Claim Missing Document
Check
Articles

Found 16 Documents
Search

Improved imperceptible engagement-based 2D sigmoid logistic maps, Hill cipher, and Kronecker XOR product Lestiawan, Heru; Sani, Ramadhan Rakhmat; Abdussalam, Abdussalam; Rachmawanto, Eko Hari; Purwanto, Purwanto; Sari, Christy Atika; Doheir, Mohamed
Bulletin of Electrical Engineering and Informatics Vol 14, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v14i3.8331

Abstract

Image encryption is a crucial facet of secure data transmission and storage, and this study explores the efficacy of combining sigmoid logistic maps (SLM), Hill cipher, and Kronecker's product method in enhancing image encryption processes. The evaluation, conducted on diverse images such as Lena, Rice, Peppers, Cameraman, and Baboon, unveils noteworthy findings. The Lena image emerges as the most successfully encrypted, as evidenced by the lowest mean squared error (MSE) at 92.81 and the highest peak signal-to-noise ratio (PSNR) at 19.43, reflecting superior fidelity and quality preservation. Additionally, the encryption of 64×64 pixels images consistently demonstrate robustness, with a high number of pixels change rate (NPCR) and unified average change intensity (UACI) values, particularly notable for the Cameraman image. Even for 128×128 pixels images, commendable encryption performance persists across the tested images. The amalgamation of SLM, Hill cipher, and Kronecker's product emerges as an effective strategy for balancing security and perceptual quality in image encryption, with the Lena image consistently outperforming others based on comprehensive metrics. This research provides valuable insights for future studies in the dynamic domain of image encryption, emphasizing the potential of advanced cryptographic techniques in ensuring secure multimedia communication.
Optimized Visualization of Digital Image Steganography using Least Significant Bits and AES for Secret Key Encryption Jatmoko, Cahaya; Sinaga, Daurat; Lestiawan, Heru; Astuti, Erna Zuni; Sari, Christy Atika; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Yaacob, Noorayisahbe Mohd
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2252

Abstract

Data hiding is a technique used to embed secret information into a cover medium, such as an image, audio, or video, with minimal distortion, ensuring that the hidden data remains imperceptible to an observer. The key challenge lies in embedding secret information securely while maintaining the original quality of the host medium. In image-based data hiding, this often means ensuring the hidden data cannot be easily detected or extracted while still preserving the visual integrity of the host image. To overcome this, we propose a combination of AES (Advanced Encryption Standard) encryption and Least Significant Bit (LSB) steganography. AES encryption is used to protect the secret images, while the LSB technique is applied to embed the encrypted images into the host images, ensuring secure data transfer. The dataset includes grayscale 256x256 images, specifically "aerial.jpg," "airplane.jpg," and "boat.jpg" as host images, and "Secret1," "Secret2," and "Secret3" as the encrypted secret images. Evaluation metrics such as Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Unified Average Changing Intensity (UACI), and Number of Pixels Changed Rate (NPCR) were used to assess both the image quality and security of the stego images. The results showed low MSE (0.0012 to 0.0013), high PSNR (58 dB), and consistent UACI and NPCR values, confirming both the preservation of image quality and the effectiveness of encryption for securing the secret data.
XGBoost-Powered Ransomware Detection: A Gradient-Based Machine Learning Approach for Robust Performance Ghozi, Wildanil; Lestiawan, Heru; Sani, Ramadhan Rakhmat; Hussein, Jassim Nadheer; Rafrastara, Fauzi Adi
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 4, November 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i4.2405

Abstract

Ransomware remains a rapidly evolving cyber threat, causing substantial financial and operational disruptions globally. Traditional signature-based detection systems are ineffective against sophisticated, zero-day attacks due to their static nature. Consequently, machine learning-based approaches offer a more effective and adaptive alternative. This study proposes an approach utilizing XGBoost for highly effective ransomware detection. We conducted a rigorous comparative analysis of prominent ensemble learning algorithms—XGBoost, Random Forest, Gradient Boosting, and AdaBoost—on the RISS Ransomware Dataset, comprising 1,524 instances. Our experimental results unequivocally demonstrate XGBoost as the superior ensemble model, achieving an impressive 97.60% accuracy and F1-Score. This performance surpassed Gradient Boosting (97.20%), Random Forest (96.94%), and AdaBoost (96.50%). Furthermore, this study benchmarked XGBoost against established state-of-the-art (SOTA) methods, including Support Vector Machine (SVM) and the SA-CNN-IS deep learning approach. The comprehensive results underscore the core contribution of this study: by applying XGBoost with a carefully structured machine learning pipeline, our approach consistently outperforms two state-of-the-art methods (SVM and SA-CNN-IS) as well as other ensemble algorithms. This highlights the critical role of methodological precision in maximizing detection performance against evolving ransomware threats.
PREDIKSI PENYAKIT MATA MENGGUNAKAN CONVOLUTIONAL NEURAL NETWORK Jatmoko, Cahaya; Lestiawan, Heru
Semnas Ristek (Seminar Nasional Riset dan Inovasi Teknologi) Vol 8, No 01 (2024): SEMNAS RISTEK 2024
Publisher : Universitas Indraprasta PGRI

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/semnasristek.v8i01.7129

Abstract

Penyakit mata merupakan sebuah penyakit yang sangat berbahaya dan memiliki dampak yang dapat menghambat aktivitas kita sebagai manusia. Oleh karena itu, kita perlu melakukan proses identifikasi dan diagnosis terlebih dahulu untuk dapat mengetahui gejala yang terjadi pada penyakit mata. Pada penelitian ini, akan dilakukan proses klasifikasi penyakit mata dengan menggunakan metode CNN. Dataset yang digunakan pada penelitian ini yaitu merupakan dataset penyakit mata yang memiliki total data citra sebanyak 4217 citra dengan 4 kelas yaitu cataract, diabetic retinopathy, glaucoma dan normal. Pada penelitian ini, akan menggunakan metode Convolutional Neural Network untuk melakukan proses klasifikasi. Hasil yang didapatkan steelah dilakukannya pengujian pada penelitian ini yaitu mendapatkan akurasi pengujian yaitu sebesar 75.27%.
Imperceptible Watermarking Using Discrete Wavelet Transform and Daisy Descriptor for Hiding Noisy Watermark Abdussalam, Abdussalam; Umam, Chaerul; Sari, Wellia Shinta; Rachmawanto, Eko Hari; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Lestiawan, Heru; Islam, Hussain Md Mehedul
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 2 (2025): JUTIF Volume 6, Number 2, April 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.2.4423

Abstract

This research aims at overcoming the challenge of improving security and robustness in digital image watermarking, a critical activity in protecting intellectual property against misuse and manipulation. In a move to overcome such a challenge, this work introduces a new form of watermarking that incorporates Discrete Wavelet Transform (DWT) and Daisy Descriptor, with a view to enhancing both durability and invisibility of the watermark. The proposed method embeds a noise-variant watermark into selected frequency sub-bands using DWT, while the Daisy Descriptor enhances resistance to noise-based attacks. Testing conducted with three grayscale images, namely Lena, Cameraman, and Lion, each with a resolution of 512 × 512 pixels, showed that the proposed DWT-Daisy Descriptor outperforms current methodologies, producing high Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index (SSIM) values. In fact, in Lena, a PSNR value of 63.71 dB and an SSIM value of 1 were attained, with Cameraman having a PSNR value of 68.33 dB and an SSIM value of 1. As for attack resistivity, a high PSNR value of 50.11 dB under Gaussian attack and 55.70 dB under Salt-and-Pepper attack, with SSIM values approaching 1, confirm the robustness of the proposed scheme. This study highlights the significance of an efficient and secure watermarking technique that not only preserves image quality but also withstands various distortions, making it highly relevant for digital content protection in modern multimedia applications.
Optimization of Heart Failure Classification on Imbalanced Data Using a Supervised Learning Approach Based on Logistic Regression, Random Forest, and K-Nearest Neighbor: Optimalisasi Klasifikasi Gagal Jantung pada Data Imbalanced Menggunakan Pendekatan Supervised Learning Berbasis Regresi Logistik, Random Forest, dan K-Nearest Neighbor agustina, feri; Irawan, Candra; Erawan, Lalang; Suprayogi; Award Widya Laksana, Deddy; Jatmoko, Cahaya; Sinaga, Daurat; Lestiawan, Heru
Jurnal Informatika Polinema Vol. 12 No. 1 (2025): Vol. 12 No. 1 (2025)
Publisher : UPT P2M State Polytechnic of Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33795/jip.v12i1.9071

Abstract

Heart failure remains one of the leading causes of mortality worldwide, posing significant challenges for early diagnosis and patient management. One of the major obstacles in developing predictive models for heart failure is the class imbalance problem, where the number of surviving patients far exceeds those who experience death events. This imbalance often leads machine learning algorithms to bias toward the majority class, reducing sensitivity to critical minority cases. To address this issue, this study applies the Synthetic Minority Oversampling Technique (SMOTE) to balance the dataset and improve model performance. Three supervised learning algorithms, namely Logistic Regression (LR), Random Forest (RF), and K-Nearest Neighbor (KNN), were implemented and compared on the UCI Heart Failure Clinical Records dataset containing 299 patient samples with 13 clinical attributes. Experimental results show that the Random Forest model achieved the highest performance with 90% accuracy, precision, recall, and F1-score, outperforming both LR and KNN. The findings demonstrate that combining data balancing with ensemble learning effectively enhances prediction accuracy and sensitivity toward minority classes. The main contribution of this research lies in optimizing supervised models for medical data with skewed class distributions, providing a more reliable and interpretable approach for early heart failure detection. Future research may extend this work by integrating advanced ensemble or hybrid deep learning models and expanding the dataset for multi-institutional validation