Claim Missing Document
Check
Articles

Found 31 Documents
Search

Teknik Penyembunyian Data Rahasia pada Berkas Gambar Digital Menggunakan Steganografi Least Significant Bit Variable-Size Neyman, Shelvie Nidya; Lindayati, Lindayati; Guritman, Sugi
Jurnal Ilmu Komputer dan Agri-Informatika Vol 1, No 1 (2012)
Publisher : Departemen Ilmu Komputer IPB

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (174.412 KB)

Abstract

Salah satu teknik pengamanan data dengan cara penyisipan informasi rahasia pada berkas gambar digital sebagai media penampung ialah steganografi berbasis least significant bit (LSB) dengan penambahan kemampuan penyisipan yang bersifat variable-size. Operasi teknik steganografi ini menggunakan tiga parameter, yaitu capacity evaluation untuk menentukan kapasitas maksimum LSB dari masing-masing pixel media penampung, minimum error replacement untuk memperkecil tingkat kesalahan saat penyisipan, dan improved grayscale compensation untuk memisahkan kesalahan penempelan agar tidak berdekatan pada tempat pixel bekerja. Penelitian ini bertujuan mengimplementasikan teknik tersebut untuk menyembunyikan data rahasia pada berkas gambar digital sebagai media penampung dan menghasilkan stego-image dengan kesamaan tampilan dan ukuran berkas. Berkas hasil penyisipan (stego-image) yang diperoleh diharapkan tidak menimbulkan kecurigaan pihak lawan, serta mampu memaksimumkan kapasitas penyisipan data rahasia, dengan memungkinkan penyisipan mencapai bit ke-5 dari LSB media penampung. Hasil penelitian menunjukkan bahwa stego-image yang diperoleh secara visual memiliki tampilan hampir sama dengan media penampungnya dan kapasitas penyisipannya mencapai lebih dari 50% ukuran media penampungnya. Kapasitas ini diperoleh tanpa mempertimbangkan border dan jumlah bit data pada setiap pixel minimal berjumlah empat.Kata kunci: capacity evaluation, improved grayscale compensation, least significant bit variabel-size, steganografi
Pemodelan Proxy Anonim Menggunakan Algoritme Expectation Maximization Dengan Data Balancing Yanto, Nur Witdi; Sukoco, Heru; Neyman, Shelvie Nidya
Jurnal Ilmu Komputer dan Bisnis Vol. 12 No. 1 (2021): Vol. 12 No. 1 (2021): Vol. 12 No. 1 (2021)
Publisher : STMIK Dharmapala Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47927/jikb.v12i1.91

Abstract

Penggunaan internet untuk mengakses situs-situs tertentu yang tidak berhubungan dengan pekerjaan dibatasi akses nya oleh perusahaan atau organisasi. Perusahaan atau organisasi melakukan pemblokiran untuk tujuan mengamankan jaringan mereka terhadap ancaman virus, spyware, hacker dan ancaman lainnya yang dapat merugikan perusahaan dengan cara menerapkan firewall, filter URL serta sistem deteksi intrusi. Namun, pengamanan tersebut masih dapat ditembus dengan menggunakan layanan proxy anonim. Penggunaan proxy anonim memungkinkan user untuk melakukan bypass sebagian besar sistem penyaringan. Dalam penelitian ini, data proxy anonim diperoleh dengan cara menangkap (capture) paket data menggunakan aplikasi wireshark. Data tersebut dimodelkan dengan algoritme expectation maximization sehingga diperoleh akurasi model sebesar 71.22% pada pembagian data yang seimbang. Hasil ini menunjukkan bahwa model mampu mengenali penggunaan proxy anonim pada traffic internet.
A New Copyright Protection for Vector Map using FFT-based Watermarking Shelvie Nidya Neyman; I Nyoman Prama Pradnyana; Benhard Sitohang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.49

Abstract

This study proposed a new approach of copyright protection for vector map using robust watermarking on FFT algorithm. A copyright marker inserted in vector map as the watermark. In addition to data origin authentication capabilities watermark, RSA cryptographic algorithm is used when generating the watermark. Quality measurement of the results was based on the three characteristics of digital watermarking: (1) invisibility using RMSE calculations, (2) fidelity with the farthest distance and (3) NC calculation and gemotrical level of robustness against attacks. Result of experiments showed that the approach used in this study succeeded in inserting copyright as watermark on vector maps. Invisibility test showed good results, demonstrated by RMSE close to zero. Fidelity of the watermarked map was also maintained. Level of watermark robustness against geometric attacks on vector map results has been maintained within the limits that these attacks do not affect the watermark bit value directly.
Teknik Penyembunyian Data Rahasia pada Berkas Gambar Digital Menggunakan Steganografi Least Significant Bit Variable-Size Shelvie Nidya Neyman; Lindayati Lindayati; Sugi Guritman
Jurnal Ilmu Komputer dan Agri-Informatika Vol 1 No 1 (2012)
Publisher : Departemen Ilmu Komputer, Institut Pertanian Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (174.412 KB) | DOI: 10.29244/jika.1.1.30-36

Abstract

Salah satu teknik pengamanan data dengan cara penyisipan informasi rahasia pada berkas gambar digital sebagai media penampung ialah steganografi berbasis least significant bit (LSB) dengan penambahan kemampuan penyisipan yang bersifat variable-size. Operasi teknik steganografi ini menggunakan tiga parameter, yaitu capacity evaluation untuk menentukan kapasitas maksimum LSB dari masing-masing pixel media penampung, minimum error replacement untuk memperkecil tingkat kesalahan saat penyisipan, dan improved grayscale compensation untuk memisahkan kesalahan penempelan agar tidak berdekatan pada tempat pixel bekerja. Penelitian ini bertujuan mengimplementasikan teknik tersebut untuk menyembunyikan data rahasia pada berkas gambar digital sebagai media penampung dan menghasilkan stego-image dengan kesamaan tampilan dan ukuran berkas. Berkas hasil penyisipan (stego-image) yang diperoleh diharapkan tidak menimbulkan kecurigaan pihak 'lawan', serta mampu memaksimumkan kapasitas penyisipan data rahasia, dengan memungkinkan penyisipan mencapai bit ke-5 dari LSB media penampung. Hasil penelitian menunjukkan bahwa stego-image yang diperoleh secara visual memiliki tampilan hampir sama dengan media penampungnya dan kapasitas penyisipannya mencapai lebih dari 50% ukuran media penampungnya. Kapasitas ini diperoleh tanpa mempertimbangkan border dan jumlah bit data pada setiap pixel minimal berjumlah empat. Kata kunci: capacity evaluation, improved grayscale compensation, least significant bit variabel-size, steganografi
Pemodelan Identifikasi Trafik Bittorrent Dengan Pendekatan Correlation Based Feature Selection (CFS) Menggunakan Algoritme Decision Tree (C4.5) Hesmi Aria Yanti; Heru Sukoco; Shelvie Nidya Neyman
CESS (Journal of Computer Engineering, System and Science) Vol 6, No 1 (2021): Januari 2021
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (676.079 KB) | DOI: 10.24114/cess.v6i1.20855

Abstract

Abstract— BitTorrent is a P2P file sharing software protocol that allows clients to apply data to other clients and can affect network performance. Bittorent client traffic data collection uses secondary data taken from official sources on the link https://unb.ca/cic/datasets/index.html in 2016. Traffic data is used as a model for BitTorrent traffic identification using feature-based correlation selection (CFS) and traffic analysis model analysis using Decision Tree Algorithm (C4.5). Feature selection is done to clean irrelevant features so that they can affect the results of the accuracy value. The results of feature selection obtained 7 features and 1 category with 244,689 records and the system connecting the rule tree data training model selected the four best accuracy values. Furthermore, the model training data is carried out by testing the BitTorrent traffic trial data. The results of data testing obtained the best BitTorrent traffic accuracy value of 98.82% with 73,406 records on the 30% data test. Keywords— BitTorrent, C4.5 algorithm, correlation based feature selection, traffic identification, modeling.
Penerapan Sistem E-Voting pada Pemilihan Kepala Daerah di Indonesia (The Application of E-Voting Systems in the Local Elections in Indonesia) Shelvie Nidya Neyman; Muhammad Fikri Isnaini; Sri Nurdiati
Jurnal Sains Terapan : Wahana Informasi dan Alih Teknologi Pertanian Vol. 3 No. 1 (2013): Jurnal Sains Terapan, Volume 3, Nomor 1, Tahun 2013
Publisher : IPB University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (973.764 KB) | DOI: 10.29244/jstsv.3.1.35-49

Abstract

On this research, the protocol and simulation of e-voting system were designed for the local election. The functions on this system were tailored to the e-voting scheme which must meet several criterias: Eligibility, Unreusability, Anonymity, Accuracy, Fairness, Vote and Go, and Public Verifiability. The protocol which was made in this research was a system for voter registration, validation and activation voters, the election system, and the election calculation system. To maintain the security of data, the e-voting system used public key algorithm and symmetric key algorithm. The result of this research was a web-based e-voting system which runs on the computer network that meets the criteria of e-voting scheme. The result of this research showed that the e-voting process can accelerate the vote calculation and decrease human errors.Keywords: voting, e-voting, the public key cryptography algorithm, pilkada
Manajemen Alokasi Bandwidth Layanan Internet Menggunakan Fractional Knapsack Problem Ahmad Rizaqu Muttaqi; Sri Wahjuni; Shelvie Nidya Neyman
Jurnal Teknologi dan Sistem Komputer Volume 7, Issue 2, Year 2019 (April 2019)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (328.313 KB) | DOI: 10.14710/jtsiskom.7.2.2019.71-76

Abstract

The technical problems faced in e-government implemented by the Ministry of Religion of Indonesia since 2015 are minimal bandwidth requirements to provide information services and behavior of users who access entertainment sites. When peak hours occur, the congested network often occurs which becomes a significant bottleneck. This study aims to implement bandwidth management using the fractional knapsack problem method by limiting access to entertainment services. The QoS parameters used in this management are throughput, delay, and jitter. The method was tested using a paired t-test using throughput, jitter, and delay test parameters by comparing test parameters before and after bandwidth management applied. The significance value produced is between 75-85%. The method used can control the amount of traffic for each service, but on the other, hand the delay and jitter are still high. It is necessary to add additional free space to each service that can be used when needed to reduce the delay and jitter.
Smart Water Management Framework Berbasis IoT Untuk Mendukung Pertanian Urban Yan Mitha Djaksana; Heru Sukoco; Sri Wahjuni; Hendra Rahmawan; Shelvie Nidya Neyman
PETIR Vol 14 No 1 (2021): PETIR (Jurnal Pengkajian Dan Penerapan Teknik Informatika)
Publisher : Sekolah Tinggi Teknik - PLN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33322/petir.v14i1.1112

Abstract

Related to water resources is one of the problems that often occurs in certain areas that have large populations such as urban areas, in addition to having to provide water that is used for daily activities, today many urban residents live in urban hardships, so an alternative is needed in providing resources water that must be purchased in daily necessities, in this paper we proposed a framework for support urban farming that we called the smart water management system by utilizing the IoT (Internet of Thinks) technology specifically sensors and machine learning algorithms in managing available water resources. many researchers have developed a similar model, but the framework model that we proposed using reuse water and filtered rainwater so that it meets the minimum quality requirements of water that can be reused in agriculture, so we hopes to make domestic water use more effective and efficient and predictable water consumption and availability.
Robust Digital Watermarking pada Arsip Vital Mnggunakan Metode Hybrid SVD Dengan DWT Alita Wulan Dini; Shelvie Nidya Neyman; Toto Haryanto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 5 (2023): October 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i5.5003

Abstract

The development of Internet technology affects the dissemination of data, especially in vital government archives. This research uses a hybrid singular value decomposition (SVD) and discrete wavelet transform (DWT) method, which aims to protect the copyright of vital archives. The stages of the insertion and extraction process are carried out to test the effect of the alpha value on the quality (imperceptibility) and robustness of the inserted image by measuring the Peak Signal-to-Noise Ratio (PSNR), verifying similarity by measuring the Normalized Cross-Correlation (NC) and Structural Similarity Index (SSIM). The results of research with ten vital archives and a watermark protection logo in JPEG format with a size of 512x512 pixels obtained a maximum PSNR with a value of α = 0.01 of 41.0567 dB, NC of 0.98904, and SSIM of 0.98023 in the Cibereum Land Certificate. So, it can be proven that this method produces vital archive watermarks that can be extracted and are robust to JPEG compression attacks of 75%, median filtering 3x3, Gaussian noise 0.01, speckle noise 0.01, and salt and pepper noise 0.01 but not resistant to rotation 80 and cropping attacks 2%.
Implementasi Serangan Website Nextcloud menggunakan DoS Beserta Pencegahannya Manurung, Cindy Arditha Claudia; Mayangkara, Mahatmadi Ariq; Al Habsy, Muhamad; Neyman, Shelvie Nidya
Journal of Internet and Software Engineering Vol. 1 No. 4 (2024): October
Publisher : Indonesian Journal Publisher

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47134/pjise.v1i4.2640

Abstract

Nextcloud adalah platform penyimpanan awan yang memungkinkan kolaborasi dan penyimpanan data yang aman. Namun, seperti layanan berbasis Internet lainnya, Nextcloud rentan terhadap serangan penolakan layanan Denial of Service (DoS), yang dapat memengaruhi ketersediaan layanan. Menerapkan langkah-langkah keamanan untuk melindungi Nextcloud dari serangan DoS penting untuk memastikan integritas dan ketersediaan data. Penelitian ini menjelaskan implementasi firewall sebagai pertahanan terhadap serangan DoS di Nextcloud. Firewall memungkinkan untuk memantau dan memfilter lalu lintas jaringan untuk mengidentifikasi dan memblokir permintaan yang mencurigakan atau berlebihan. Hasil pengujian menunjukkan bahwa penggunaan firewall secara signifikan mengurangi dampak serangan DoS pada Nextcloud, sehingga meningkatkan keandalan dan ketersediaan layanan.