Implementation of Blockchain Technology for Image Plagiarism Detection Using DCT, AES128, and SHA-1 Algorithms
DOI:
https://doi.org/10.34148/teknika.v14i1.1205Keywords:
Blockchain, Plagiarism, Digital Image, DCT, AES-128, SHA-1Abstract
Plagiarism encompasses the act of appropriating high-quality user-generated content as if it were one's own intellectual property. Image plagiarism can be conceptualized as a broader category that encompasses the challenges of detecting copied images. Identifying instances of plagiarism is of paramount importance not only for graphic designers, professional photographers, and bloggers but also for publishing entities and legal practitioners seeking to uncover unauthorized reproductions of their creations. In addressing this issue, the implementation of blockchain technology presents a viable solution. Fundamentally more than just a collection of interconnected blocks, blockchain is characterized by the systematic recording of digital signatures or hashes of each block. Blockchain is essentially more than just a collection of interconnected blocks; it is characterized by the systematic recording of a digital signature or hash of each block. To generate the hash, cryptographic methods can be applied. This study aims to develop a web-based application that is adept at detecting image plagiarism through the application of blockchain technology. Images submitted by users will undergo plagiarism detection by an application that uses blockchain methodology. This study applies the DCT method to extract features from images, then uses the AES-128 and SHA-1 methods to generate blockchain. The results of this study are in the form of a website that can be used to detect image plagiarism. From the results of the tests carried out, it was obtained that the combination of the DCT, AES-128 and SHA-1 methods can detect image plagiarism with an accuracy of 100%. This means that the combination of these methods can be applied to carry out the process of detecting image plagiarism with a very high level of accuracy.
Downloads
References
[1] S. Anwar, A. Ullah, Á. Rocha, and M. J. Sousa, Lecture Notes in Networks and Systems 614 Proceedings of International Conference on Information Technology and Applications ICITA 2022. 2022.
[2] M. F. Sidiq, A. I. Basuki, D. Rosiyadi, I. Setiawan, Y. H. Siregar, and S. Sriyadi, “Secure protection for covid-19 infographic using blockchain and discrete cosine transform-singular value decomposition (DCT-SVD) watermarking,” J. Infotel, vol. 14, no. 2, pp. 93–100, 2022, doi: 10.20895/infotel.v14i2.749.
[3] R. Uki Indriani and M. Hardjianto, “3 rd Seminar Nasional Mahasiswa Fakultas Teknologi Informasi (SENAFTI) 30 Agustus 2023-Jakarta,” 2023.
[4] P. T. A. Muzizat, “Algoritma AES128-CBC (Advanced Encryption Standard) Untuk Enkripsi Dan Dekripsi Berkas Dokumen,” vol. 7, no. 1, pp. 166–176, 2025.
[5] M. G. Royhan and D. K. Ngabekti, “Problematika Desain Komunikasi Visual dan Plagiarisme dalam Dunia Desain Grafis,” CITRAWIRA J. Advert. Vis. Commun., vol. 2, no. 1, pp. 86–95, Jun. 2021, doi: 10.33153/citrawira.v2i1.3671.
[6] R. Maulana Rachman, A. Sobandi, and A. Wahyudin, “Penggunaan Aplikasi Pendeteksi Plagiarisme Image Sebagai Fasilitas Pendukung Otomatisasi Perkantoran,” 2022. [Online]. Available: http://ejournal.upi.edu/index.php/manajerial/
[7] A. Chaudhuri, M. S. Bhatia, Y. Kayikci, K. J. Fernandes, and S. Fosso-Wamba, “Improving social sustainability and reducing supply chain risks through blockchain implementation: role of outcome and behavioural mechanisms,” Ann. Oper. Res., vol. 327, no. 1, pp. 401–433, 2023, doi: 10.1007/s10479-021-04307-6.
[8] I. S. Farahat, W. Aladrousy, M. Elhoseny, S. Elmougy, and A. E. Tolba, “Secure Medical Blockchain Model,” Inf., vol. 14, no. 2, pp. 1–15, 2023, doi: 10.3390/info14020080.
[9] A. R. Kairaldeen, N. F. Abdullah, A. Abu-Samah, and R. Nordin, “Peer-to-Peer User Identity Verification Time Optimization in IoT Blockchain Network,” Sensors, vol. 23, no. 4, 2023, doi: 10.3390/s23042106.
[10] H. Guo and X. Yu, “A survey on blockchain technology and its security,” Blockchain Res. Appl., vol. 3, no. 2, p. 100067, 2022, doi: 10.1016/j.bcra.2022.100067.
[11] A. K. Peepliwal et al., “A Prototype Model of Zero Trust Architecture Blockchain with EigenTrust-Based Practical Byzantine Fault Tolerance Protocol to Manage Decentralized Clinical Trials,” Blockchain Res. Appl., vol. 5, no. 4, p. 100232, 2024, doi: 10.1016/j.bcra.2024.100232.
[12] J. Swati and P. Nitin, “Securing Decentralized Storage in Blockchain: A Hybrid Cryptographic Framework,” Cybern. Inf. Technol., vol. 24, no. 2, pp. 16–31, 2024, doi: 10.2478/cait-2024-0013.
[13] O. Itohan Oriekhoe, G. Bolawale Omotoye, O. Peter Oyeyemi, S. Tubokirifuruar Tula, A. Ifesinachi Daraojimba, and A. Adefemi, “Blockchain in Supply Chain Management: a Systematic Review: Evaluating the Implementation, Challenges, and Future Prospects of Blockchain Technology in Supply Chains,” Eng. Sci. Technol. J., vol. 5, no. 1, pp. 128–151, 2024, doi: 10.51594/estj/v5i1.732.
[14] Y. A. Prabowo, W. S. Pambudi, and I. R. Imaduddin, “Identification of the Flip Folder Folding Machine Using Artificial Neuro Network Method with NARX (Nonlinear Auto Regressive Exogenous) Structure,” Inf. J. Ilm. Bid. Teknol. Inf. dan Komun., vol. 5, no. 2, pp. 74–79, 2020, doi: 10.25139/inform.v5i2.2743.
[15] M. C. Kriswantoro, A. Sudarsono, and M. Yuliana, “Secret Key Establishment Using Modified Quantization Log For Vehicular Ad-Hoc Network,” Inf. J. Ilm. Bid. Teknol. Inf. dan Komun., vol. 6, no. 2, pp. 103–109, 2021, doi: 10.25139/inform.v6i2.4037.
[16] T. Wira and E. Suryawijaya, “Memperkuat Keamanan Data melalui Teknologi Blockchain: Mengeksplorasi Implementasi Sukses dalam Transformasi Digital di Indonesia Strengthening Data Security through Blockchain Technology: Exploring Successful Implementations in Digital Transformation in Indonesia,” vol. 2, no. 1, pp. 55–67, 2023, doi: 10.21787/jskp.2.2023.55-67.
[17] Z. Munawar, N. Indah Putri, I. Iswanto, and D. Widhiantoro, “Analisis Keamanan Pada Teknologi Blockchain,” Infotronik J. Teknol. Inf. dan Elektron., vol. 8, no. 2, p. 67, Dec. 2023, doi: 10.32897/infotronik.2023.8.2.2062.
[18] Pedro et al, “Title Page (with Author Details) Title: Insights into Blockchain Implementation in Construction: Models for 2,” 2021.
[19] R. Fotohi and F. Shams Aliee, “Securing communication between things using blockchain technology based on authentication and SHA-256 to improving scalability in large-scale IoT,” Comput. Networks, vol. 197, no. December 2020, 2021, doi: 10.1016/j.comnet.2021.108331.
[20] C. E. B. Santos, L. M. D. d. Silva, M. F. Torquato, S. N. Silva, and M. A. C. Fernandes, “SHA-256 Hardware Proposal for IoT Devices in the Blockchain Context,” Sensors, vol. 24, no. 12, pp. 1–25, 2024, doi: 10.3390/s24123908.
[21] A. K. Yadav and V. P. Vishwakarma, “An integrated blockchain and fractional DCT based highly secured framework for storage and retrieval of retinal images,” Ain Shams Eng. J., vol. 15, no. 11, p. 103047, 2024, doi: 10.1016/j.asej.2024.103047.
[22] A. H. Jasim and A. H. Kashmar, “An Evaluation of RSA and a Modified SHA-3 for a New Design of Blockchain Technology,” EAI/Springer Innov. Commun. Comput., vol. Part F632, pp. 477–489, 2023, doi: 10.1007/978-3-031-23602-0_28.
[23] I. F. Azmi and A. A. Nugroho, “Anti-corruption system 4.0: The adoption of blockchain technology in the public sector,” Integritas J. Antikorupsi, vol. 9, no. 1, pp. 93–108, Jun. 2023, doi: 10.32697/integritas.v9i1.985.
[24] S. Hafeez, M. A. Shawky, M. Al-Quraan, L. Mohjazi, M. A. Imran, and Y. Sun, “BETA-UAV: Blockchain-based Efficient Authentication for Secure UAV Communication,” pp. 5–9, 2024, [Online]. Available: http://arxiv.org/abs/2402.15817
[25] A. Garba et al., “A digital rights management system based on a scalable blockchain,” Peer-to-Peer Netw. Appl., vol. 14, no. 5, pp. 2665–2680, 2021, doi: 10.1007/s12083-020-01023-z.

Downloads
Published
Issue
Section
License
Copyright (c) 2025 Teknika

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.