Analisa Metode SHA224 Untuk Mendeteksi Orisinalitas Citra Digital
Keywords:Cryptography, Hash Function, SHA-224, Digital Image
In a digital image it is very important that the name of the authenticity of the data, given the data contained in it is very important and very confidential from parties who are not obliged to want to damage and change the information contained therein so it does not match what is expected. So, it is necessary to apply data security that can protect the data so that it cannot be manipulated or damaged any information contained in the data. Cryptography is the study of mathematical techniques related to aspects of information security such as data confidentiality, data integrity of data integrity, and data authentication. But not all aspects of information security can be solved by cryptography. Cryptography can also be interpreted as a science or an art to maintain message security. Some of the problems above that need to be considered and understood so that the system applied in accordance with what is desired by all parties. In digital images, the main thing that must be observed is to maintain the authenticity of digital images and improve the quality problems of digital images that you want to manipulate. With this research can overcome all the problems that occur about manipulating data from parties who are not obliged to the data From the above research the purpose of SHA224 is to secure a form of digital images that are still original that want to be manipulated by other parties. The image can be seen or manipulated anyone who has rights or obligations in the data or has no obligation at all, but when securing data using the SHA224 method, the data resulting from manipulation and original data will be detected and the results will be seen in fact. With the SHA224 method it can maintain the security and authenticity of digital images. In testing this can be done with the SHA224 method using the MATLAB application.
Pulung Nurtatian Andono, pengolahan citra digital. Yogyakarta, 2017.
renaldi, “pengertian dan contoh kriptografi dengan proses enkripsi dan deskripsi,” ondigiitalforensics.weebly.com, 2016. [Online]. Available: http://ondigitalforensics.weebly.com/cryptography/pengertian-dan-contoh-kriptografi-dengan-proses-enkripsi-dan-dekripsi#.XRTEI45R3Dc. [Accessed: 27-Jun-2019].
K.-G. K. O. Henry NuNoo-Mansah, “Analisis Komparatif Penggunaan Energi Hash Fungsi dalam Jaringan Sensor Nirkabel Aman,” J. Int. Apl. Komput. (0975 - 8887), vol. 109, p. 1, 2015.
N. J. S. Jinita jose, nanda kumar, “Desain & Validasi SHA 224 IP Core,” IJCST, vol. vol.5, no. 0976–8491, p. 2, 2014.
S. Aripin dan M. Syahrizal, “Pengaman File Video Menggunakan Algoritma Merkle Hellman Knapsack,” J. MEDIA Inform. BUDIDARMA, vol. 4, no. April, hal. 461–465, 2020, doi: 10.30865/mib.v4i2.2039.
Copyright (c) 2021 Rusman Halawa
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).