Claim Missing Document
Check
Articles

Found 5 Documents
Search

Improved Javanese script recognition using custom model of convolution neural network Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Sari, Christy Atika; Rachmawanto, Eko Hari; Setiadi, De Rosal Ignatius Moses; Sarker, Md Kamruzzaman
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i6.pp6629-6636

Abstract

Handwriting recognition in Javanese script is not widely developed with deep learning (DL). Previous DL and machine learning (ML) research is generally limited to basic characters (Carakan) only. This study proposes a deep learning model using a custom-built convolutional neural network to improve recognition accuracy performance and reduce computational costs. The main features of handwritten objects are textures, edges, lines, and shapes, so convolution layers are not designed in large numbers. This research maximizes optimization of other layers such as pooling, activation function, fully connected layer, optimizer, and parameter settings such as dropout and learning rate. There are eleven main layers used in the proposed custom convolutional neural network (CNN) model, namely four convolution layers+activation function, four pooling layers, two fully connected layers, and a softmax classifier. Based on the test results on the Javanese script handwritten image dataset with 120 classes consisting of 20 basic character classes and 100 compound character classes, the resulting accuracy is 97.29%.
Image Encryption using Half-Inverted Cascading Chaos Cipheration Setiadi, De Rosal Ignatius Moses; Robet, Robet; Pribadi, Octara; Widiono, Suyud; Sarker, Md Kamruzzaman
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9388

Abstract

This research introduces an image encryption scheme combining several permutations and substitution-based chaotic techniques, such as Arnold Chaotic Map, 2D-SLMM, 2D-LICM, and 1D-MLM. The proposed method is called Half-Inverted Cascading Chaos Cipheration (HIC3), designed to increase digital image security and confidentiality. The main problem solved is the image's degree of confusion and diffusion. Extensive testing included chi-square analysis, information entropy, NCPCR, UACI, adjacent pixel correlation, key sensitivity and space analysis, NIST randomness testing, robustness testing, and visual analysis. The results show that HIC3 effectively protects digital images from various attacks and maintains their integrity. Thus, this method successfully achieves its goal of increasing security in digital image encryption
Butterflies Recognition using Enhanced Transfer Learning and Data Augmentation Adityawan, Harish Trio; Farroq, Omar; Santosa, Stefanus; Islam, Hussain Md Mehedul; Sarker, Md Kamruzzaman; Setiadi, De Rosal Ignatius Moses
Journal of Computing Theories and Applications Vol. 1 No. 2 (2023): JCTA 1(2) 2023
Publisher : Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jcta.v1i2.9443

Abstract

Butterflies’ recognition serves a crucial role as an environmental indicator and a key factor in plant pollination. The automation of this recognition process, facilitated by Convolutional Neural Networks (CNNs), can expedite this task. Several pre-trained CNN models, such as VGG, ResNet, and Inception, have been widely used for this purpose. However, the scope of previous research has been somewhat constrained, focusing only on a maximum of 15 classes. This study proposes to modify the CNN InceptionV3 model and combine it with three data augmentations to recognize up to 100 butterfly species. To curb overfitting, this study employs a series of data augmentation techniques. In parallel, we refine the InceptionV3 model by reducing the number of layers and integrating four new layers. The test results demonstrate that our proposed model achieves an impressive accuracy of 99.43% for 15 classes with only 10 epochs, exceeding prior models by approximately 5%. When extended to 100 classes, the model maintains a high accuracy rate of 98.49% with 50 epochs. The proposed model surpasses the performance of standard pre-trained models, including VGG16, ResNet50, and InceptionV3, illustrating its potential for broader application.
Hybrid image encryption using quantum bit-plane scrambling and discrete wavelet transform Rachmawanto, Eko Hari; Susanto, Ajib; Hermanto, Didik; Sari, Christy Atika; Setiarso, Ichwan; Sarker, Md Kamruzzaman
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8887

Abstract

Digital image security is increasingly vulnerable to sophisticated attacks, underscoring the urgent need for robust encryption techniques. Traditional encryption methods often fall short in defending against advanced threats, highlighting the importance of innovative solutions to protect digital images. This study tackles these challenges by incorporating quantum computing into image encryption, employing techniques such as bit-plane scrambling, pixel permutation, and bit permutation. These strategies enhance security by introducing complex, non-linear transformations that make decryption attempts significantly more difficult without the correct cryptographic keys. A key configuration based on r=44, μ=2024 is employed to achieve this. The integration of quantum bit-plane scrambling and quantum pixel permutation results in a highly secure encryption method. Experimental results show substantial improvements in entropy levels, along with strong unified average changing intensity (UACI) and number of pixels change rate(NPCR) values across various images. Notably, the "Peppers" image achieved the best performance, with UACI values of 33.5572 and NPCR values of 99.8301. The method proves highly effective, as repeated tests with incorrect keys failed to decrypt the plain image accurately. Future research could explore the addition of a discrete quantum wavelet transform to further enhance the security and efficiency of quantum-based image encryption methods.
Multi-Level Secure Image Cryptosystem Using Logistic Map Chaos: Entropy, Correlation, and 3D Histogram Validation Latifa, Anidya Nur; Sari, Christy Atika; Rachmawanto, Eko Hari; Sarker, Md Kamruzzaman
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.74537

Abstract

This study presents a multi-level image encryption framework that combines password dependent SHA-256 key generation with a Logistic Map-based chaotic mechanism, supporting three operational modes: Speed, Balanced, and Security. The system is designed for scalability and robustness across diverse image sizes, achieving up to 27 percent faster encryption than AES on 1024×1024 images while maintaining high cryptographic strength. Experimental results show strong randomness with entropy reaching up to 7.98 bits per pixel, reduced adjacent pixel correlation below 0.01, and high resistance to differential attacks with NPCR above 99.6 percent and UACI around 33.4 percent. Structural integrity after decryption is also preserved with SSIM scores above 0.98. Compared to existing chaos based methods such as those proposed by Arif et al. and Riaz et al., the proposed system offers superior entropy performance, enhanced flexibility through multi-mode encryption, and broader resolution support up to 2048×2048 pixels. Comprehensive evaluations using entropy, correlation, PSNR, SSIM, XOR, and 3D histogram analysis confirm the method’s effectiveness. These findings highlight the system’s suitability for real-time, secure image transmission in environments such as IoT, medical imaging, and embedded applications.