author

DOI: http://dx.doi.org/10.30865/komik.v4i1.2709

Abstract

Image modification is the process of manipulating part or all of the image area with the help of digital image processing techniques. Image fakes are generally difficult to analyze with the naked eye because the resulting image from the image modification process is difficult to distinguish with the naked eye. The ease of creating and changing an image can damage the credibility of the authenticity of the image in various aspects, thus making it prone to be used for criminal acts because image changes in digital images can change the information conveyed to be different. This is the basis of this research to detect the authenticity of an image. The Grostl method is a hash function to detect changes in digital images, the Grostl hash function is used to determine whether an image has been modified or not. The application of the Grostl method to generate a hash code from a digital image begins by inputting the digital image as the object to be hashed.

Keywords: Image Originality, Hash, Grostl

Full Text:

PDF


Article Metrics

Abstract view : 146 times
PDF - 7 times

References

E. P. Purwandari, “deteksi pemalsuan copy-move duplicated region pada citra digital,” pp. 24–31, 2014.

K. A. Des, A. E. S. Rijndael, R. N. Ibrahim, K. A. Des, and A. Rijndael, “Blowfish untuk keamanan citra digital dengan menggunakan metode discrete wavelet transformation ( DWT ),” vol. 6, no. 2, pp. 82–95, 2012.

Kai Guo and Howard M. Heys “A Pipelined Implementation of The Grostl Hash Algorithm and The Advanced Encryption Standard” Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland,2013.

Team dosen pengampu Metode Penelitian, “Metode Penelitian Manajemen dan Teknik Informatika,” STMIK Budi Darma, 2017

Sumandri, “Studi Model Algoritma Kriptografi Klasik dan Modern,”Universitas Negeri Yogyakarta, 2017

Arif Prayitno, Nurdin N“ANALISA DAN IMPLEMENTASI KRIPTOGRAFI PADA PESAN RAHASIA MENGGUNAKAN ALGORITMA CIPHER TRANSPOSITION,” Jurnal Elektronik Sistem Informasi dan Komputer, Vol.3 No.1 Januari-Juni 2017

Emy Setyaningsih, S.Si., M.Kom, “Kriptografi & Implementasinya menggunakan MATLAB,” Yogyakarta: Penerbit Andi, 2015.

G. G. Maulana, “Pembelajaran Dasar Algoritma Dan Pemrograman Menggunakan El-Goritma Berbasis Web,” J. Tek. Mesin, vol. 06, no. 2, pp. 69–73, 2017.

M. Albadr Lutan Nasution and 13508011,1” Studi dan Implementasi HMAC dengan Fungsi Hash Grøstl dan Perbandingannya dengan CMAC dengan Algoritma Cipher Blok AES”, Institut Teknologi Bandung, Jl. Ganesha 10 Bandung 40132, Indonesia

Dani Rohpandi1), Asep Sugiharto2), Giri Aji Winara3”Aplikasi Pengolahan Citra Dalam Pengenalan Pola Huruf Ngalagena Menggunakan MATLAB.” Konferensi Nasional Sistem & Informatika, STMIK STIKOM Bali, 9 – 10 Oktober 2015

Darma Putra, “Pengolahan Citra digital,”Yogyakarta: Penerbit Andi, 2010.

Rosa A.S dan M. Shalahuddin, “Rekayasa Perangkat Lunak Struktur dan Berorientasi Objek," Bandung, 2014.

Wahana Komputer, “Ragam Aplikasi Pengolahan Image dengan MATLAB," Jakarta: PT Elex Media Komputindo, 2013.

Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Implementasi Algoritma Fungsi Hash Grostl Untuk Mendeteksi Orisinalitas Citra Digital

Refbacks

  • There are currently no refbacks.


Copyright (c) 2021 KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)




KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer)
P3M STMIK Budi Darma
Sekretariat Jln. Sisingamangaraja No. 338 Telp 061-7875998
email: komik@univ-bd.ac.id, komik.budidarma@gmail.com

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.