The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2019
DOI: 10.30865/komik.v3i1.1588
|View full text |Cite
|
Sign up to set email alerts
|

Analisa Metode Sha384 Untuk Mendeteksi Orisinalitas Citra Digital

Abstract: Cryptography is used to maintain the security of content or information that is personal from anyone except those who have the authority or secret key to open the information that has been encoded. Along with the development of technology and computers now, the increase in computer crime has also increased, especially in image manipulation. Many methods are used and carried out by people to manipulate images that have a detrimental effect on others. The originality of a digital image is the authenticity of the… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Research [2][3][4][5][6] discusses how to detect image authenticity using cryptographic techniques by utilizing hash functions. Detection is done by comparing the hash value of the original image and the manipulated image.…”
Section: Introductionmentioning
confidence: 99%
“…Research [2][3][4][5][6] discusses how to detect image authenticity using cryptographic techniques by utilizing hash functions. Detection is done by comparing the hash value of the original image and the manipulated image.…”
Section: Introductionmentioning
confidence: 99%