Boyer-Moore String Matching Algorithm and SHA512 Implementation for Jpeg/exif File Fingerprint Compilation in DSA

Rachmad Fitriyanto, Anton Yudhana, Sunardi Sunardi


Data integrity, authenticity and non-repudiation are security parameters that provided by Digital Signature Algorithm (DSA). Hash value is important element inside DSA to identify information data integrity using hash function to generate message digest. Jpeg/exif is image file format that produce by digital camera as in smartphone. Hardware technology development made image file have higher resolution than before. This condition made image file fingerprinting need more time to compile jpeg/exif fingerprint. This research purpose is to develop fingerprinting process for jpeg/exif file using Boyer-Moore string matching algorithm and SHA512. Research conducted in four stages. First stage is jpeg/exif file structure identification, second stage is segment content acquisition and hashing, third stage is image file modification experiments and last stage is jpeg/exif file fingerprint compilation. Obtained result shown that jpeg/exif file fingerprint comprises of three hash value from SOI segment, APP1 segment and SOF0 segment. The jpeg/exif file fingerprint can use to detect six types image modification there are image resizing, text addition, metadata modification, image resizing, image cropping and file file type conversion.


Boyer-Moore; SHA512; Jpeg/exif; Digital Signature Algorithm; Fingerprint

Full Text:



H. Wijayanto, I. Riadi, and Y. Pryudi, “Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy,” Int. J. Res. Comput. Commun. Technol., vol. 5, no. 5, 2016.

W. Stallings and L. Brown, Computer Security Priciples and Practice, Third Edit. New Jersey: Pearson Education Inc., 2015.

H. A. Chaudhary, “Process , Application and Authenticity of Digital Signature,” Int. J. Sci. Res. Eng. Technol., vol. 6, no. 8, pp. 882–888, 2017.

L. Refialy, E. Sediyono, and A. Setiawan, “Pengamanan Sertifikat Tanah Digital Menggunakan Digital Signature SHA-512 dan,” JUTISI, vol. 1, pp. 229–234, 2015.

D. Bansal, M. Sharma, and A. Mishra, “Analysis of Digital Signature based Algorithm for Authentication and Privacy in Digital Data,” Int. J. Comput. Appl., vol. 161, no. 5, pp. 43–45, 2017.

N. Jiji and T. Mahalaksmi, “An Efficient String Matching Algorithm for Detecting Pattern Using Forward and Backward Searching Approach,” Int. J. Comput. Sci., vol. 6, no. 2, pp. 16–26, 2018.

M. Almazrooie, A. Samsudin, A. A. Gutub, M. Syukri, M. Adib, and S. Akram, “Integrity verification for digital Holy Quran verses using cryptographic hash function and compression,” J. King Saud Univ. - Comput. Inf. Sci., vol. 2, no. 6, 2018.

NIST, “FIPS PUB 180-4 Secure Hash Standard ( SHS ),” 2015.

I. Riadi and M. Sumagita, “Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 4, 2018.

K. Al-Khamaiseh and S. Al-Shagarin, “A Survey of String Matching Algorithms,” Int. J. Eng. Res. Appl., vol. 4, no. June 2015, pp. 144–156, 2014.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.