Rizal U
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Steganography with Digital Image Technique On Integer Wavelet Transform Cielab Alhaziyah R M; Rizal U
International Conference on Engineering and Technology Development (ICETD) 2017: 4rd ICETD 2017
Publisher : Bandar Lampung University (UBL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (713.373 KB)

Abstract

Remarkable progress in the field of information technology and telecommunications led to the emergence of demand for secure communication environment and have privacy. Steganography is a method used to disguise the presence of confidential information, making it difficult to detect its presence by people who do nothave the authority for the information. Additionally, steganography can be applied to multimedia such as text, images, audio / video and protocols. Problems often arise in research on steganography, among others, the low capacity of concealment, less pharmaceutics stego-image, as well as the poor quality of stego-image is generated. This study aims to create a digital image steganography safe, sturdy, has a high masking capacity and has good imperceptibility, so the fidelity and recovery capabilities will be good anyway. The method proposed in this study manggabungkan Integer Wavelet Transform technique that aims to increase the capacity of concealment Furthermore this research is done on the CIELAB color space, where CIELAB can produce digital images with high compression range and a small color deviations on wavelet transform. In the watermarking technique in wavelet domain, CIELAB has the most excellent robustness compared with other color spaces. For security measures, used steganalyzer's ROC performance and PSNR of the quality of stego-image is generated
Mobile Application Category Cybercrime To Filter The Content Using Ontology Kintani M A; Rizal U
International Conference on Engineering and Technology Development (ICETD) 2017: 4rd ICETD 2017
Publisher : Bandar Lampung University (UBL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (775.191 KB)

Abstract

The current Internet is growing rapidly. This has created new opportunities in various fields which we can think of, be it entertainment, business, sports or education. The Internet is a useful way for people to do business effectively, very fast. It saves a lot of time, money and resources. Unfortunately, it is also an open invitation to fraudsters and online scams becoming more rampant. Like two sides of a coin, the Internet also has its own drawbacks. One of the major disadvantages is Cybercrime - illegal activities on the Internet. Computers today are being misused for illegal activities such as e-mail fraud, credit card fraud, spam, piracy of software and so forth, which violates privacy.  Cybercrime is a crime where a criminal act can only be done with the use of cyber technology and occur in the cyberworld. (M.Yoga.P,2013).The ontology is defined as a formal and clear picture of conceptualization together. (Gruber 1993). Frantz and Franco (2005) argued that ontology provide shared and common understanding of the domain to be notified between people and computers to facilitate knowledge sharing and reuse. In addition, Frantz and Franco explained that ontology provides a clear formal conceptualization (ie the meta-information) that describes the semantic information of the arrest of a static domain knowledge-based systems.Ontology is proposed to collect, examine, analyze, prepare for, obtain and store evidence of computer crime in cyberspace. To answer the above conditions and problems, then here I do resume journal entitled  "Analysis and Classification of Cybercrime with OntologyMethod"
Comparison Method Of Classification Naives Bayes And Classification Nearest Neighbor On Analysis Twitter Posts Jams Traffic In Bandar Lampung Wijaya R; Rizal U
International Conference on Engineering and Technology Development (ICETD) 2017: 4rd ICETD 2017
Publisher : Bandar Lampung University (UBL)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (904.996 KB)

Abstract

Twitter became one of the popular social media in cyberspace. Twitter can be used as a means of disseminating information in their status, this is an opportunity for the parties to disseminate information. This study aims to classify the status of which contain information congestion on Twitter. This study focused on the information content congestion tweet on Twitter. Classification algorithm used is Naive Bayes classifier and K Nearest Neighbor classification model that produces information-based decision trees and rules. This research will prove Classification is done with Twitter data method, Naive Bayes classifier and K-Nearest Neighbor to classify tweets containing information on traffic congestion in Bandar Lampung