Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Building of Informatics, Technology and Science

Pengembangan Sistem Pendeteksi Masker Sesuai Protokol Kesehatan dengan Algoritma Mobilenetv2 dan Raspberry Pi Imam M Shofi; Luh Kesuma Wardhani; Nenny Anggraini; Nashrul Hakiem; Denny Saputra; Ariq Cahya Wardhana
Building of Informatics, Technology and Science (BITS) Vol 4 No 2 (2022): September 2022
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v4i2.2250

Abstract

A new type of human coronavirus was discovered in December 2019 in Wuhan, China. In humans, coronaviruses usually cause respiratory tract infections, ranging from the common cold to serious diseases such as Middle East Respiratory (MERS) and Severe Acute Respiratory Syndrome (SARS). This new type of coronavirus was later named Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-COV2) and caused Coronavirus Disease-2019 (COVID-19). COVID-19 can cause mild to severe symptoms. So, wearing a mask and keeping a distance is very important to stop the spread of COVID-19. In previous research, a deep learning model has been developed to identify whether the person is wearing a mask or not. In previous studies, the classification was limited to whether humans wore masks or not. There is no classification as to whether the use of masks is right or wrong and whether the masks worn are masks that are in accordance with the recommendations of the Ministry of Health. So that in this study, the detection system for the use of masks is able to detect the use of masks in accordance with the recommendations of the Indonesian Ministry of Health which refers to the interim WHO Guidelines June 5, 2020, regarding recommendations regarding the use of masks in the context of COVID-19, namely the use of cloth masks, medical masks, and masks. can ensure the cover of the mouth and nose, and adjust to the bridge of the nose. The result is a system with the SSDLite Mobilenet V2 model has the highest FPS compared to a system using a system with SSDMNV2. That is, the maximum FPS obtained is 3.57 FPS and the minimum FPS is 3.45 FPS
Nearest Neighbor Interpolation and AES Encryption for Enhanced Least Significant Bit (LSB) Steganography Anggraini, Nenny; Wardhani, Luh Kesuma; Assyahid, Muhammad Hudzaifah; Hakiem, Nashrul; Yusuf, Muhammad; Setyawan, Okky Bagus
Building of Informatics, Technology and Science (BITS) Vol 6 No 4 (2025): March 2025
Publisher : Forum Kerjasama Pendidikan Tinggi

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47065/bits.v6i4.7079

Abstract

The increasing use of digital communication raises concerns about data security, especially when transmitting sensitive information. Steganography conceals messages within digital media to prevent detection. However, conventional methods face storage limitations, leading to message truncation or distortion, making hidden messages more detectable. This study proposes a combination of Nearest Neighbor Interpolation (NNI) and Least Significant Bit (LSB) steganography to dynamically expand the cover image, allowing larger encrypted messages to be embedded while maintaining image integrity. NNI was chosen over other interpolation techniques such as Bilinear and Bicubic due to its lower computational complexity and preservation of sharp edges, which minimizes blurring artifacts that could make steganographic alterations more noticeable. AES-128 encryption ensures message confidentiality before embedding. The system was developed as a web-based application to improve usability. The research followed the Waterfall Software Development Life Cycle (SDLC), and Black Box Testing validated system functionality. Testing results showed that the method successfully embedded and extracted messages without data loss, maintaining PSNR values above 40 dB, ensuring minimal perceptual distortion. However, the maximum interpolation limit was 5310 × 5310 pixels, beyond which system constraints caused failures. The stego-images retained original aspect ratios, reducing suspicion. Despite its success, the system remains vulnerable to modifications such as color changes, cropping, rotation, and compression, which can disrupt the message.