Analisa Keaslian Tanda Tangan Dengan Menerapkan Algoritma Ripemd160
DOI:
https://doi.org/10.47065/jieee.v1i3.354Keywords:
Authentication; Verification; Signature; Ripemd160Abstract
Signature is one of the characteristics of every person. Signatures are widely used as a condition for ratifying legal documents. This becomes problematic if a transaction is problematic or fails due to signature forgery, of course this is very detrimental, so it is very important to verify the signature. One way to be able to identify a match signature is by utilizing image processing techniques. To get the identification of the signature match, the RIPEMD160 method is used which prioritizes processing the Hash value of a digital image to provide special characteristics for a digital image data, and at the same time as a data that will be used as a verifier for the authenticity of digital image data by processing the signature image and provides information that only the original signature would have. The result of this process will indicate that a signature matches or does not match and can distinguish itself from a signature that has an original verification and is not.
Downloads
References
Arius, D. (2008). Keamanan Multimedia. Yogyakarta: Penerbit Andi.
Larsson, & Moffat. (2000). Off-Line Dictionary-Based Compression. Kyoto: IEEE.
Sudewa. (2003) Data File dan Jenisnya Dalam Komputer
Ariani, R. & Shalahuddin, M. 2013. Rekayasa Perangkat Lunak Terstruktur dan Berorientasi Objek. Bandung: Informatika
Suarga. 2006. Algoritma dan Pemrograman. Andi: Yogyakarta.
Mhd Arief Hasan. 2017. Implementasi Algoritma Fisher-Yates Untuk Mengacak Soal Ujian Online Penerimaan Mahasiswa Baru (Studi Kasus : Universitas Lancang Kuning Riau). JURNAL TEKNOLOGI DAN SISTEM INFORMASI - VOL. 03 NO. 02 (2017) 291-298
Phie Chyan. 2017. PENERAPAN SISTEM KRIPTOGRAFI ENKRIPSI JAMAK DAN TANDA TANGAN DIGITAL DALAM MENDUKUNG KEAMANAN INFORMASI. Fakultas Teknologi Informasi, Universitas Atma Jaya Makassar
Sebastian Suhandinata. 2014. Implementasi Metode Beaufort Cipher Dan Blowfish Cipher untuk Enkripsi SMS Pada Telepon Seluler Berbasis Android. JKonferensi Nasional Sistem dan Informatika 2014; Bali, November 7-8,
Mia Diana. 2018. IOptimalisasi Beaufort Cipher Menggunakan Pembangkit Kunci RC4 Dalam Penyandian SMS. Jurnal Sains Komputer & Informatika (J-SAKTI) Volume (2) No.1 Maret 2018, pp. 12-22
James R. Silkenat. 2014 The American Bar Association and the Rule of La.
SMU Law Review Volume 67 | Issue 4 Article 7
Mohamad Hoseyn Sigari. 2011. Offline Handwritten Signature Identification and Verification Using Multi-Resolution Gabor Wavelet. International Journal of Biometrics and Bioinformatics (IJBB), Volume (5) : Issue (4) : 201
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisa Keaslian Tanda Tangan Dengan Menerapkan Algoritma Ripemd160
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Jefri Sianipar

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


