Implementasi Metode Perceptual Hash Untuk Deteksi Plagiarisme Tugas Mata Kuliah Software Modeling

Septira Kurniati, Rachman Yulianto, Tintin Harlina
{"title":"Implementasi Metode Perceptual Hash Untuk Deteksi Plagiarisme Tugas Mata Kuliah Software Modeling","authors":"Septira Kurniati, Rachman Yulianto, Tintin Harlina","doi":"10.55794/jikom.v12i2.84","DOIUrl":null,"url":null,"abstract":"Plagiarism is a crime that is no stranger to the world of education in Indonesia. Plagiarism can be done in the form of text or images. One example of plagiarism in the form of images is when submitting assignments for the Software Modeling course at the STIKOM PGRI Banyuwangi Campus. One example of plagiarism that was carried out at the STIKOM PGRI Banyuwangi Campus was when a student copied a drawing assignment from another student. However, only changed in a few elements.Therefore, we need a mechanism that can detect plagiarism in the form of images.One method that can be used to detect the similarity of image sources is to use the perceptual hash algorithm. The algorithm is applied to compare one image with another image that is suspected of plagiarism. In applying this perceptual hash method, it requires a program using the PHP programming language.The results of this study are to detect plagiarism with an 8x8 image resize which has the fastest computing time of 0.437 seconds. When tested, the perceptual hash method was able to detect plagiarism with a success rate of 70.7% with a threshold value of 75% for the similarity level. However, it is not capable of images that change position. Thus, the perceptual hash method is capable of detecting plagiarism of sequence diagram images without changing position or normally.","PeriodicalId":338910,"journal":{"name":"Jikom: Jurnal Informatika dan Komputer","volume":"21 9","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Jikom: Jurnal Informatika dan Komputer","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55794/jikom.v12i2.84","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Plagiarism is a crime that is no stranger to the world of education in Indonesia. Plagiarism can be done in the form of text or images. One example of plagiarism in the form of images is when submitting assignments for the Software Modeling course at the STIKOM PGRI Banyuwangi Campus. One example of plagiarism that was carried out at the STIKOM PGRI Banyuwangi Campus was when a student copied a drawing assignment from another student. However, only changed in a few elements.Therefore, we need a mechanism that can detect plagiarism in the form of images.One method that can be used to detect the similarity of image sources is to use the perceptual hash algorithm. The algorithm is applied to compare one image with another image that is suspected of plagiarism. In applying this perceptual hash method, it requires a program using the PHP programming language.The results of this study are to detect plagiarism with an 8x8 image resize which has the fastest computing time of 0.437 seconds. When tested, the perceptual hash method was able to detect plagiarism with a success rate of 70.7% with a threshold value of 75% for the similarity level. However, it is not capable of images that change position. Thus, the perceptual hash method is capable of detecting plagiarism of sequence diagram images without changing position or normally.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
用于剽窃软件作业的剽窃大麻方法的实施
抄袭是一种犯罪,在印度尼西亚的教育界并不陌生。抄袭可以以文字或图像的形式进行。以图像形式抄袭的一个例子是在提交STIKOM PGRI Banyuwangi校区软件建模课程的作业时。在STIKOM PGRI Banyuwangi校区发生的一个抄袭案例是,一名学生抄袭了另一名学生的绘画作业。然而,只改变了几个元素。因此,我们需要一种机制来检测图像形式的抄袭。一种可以用来检测图像源相似性的方法是使用感知哈希算法。该算法用于将一个图像与另一个疑似抄袭的图像进行比较。在应用这种感知哈希方法时,需要使用PHP编程语言编写程序。本研究的结果是,以8 × 8的图像大小进行抄袭检测,其最快的计算时间为0.437秒。经过测试,感知哈希方法能够检测剽窃,成功率为70.7%,相似性水平的阈值为75%。然而,它不能改变图像的位置。因此,感知哈希方法能够在不改变位置或正常的情况下检测序列图图像的抄袭。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Sistem Pakar Psikologi Perkembangan Anak Menggunakan Algoritma Cosine Arsitektur Perusahaan Untuk Mendukung Transformasi Digital: Systematic Literature Review Implementasi Algoritma Naïve Bayes untuk Sistem Rekomendasi Pemilihan Fakultas di Universitas Amikom Yogyakarta Sistem Informasi Penelitian Dosen Pada Lp2m Itb Asia Malang Berbasis Web Perancangan Buku Mewarnai Interaktif Berbasis Teknologi Augmented Reality Dengan Unity Region Capture
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1