Abstract:Cryptography is used to maintain the security of content or information that is personal from anyone except those who have the authority or secret key to open the information that has been encoded. Along with the development of technology and computers now, the increase in computer crime has also increased, especially in image manipulation. Many methods are used and carried out by people to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the… Show more
“…Research [2][3][4][5][6] discusses how to detect image authenticity using cryptographic techniques by utilizing hash functions. Detection is done by comparing the hash value of the original image and the manipulated image.…”
Image is a digital media that is easy to change, so it is susceptible to being used for crime. Image changes may be affected by the unstable internet during transmission or deliberate manipulation of images for specific purposes. Hence, we need a tool to determine the authenticity of the image. One strategy that can be used is to insert code into the entire image, so that any changes to the image information can be detected. The insertion process performed by dividing the image into several blocks, where the size of each block is adjusted according to the size of the magic square order 3. For the authentication process, the image that has been manipulated will be counted for each pixel. The results show that the manipulated image can be detected. The parts of the image that have changed can be identified because the pixel value doesn't satisfy the magic square rule.
“…Research [2][3][4][5][6] discusses how to detect image authenticity using cryptographic techniques by utilizing hash functions. Detection is done by comparing the hash value of the original image and the manipulated image.…”
Image is a digital media that is easy to change, so it is susceptible to being used for crime. Image changes may be affected by the unstable internet during transmission or deliberate manipulation of images for specific purposes. Hence, we need a tool to determine the authenticity of the image. One strategy that can be used is to insert code into the entire image, so that any changes to the image information can be detected. The insertion process performed by dividing the image into several blocks, where the size of each block is adjusted according to the size of the magic square order 3. For the authentication process, the image that has been manipulated will be counted for each pixel. The results show that the manipulated image can be detected. The parts of the image that have changed can be identified because the pixel value doesn't satisfy the magic square rule.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.