Perancangan Aplikasi Duplicate Image Scanner Menerapkan Algoritma MD5
Abstract
Currently we are in the era of the digital world, there are lots of equipment that have tools to record photos in the form of cameras found on smartphones. The weakness of smartphones is the small storage space, so users must be good at managing files stored on the smartphone. There are so many applications in smartphones that provide facilities for sharing images. This of course will greatly burden the storage space of the smartphone because it stores image files which are generally large in size, especially if the image files are the same or duplicate, of course it is very burdensome for storage space. It will be very difficult to distinguish an image file without looking at the contents of the image file. So if you want to distinguish one image file from another, the user must see the contents of the image file and this will certainly be very difficult. For that we need a method that can be used to identify the same image file or duplicate image files so that a decision can be made to delete the duplicate document files so as to save storage space. In cryptography there is a hash function which is a one-way function that can generate the identity of a file, where if the image file contains the same content, it will produce the same hash value. It can be used to identify the same or duplicate image files. In the hash function there is the MD5 method or Message Digest 5 which is one of the hashing algorithms that is often used to encrypt data with a length of 128 bits. By applying this algorithm to the file scanner application, the results of the image file search are grouped based on the same hash value and users can make it easier and faster for users to delete duplicate image files without having to open and view the contents of the file
References
Irwanto, D. (2007). Perancangan Object Oriented Software Dengan UML. Yogyakarta: Andi.
Ketut Darmayuda. (2010). Pemograman Aplikasi Database dengan Microsoft Visual Basic. NET 2008. Bandung.
Kurniawan, Y. (2017). Kriptografi Keamanan Internet dan Jaringan Komunikasi. Bandung: Informatika.
Munir, R. (2006). Kriptografi. Bandung: R. Munir.
Munir, R. (2006). Kriptografi. Bandung: Informatika Bandung.
Munir, R. (2007). Pengolahan Citra Digital Dengan Pendekatan Algoritmik. Bandung: Informatika.
Patil, S., Jagtap, N., Rajput, S., & Sangore, R. (2017). A Duplicate File Finder System. International Journal of Science Spirituality Business and Technology, 10-14.
Putra, D. (2010). Pengolahan Citra Digital. Yogyakarta: Andi.
Rivest, R. (1992). The MD5 Message-Digest Algorithm. Massachuset: MIT Laboratory for Computer Science.
Sadikin, R. (2012). Kriptografi Untuk Kemanan Jaringan dan Implementasinya Dalam Bahasa Java. Yogyakarta: Andi.
Solution, C., & Community, S. (2010). Membangun Aplikasi Database Dengan Visual Basic 2008 dan SQL Server 2008. Jakarta: PT. Elex Media Komputindo.
Copyright (c) 2022 Gaberia Sanchia Melati BR Lumbantoruan

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).


