of perceptual hash to detect the rotation image as
plagiarism. This research generated a hash value
every time rotate the image 22,5
○
and then compare
it with the real hash value of the image in the
dataset. Rivas et al., 2017 researched the use of
perceptual hash to detect similarity images when
uploaded on social media. Drmic (Drmic et al. 2017)
compared each well-known algorithm in perceptual
hash such as average hash, differential hash, discrete
cosine transform (DCT) hash, and wavelet hash.
This research showed that DCT hash is the most
robust perceptual hash algorithm to detect similarity
image.
In this paper, we introduced the model that not
only detected the similarity of the uploaded image
but can protect the copyright of the image that is
already saved. The proposed model combined the
use of Blockchain technology with the digital
signature and perceptual hash to (1) protect and
prevent the attempt to change important information
such as hash value, image owner name, image name,
uploader name, and image added date, (2) to detect
the similarity of modification image such as gamma
correction, resize, rotate, crop, and salt and pepper
noise that try to upload especially to detect rotation
of 90
○
, 180
○
, and 270
○
that previous research can’t
solve it, (3) with ECDSA digital signature it can be
an additional security to protect and proof the
possession of the received upload image.
As mention above about the proposed model, it
can be explained that the contribution of this
research is the use of looping steps for DCT hash to
detected the plagiarism image, especially for the
rotation image which cannot be detected by the
previous researcher model. The improved DCT hash
is combined with Blockchain technology and the
digital signature to improve the security of data, so it
cannot be changed once it is saved into the block.
The remaining paper is structured as follows:
Section 2 provides background research related to
perceptual hash and blockchain application. Section
3 presents research methodology or our approach to
detect the similarity of the uploaded image and
prevent the attempt to change important data about
the image that is already saved before and to proof
of possession with the use of ECDSA. Section 4
provided the result and discussion and Section 5
provided the conclusion of the paper.
2 RELATED WORKS
Blockchain was a decentralized management system
invented by Satoshi Nakamoto in 2008 and
implemented in 2009. Bitcoin is the first application
that implemented this technology to handle the
transaction of cryptocurrency. As a result, Bitcoin
did not need a third party to validate the transaction.
All transaction in Bitcoin is validated by together
agreement which is called Consensus. Blockchain
isn’t a standalone technology, it consists of
cryptography, mathematics, algorithm, economic
model, combine of peer to peer network (P2P), and
consensus algorithm which is agreed by everyone
who joined to the network (Wang et al. 2018). The
use of Blockchain is well known because it's capable
to secure data inside, it prevented other people who
want to change the data which is already saved in
the block. But this technology still has an
opportunity to be hacked, if the attack is offense
more than 50% (50%+1) of network members at the
same time. But this is something that almost
impossible to do because it needed many resources
in computing. (Lin and Liao 2017).
The related works about Blockchain and
perceptual hash have been done by some
researchers. In 2014 (Aghav et al. 2014) research the
use of DCT hash which is one of the perceptual hash
algorithms to detect rotation image modification.
This research generated the hash value every 22,5
○
rotation and then compared it with the hash value of
each image that previously saved before. Compared
the hash value is using a hamming distance if the
hamming distance value below the threshold image
will be rejected, if the hamming distance value
above the threshold it will looping rotate the image
and repeat the step before until the image rotated
180
○
clockwise and anti-clockwise. This research
model is when there is just one hamming distance
value below the threshold all processes will stop and
it will be considered as plagiarism image. Bhowmik
and Feng, (2017) researched the use of Blockchain
store the watermark of unique information that
consisting of transaction history and the hash value
of image which can be used to find a similarity
image. The result of this research is using history
transactions and the value of image hash, it can be
defined as the part of the image that is edited or be
changed. Knirsch et al., (2018) research the use of
smart contracts with digital signature to handle the
claim of copyright possession by generated private
key and public key. In this research private key is
kept by the author of image, and the public key is
used by another to verified the possession of image.
But the analysis of this research is focus on evaluate
the operational cost implementation of this methoed
indeed of evaluate the effectiveness of this method.
The conclusion of this research is if the more image