Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : JAIS (Journal of Applied Intelligent System)

A Video Quality Testing : Review of Human Visual Aspect Andi Danang Krismawan; Lekso Budi Handoko
Journal of Applied Intelligent System Vol 6, No 2 (2021): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v6i2.4613

Abstract

Various types of video player applications have been widely used by the community. The emergence of the latest version and a variety of features make people need to make a choice to use a video player application with a good visual level. The type of video that is often played is a file with an MP4 extension. This file type is not heavy but is usually intended for long file durations such as movies. In this paper, we will use a dataset in the form of a movie file with an MP4 extension. The video player applications used include VLC, Quick time, Potplayer, KMPLayer, Media Player Classic (MPC), DivX Player, ACG Player, Kodi, MediaMonkey. Through various empirical calculations, such as Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Structutral Similarity Index Measurement (SSIM), Threshold F-ratio, Visual Signal to Noise Ratio (VSNR), Visual Quality Metric (VQM), and Multiscale - Structutral Similarity Index Measurement (MS-SSIM) has analyzed the visual capabilities of each video player application. Experimental results prove that the KMPlayer application gets the best visual results compared to other selected applications.
Upload File Security on the Server Using LSB and Hill Cipher Lekso Budi Handoko; Chaerul Umam; Adelia Syifa Anindita
Journal of Applied Intelligent System Vol 4, No 1 (2019): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v4i1.2331

Abstract

The rapid development of technology not only has a positive impact, but also can have a negative impact such as the development of cyber crime that can cause messages to be unsafe. Message security can be protected using cryptography to convert messages into secret passwords. Steganography is a technique of hiding messages by inserting messages into images that are used to increase message security. In this study, it discusses a combination of hill cipher and LSB algorithms to secure messages. The message used is a 3-bit grayscale image for steganography and text messages with 32, 64 and 128 characters for cryptography. The measuring instruments used in this study are MSE, PSNR, Entropy and travel time (CPU time). Test results prove an increase in security without too damaging the image. This is evidenced by the results of the MSE trial which has a value far below the value 1, the PSNR is> 65 dB with a range of entropy values of 5 to 7, and travel times are almost the same.
A File Encoding Using A Combination of Advanced Encryption Standard, Cipher Block Chaining and Stream Cipher In Telkom Region 4 Semarang Lekso Budi Handoko; Andi Danang Krismawan
Journal of Applied Intelligent System Vol 6, No 2 (2021): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v6i2.4502

Abstract

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.
Data Security Using Color Image Based on Beaufort Cipher, Column Transposition and Least Significant Bit (LSB) Handoko, Lekso Budi; Umam, Chaerul
Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i2.7863

Abstract

One of cryptography algorithm which used is beaufort cipher. Beaufort cipher has simple encryption procedure, but this algorithm has good enough endurance to attack. Unauthorized people cannot break up decrypt without know matrix key used. This algorithm used to encrypt data in the form of text called plaintext. The result of this algorithm is string called ciphertext which difficult to understood that can causing suspicious by other people. Beaufort cipher encryption tested with avalanche effect algorithm with modified one, two, three and all key matrix which resulting maximum 31.25% with all key modification so another algorithm is needed to get more secure. Least Significant Bit (LSB) used to insert ciphertext created to form of image. LSB chosen because easy to use and simple, just alter one of last bit image with bit from message. LSB tested with RGB, CMYK, CMY and YUV color modes inserted 6142 characters resulting highest PSNR value 51.2546 on YUV color mode. Applying steganography technique has much advantage in imperceptibility, for example the image product very similar with original cover image so the difference can not differentiate image with human eye vision. Image that tested as much ten images, that consist of five 512 x 512 and five 16 x 16 image. While string message that used is 240, 480 and 960 character to test 512 x 512 image and 24, 48 and 88 character to test 16 x 16 image. The result of experiment measured with Mean Square Error (MSE) and Peak Signal Ratio (PSNR) which has minimum PSNR 51.2907 dB it means stego image that produced hood enough. Computation time calculation using tic toc in matlab resulting fastest value 0.041636 to encrypt 2000 character and the longest time is 4.10699 second to encrypt 6000 character and inserting to image. Amount of character and amount of multi algorithm can affecting computation time calculation.
File Cryptography Optimization Based on Vigenere Cipher and Advanced Encryption Standard (AES) Muslih, Muslih; Handoko, L. Budi; Rizqy, Aditya
Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i2.7899

Abstract

The rapid The main problem in the misuse of data used in crime is the result of a lack of file security. This study proposes a data security method to protect document files using the Advanced Encryption Standard (AES) algorithm combined with the Vigenere Cipher. This research carried out 2 processes, namely the encryption process and the decryption process. The encryption process will be carried out by the AES algorithm and then encrypted again with the Vigenere Cipher algorithm. The experiments show that the proposed method can encrypt files properly, where there are changes in the value of the document file and the encrypted file cannot be opened and the description results do not cause changes to the original file. The results of this study are that the system is able to work properly so as to produce file encryption and decryption using the AES method combined with the Vigenere Cipher. In document files, the largest difference in encryption and decryption time is 8 seconds, while in image files the difference in encryption and decryption time is 17 seconds. This longest time difference is generated by large files.