Claim Missing Document
Check
Articles

Found 10 Documents
Search

A Comparison of Non Blind Image Watermarking Using Transformation Domain Kartikadarma, Etika; Udayanti, Erika Devi; Sari, Christy Atika; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In digital image processing, there is an algorithm that is most often used because it has advantages in imperceptibility and robustness. The DCT and HWT algorithms are usually used together to get better results. However in this study we wanted to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect. Using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. On the other hand, robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.
A Comparison of Non Blind Image Watermarking Using Transformation Domain Kartikadarma, Etika; Udayanti, Erika Devi; Sari, Christy Atika; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.28334

Abstract

Purpose: This study aims to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. Methods: The DCT and HWT algorithms used to get better results. Result: The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect.  using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. Novelty: Robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.
Histogram of Gradient in K-Nearest Neighbor for Javanese Alphabet Classification Susanto, Ajib; Atika Sari, Christy; Mulyono, Ibnu Utomo Wahyu; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 2 (2021): November 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i2.30788

Abstract

Purpose: The Javanese script generally has a basic script or is commonly referred to as the “carakan” script. The script consists of 20 letters with different levels of difficulty. Some letters have similarities, so research is needed to make it easier to detect the image of Javanese characters. Methods: This study proposes recognizing Hiragana's writing characters using the K-Nearest Neighbor (K-NN) method. In the preprocessing stage, the segmentation process is carried out using the thresholding method to perform segmentation, followed by the Histogram of Gradient (HOG) feature extraction process and noise removal using median filtering. Histogram of Gradient (HoG) is one of the features used in computer vision and image processing in detecting an object in the form of a descriptor feature. There are 1000 data divided into 20 classes. Each class represents one letter of the basic Javanese script. Result: Based on data collection using the writings of 50 respondents where each respondent writes 20 basic Javanese characters, the highest accuracy was obtained at K = 1, namely 98.5%. Novelty: Using several preprocessing such as cropping, median filtering, otsu thresholding and HOG feature extraction before do classification, this experiment yields a good accuracy.
Bounding Box and Thresholding in Optical Character Recognition for Car License Plate Recognition Sania, Wulida Rizki; Sari, Christy Atika; Rachmawanto, Eko Hari; Doheir, Mohamed
Sinkron : jurnal dan penelitian teknik informatika Vol. 7 No. 4 (2023): Article Research Volume 7 Issue 4, October 2023
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v8i4.12944

Abstract

License plate recognition plays a central role in a variety of application contexts, including traffic management, automated parking, and law enforcement. Among the various approaches available, the Optical Character Recognition (OCR) technique has proven its effectiveness in recognizing characters in license plate images. This study describes an approach for detecting and recognizing vehicle license plates by utilizing the OCR method with Bounding Box, Thresholding, and template matching. In addition, this study uses MATLAB R2022a software as the main tool in developing and implementing the method. The goal is to recognize vehicle license plates from images, describe their characteristics, and generate relevant information. This approach involves a series of image processing steps starting with the pre-processing stage, followed by the process of binarization and license plate segmentation. After successfully isolating the license plate area, isolating the character using a bounding box is performed using image separation techniques. The OCR method is used to recognize license plate characters through comparison using the correlation method. Through a series of experiments on several image datasets, this approach succeeded in showing that out of 20 sampled license plate images, the results obtained were a reading accuracy of 93.55% of 100%, recognizing 13 out of 20 license plate images accurately when tested. Thus, the findings of this research are expected to contribute to the recognition of vehicle license plates that are accurate and efficient, by utilizing image processing techniques and OCR methods implemented using MATLAB R2022a software.
Dijkstra-based Official Motorcycle Repair Shop Application for Determining the Shortest Route Sucipto, Adi; Doheir, Mohamed
Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i2.8593

Abstract

Servicing on 2-wheeled vehicles is needed so that the condition remains prime and minimizes the symptoms of component damage. Motorcycle service activities have an impact on the automotive world, especially in the City of Kudus. There are also many motorized vehicle users who do not know the closest route to the nearest Authorized Motorcycle Workshop in the holy city and choose Engine Fuel (BBM) that is in accordance with the type of vehicle they have. shorter service life because the RON (Research Octane Number) or octane number for each motorized vehicle is different, the octane number represents the resistance of the fuel to engine compression. With the development of information science in the current era, an Android-based application was created to search for the closest route to an official motorcycle repair shop in the Kudus City using the Djikstra Algorithm and having a BBM recommendation feature that is suitable for motorbike users' vehicles in the Kudus City.
Implementation Of The Base64 Algorithm For Text Encryption And Decryption Using The Python Programming Language Pamungkas, Caroko Aji; Pratama, Zudha; Setiarso, Ichwan; Doheir, Mohamed
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10310

Abstract

The exchange of information on the Internet requires increased protection to avoid potential threats to privacy and security. This study identified the main issues in this regard: the need for simple and effective tools for encoding and decoding messages, and the need to understand Base64 encoding algorithms and concepts. However, to overcome this problem the author developed an application to encode and decode messages/text using the Base64 algorithm and the Python programming language. This application allows users to send secret messages/text securely via and convert the data into Base64 format for secure transmission via text media. It also covers the basics of cryptography, Base64 algorithms, and how to use the Python programming language to develop secure applications. The result of this research is a simple and effective encryption and decryption application. This application provides a solution for users to protect messages or text when they want to change confidential information by converting it to Base64 format. With this application, you can send secret messages or texts with the confidence that only authorized parties can read them. Implementing message encryption and decryption using the Base64 algorithm using Python is an important step in maintaining message privacy and security in the current digital era. This research succeeded in developing an application suitable for this purpose. Therefore, the next step is to improve the security of your application by implementing stronger encryption algorithms. Additionally, we provide a more comprehensive user guide to help users better understand cryptographic concepts. Further research may focus on integrating applications with broader Internet security protocols to address increasingly complex security threats.
Improved imperceptible engagement-based 2D sigmoid logistic maps, Hill cipher, and Kronecker XOR product Lestiawan, Heru; Sani, Ramadhan Rakhmat; Abdussalam, Abdussalam; Rachmawanto, Eko Hari; Purwanto, Purwanto; Sari, Christy Atika; Doheir, Mohamed
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8331

Abstract

Image encryption is a crucial facet of secure data transmission and storage, and this study explores the efficacy of combining sigmoid logistic maps (SLM), Hill cipher, and Kronecker's product method in enhancing image encryption processes. The evaluation, conducted on diverse images such as Lena, Rice, Peppers, Cameraman, and Baboon, unveils noteworthy findings. The Lena image emerges as the most successfully encrypted, as evidenced by the lowest mean squared error (MSE) at 92.81 and the highest peak signal-to-noise ratio (PSNR) at 19.43, reflecting superior fidelity and quality preservation. Additionally, the encryption of 64×64 pixels images consistently demonstrate robustness, with a high number of pixels change rate (NPCR) and unified average change intensity (UACI) values, particularly notable for the Cameraman image. Even for 128×128 pixels images, commendable encryption performance persists across the tested images. The amalgamation of SLM, Hill cipher, and Kronecker's product emerges as an effective strategy for balancing security and perceptual quality in image encryption, with the Lena image consistently outperforming others based on comprehensive metrics. This research provides valuable insights for future studies in the dynamic domain of image encryption, emphasizing the potential of advanced cryptographic techniques in ensuring secure multimedia communication.
Regionprops Segmentation in Convolutional Neural Network for Identification of Lung Cancer Disease and Position Syafira, Zahra Ghina; Sari, Christy Atika; Mulyono, Ibnu Utomo Wahyu; Agustina, Feri; Suprayogi, Suprayogi; Doheir, Mohamed
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.73967

Abstract

Lung cancer is one of the leading causes of death in the world, so early detection is very important to increase the chances of patient recovery. This study aims to develop a method for identifying lung cancer types using Convolutional Neural Network (CNN) combined with Regionprops segmentation technique to determine the position of cancer in CT scan images. The dataset used consists of 1,294 CT scan images classified into three classes, namely Benign, Malignant, and Normal, with variations in the ratio of training and testing data: 80:20, 70:30, 60:40, 50:50, and 40:60. The CNN method is used to perform classification, while the Regionprops segmentation technique is applied to determine the position of the cancer. The results showed that the model with a data ratio of 80:20 achieved the highest accuracy of 99.54%, indicating a very good generalization ability of the model. The Regionprops segmentation technique successfully separated the nodule area in the CT scan image clearly, thus providing more detailed information regarding the position of the cancer. The conclusion of this study shows that the combination of CNN and Regionprops segmentation methods is effective in detecting and analyzing lung cancer and has the potential to be used as a diagnostic tool in the medical field. This study recommends further testing with a larger dataset and optimization of model parameters to improve classification and segmentation performance.
Improved Chaotic Image Encryption on Grayscale Colorspace Using Elliptic Curves and 3D Lorenz System Sinaga, Daurat; Jatmoko, Cahaya; Astuti, Erna Zuni; Rachmawanto, Eko Hari; Abdussalam, Abdussalam; Pramudya, Elkaf Rahmawan; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Doheir, Mohamed
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2251

Abstract

Digital data, especially visual content, faces significant security challenges due to its susceptibility to eavesdropping, manipulation, and theft in the modern digital landscape. One effective solution to address these issues is the use of encryption techniques, such as image encryption algorithms, that ensure the confidentiality, integrity, and authenticity of digital visual content. This study addresses these concerns by introducing an advanced image encryption method that combines Elliptic Curve Cryptography (ECC) with the 3D Lorenz chaotic system to enhance both security and efficiency. The method employs pixel permutation, ECC-based encryption, and diffusion using pseudo-random numbers generated by the Lorenz 3D system. The results show superior performance, with an MSE of 3032 and a PSNR of 8.87 dB, as well as UACI and NPCR values of 33.34% and 99.64%, respectively, indicating strong resilience to pixel intensity changes. During testing, the approach demonstrated robustness, allowing only the correct key to decrypt images accurately, while incorrect or modified keys led to distorted outputs, ensuring encryption reliability. Future work could explore extending the method to color images, optimizing processing for larger datasets, and incorporating additional chaotic systems to further fortify encryption strength.
Interpretable Deep Learning Model for Grape Leaf Disease Classification Based on EfficientNet with Grad-CAM Visualization Sugianto, Castaka Agus; Rohmayani, Dini; Fredricka, Jhoanne; Doheir, Mohamed
Journal of Innovation Information Technology and Application (JINITA) Vol 7 No 1 (2025): JINITA, June 2025
Publisher : Politeknik Negeri Cilacap

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35970/jinita.v7i1.2745

Abstract

Grape leaf diseases pose a significant threat to agricultural productivity, especially in regions with fluctuating climatic conditions that create favorable environments for pathogen growth. Early and accurate disease detection is essential for preventing severe crop losses. Traditional manual inspection methods are inefficient and prone to human error, highlighting the need for an automated approach. This study proposes a computer vision-based solution using Convolutional Neural Networks (CNN) improved by EfficientNetB0 to classify grape leaf diseases. The model was trained on a publicly available dataset from Kaggle, which consists of 9,027 images in four classes: ESCA, Leaf Blight, Black Rot, and Healthy. Each image has a resolution of 300 × 300 pixels with a 24-bit color depth, ensuring sufficient detail for analysis. To enhance model performance, data augmentation and hyperparameter tuning were applied. The EfficientNetB0 model was employed due to its strong feature extraction capabilities and computational efficiency. The proposed model achieved 99.36% accuracy, with evaluation metrics including precision (99%), recall (99%), and F1-score (99%), demonstrating its reliability in distinguishing disease categories. Further analysis using a confusion matrix and Grad-CAM visualization provided insights into the model’s decision-making process. The results indicate that this deep learning-based approach is highly effective for grape leaf disease classification. Future research can explore real-time field data collection, attention mechanisms, and self-supervised learning to further improve classification accuracy and model generalization for large-scale agricultural applications.