Manajemen jpeg/exif file fingerprint dengan algoritma Brute Force string matching dan Hash Function SHA256

Rachmad Fitriyanto
Anton Yudhana
Sunardi Sunardi

Abstract


Management of jpeg/exif file fingerprint with Brute Force string matching algorithm and Hash Function SHA256


Metode pengamanan berkas gambar jpeg/exif saat ini hanya mencakup aspek pencegahan, belum pada aspek deteksi integritas data. Digital Signature Algorithm (DSA) adalah metode kriptografi yang digunakan untuk memverifikasi integritas data menggunakan hash value. SHA256 merupakan hash function yang menghasilkan 256-bit hash value yang berfungsi sebagai file fingerprint. Penelitian ini bertujuan untuk menyusun file fingerprint dari berkas jpeg/exif menggunakan SHA256 dan algoritma Brute Force string matching untuk verifikasi integritas berkas jpeg/exif. Penelitian dilakukan dalam lima tahap. Tahap pertama adalah identifikasi struktur berkas jpeg/exif. Tahap kedua adalah akuisisi konten segmen. Tahap ketiga penghitungan hash value. Tahap keempat adalah eksperimen modifikasi berkas jpeg/exif. Tahap kelima adalah pemilihan elemen dan penyusunan file fingerprint. Hasil penelitian menunjukkan sebuah jpeg/exif file fingerprint tersusun atas tiga hash value. SOI (Start of Image) segment hash value digunakan untuk mendeteksi terjadinya modifikasi berkas dalam bentuk perubahan tipe berkas dan penambahan objek pada konten gambar. Hash value segmen APP1 digunakan untuk mendeteksi modifikasi pada metadata berkas. Hash value segmen SOF0 digunakan untuk mendeteksi gambar yang dimodifikasi dengan teknik recoloring, resizing, dan cropping.

 

The method of securing jpeg/exif image files currently has covered only the prevention aspect instead of the data integrity detection aspect. Digital Signature Algorithm is a cryptographic method used to verify the data integrity using hash value. SHA256 is a hash function that produces a 256-bit hash value functioning as a fingerprint file. This study aimed at compiling fingerprint files from jpeg/exif files using SHA256 and Brute Force string matching algorithm to verify the integrity of jpeg/exif files. The research was conducted in five steps. The first step was identifying the jpeg/exif file structure. The second step was the acquisition of the segment content. The third step was calculating the hash value. The fourth step was the jpeg/exif file modification experiment. The fifth step was the selection of elements and compilation of fingerprint files. The obtained results showed a jpeg/exif fingerprint file which was compiled in three hash values. The hash value of SOI segment was used to detect the occurrence of file modification in the form of file type changing and object addition on the image content. The hash value of APP1 segment was used to detect the metadata file modification. The hash value of SOF0 segment was used to detect the images modified by recoloring, resizing, and cropping techniques.


Keywords


Brute Force string matching; file fingerprint; jpeg; exif; SHA256

Full Text:

PDF

References


Bansal, D., Sharma, M., & Mishra, A. (2017). Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data. International Journal of Computer Applications, 161(5), 43-45.

Gangwar, D. P., & Pathania, A. (2018). Authentication of Digital Image using Exif Metadata and Decoding Properties. International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSR CSEIT), 3(8), 335-341.

Jain, A. K., Jones, R., & Joshi, P. (2017). Survey of Cryptographic Hashing Algorithms for Message Signing. IJCST, 8(2), 18-22.

Jiji, N., & Mahalakshmi, T. (2018). An Efficient String Matching Algorithm for Detecting Patterns using Forward and Backward Searching Approach. IPASJ International Journal of Computer Science (IIJCS), 6(2), 16-26.

Madhu, B., Holi, G., & Murthy, K. S. (2016). An Overview of Image Security Techiques. International Journal of Computer Applications, 154(6), 37-46.

NIST, N. (2015). FIPS 180-4 Secure Hash Standard (SHS). Gaithersburg, Montgomery County, Maryland: National Institute of Standards and Technology. doi:http://dx.doi.org/10.6028/NIST.FIPS.180-4

Orozco, A. L., González, D. M., Villalba, L. J., & Hernández-Castro, J. (2015). Analysis of errors in exif metadata on mobile devices. Multimedia Tools and Applications, 74(13), 4735–4763.

Park, S., Ruighaver, A. B., Maynard, S. B., & Ahmad, A. (2011). Towards Understanding Deterrence: Information Security Managers’ Perspective. Proceedings of the International Conference on IT Convergence and Security (pp. 21-37). Suwon: Springer.

Refialy, L., Sediyono, E., & Setiawan, A. (2015). Pengamanan Sertifikat Tanah Digital menggunakan Digital Signature SHA-512 dan RSA. Jurnal Teknik Informatika dan Sistem Informasi (JuTISI), 1(3), 229-234.

Roussev, V. (2009). Hashing and Data Fingerprinting in Digital Forensics. IEEE Security & Privacy, 7(2), 49-55.

Roussev, V. (2011). An evaluation of forensic similarity hashes. Digital Investigation, 8, S34-S41.

Shaker, S. H., & Jumaa, G. G. (2017). Digital Signature Based on Hash Functions. International Journal Of Advancement In Engineering Technology, Management and Applied Science (IJAETMAS), 4(1), 88-99.

Sukarno, A. S. (2013). Pengembangan Aplikasi Pengamanan Dokumen Digital Memanfaatkan Algoritma Advance Encryption Standard, RSA Digital Signature dan Invisible Watermarking. Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2013 (pp. M-1 ~ M-8). Yogyakarta: Universitas Islam Indonesia.

Sumagita, M., & Riadi, I. (2018). Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application. International Journal of Cyber-Security and Digital Forensics (IJCSDF), 7(4), 373-381.

Wijayanto, H., Prabowo, I. A., & Harsadi, P. (2018). Optimalisasi Penyusutan Exif Metadata dengan Teknik Substitusi Null Value pada Kasus Keamanan Citra Digital. Jurnal Ilmiah SINUS, 16(1), 1-10.

Wijayanto, H., Riadi, I., & Prayudi, Y. (2016). Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy. International Journal of Research in Computer and Communication Technology (IJRCCT), 5(5), 237-243.




DOI: https://doi.org/10.26594/register.v5i2.1707

Article metrics

Abstract views : 0 | views : 0

Refbacks

  • There are currently no refbacks.



Indexed in:

                                   


 

Creative Commons License
Register: Jurnal Ilmiah Teknologi Sistem Informasi is licensed under a Creative Commons Attribution 4.0 International License.