Abstract
The jpeg/exif is file’s format for image produced by digital camera such as in the smartphones. The security method for jpeg/exif usages in digital communication currently only full-fill prevention aspect from three aspects of information security, prevention, detection and response. Digital Signature Algorithm (DSA) is a cryptographic method that provide detection aspect of information security by using hash-value as fingerprint of digital documents. The purpose of this research is to compile jpeg/exif file data fingerprint using the hash-value from DSA. The research conducted in four stages. The first stages is the identification of jpeg/exif file structure using Boyer-Moore string matching algorithm to locate the position of file’s segments. The second stage is segment’s content acquisition. The third stage the image files modification experiments to select the suitable element of jpeg/exif file data fingerprint. The fourth stage is the compilation of hash-values to form data fingerprint. The Obtained result has shown that the jpeg/exif file fingerprint comprises three hash value from the SOI segment, APP1's segment, and the SOF0 segment. The jpeg/exif file fingerprint can use for modified image detection, include six types of image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file type conversion
Highlights
The information security have three stages to secure the communication [1]
The aspect of data integrity detection for jpeg/exif file accomplished by using data fingerprint in form of hash value
The acquisition and hashing computation using SHA512 hash function required time that linear with content sized
Summary
The information security have three stages to secure the communication [1]. Prevention stage have purpose to prevent attack to information. The recipient of information must be able to ensure that the received information comes from senders he or she knows Both image and video files generated from digital camera usage such as in smartphones. The information security method proposed in this research for provide detection stage of information security is using Digital Signature Algorithm (DSA). The First process until third process shows generating process of information fingerprint These three steps executed both on sender side and receiver side. Hash value that produced from hash function has used for installer file data integrity verification that provided by software or application developer and for data acquisition in digital forensics [15]. The focus of this research is to compile data fingerprint from the jpeg/exif file using Boyer-Moore string matching algorithm and hash value from SHA512 hash function. Data fingerprint must have function to detect the integrity of image file from common image modification methods
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have