Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA

Rachmad Fitriyanto, Anton Yudhana, Sunardi Sunardi


The jpeg/exif is file’s format for image produced by digital camera such as in the smartphones. The security method for jpeg/exif usages in digital communication currently only full-fill prevention aspect from three aspects of information security, prevention, detection and response. Digital Signature Algorithm (DSA) is a cryptographic method that provide detection aspect of information security by using hash-value as fingerprint of digital documents. The purpose of this research is to compile jpeg/exif file data fingerprint using the hash-value from DSA. The research conducted in four stages. The first stages is the identification of jpeg/exif file structure using Boyer-Moore string matching algorithm to locate the position of file’s segments. The second stage is segment’s content acquisition. The third stage the image files modification experiments to select the suitable element of jpeg/exif file data fingerprint. The fourth stage is the compilation of hash-values to form data fingerprint. The Obtained result has shown that the jpeg/exif file fingerprint comprises three hash value from the SOI segment, APP1's segment, and the SOF0 segment. The jpeg/exif file fingerprint can use for modified image detection, include six types of image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file type conversion


Boyer-Moore; SHA512; Jpeg/exif; Digital Signature Algorithm; Fingerprint


[1] S. Park, A. B. Ruighaver, S. B. Maynard, and A. Ahmad, “Towards understanding deterrence: Information security managers’ perspective,” Lect. Notes Electr. Eng., vol. 120 LNEE, no. January, pp. 21–37, 2012.

[2] H. Wijayanto, I. Riadi, and Y. Prayudi, “Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy,” Int. J. Res. Comput. Commun. Technol., vol. 5, no. 5, 2016.

[3] D. P. Gangwar and A. Pathania, “Authentication of Digital Image using Exif Metadata and Decoding Properties,” Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol., vol. 3, no. January, pp. 335–341, 2019.

[4] L. Refialy, E. Sediyono, and A. Setiawan, “Pengamanan Sertifikat Tanah Digital Menggunakan Digital Signature SHA-512 dan,” JUTISI, vol. 1, pp. 229–234, 2015.

[5] W. Stallings, Cryptography and Network Security Principles and Practice, 6th ed. New Jersey: Pearson Education Inc., 2014.

[6] H. A. Chaudhary, “Process , Application and Authenticity of Digital Signature,” Int. J. Sci. Res. Eng. Technol., vol. 6, no. 8, pp. 882–888, 2017.

[7] U. Abubakar Idris, J. Awwalu, and B. kamil, “User authentication in securing communication using Digital Certificate and public key infrastructure,” Int. J. Comput. Trends Technol., vol. 37, no. 1, 2016.

[8] D. Bansal, M. Sharma, and A. Mishra, “Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data,” Int. J. Comput. Appl., vol. 161, no. 5, pp. 43–45, 2017.

[9] K. Al-Khamaiseh and S. Al-Shagarin, “A Survey of String Matching Algorithms,” Int. J. Eng. Res. Appl., vol. 4, no. June 2015, pp. 144–156, 2014.

[10] D. R. Candra and K. D. Tania, “Application of Knowledge Sharing Features Using the algorithm Boyer-moore On Knowledge Management System (KMS),” J. Sist. Inf., vol. 9, no. 1, pp. 1216–1221, 2017.

[11] Y. D. Prabowo, “Pencocokan DNA NR_108049 dan DNA DI203322 Menggunakan Algoritma Boyer Moore,” Pros. Semin. Nas. Teknol. Inf. dan Komun., no. 40, pp. 18–19, 2016.

[12] V. Roussev, “Hashing and Data Fingerprinting in Digital Forensics,” IEE Secur. Priv., no. April, pp. 49–55, 2009.

[13] NIST, FIPS PUB 180-4 Secure Hash Standard ( SHS ), no. August. Gaithersburg: National Institute of Standards and Technology, 2015.

[14] I. Riadi and M. Sumagita, “Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 4, 2018.

[15] V. Roussev, “An Evaluation of Forensic Similarity Hashes Vassil Roussev An evaluation of forensic similarity hashes,” Proc. Digit. Forencsic Res. Conf., pp. s34–s41, 2011.

[16] A. L. . Sandoval, D. M. . Gonzales, L. J. . Villaba, and J. Hernandez-Castro, “Analysis of errors in exif metadata on mobile devices,” Multimed Tools Appl, no. 74, pp. 4735–4763, 2015.

Full Text: PDF

DOI: 10.30595/juita.v8i1.4413


  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

ISSN: 2579-8901