Mendeteksi Orisinalitas Hasil Scan Citra Ijazah Menerapkan Metode Blake
DOI:
https://doi.org/10.47065/jimat.v1i3.101Keywords:
Cryptography; File Authenticity; BLAKEAbstract
The rapid development of technology now causes frequent abuse of computer performance systems which are widely used as one of the crimes of manipulating document files that harm others. it can be known whether the file is original or not if the results are the same then the file is said to be original, and if the results are not the same then the file is said to be not original. original and non-original files
Downloads
References
S. Emy Setyaningsih, Kriptografi & implementasinya menggunakan matlap, Yogyakarta: ANDI, 2015.
Schneir, "Pengamanan basis data sistem penjualan dengan menggunakan teknik enkripsi kriptografi," Jurnal Teknologi Informasi dan Komunikasi, no. 6, pp. 2252-4517, 2018.
Sarineen, "Pengamanan basis data sistem penjualan dengan menggunakan teknik enkripsi kriptografi gost," Jurnal teknologi informasi dan komunikasi , no. 6, pp. 2252-4517, 2018.
Leurent, G.: ARXtools: A toolkit for ARX analysis. In: The Third SHA-3 Candi-date Conference. (March 2012).
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Mendeteksi Orisinalitas Hasil Scan Citra Ijazah Menerapkan Metode Blake
ARTICLE HISTORY
Issue
Section
Copyright (c) 2021 Robert Laia

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).