Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 5
Abstract
Many photographic images that are published to particular interests. This makes it more and more copyright piracy of images. In this study will make a tools and methods that can be used to protect the copyright of the digital image. The most important part of the digital image is a color image composition or texture images and EXIF metadata information contained therein. Image color and texture of the image reflects the beauty of the digital image. While reflecting the EXIF data information from digital image. In the science of cryptography many common cryptographic algorithms to secure data or information from copyright piracy. One of them is the eXtended Tiny Encryption Algorithm (XTEA) which is a cryptographic technique and operates in 64-bit block size and a 128bit key length. EXIF metadata in encrypted with XTEA, then insert it into End of File image, and delete the original EXIF, is expected to secure a digital image of the copyright piracy without changing primary data image. From the results of the encryption-decryption process, EXIF information and pixel digital image can be protected. There is a shrinkage of the size of the file capacity of -25.15% from size of original image, because image have a change in the type of EXIF metadata to JFIF format. This change only in bits header image, so that 74.85% of primary data bits are not changed.
Authors and Affiliations
Hendro Wijayanto, Imam Riadi, Yudi Prayudi
Secure Data Aggregation In Wireless Networks
Security threat is originated by node capture attacks in hierarchical data aggregation where a hacker achieves full control over a sensor node through direct physical access in wireless sensor networks. It makes a hig...
A Hybrid Routing Protocol for Unobservable Security in Mobile Ad-hoc Networks
Security of mobile ad hoc network is crucial due to infra structure less network and mobility of wireless media. In this paper, we propose an Hybrid Routing Protocol for Unobservable Secured (HRPUS) to offer privacy...
Unauthorized Data Access Detection by Insertion of Duplicate Data Records
Data distributor gives the access the important data to some trusted agents (third parties), but some of the data is leaked and found with unauthorized persons. Due to this reason data accessing in a secure way is be...
Power Quality Measurements by Using Fiber Optical Cable
Accurate measurement of power and other AC quantities is extremely important at all levels of the electrical power system, and is of value for both for power distributors and power consumers. This paper describes the...
To Resolve The Voltage Unbalance Of The Dc Links In Different H-Bridges Based Solid State Transformer (Sst)
As the expansion of the dc distribution system and the augment of the penetration of distributed generations an intelligent transformer with the capability to actively supervise the power and allowing for the easy co...