Smart Blockchain Technology in Image Processing Between Challenges, Transformation and Digital-Based Learning Solutions

Muhammad Rifqi, Muhammad Isradi, Otto Fajarianto

Sari


The rapid growth of cellular phone and internet users today, but not yet fully accompanied by the growing public awareness of protecting personal data, with the increase in the flow of data transmission packets via email or other media has a direct impact on increasing threats and theft of personal data. The higher the benefits of technology, the greater the risk that will be faced, meaning that there is no perfectly designed information technology that is free from vulnerability to data theft. With the inclusion of the concept of personal data as part of privacy, the protection of personal data becomes part of the protection of privacy. So the protection of personal data is part of the protection of human rights. Moreover, data has a high economic value. Based on these problems, the researchers conducted experiments with data collection techniques using literature studies and documentation. The problem-solving approach uses problem identification to find solutions. The presence of blockchain technology in the form of consensus in the form of a smart contract or chain code can make one solution in answering existing problems. The design method used is rapid application development by applying 5 design steps, namely business modeling, data modeling, process modeling, generation, and application testing. This software is built using the Disk Operating system (DOS) command. With this technique, it is hoped that the confidentiality of confidential information messages can be guaranteed.

Kata Kunci


Information security; Data; Blockchain; Data transmission; DOS

Teks Lengkap:

PDF

Referensi


Rifqi, Muhammad, Combining Steganography And Cryptograph Techniques For Data Security (Case Study In PT XYZ), International Research Journal of Computer Science (IRJCS), Vol.5, Issue 01 January 2018

Internet Usage Statistic, www.internetworldstats.com/stats.html, accessed May 13, 2013.

M. Conway, Code Wars: Steganography, Signals Intelligence, and Terrorism, Knowledge Technology & Policy , Volume 16, Number 2, pp. 45-62, Springer, 2003. 4. RJ Anderson and FAP Petitcolas, On The Limits of Steganography , IEEE Journal of Selected Areas in Communications, 16 (4), pp.474-481, May 1998, ISSN 0733-8716.

C. Hosmer, Discovering Hidden Evidence , Taylor & Francis Group, Journal of Digital Forensic Practice, Vol. No.1, pp.47-56, 2006.

AJ Raphael and V. Sundaram, Cryptography and Steganography - A Survey , Int. J. Comp. Tech. Appl., Vol 2 (3), pp. 626-630, ISSN: 2229-6093.

SA Laskar and K. Hemachandran, An Analysis of Steganography and Steganalysis Techniques, Assam University Journal of Science and Technology, Vol.9, No. II, pp.83- 103, January, 2012, ISSN: 0975-2773.

NF Johnson and S. Jajodia, Exploring Steganography: Seeing the Unseen, IEEE, Computer, vol. 31, no. 2, pp. 26- 34, Feb. 1998.

Menezes. J. Alfred, Paul C. Van Oorschot, Scott A. Vanstone, Applied Cryptography, 1996.

E. Walia, P. Jain and Navdeep, An Analysis of LSB & DCT based Steganography , Global Journal of Computer Science and Technology, Vol. 10 Issue 1 (Ver 1.0), pp 4-8, April , 2010 .

BB Zaidan, AA Zaidan, AK Al-Frajat and HA Jalab, On the Differences between Hiding Information and Cryptography Techniques: An Overview, Journal of Applied Sciences, Vol.10, No.15, pp.1650-1655, 2010.

RS Ramesh, G. Athithan and K. Thiruvengadam, An Automated Approach to Solve Simple Substitution Ciphers , Taylor & Francis, Cryptologia, Vol. XVII, No. 2, pp. 202- 218, April, 1993.

WF Friedman, Cryptology, Encyclopedia Britannica, Vol. 6, pp. 844-851, 1967. 14. Atul Kahate, Cryptography and Network Security, 2nd Edition, Tata McGraw-Hill, 2008.

Fauzan, N.I (2018). Teknologi blockchain dan Peranannya dalam Era Digital. Jurnal BJB University.

AJ Raphael and V. Sundaram, Cryptography and Steganography - A Survey , Int. J. Comp. Tech. Appl., Vol 2 (3), pp. 626-630, ISSN: 2229-6093.

Munir, Rinaldi, 2009, Steganography and Watermarking, http://www.informatika.org/~ rinaldi / Cryptography / Steganography% 20and% 20Watermarking.pdf, accessed on 26 May 2013.

Untung Rahardja, Qurotul Aini, 2020, Penerapan Teknologi Blockchain Sebagai Media Pengamanan Proses Transaksi E-Commerce CESS (Journal of Computer Engineering System and Science) Vol. 5 No. 1 Januari 2020, ISSN :2502-7131

Christidis, K., & Devetsikiotis, M. (2016). Blockchains and smart contracts for the internet of things. Ieee Access, 4, 2292- 2303.

Sutandi, S. (2018). Pengaruh BigData dan Teknologi Blockchain terhadap Model Business Model Canvas. Jurnal Logistik Indonesia, 2(1), 9-20.




DOI: http://dx.doi.org/10.33603/jste.v2i1.7063

Refbacks

  • Saat ini tidak ada refbacks.


execute(); ?>