Claim Missing Document
Check
Articles

Robust Watermarking Untuk Perlindungan Data Pasien Pada Citra Medis Digital Dengan Metode Hybrid Dct-dwt Dan Metode Pso Zulfikar Fauzi; Adiwijaya Adiwijaya; Didi Rosiyadi
eProceedings of Engineering Vol 5, No 2 (2018): Agustus 2018
Publisher : eProceedings of Engineering

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Abstrak Terdapat dua hal yang perlu diperhatikan dalam citra medis yaitu otentifikasi kepemilikan dan keaslian citra digital. Sedangkan citra digital sendiri rentan terhadap manipulasi yang terjadi. Serta kepemilikan dari citra digital seorang pasien sendiri dapat tertukar secara sengaja maupun tidak sengaja. Permasalahan tersebut dapat merugikan bagi seorang pasien. Oleh karena itu, diperlukan sistem yang mampu melindungi kepemilikan citra medis dan perlindungan rekam medis yang tangguh. Sistem itu sendiri menggunakan teknik watermarking untuk melindungi citra digital dengan menyisipkan informasi didalamnya. Terdapat tiga metode didalam sistem ini yaitu metode Discrete Wavelet Transform (DWT) yang digabungkan dengan metode Discrete Cosine Transform (DCT) dan dioptimasi dengan metode Particle Swarm Optimization (PSO) untuk mencari nilai faktor skala yang optimal. Pengujian yang digunakan untuk mengukur performansi sistem yaitu Peak Signal to Noise Ratio (PSNR) dan Normalized-Cross Correlation (NCC). Dari ketiga metode tersebut, dihasilkan bahwa tidak ada perubahan nilai PSNR dan NCC setelah dioptimasi. Sehingga sistem meiliki kekokohan yang mampu melindungi keaslian citra digital meskipun mendapatkan serangan berupa noise dan sharpening. Kata kunci : watermarking, PSO, DWT, DCT, citra medis. Abstract There are two things notice in the medical image of ownership authentication and digital image authentici- ty. While the digital image is vulnerable to manipulation that occurred. And the ownership of a patient’s digital image can be intentionally or accidentally interchanged. It can be detrimental to a patient. The- refore, a system capable of protecting medical image ownership and protection of a strong medical record is essential. The system uses watermarking techniques to protect digital images by inserting information inside. There are three methods in this system, Discrete Wavelet Transform (DWT) method combined with Discrete Cosine Transform (DCT) method and optimized with Particle Swarm Optimization (PSO) method to find the optimal scale factor value. The tests used to measure the performance of the system are Peak Signal to Noise Ratio (PSNR) and Normalized-Cross Correlation (NCC). Of the three methods, it was found that there was no change in PSNR and NCC values after optimization. So the system has robustness so as to protect the authenticity of digital images despite getting attacks in the form of noise and sharpening. Keywords: watermarking, PSO, DWT, DCT, medical image.
Approximation-based homomorphic encryption for secure and efficient blockchain-driven watermarking service Didi Rosiyadi; Akbari Indra Basuki; Taufik Iqbal Ramdhani; Heru Susanto; Yusnan Hasani Siregar
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 4: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i4.pp4388-4400

Abstract

Homomorphic encryption has been widely used to preserve the privacy of watermarking process on blockchain-driven watermarking services. It offers transparent and traceable encrypted watermarking without revealing sensitive data such as original images or watermark data to the public. Nevertheless, the existing works suffer from enormous memory storage and extensive computing power. This study proposed an approximation-based homomorphic encryption for resource-efficient encrypted watermarking without sacrificing watermarking quality. We demonstrated the efficiency of the Cheon-Kim-Kim-Son (CKKS) encrypted watermarking process using discrete cosine transform-singular value decomposition (DCT-SVD) embedding. The evaluation results showed that it could preserve the watermarking quality similar to non-encrypted watermark embedding, even after geometrical and filtering attacks. Compared to existing homomorphic encryption, such as Brakerski-Gentry-Vaikuntanathan (BFV) encryption, it has superior performance regarding resource utilization and watermarking quality preservation.
Secure protection for covid-19 infographic using blockchain and discrete cosine transform-singular value decomposition (DCT-SVD) watermarking Muhammad Fajar Sidiq; Akbari Indra Basuki; Didi Rosiyadi; Iwan Setiawan; Yusnan Hasani Siregar; Sriyadi Sriyadi
JURNAL INFOTEL Vol 14 No 2 (2022): May 2022
Publisher : LPPM INSTITUT TEKNOLOGI TELKOM PURWOKERTO

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20895/infotel.v14i2.749

Abstract

Covid-19 infographics have a crucial role in mitigating the covid-19 pandemic by conveying the complex Covid19 information in a form of a simple yet understandable image. However, keenly to contribute to mitigating Covid-19, numerous parties and agencies had released Covid-19 infographics that might contain incorrect or inaccurate information. To prevent such recurrent, this paper proposed an authentication system by using a blockchain-based authorization service that lets the authority guarantee the correctness and validity of the infographics in a transparent manner. We proposed smart contract-based watermarking requests and approval management that let anyone track the watermarking process. To prevent unauthorized infographic fabrications, we use the DCT-SVD method considering its robustness against various attacks. We deployed and evaluated the smart contract on Ethereum test networks (Ropsten, Rinkeby, Goerli, and Kovan) to compare the efficiency and the ease of use. The result showed that the test networks have similar efficiency while the Ropsten and Goerli have better ease of use. The watermark validation service is accessible via a web-based interface for anyone to check the validity of the infographic’s watermark.
Pengelompokan Dampak Gempa Bumi dan Kerusakan Pada Wilayah Berpotensi Gempa di Provinsi Sumatera Barat Sugiyarto, Ipin; Irawan, Rama; Rosiyadi, Didi
Journal of Students‘ Research in Computer Science Vol. 2 No. 2 (2021): November 2021
Publisher : Program Studi Informatika Fakultas Ilmu Komputer Universitas Bhayangkara Jakarta Raya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31599/81fwpe68

Abstract

Earthquake disaster data represent knowledge from the West Sumatra Province, data taken from the official website of the National Disaster Management Agency that occurred in the period 2001 to 2018. Clustering data mining techniques are used to determine the earthquake impact area using Knowledge Discovery Data. Mining Method (KDD) consisting of Domain Understanding, Additional Selection (Data Selection), Preprocessing (Data Cleaning, Data Sampling), Transformation (Data Normalization), Data Mining (K-means & Linear Regression), Evaluation and Interpretation (cluster & Prediction). The results showed that the use of the K-Means method resulted in 3 clusters with the largest earthquake impact in the city of Padang in 2009, while the use of Linear Regression estimates the impact of victims and damage to facilities and units that often occur in earthquake locations. The purpose of the research is to implement and categorize and predict to find out the results of the impact and damage of the earthquake that occurred in the province of West Sumatra.
Privacy-preserving reservation model for public facilities based on public Blockchain Basuki, Akbari Indra; Rosiyadi, Didi; Susanto, Hadi; Setiawan, Iwan; Salim, Taufik Ibnu
International Journal of Electrical and Computer Engineering (IJECE) Vol 14, No 4: August 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v14i4.pp4418-4429

Abstract

Ensuring fairness in the utilization of government-funded public facilities, such as co-working spaces, sports fields, and meeting rooms, is imperative to accommodate all citizens. However, meeting these requirements poses a significant challenge due to the high costs associated with maintaining digital infrastructure, employee wages, and cybersecurity expenses. Fortunately, Blockchain smart contracts present an economical and secure solution for managing digital infrastructure. They offer a pay-per-transaction schema, immutable transaction records, and role-based data updates. Despite these advantages, public blockchains raise concerns about data privacy since records are publicly readable. To address this issue, this study proposes a privacy-preserving mechanism for public facilities' reservation systems. The approach involves encrypting the reservation table with fully-homomorphic encryption (FHE). By employing FHE with binary masking and polynomial evaluation, the reservation table can be updated without decrypting the data. Consequently, citizens can discreetly book facilities without revealing their identities and eliminating the risk of overlapping schedules. The proposed system allows anyone to verify reservations without disclosing requested data and table contents. Moreover, the system operates autonomously without the need for human administration, ensuring enhanced user privacy.
OPTIMALISASI KLASIFIKASI BERITA MENGGUNAKAN FEATURE INFORMATION GAIN UNTUK ALGORITMA NAIVE BAYES TERHUBUNG RANDOM FOREST Prakoso, Bobby Suryo; Rosiyadi, Didi; Aridarma, Dedi; Utama, Heru Sukma; Fauzi, Fariz; Qhomar, Mohammad Arifin Nurul
Jurnal Pilar Nusa Mandiri Vol 15 No 2 (2019): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1384.907 KB) | DOI: 10.33480/pilar.v15i2.684

Abstract

Penelitian ini adalah tentang pengklasifikasian berita yang mengoptimalisasi dengan kombinasi antar algoritma. Tentang dataset yang digunakan diambil pada situs pemberitaan online. Algoritma yang digunakan adalah algoritma Naive Bayes Classifier, dan Random Forest dengan pembobotan seleksi fitur Information Gain. Dataset yang digunakan terdapat 615 dataset dengan 3 katagori atau tema berita. Dalam permodelan terdapat 6 model skenario sebagai pembanding untuk menentukan skenario mana yang mendapatkan nilai terbaik, berdasarkan hasil penelitian ini nilai terbaik didapatkan oleh model Remove Useless Attributes, Naive bayes Classifier-Multinomial, dan Random Forest-Feature Selection Information gain. Hasil evaluasi yang didapatkan adalah nilai accuracy 85.67%, nilai recall 85.67%, dan nilai precision 86.23
SENTIMEN ANALISIS KEBIJAKAN GANJIL GENAP DI TOL BEKASI MENGGUNAKAN ALGORITMA NAIVE BAYES DENGAN OPTIMALISASI INFORMATION GAIN Utama, Heru Sukma; Rosiyadi, Didi; Aridarma, Dedi; Prakoso, Bobby Suryo
Jurnal Pilar Nusa Mandiri Vol 15 No 2 (2019): Pilar Nusa Mandiri : Journal of Computing and Information System Periode Septemb
Publisher : LPPM Universitas Nusa Mandiri

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1207.156 KB) | DOI: 10.33480/pilar.v15i2.705

Abstract

Analysis of the odd even-numbered sentiment systems in Bekasi toll using the Naïve Bayes Algorithm, is a process of understanding, extracting, and processing textual data automatically from social media. The purpose of this study was to determine the level of accuracy, recall and precision of opinion mining generated using the Naïve Bayes algorithm to provide information community sentiment towards the effectiveness of the odd system of Bekasi tiolls on social media. The research method used in this study was to do text mining in comments-comments regarding posts regarding even odd oddities on Bekasi toll on Twitter, Instagram, Youtube and Facebook. The steps taken are starting from preprocessing, transformation, datamining and evaluation, followed by information gaon feature selection, select by weight and applying NB Algorithm model. The results obtained from the study using the NB model are obtained Confusion Matrix result, namely accuracy of 79,55%, Precision of 80,51%, and Sensitivity or Recall of 80,91%. Thus this study concludes that the use of Support Vector Machine Algorithms can analyze even odd sentiments on the Bekasi toll road.
Rancang Bangun Aplikasi Presensi Instruktur Bebasis Android Menggunakan Framework Flutter Pada LKP Bright School Lampung Timur Kurniawan, Rohim; Rosiyadi, Didi; Hardi, Nila
Reputasi: Jurnal Rekayasa Perangkat Lunak Vol. 5 No. 2 (2024): Edisi November 2024
Publisher : LPPM Universitas Bina Sarana Informatika

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.31294/reputasi.v5i2.5871

Abstract

Abstrak - Perkembangan teknologi saat ini telah memberikan dampak positif dalam berbagai bidang, termasuk dalam dunia pendidikan. Salah satu perkembangan yang dapat dimanfaatkan adalah penggunaan aplikasi mobile sebagai media pembelajaran. Sudah selayaknya teknologi informasi diterapkan di instansi pendidikan salah satu contohnya aplikasi mobile dapat menjadi alat yang efektif bagi para instruktur untuk melakukan presensi. Penelitian ini bertujuan untuk mengembangkan sebuah aplikasi berbasis android presensi instruktur menggunakan teknologi Flutter. Flutter adalah sebuah framework open-source yang dikembangkan oleh Google untuk membangun aplikasi mobile multi-platform. Metode penelitian dan pengembangan yang digunakan adalah Agile Metodology dengan framework Scrum. Tahap analisis dilakukan untuk mengidentifikasi kebutuhan pengguna, tahap desain dilakukan untuk merancang antarmuka dan fitur aplikasi, tahap impelementasi dilakukan untuk membangun aplikasi, dan tahap evaluasi dilakukan untuk menilai kelayakan aplikasi. Hasil penelitian menunjukkan bahwa aplikasi instruktur yang dikembangkan dengan menggunakan framework Flutter dapat berjalan dengan baik pada perangkat mobile berbasis Android. Aplikasi ini menyediakan fitur-fitur yang memudahkan instrukturpada lembaga kursus dalam melakukan presensi kehadiran dan bagi admin lembaga kursus dan pelatihan Bright School memudahkan dalam memantau rekap presensi serta mengolah data presensi. Kata Kunci: Flutter, Android, Presensi Abstract - The current development of technology has had a positive impact on various fields, including education. One of the developments that can be utilized is the use of mobile applications as a learning medium. Information technology should be applied in educational institutions, one example being that mobile applications can serve as an effective tool for instructors to manage attendance. This study aims to develop an Android-based attendance application for instructors using Flutter technology. Flutter is an open-source framework developed by Google for building multi-platform mobile applications. The research and development methodology used is Agile Methodology with the Scrum framework. The analysis phase was carried out to identify user needs, the design phase was conducted to design the interface and features of the application, the implementation phase was executed to build the application, and the evaluation phase was done to assess the feasibility of the application. The results of the study indicate that the instructor attendance application developed using the Flutter framework can run well on Android-based mobile devices. This application provides features that facilitate instructors at training institutions in managing attendance, and for the admin of Bright School training institutions, it simplifies monitoring attendance records and processing attendance data. Keywords: flutter, android, attendance
Perancangan Sistem Informasi Pelayanan Customer Berbasis Website Pada LKP SMART Bandar Sribhawono Lampung Timur Qurrota Ayun Hariyanto Putra; Didi Rosiyadi; Nila Hardi
Attractive : Innovative Education Journal Vol. 6 No. 3 (2024): Attractive : Innovative Education Journal
Publisher : CV. Creative Tugu Pena

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.51278/aj.v6i3.1443

Abstract

The LKP SMART Bandar Sribhawono is a Course and Training Institution in the field of Non-Formal Education that provides skills, knowledge, and attitudes to the community. In this digital era, the need for information systems that facilitate interaction between companies and customers is increasing, especially in the service sector. This thesis designs and builds a web-based customer service information system for LKP SMART using the SDLC method Waterfall model, UML system modeling, CodeIgniter 4 framework, PHP programming language, and XAMPP for connection to the MySQL database. At the testing stage using the BlackBox Testing method to ensure the application is as expected. The result is a web-based customer service information system that meets the needs of LKP SMART in serving customers. The main features include registration and managementof customer data, which are expected to improve the efficiency and effectiveness of services and help manage customer relationships in a more organized manner.
Low-dose computed tomography image denoising using graph wavelet transform with optimal base Setiawan, Iwan; Hidayat, Rachmat; Najar, Abdul Mahatir; Jaya, Agus Indra; Rosiyadi, Didi
International Journal of Electrical and Computer Engineering (IJECE) Vol 15, No 2: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v15i2.pp1696-1708

Abstract

Noise in electronic components of computed tomography (CT) detectors behaves like a virus that infects visual quality of CT scans and might distort clinical diagnosis. Modern CT detector technology incorporates high-quality electronic components in conjunction with signal and image processing to ensure optimal image quality while retaining benign doses of x-rays. In this study, a new strategy in signal and image processing directions is proposed by finding the most optimal wavelet base for denoising low-dose CT scan data. The process begins by selecting the appropriate wavelet bases for CT image denoising, followed by a wavelet decomposition, thresholding, and reconstruction. Other methods, such as graph wavelet and learning-based, are used to assess the consistency of the outcomes. The wavelet base of biorthogonal 5.5 achieves the highest optimum performance for CT image denoising. Meanwhile, the Daubechies wavelet base is inconsistent and performs poorly compared to the optimum base. This research highlights the importance of wavelet properties such as orthogonality, regularity, and the number of vanishing moments in selecting an appropriate wavelet basis for noise reduction in CT images.
Co-Authors -, Cucu Abdul Mahatir Najar Abdullah, Ifnu Abdul Aziz Ade Cahyana Adiwijaya Adnyana, I Ketut Widhi Agus Indra Jaya Agus Salim Akbari Basuki Akbari Indra Basuki Alvi Alvi Aridarma, Dedi Bambang Joko Triwibowo Basuki, Akbari Indra Bobby Suryo Prakoso Bobby Suryo Prakoso Cahya, El Rangga Un Chandra Nugraha Chandra Nugraha, Chandra Cucu Cucu Daniati Uki Eka Saputri Dedi Ariadarma Dedi Aridarma Deni Rusdiaman Dwi, F Lia Dwiza Riana Eko Arif Riyanto, Eko Arif Eko Saputro Endang Sri P Fajar Pramono Fajar Priyono Fariszal Nova Arviantino Fauzi, Fariz Furqon Hensan Muttaqien Hadi Susanto Harianto Harianto Heru Sukma Utama Heru Sukma Utama Heru Susanto Horng, Shi Jinn Husain, Syepry Maulana Ifnu Abdul Aziz abdullah Imam Amirulloh Ipin Sugiyarto Iqbal Dzulfiqar I Irawan, Rama Irwansyah Saputra Iwan Setiawan Iwan Setiawan Jamil, Muh. Juninisvianty, Tri Kurniawan W. Handito Kurniawan, Rohim Kusnadi - Kusnadi Muh. Jamil Muhammad Syahrani Mulyanto, Yudi Nana Suryana Nana Suryana Nana Suryana nanang ruhyana Nila Hardi Nuryani Nuryani Prakoso, Bobby Suryo Prasetyo, Heri Putra, Yeffry Handoko Qhomar, Mohammad Arifin Nurul Qurrota Ayun Hariyanto Putra RACHMAT HIDAYAT Rama Irawan Riski Annisa Salim, Taufik Ibnu Salsabila, Unik Hanifah Saputra, Surya Fajar Seimahuira, Syarah Sidiq, Muhammad Fajar Sriyadi Sriyadi Sugiyarto, Ipin Surti Kanti Surya Fajar Saputra Sutiyono Sutiyono Suwanda Aditya Aaputra Taufik Iqbal Ramdhani Tiska Pattiasina Utama, Heru Sukma Windu Gata Yeffry Handoko Putra Yusnan Hasani Siregar Yusuf Arif Setiawan Zulfikar Fauzi