2016
DOI: 10.20449/jnte.v5i2.230
|View full text |Cite
|
Sign up to set email alerts
|

Deteksi Pemalsuan Citra dengan Teknik Copy-Move Menggunakan Metode Ordinal Measure dari Koefisien Discrete Cosine Transform

Abstract: Abstrak-Artikel ini membahas tentang metode baru untuk deteksi citra palsu yang dihasilkan dari teknik copy-move. Teknik copy-move merupakan salah satu teknik pemalsuan citra dengan cara mengambil objek tertentu dari citra asli dan menambahkannya pada citra tersebut dengan tujuan untuk menambah jumlah atau merubah objek yang sama pada citra asli. Penelitian ini bertujuan untuk mendeteksi citra palsu yang dihasilkan oleh teknik copy-move dan citra palsu copy-move yang telah dimodifikasi dengan operasi rotasi da… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
5
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(5 citation statements)
references
References 6 publications
0
5
0
Order By: Relevance
“…The watermarking method with DCT as done (Saifuddin, Yogyakarta, Mido, & Yogyakarta, 2020) is used for steganography, as well as research conducted (Ardiansyah, Susilo, & Erlansari, 2017) used to insert information into the image to secure the image. The results obtained are no difference between the original image and the watermarked image as in the research conducted (Hardianto et al, 2017), (Zulfan & Muharar, 2016), (Agustina & Asmara, 2017) and (Ghonge, 2018) . For a home industry usually has many batik designs produced, but this design can be duplicated because there is no system that can help to secure the design as an identifier from the initial design owner as in the research conducted (Saputra, Fauziah, & Hayati, 2020) and (Zulfan & Muharar, 2016) and (Zhou, Bai, & Wang, 2015).…”
Section: Introductionmentioning
confidence: 61%
See 4 more Smart Citations
“…The watermarking method with DCT as done (Saifuddin, Yogyakarta, Mido, & Yogyakarta, 2020) is used for steganography, as well as research conducted (Ardiansyah, Susilo, & Erlansari, 2017) used to insert information into the image to secure the image. The results obtained are no difference between the original image and the watermarked image as in the research conducted (Hardianto et al, 2017), (Zulfan & Muharar, 2016), (Agustina & Asmara, 2017) and (Ghonge, 2018) . For a home industry usually has many batik designs produced, but this design can be duplicated because there is no system that can help to secure the design as an identifier from the initial design owner as in the research conducted (Saputra, Fauziah, & Hayati, 2020) and (Zulfan & Muharar, 2016) and (Zhou, Bai, & Wang, 2015).…”
Section: Introductionmentioning
confidence: 61%
“…The results obtained are no difference between the original image and the watermarked image as in the research conducted (Hardianto et al, 2017), (Zulfan & Muharar, 2016), (Agustina & Asmara, 2017) and (Ghonge, 2018) . For a home industry usually has many batik designs produced, but this design can be duplicated because there is no system that can help to secure the design as an identifier from the initial design owner as in the research conducted (Saputra, Fauziah, & Hayati, 2020) and (Zulfan & Muharar, 2016) and (Zhou, Bai, & Wang, 2015). The existence of a compression system using watermarking allows a product design to be secured as was done in research , (Suheryadi, 2017) and (Ardiansyah et al, 2017) to be able to find out the owner of the initial design of the product so that Home industry craftsmen will feel the results of their work and can also continue to improve their creative works.…”
Section: Introductionmentioning
confidence: 61%
See 3 more Smart Citations