PENGEMBANGAN METODE BLOCK MATCHING UNTUK DETEKSI COPY-MOVE PADA PEMALSUAN CITRA
Abstract
Pemalsuan citra dengan maksud menutupi sebagian objek pada citra dengan blok lain pada citra yang sama disebut dengan copy-move. Deteksi copy-move pada citra dapat dilakukan pada domain spasial melalui pengolahan pada tiap pikselnya maupun pada domain frekeunsi melalui beberapa fungsi transformasi. Penelitian ini mengusulkan deteksi copy-move pada domain spasial dengan mengembangkan metode block macthing. Metode yang diusulkan terbagi atas dua pendekatan yaitu excact match dan robust match. Pendekatan excact match dimulai dengan: input citra RGB, pengambi-lan blok, penghitungan nilai hash tiap blok, pencarian blok yang mirip dan diakhiri dengan dengan operasi morfologi untuk penghalusan hasil deteksi. Sedangkan pendekatan robust match mirip dengan exact match namun nilai hash diganti dengan Discrete Cosine Transform (DCT). Hasil uji coba menujukkan bahwa pendekatan robust match mendapatkan hasil sedikit lebih baik dibandingkan dengan excact match dimana nilai rata-rata kualitas deteksi 75% dengan kualitas deteksi terbaik sebesar 97%.Downloads
References
[2] B.L.Shivakumar,Lt. Dr. S.Santhosh Baboo”Detecting Copy-Move Forgery in Digital Images: A Survey and Analysis of Current Methods “Global Journal of Computer Science and Technology Vol. 10 Issue 7 Ver. 1.0 September 2010
[3] Yadav, Preeti, and Yogesh Rathore. "Detection of Copy-Move Forgery of Images Using Discrete Wavelet Transform." International Journal on Computer Science and Engineering, vol. 4, no. 4, pp.365-370, April 2012.
[4] Sarah A. Summers, Sarah C. Wahl “Multimedia Securityand Forensics Authentication of Digital mages” http://cs.uccs.edu/~cs525/studentproj/proj52006/sasummer/doc/cs525projsummersWahl.doc
[5] J. Fridrich, D. Soukal, and J. Lukas, “Detection of copymove forgery in digital images,” Proceedings of the Digital Forensic Research Workshop. Cleveland OH, USA, 2003.
[6] A.C.Popescu and H.Farid, “Exposing digital forgeries by detecting duplicated image regions,” Dartmouth College, Hanover, New Hampshire, USA: TR2004-515, 2004.
[7] G.Li, Q.Wu, D.Tu, and Shaojie Sun, “A sorted neighborhood approach for detecting duplicated regions in image forgeries based on DWT and SVD,” IEEE International Conference on Multimedia & Expo, 2007.
[8] P. Albert J. Marcella, Cyber Forensics - A Field Manual of Collectiong, Examining, and Preserving Evidence of Computer Crimes, CRC Press Book, 2002.
[9] J.A. Redi, W. Taktak,J.-L. Dugelay, Digital image forensics: a booklet for beginners, Multimed. Tools Appl. 51 (1) (2011) 133–162.
[10] V. Christlein, C. Riess, J. Jordan, C. Riess dan E. Angelopoulou, “An Evaluation of Popular Copy-Move Forgery Detection Approaches,” IEEE Transactions on Information Forensics and Security, vol. 7, pp. 1841-1854, 2012.
[11] H. Delfs dan H. Knebl, Introduction to Cryptography: Principles and Application Second Edition, Heidelberg: Springer, 2007.
[12] Fitrokhoerani N. dan Atrika Anggraeni, “Penggunaan Metode Heuristik Dan Cyclic Redudancy Check 32 (CRC32) untuk Mendeteksi Kerusakan File,” Seminar Nasional Matematika dan Pendidikan Matematika UNY, 2016.
[13] (FAU) Friedrich-Alexander-Universität Erlangen-Nürnberg, "Image Manipulation Dataset," [Online]. Available: https://www5.cs.fau.de/research/data/image-manipulation/. [Accessed 10 Nov 2016]
Downloads
Published
Issue
Section
License
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in JUTI unless they receive approval for doing so from the Editor-in-Chief.
JUTI open access articles are distributed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.











