Please use this identifier to cite or link to this item: https://repository.unej.ac.id/xmlui/handle/123456789/111237
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSANTOSO, Kiswara Agung-
dc.date.accessioned2022-12-21T01:51:14Z-
dc.date.available2022-12-21T01:51:14Z-
dc.date.issued2022-09-12-
dc.identifier.urihttps://repository.unej.ac.id/xmlui/handle/123456789/111237-
dc.description.abstractImage is a digital media that is easy to change, so it is susceptible to being used for crime. Image changes may be affected by the unstable internet during transmission or deliberate manipulation of images for specific purposes. Hence, we need a tool to determine the authenticity of the image. One strategy that can be used is to insert code into the entire image, so that any changes to the image information can be detected. The insertion process performed by dividing the image into several blocks, where the size of each block is adjusted according to the size of the magic square order 3. For the authentication process, the image that has been manipulated will be counted for each pixel. The results show that the manipulated image can be detected. The parts of the image that have changed can be identified because the pixel value doesn’t satisfy the magic square rule.en_US
dc.language.isootheren_US
dc.publisherFakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jemberen_US
dc.subjectAuthenticationen_US
dc.subjectImageen_US
dc.subjectMagic Squareen_US
dc.subjectPixelen_US
dc.titleOtentikasi Image Berbasis Magic Square Orde 𝒏 (Image Authentication Based on Magic Square Order n)en_US
dc.typeArticleen_US
Appears in Collections:LSP-Jurnal Ilmiah Dosen

Files in This Item:
File Description SizeFormat 
F MIPA_JURNAL_Digital Image Encryption by Using a Modified Hill Code.pdf880.8 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.