Please use this identifier to cite or link to this item: https://repository.unej.ac.id/xmlui/handle/123456789/111256
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSANTOSO, Kiswara Agung-
dc.contributor.authorNAJAH, Maulidyah Lailatun-
dc.contributor.authorHASAN, Moh.-
dc.date.accessioned2022-12-21T16:21:28Z-
dc.date.available2022-12-21T16:21:28Z-
dc.date.issued2021-
dc.identifier.urihttps://repository.unej.ac.id/xmlui/handle/123456789/111256-
dc.description.abstractImage is a digital media that is easy to change, so it is susceptible to being used for crime. Image changes may be affected by the unstable internet during transmission or deliberate manipulation of images for specific purposes. Hence, we need a tool to determine the authenticity of the image. One strategy that can be used is to insert code into the entire image, so that any changes to the image information can be detected. The insertion process performed by dividing the image into several blocks, where the size of each block is adjusted according to the size of the magic square order 3. For the authentication process, the image that has been manipulated will be counted for each pixel. The results show that the manipulated image can be detected. The parts of the image that have changed can be identified because the pixel value doesn’t satisfy the magic square ruleen_US
dc.language.isoenen_US
dc.subjectAuthenticationen_US
dc.subjectImageen_US
dc.subjectMagic squareen_US
dc.subjectPixelen_US
dc.titleImage Authentication Based on Magic Squareen_US
dc.typeArticleen_US
Appears in Collections:LSP-Conference Proceeding

Files in This Item:
File Description SizeFormat 
Image Authentication Based on Magic Square.pdf7.86 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.