Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : TELKOMNIKA (Telecommunication Computing Electronics and Control)

Securing E-Mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices Teddy Mantoro; Andri Zakariya
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 10, No 4: December 2012
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v10i4.870

Abstract

One of the most popular internet services is electronic mail (e-mail). By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.
Advanced watermarking technique to improve medical images’ security Media Anugerah Ayu; Teddy Mantoro; I Made Alan Priyatna
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 5: October 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i5.13292

Abstract

Advances in imaging technology have made medical images become one of the important sources for information in supporting accurate diagnoses and treatment decisions by doctors for their patients. However, the vulnerability of medical images’ security is high. The images can be easily ‘attacked’, which altered their information that can lead to incorrect diagnoses or treatment. In order to make the images less vulnerable from outside attacks, this study proposes to secure them by advancing the watermarking using dual-layer fragile technique. It is expected that this dual-layer fragile watermarkingwill guarantee the integrity, authenticity, and confidentiality of patient’s and any other important information and also the pixel data of the medical images. The work in this study implements two LSBs of image where the role of the first LSB is as a tamper detector, and the second LSB is used to store patient’s and any other important information. Medical images of four deadliest diseases in Indonesia were used to test the proposed watermarking technique. Results from the conducted tests show that the proposed technique able to generate a watermarked image that has no noticeable changes compared to its original image, with PSNR value more than 44 dB and SSIM value of almost 1, where the tamper detector can correctly detect and localize any tampering on the watermarked image. Furthermore, the proposed technique has shown to have a higher level of security on medical images, compared to DICOM standard and standard watermarking method.
Augmented reality using features accelerated segment test for learning tajweed Adi Putra Andriyandi; Wahyudin Darmalaksana; Dian Sa’adillah Maylawati; Ferli Septi Irwansyah; Teddy Mantoro; Muhammad Ali Ramdhani
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 18, No 1: February 2020
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v18i1.14750

Abstract

Currently, education forms students to think creatively and critically, this can be supported by the multimedia technology for education, including Islamic religious education. Islam requires all of its Muslim to read the Qur'an. Tajweed is an important because it is related to the articulation of reading the Qur'an properly and correctly. This article discusses the application of augmented reality (AR) as one of the multimedia technologies that can be used as an interactive educational medium to help study the tajweed of Qur'an. The method used in this research is Features from accelerated segment test (FAST) corner detection. The testing result with 31 tajweed objects show that FAST is able to recognize all Tajweed objects and display their AR. Besides, based on a survey with questionnaires to several students, the result shows that 88.2% of students responded very well and judged that it was sufficient to help study the tajweed.
Crime index based on text mining on social media using multi classifier neural-net algorithm Teddy Mantoro; Muhammad Anton Permana; Media Anugerah Ayu
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 20, No 3: June 2022
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v20i3.23321

Abstract

Everyday criminal issues appear on social media, even some crime news is often disturbing to the public but it gives a warning to the public to remain careful and alert to the surrounding environment. However, following large amounts of crime information on social media is not effective, especially for busy people. Therefore, there is a need to efficiently and effectively summarize information in a way that is meaningful and easy to see, attracts people’s attention, and can be used by law enforcement officials. The purpose of this study is to present the index crime based on social media by looking for patterns of crime. This study proposes the projected index crime based on crime trends by using text mining to classify tweet texts and post contents into 10 crime classes. The classification method uses the neural-net multi classifier algorithm which has several classifiers namely logistic regression, naïve bayes, support vector machine (SVM), and decision tree in parallel. In this approach, the classifier that provides the best accuracy will be the winning classifier and will be used in the next learning process. In this experiment, in using the multi classifier neural-net, the logistics regression classifier often provides the best accuracy.
Quality Translation Enhancement Using Sequence Knowledge and Pruning in Statistical Machine Translation Media A. Ayu; Teddy Mantoro; Jelita Asean
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 16, No 2: April 2018
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v16i2.8687

Abstract

Machine translation has two important parts, a learning process which followed by a translation process. Unfortunately, most of the translation process requires complex operations and in-depth knowledge of the languages in order to give a good quality translation. This study proposes a better approach, which does not require in-depth knowledge of the linguistic properties of the languages, but it produces a good quality translation. This study evaluated 28 different parameters in IRSTLM language modeling, which resulting 270 millions experiments, and proposes a sequence evaluation mechanism based on a maximum evaluation of each parameter in producing a good quality translation based on NIST and BLEU. The parallel corpus and statistical machine learning for English and Bahasa Indonesia were used in this study. The pruning process, user interface, and the personalization of translation have a very important role in implementing of this machine translation. The result is quite promising. It shows that pruning process increases of the translation process time. The particular sequence knowledge/value parameter in translation process has a better performance than the other method using in-depth linguistic knowledge approaches. All these processes, including the process of parsing from a stand-alone mode to an online mode, are also discussed in detail.