CFP last date
20 June 2024
Call for Paper
July Edition
IJCA solicits high quality original research papers for the upcoming July edition of the journal. The last date of research paper submission is 20 June 2024

Submit your paper
Know more
Reseach Article

Developing of Image Detection System with JPG Format using Error Level Analysis Technique

by Andriani Silviana Primastuti, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 2
Year of Publication: 2022
Authors: Andriani Silviana Primastuti, Imam Riadi
10.5120/ijca2022921977

Andriani Silviana Primastuti, Imam Riadi . Developing of Image Detection System with JPG Format using Error Level Analysis Technique. International Journal of Computer Applications. 184, 2 ( Mar 2022), 41-47. DOI=10.5120/ijca2022921977

@article{ 10.5120/ijca2022921977,
author = { Andriani Silviana Primastuti, Imam Riadi },
title = { Developing of Image Detection System with JPG Format using Error Level Analysis Technique },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2022 },
volume = { 184 },
number = { 2 },
month = { Mar },
year = { 2022 },
issn = { 0975-8887 },
pages = { 41-47 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number2/32307-2022921977/ },
doi = { 10.5120/ijca2022921977 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:27.206861+05:30
%A Andriani Silviana Primastuti
%A Imam Riadi
%T Developing of Image Detection System with JPG Format using Error Level Analysis Technique
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 2
%P 41-47
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Digital image manipulation is increasingly difficult to detect. Software for image processing is easily available, making it easier for someone to manipulate a photo. Image manipulation techniques produce fake photos that are difficult to detect. Crime cases that use photo manipulation are increasingly rampant in fake news (hoax). Detection of manipulated images in crime cases using digital forensics.The object of this research is the attack on the jpg image. The data collection method used in this research is the observation technique and literatul study (library). The method used in this research is Error Level Analysis (Ela). ELA is a forensic method for identifying parts of an image with different levels of compression. This research is concerned with detecting errors that occur due to a decrease in image quality. If a JPEG image is attached to another JPEG image, then saved as a JPEG, there will be a difference in the level of compression that occurs.

References
  1. Gani, R., &Kusumalestari, R. R. (2013). Photojournalism An Introduction (N. S. Nurbaya (ed.)). SimbiosaRekatama Media.
  2. Irwansyah, I., & Yudiastuti, H. (2019). Image Engineering Digital Forensic Analysis Using Jpegsnoop And Forensically Beta. Jurnal Ilmiah Matrik, 21(1), 54–63. https://doi.org/10.33557/jurnalmatrik.v21i1.518
  3. Mahardika, F., Khatulistian, A. D., &Kuncoro, A. P. (2018). Forensic.com Photo Review with Error Level Analysis and JPEG Techniques to find out the Original Image. Journal of Informatics: JurnalPengembangan IT PoltekTegal, 03(01), 71–75.
  4. Ela, A., Color, D. A. N., Array, F., &Berbasis, C. F. A. (2015). Integrated Digital Image Authentication System With Error Level Analysis (Ela) And Web Based Color Filter Array (Cfa). Computer Science and Information Systems, 12(2), 873–893. https://ejournal.unib.ac.id/index.php/rekursif/article/view/952
  5. Sugiantoro, B., Prayudi, Y., Informatika, M., Industri, F. T., & Indonesia, U. I. (2018).Analysis of Object Fitness Detector in Digital Image Using Matlab Through Sift Algorithm Method. 1(1), 20–27.
  6. YuliSulistyo, W., Riadi, I., Yudhana, A., Dahlan, A., StudiTeknikElektro, P., & Ahmad DahlanJalanSoepomo, U. (2018). Image Authenticity Detection Analysis Using Error Level Analysis Technique WithForensicallybeta. Seminar NasionalInformatika (SEMNASIF), 2018(November), 154–159. http://www.jurnal.upnyk.ac.id/index.php/semnasif/article/ view/2632
  7. Faroek, D. A., Umar, R., &Riadi, I. (2020). Image Authenticity Detection Using Error Level Analysis (ELA) and Principal Component Analysis Methods (PCA). Format : JurnalIlmiahTeknikInformatika, 8(2), 132. https://doi.org/10.22441/format.2019.v8.i2.006
  8. Sharif, N. M., Ali, M. N. S., & Abdullah, M. Y. H. (2014). Visual literacy on photographic images in digital forensic investigation. JurnalKomunikasi: Malaysian Journal of Communication, 30, 159–176. https://doi.org/10.17576/jkmjc-2014-30si-10
  9. Rahman, F. M., Putra, R. R. J., &Wihardi, Y. (2020).Statistical Analysis and Image Masking Implementation Based on Error Level Analysis Results on Digital Images. JATIKOM: JurnalAplikasi Dan TeoriIlmuKomputer, 3(1), 22–28.
  10. GedeNengahBayuDarmawan, I., Made Arya Sasmita, G., &WiraBuana, P. (2019). Development of Image Modification Detection Method Using Error Level Analysis Method. JurnalIlmiahMerpati (MenaraPenelitianAkademikaTeknologiInformasi), 7(1), 29. https://doi.org/10.24843/jim.2019.v07.i01.p04
  11. Sari, T., Riadi, I., &Fadlil, A. (2016). Image Forensics for File Engineering Detection Using Error Level Analysis. 2(1), 133–138. http://ars.ilkom.unsri.ac.id
  12. Saputra, A. P., &Widiyasono, N. (2017). Digital Forensic Analysis on File Steganography (Case Study: Drug Trafficking). JurnalTeknikInformatika Dan SistemInformasi, 3(1), 179–190. https://doi.org/10.28932/jutisi.v3i1.594
  13. Wijayanto, H., Prabowo, I. A., &Harsadi, P. (2018). Optimization of Exif Metadata Shrinkage Using Null Value Substitution Techniques in the Case of Digital Image Security.JurnalIlmiah SINUS, 16(1), 1. https://doi.org/10.30646/sinus.v16i1.327
  14. Riadi, I. (n.d.). Email Forensic from Phishing Attack using Network Forensics Development Life Cycle Method.
  15. Lasaharu, S. (2021). Network Forensic on Web-Based Applications using Network Forensic Development Life Cycle Method. 1–7.
  16. Zaenudin. (2018).Forensic Metadata For Digital Evidence Correlation Analysis. 10(1), 85–89. https://dspace.uii.ac.id/handle/123456789/9452
  17. Priyadi, D. P., Budiyanto, U., Studi, P., Informatika, T., Informasi, F. T., Luhur, U. B., Utara, P., & Lama, K. (n.d.).Checking Image Authenticity Using Cryptographic Algorithm Advanced Encryption Standard 128 (Aes), Vigenere Cipher And Steganography Least Significant Bit (Lsb) Based On Android On Cv. Wiratama. 128, 1–7.
  18. AutoridadNacionaldelServicio Civil. (2021). 済無No Title No Title No Title. AngewandteChemie International Edition, 6(11), 951–952., 2013–2015.
  19. Al-Fajri, M. R., M.Kom, C., &Yusup, D. (2021). Image Forensic Analysis In Detecting Engineering Image Files With The Nist Method. JUSTINDO (JurnalSistem Dan TeknologiInformasi Indonesia), 6(2), 84–90. https://doi.org/10.32528/justindo.v6i2.5120
  20. Harahap, F. (2021).Detect Photo Manipulation With Forensicallybeta and Imageforensic Tools. orgDenganMetode Error Level Analysis ( ELA ). 2(3).
  21. Wijayanto, H., Prabowo, I. A., &Harsadi, P. (2018). Optimization of Exif Metadata Shrinkage Using Null Value Substitution Techniques in the Case of Digital Image Security.JurnalIlmiah SINUS, 16(1), 1. https://doi.org/10.30646/sinus.v16i1.327
  22. N. B. A. Warif, M. Y. I. Idris, A. W. A. Wahab, and R. Salleh, “An evaluation of Error Level Analysis in image forensics,” in 2015 5th IEEE International Conference on System Engineering and Technology (ICSET), 2015, pp. 23–28.
  23. J. Lorenzo-Navarro, M. Castrillón-Santana, and D. HernándezSosa, “On the use of simple geometric descriptors provided by RGB-D sensors for re-identification,” Sensors for re-identification,” Sensors, vol. 13, no. 7, pp.8222–8238, 2013.
  24. Pasquini, V. Conotter, and G. Boato, “RAISE - A Raw Images Dataset for Digital Image Forensics,” Proc. 6th ACM Multimed. Syst. Conf., 2015.
  25. M. Fauzi Rahman, “Digital Image Forensics: Metadata and Error Level Analysis To Detect Image Manipulation,” UniversitasPendidikan Indonesia, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Image Jpeg Image Manipulation Image Forensics Error Level Analysis