Digital File Identification Method Using Efficient Anonymous Fingerprinting Digital File Identification Method Using Efficient Anonymous Fingerprinting
Main Article Content
Abstract
Fingerprinting method is one important class of engineering protection of intellectual property in digital form. This method is a cryptographic method that is applied to detect people to redistribute an item of data by allowing a merchant (merchant) to track a duplicate to be able to note the original purchaser. Buyers dishonest redistribute illegally item of data called a traitor (traitor). Information referred to as fingerprint identification, attached to the duplication of the original item data. For the development of an application it is necessary to illustrate the application of anonymous fingerprinting methods in the detection of identity of the file redistributed. Other than that, the software also provides a tutorial to assist understanding of the working procedures of anonymous fingerprinting method. The results of the tutorial section can also be saved into a text file.
Downloads
Article Details
[2]. Munir, R., 2006, Kriptografi, Informatika Bandung, Indonesia.
[3]. Pressman, R.S., 2002, Rekayasa Perangkat Lunak : Pendekatan Praktisi (Buku Satu), Mc Graw-Hill Companies, Inc, Penerbit ANDI, Indonesia.
[4]. Schneier, B., 1996, Applied Crytography : Protocols, Algorithm, and Source Code in C, Second Edition, John Willey and Sons Inc, Amerika Serikat.
[5]. Stallings, W., 1999, Cryptography and Network Security : Principle and Practice, Second Edition, Prentice Hall, Amerika Serikat.
[6]. Yong L., B. Yang and X. Hua, 2002, An Efficient Anonymous Fingerprinting Scheme, China.
[7]. P. Informatika, B. Darma, H. D. Hutahaean, C. Digital, C. Streching, and L. Teori, “TEKNIK PENAJAMAN CITRA DIGITAL DENGAN MENGGUNAKAN Diterbitkan Oleh?: STMIK Budi Darma Medan Diterbitkan Oleh?: STMIK Budi Darma Medan,” vol. III, pp. 35–44, 2013.