Perancangan Aplikasi Duplicate PDF Scanner Menerapkan Algoritma MD2
DOI:
https://doi.org/10.47065/jieee.v2i2.387Keywords:
Duplicate; Message Digest; Verification; MD2Abstract
We are now in the era of the digital world. Many industries have switched to digital technology such as photos, videos, music, and so on. Of course, this change brings many benefits for us in terms of speed and data access. The ease of accessing the internet also has a major impact on human life. The ease of accessing documents online is very helpful if you want to find and download pdf documents online. With this convenience, many of the same pdf files are downloaded more than once. This will definitely burden the storage space. To distinguish one pdf file from another, it is done by viewing and reading the contents of the pdf file. This is very inconvenient and time consuming. To overcome this, we need a practical way that can be used to search for the same pdf document so that it can delete duplicate pdf files. One way that can be used to overcome this problem is to use a hash function, one of the hash functions in cryptography is the MD 2 algorithm or Message Digest 2. By using the hash function, the identity of the pdf file can be generated. If the pdf files are the same it will produce the same hash value as well. This will make it easier to group the same pdf documents so that it will speed up the process of deleting the same pdf files. With the pdf file scanner application, pdf files will be searched for all folders and will group pdf files based on the same hash value. So that it will be easier for users to delete the same pdf file.
Downloads
References
R. Sadikin, Kriptografi Untuk Kemanan Jaringan dan Implementasinya Dalam Bahasa Java, Yogyakarta: Andi, 2012.
R. Munir, Kriptografi, Bandung: R. Munir, 2006.
Y. Kurniawan, Kriptografi Keamanan Internet dan Jaringan Komunikasi, Bandung: Informatika, 2017.
R. Munir, Kriptografi, Bandung: Informatika Bandung, 2006.
F. I. P. Standards Publications, "Secure Hash Standard," National Institute of Standards and Technology, Amerika Serikat, 2002.
S. Patil, N. Jagtap, S. Rajput and R. Sangore, "A Duplicate File Finder System," International Journal of Science Spirituality Business and Technology, pp. 10-14, 2017.
D. Irwanto, Perancangan Object Oriented Software Dengan UML, Yogyakarta: Andi, 2007.
Ketut Darmayuda, Pemograman Aplikasi Database dengan Microsoft Visual Basic. NET 2008, Bandung, 2010.
C. Solution and S. Community, Membangun Aplikasi Database Dengan Visual Basic 2008 dan SQL Server 2008, Jakarta: PT. Elex Media Komputindo, 2010.
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Perancangan Aplikasi Duplicate PDF Scanner Menerapkan Algoritma MD2
ARTICLE HISTORY
Issue
Section
Copyright (c) 2022 Felisiana Apustriani Gulo

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


