Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Jurnal Teknik Informatika (JUTIF)

AN ENHANCED MULTI-LAYERED IMAGE ENCRYPTION SCHEME USING 2D HYPERCHAOTIC CROSS-SYSTEM AND LOGISTIC MAP WITH ROUTE TRANSPOSITION Fauzyah, Zahrah Asri Nur; Nugraha, Adhitya; Luthfiarta, Ardytha; Farandi, Muhammad Naufal Erza
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.1.4007

Abstract

In the rapidly evolving digital era, image encryption has become a crucial technique to protect visual data from the threat of information leakage. However, the main challenge in image encryption is improving security against cryptanalysis attacks, such as brute-force and differential attacks, which can compromise the integrity of the encrypted image. Additionally, the creation of efficient and fast encryption schemes that do not degrade image quality remains a significant challenge. This research proposes a multi-layer image encryption scheme that integrates the Logistic Map algorithm, Cross 2D Hyperchaotic (C2HM) system, and Route Transposition techniques. The method aims to enhance the security of digital image encryption by combining chaotic and hyperchaotic systems. The Logistic Map is used to generate a sequence of random values with high chaotic properties, while C2HM contributes to increasing complexity and variability. The Route Transposition technique is applied to scramble pixel positions, further strengthening the encryption’s randomness. The encryption key is derived from a combination of the image hash and user key, which are then used to calculate the initial seed in the chaotic algorithm. Experiments were conducted using standard images with a resolution of 512×512 pixels. The security analysis includes evaluations of NPCR, UACI, histogram analysis, and information entropy. The experimental results show that NPCR consistently exceeds 99.5%, while UACI ranges between 33.23% and 33.56%, indicating high sensitivity to minor changes. Histogram analysis demonstrates an even intensity distribution, and the information entropy value of 7.999 reflects an exceptionally high level of randomness. Robustness tests also indicate that this method can maintain image integrity even when subjected to damage or data loss.
A TOPIC-BASED APPROACH FOR RECOMMENDING UNDERGRADUATE THESIS SUPERVISOR USING LDA WITH COSINE SIMILARITY Nisa, Laila Rahmatin; Luthfiarta, Ardytha; Nugraha, Adhitya; Hasan, Md. Mahadi; Wulandari, Kang, Andini; Huda, Alam Muhammad
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 1 (2025): JUTIF Volume 6, Number 1, February 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.1.4061

Abstract

The thesis is one of the critical factors in determining student graduation. While working on the thesis, students will be guided by a lecturer who has the role and responsibility to ensure that students can prepare the thesis well so that the thesis is ready to be tested and is of good quality. Therefore, selecting a supervisor with the same expertise as the thesis topic is essential in determining students' success in completing their thesis. So far, the selection of thesis supervisors at Dian Nuswantoro University still needs to be done manually by students, so the lack of information about the supervisor can hinder students in determining the supervisor. This study aims to model the topic of lecturer research publications taken from the ResearchGate and Google Scholar platforms so that it is easier for students to choose a thesis supervisor whose research topic is relevant to the student's thesis using the Latent Dirichlet Allocation method. The LDA method will mark each word in the topic in a semi-random distribution. It will calculate the probability of the topic in the dataset and the likelihood of the word against the topic for each iteration. The results of LDA modeling present six main topics of lecturer research with the highest coherence score of 0.764, and then the resulting topics and thesis titles will be compared using cosine similarity. Students can use The highest cosine value as a reference when determining the right thesis topic. Thus, the supervisor selection process will be more focused and in accordance with the student's research interests.
Single-Image Face Recognition For Student Identification Using Facenet512 And Yolov8 In Academic Environtment With Limited Dataset Imam Muttaqin, Almas Najiib; Luthfiarta, Ardytha; Nugraha, Adhitya; Salsabila, Pramesya Mutia
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.3908

Abstract

Face recognition has become one of the most significant research areas in image processing and computer vision, mainly due to its wide applications in security, identity verification, and human and machine interaction. In this study, FaceNet512 and YOLOv8 models are used to overcome the challenges in face recognition with a limited dataset, which is only one formal photo per individual. The application of image augmentation to the model achieved 90% accuracy and ROC curve of 0.82, while the model without augmentation achieved 89% accuracy and ROC curve of 0.79. FaceNet512 showed superiority in producing more accurate and detailed facial representations compared to other models, such as ArcFace and FaceNet, especially in handling minimal facial variations. Meanwhile, YOLOv8 provides efficient face detection across various lighting conditions and viewing angles. The main challenge in this research is the low quality of the original image, which can reduce the accuracy of face recognition. These results show the great potential of using deep learning-based face recognition systems in the real world, especially for automatic attendance applications in academic environments.
Comparison of IndoNanoT5 and IndoGPT for Advancing Indonesian Text Formalization in Low-Resource Settings Firdausillah, Fahri; Luthfiarta, Ardytha; Nugraha, Adhitya; Dewi, Ika Novita; Hafiizhudin, Lutfi Azis; Mumtaz, Najma Amira; Syarifah, Ulima Muna
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.4935

Abstract

The rapid growth of digital communication in Indonesia has led to a distinct informal linguistic style that poses significant challenges for Natural Language Processing (NLP) systems trained on formal text. This discrepancy often degrades the performance of downstream tasks like machine translation and sentiment analysis. This study aims to provide the first systematic comparison of IndoNanoT5 (encoder-decoder) and IndoGPT (decoder-only) architectures for Indonesian informal-to-formal text style transfer. We conduct comprehensive experiments using the STIF-INDONESIA dataset through rigorous hyperparameter optimization, multiple evaluation metrics, and statistical significance testing. The results demonstrate clear superiority of the encoder-decoder architecture, with IndoNanoT5-base achieving a peak BLEU score of 55.99, significantly outperforming IndoGPT's highest score of 51.13 by 4.86 points—a statistically significant improvement (p<0.001) with large effect size (Cohen's d = 0.847). This establishes new performance benchmarks with 28.49 BLEU points improvement over previous methods, representing a 103.6% relative gain. Architectural analysis reveals that bidirectional context processing, explicit input-output separation, and cross-attention mechanisms provide critical advantages for handling Indonesian morphological complexity. Computational efficiency analysis shows important trade-offs between inference speed and output quality. This research advances Indonesian text normalization capabilities and provides empirical evidence for architectural selection in sequence-to-sequence tasks for morphologically rich, low-resource languages.
OPTIMIZING BUTTERFLY CLASSIFICATION THROUGH TRANSFER LEARNING: FINE-TUNING APPROACH WITH NASNETMOBILE AND MOBILENETV2 Putri, Ni Kadek Devi Adnyaswari; Luthfiarta, Ardytha; Putra, Permana Langgeng Wicaksono Ellwid
Jurnal Teknik Informatika (Jutif) Vol. 5 No. 3 (2024): JUTIF Volume 5, Number 3, June 2024
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2024.5.3.1583

Abstract

Butterflies play a significant role in ecosystems, especially as indicators of the state of biological balance. Each butterfly species is distinctly different, although some also show differences with very subtle traits. Etymologists recognize butterfly species through manual taxonomy and image analysis, which is time-consuming and costly. Previous research has tried to use computer vision technology, but it has shortcomings because it uses a small distribution of data, resulting in a lack of programs for recognizing various other types of butterflies. Therefore, this research is made to apply computer vision technology with the application of transfer learning, which can improve pattern recognition on image data without the need to start the training process from scratch. Transfer learning has a main method, which is fine-tuning. Fine-tuning is the process of matching parameter values that match the architecture and freezing certain layers of the architecture. The use of this fine-tuning process causes a significant increase in accuracy. The difference in accuracy results can be seen before and after using the fine-tuning process. Thus, this research focuses on using two Convolutional Neural Network architectures, namely MobileNetV2 and NASNetMobile. Both architectures have satisfactory accuracy in classifying 75 butterfly species by applying the transfer learning method. The results achieved on both architectures using fine-tuning can produce an accuracy of 86% for MobileNetV2, while NASNetMobile has a slight difference in accuracy of 85%.
Accelerating Classification For Iot Attack Detection Using Decision Tree Model With Gini Impurity Tree-Based Feature Selection Technique Dzaki, Muhammad Hafizh; Nugraha, Adhitya; Luthfiarta, Ardytha; Riyanto, Azizu Ahmad Rozaki; Novandian, Yohanes Deny
Jurnal Teknik Informatika (Jutif) Vol. 6 No. 5 (2025): JUTIF Volume 6, Number 5, Oktober 2025
Publisher : Informatika, Universitas Jenderal Soedirman

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52436/1.jutif.2025.6.5.3817

Abstract

The Internet of Things (IoT) continues to expand rapidly, with the number of connected devices expected to reach billions in the near future. However, it makes IoT devices prime target for cyber-attack. Therefore, an effective Intrusion Detection System (IDS) is required to detect these attacks swiftly and accurately. This study aims to build a machine learning-based IDS to effectively detect attack on IoT network using the CIC IoT 2023 dataset. The dataset contains over 46 million data rows with 48 features, covering 33 attack types and 1 benign class. To address the dataset's complexity and enhance processing efficiency, feature selection technique was applied. Six feature selection techniques from three categories – Filter-based, Wrapper-based, and Hybrid methods – were evaluated to produce the best feature subset. Each subset was tested using a Decision Tree algorithm. Then, the model performance calculated based on accuracy, computational time, as well as macro-precision, -recall, and -F1-score. The results demonstrate that the three best feature selection from each category – Mutual Information, Genetic Algorithm, and Gini Impurity Tree-based – improved training time by average different 55 seconds from 148 seconds, which speed up by 63.06% without sacrificing accuracy. The Gini Impurity Tree-based algorithm proved to be the most efficient, producing the smallest feature subset, which is 10 features, faster processing times, which is 40 seconds, and shallower tree’s depth, which is 64 level from 73 level. In conclusion, feature selection not only enhances computational efficiency but also simplifies tree’s shape without sacrificing the accuracy of detection.
Co-Authors ., Junta Zeniarza ., Junta Zeniarza Abu Salam Abu Salam Adhitya Nugraha Adhitya Nugraha Adhitya Nugraha Affandy Affandy Al Fahreza, Muhammad Daffa Althoff, Mohammad Noval Aris Febriyanto Aryanti, Firda Ayu Dwi Astuti, Yani Parti Bagus Dwi Satya, Mohammad Wahyu Basiron, Halizah Cahya, Leno Dwi Catur Supriyanto Catur Supriyanto Defri Kurniawan Desyana, Nindya Dhita Aulia Octaviani Dwi Mareta, Amalia Putri Dzaki, Azmi Abiyyu Dzaki, Muhammad Hafizh Edi Faisal Edi Sugiarto Egia Rosi Subhiyakto, Egia Rosi Erwin Yudi Hidayat Fahreza, Muhammad Daffa Al Fahrezi, Sahrul Fahrezi Fahrezi, Sahrul Yudha Fahri Firdausillah Fairuz Dyah Esabella Farandi, Muhammad Naufal Erza Farsya, Nabila Zibriza Fauzyah, Zahrah Asri Nur Firmansyah, Gustian Angga Fitri, Maulatus Shaffira Ganiswari, Syuhra Putri Hafiizhudin, Lutfi Azis Haresta, Alif Agsakli Harun Al Azies Hasan Shobri Heru Lestiawan Huda, Alam Muhammad Ika Novita Dewi Imam Muttaqin, Almas Najiib Indrawan, Michael Irham Ferdiansyah Katili Ivan Zuhdiansyah Julius Immanuel Theo Krisna Junta Zeniarja Krisna, Julius Immanuel Theo L. Budi Handoko Leno Dwi Cahya Maharani, Zahra Nabila Mahardika, Pramesthi Qisthia Hanum Md. Mahadi Hasan, Md. Mahadi Michael Indrawan Muhammad Daffa Al Fahreza Muhammad Jamhari Muhammad Naufal, Muhammad Muhammad Rafid Mulyana, Yudha Mumtaz, Najma Amira Muttaqin, Almas Najiib Imam Nauval Dwi Primadya Nisa, Laila Rahmatin Novandian, Yohanes Deny Octaviani, Dhita Aulia Primadya, Nauval Dwi Putra, Permana Langgeng Wicaksono Ellwid Putri, Ni Kadek Devi Adnyaswari Rafid, Muhammad Ramadhan Rakhmat Sani Rismiyati Rismiyati Riyanto, Azizu Ahmad Rozaki Sahrul Yudha Fahrezi Salsabila, Pramesya Mutia Satya, Mohammad Wahyu Bagus Dwi Setiawan, Dicky setiawan, nabila putri Soeroso, Dennis Adiwinata Irwan Sri Winarno Sri Winarno Suprayogi Suprayogi Suryaningtyas Rahayu Syarifah, Ulima Muna Utomo, Danang Wahyu Wibowo Wicaksono Wibowo Wicaksono Wicaqsana, Shiva Augusta Wulandari, Kang Andini Wulandari, Kang, Andini Zarifa, Yasmine Zuhdiansyah, Ivan