Claim Missing Document
Check
Articles

Found 2 Documents
Search

Application Of The Concept Of Singular Value Decomposition For The Making Of Watermark In Documents Sinar Sinurat; Edward R Siagian
Bahasa Indonesia Vol 14 No 01 (2022): Instal : Jurnal Komputer
Publisher : Cattleya Darmaya Fortuna

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.54209/jurnalkomputer.v13i02.28

Abstract

Watermark is a part of steganography that is used by many users in electronic and non-electronic documents. Watermark certainly does not guarantee the safe use or modification of the document, but only the legitimacy of ownership of the document. Watermarking is a part of steganography that is used by many users in electronic and non-electronic documents. Watermarking certainly does not guarantee the safe use or modification of the document, but only the legitimacy of ownership of the document. Establishing a digital watermark will improve the owner's document security. Hiding a label by inserting datum bits in the image segment using Singular Value Decomposition (SVD), as a part of Watermarking. Watermark domains are digital documents in the form of videos, images, text, sound. Watermarking applications built by applying singular value decomposition to numbers
Learning Text Data Security in Documents Using McEliece's Algorithm Sinar Sinurat; Edward R Siagian
INFOKUM Vol. 10 No. 5 (2022): December, Computer and Communication
Publisher : Sean Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Computer Assisted Instruction (CAI) is a very interesting computer-based learning media and is able to increase students' learning motivation. One model of CAI is a tutorial in which the delivery of material is carried out in a tutorial manner, as a tutorial is done by a teacher or instructor. The development of this design idea is based on how to design learning software for the McEliece cryptographic algorithm using the Computer Assisted Instruction (CAI) tutorial model by displaying the key formation process, the encryption process and the decryption process in the McEliece cryptographic algorithm, and including the McEliece cryptographic algorithm as material in learning applications. . The results of this study show that the McEliece cryptographic algorithm learning software is designed using the Computer Assisted Instruction (CAI) tutorial model and is useful for showing every step and result of the key formation process, the encryption process and the decryption process contained in the McEliece cryptographic algorithm, so that can help understand or learn work procedures or algorithms from the cryptography.