<?xml version="1.0" encoding="UTF-8" ?>
<modsCollection xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" xmlns:slims="http://slims.web.id" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-3.xsd">
<mods version="3.3" id="58395">
 <titleInfo>
  <title></title>
 </titleInfo>
 <name type="Personal Name" authority="">
  <namePart>Fitriyanto Rachmad</namePart>
  <role>
   <roleTerm type="text">Primary Author</roleTerm>
  </role>
 </name>
 <typeOfResource manuscript="no" collection="yes">mixed material</typeOfResource>
 <genre authority="marcgt">bibliography</genre>
 <originInfo>
  <place>
   <placeTerm type="text">Purwokerto</placeTerm>
   <publisher>Universitas Muhammadiyah Purwokerto</publisher>
   <dateIssued>2020</dateIssued>
  </place>
 </originInfo>
 <language>
  <languageTerm type="code"></languageTerm>
  <languageTerm type="text">Indonesia</languageTerm>
 </language>
 <physicalDescription>
  <form authority="gmd">Artikel Jurnal</form>
  <extent>hlm : 1-10</extent>
 </physicalDescription>
 <relatedItem type="series">
  <titleInfo/>
  <title>JUITA : Jurnal Informatika</title>
 </relatedItem>
</mods>
<note>Abstract&#13;
&#13;
The jpeg/exif is file’s format for image produced by digital camera such as in the smartphones. The security method for jpeg/exif usages in digital communication currently only full-fill prevention aspect from three aspects of information security, prevention, detection and response. Digital Signature Algorithm (DSA) is a cryptographic method that provide detection aspect of information security by using hash-value as fingerprint of digital documents. The purpose of this research is to compile jpeg/exif file data fingerprint using the hash-value from DSA. The research conducted in four stages. The first stages is the identification of jpeg/exif file structure using Boyer-Moore string matching algorithm to locate the position of file’s segments. The second stage is segment’s content acquisition. The third stage the image files modification experiments to select the suitable element of jpeg/exif file data fingerprint. The fourth stage is the compilation of hash-values to form data fingerprint. The Obtained result has shown that the jpeg/exif file fingerprint comprises three hash value from the SOI segment, APP1's segment, and the SOF0 segment. The jpeg/exif file fingerprint can use for modified image detection, include six types of image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file type conversion</note>
<note type="statement of responsibility"></note>
<subject authority="">
 <topic>Informatika</topic>
</subject>
<classification>JUITA</classification>
<identifier type="isbn">20869398</identifier>
<location>
 <physicalLocation>Perpustakaan Teknik UPI YAI </physicalLocation>
 <shelfLocator>JUITA V8N1 Mei 2020</shelfLocator>
 <holdingSimple>
  <copyInformation>
   <numerationAndChronology type="1">JUITA3a-001</numerationAndChronology>
   <sublocation>Perpustakaan FT UPI YAI</sublocation>
   <shelfLocator>JUITA V8N1 Mei 2020</shelfLocator>
  </copyInformation>
  <copyInformation>
   <numerationAndChronology type="1">JUITA3b-001</numerationAndChronology>
   <sublocation>Perpustakaan FT UPI YAI</sublocation>
   <shelfLocator>JUITA V8N1 Mei 2020</shelfLocator>
  </copyInformation>
 </holdingSimple>
</location>
<slims:image>juita.png.png</slims:image>
<recordInfo>
 <recordIdentifier>58395</recordIdentifier>
 <recordCreationDate encoding="w3cdtf">2022-12-07 14:04:07</recordCreationDate>
 <recordChangeDate encoding="w3cdtf">2023-01-12 11:34:17</recordChangeDate>
 <recordOrigin>machine generated</recordOrigin>
</recordInfo>
</modsCollection>