p-Index From 2020 - 2025
14.245
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Ilmu Komputer dan Informasi Jurnal Masyarakat Informatika Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Prosiding SNATIF Journal of ICT Research and Applications Teknika: Jurnal Sains dan Teknologi Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics Jurnal Teknologi dan Sistem Komputer Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) Jurnal Manajemen Informatika Jurnal Kridatama Sains dan Teknologi Infotekmesin Jurnal Mnemonic Abdimasku : Jurnal Pengabdian Masyarakat Variabel Journal of Intelligent Computing and Health Informatics (JICHI) SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Teknik Informatika (JUTIF) JUDIMAS (Jurnal Inovasi Pengabdian Kepada Masyarakat) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Soft Computing Exploration Advance Sustainable Science, Engineering and Technology (ASSET) Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Prosiding Seminar Nasional Hasil-hasil Penelitian dan Pengabdian Pada Masyarakat Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics LogicLink: Journal of Artificial Intelligence and Multimedia in Informatics Seminar Nasional Riset dan Teknologi (SEMNAS RISTEK) Advance Sustainable Science, Engineering and Technology (ASSET)
Claim Missing Document
Check
Articles

Found 6 Documents
Search
Journal : Jurnal Masyarakat Informatika

Fitur Esktraksi LBP dan Naive Bayes dalam Klasifikasi Jenis Pepaya Berdasarkan Citra Daun Sari, Christy Atika; Rachmawanto, Eko Hari
Jurnal Masyarakat Informatika Vol 12, No 2 (2021): JURNAL MASYARAKAT INFORMATIKA
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Tanaman merupakan bagian terpenting dalam kehidupan makhluk hidup sebagai oksigen untuk bernafas, selain itu juga digunakan sumber makanan, bahan bakar, obat-obatan dan masih banyak lagi manfaatnya. Salah satunya tanaman buah pepaya, bisa digunakan untuk bahan makanan maupun obat-obatan. Tanaman buah pepaya ini memiliki banyak jenis dan bisa diklasifikasikan berdasarkan bentuk daunnya. Jenis daun buah papaya yang digunakan dalam penelitian ini, yaitu : daun buah pepaya Sumatera, daun buah pepaya California, daun buah pepaya Hawai, daun buah pepaya cibinong dan daun buah pepaya Bangkok. Jumlah dataset yang digunakan adalah 150 citra dan akan dibagi menjadi 5 kelas yang terdiri dari 25 data training dan 5 data testing masing-masing kelas. Proses klasifikasi ini menggunakan metode Local Binary Pattern untuk ektraksi fitur dan metode Naïve Bayes Classifier sebagai metode klasifikasinya. Metode Local Binary Pattern operator sederhana dan efisien untuk menggambarkan pola gambar local dan mendapatkan hasil yang baik dalam tekstur pengambilan gambar. Sedangkan metode Naïve Bayes Classifier adalah metode yang paling sederhana dengan menggunakan peluang yang ada, dimana tempatnya mengasumsikan bahwa setiap variabel adalah independensi. Berdasarkan hasil pengujian yang dilakukan, penggunaan Naïve Bayes Classifier ditambah dengan ekstraksi fitur Local Binary Pattern didapatkan nilai akurasi 96% pada percobaan pertama dan 93% pada percobaan kedua.
Implementasi Kriptografi dengan Menggunakan Algoritma Arnold’s Cat Map dan Henon Map Irawan, Candra; Rachmawanto, Eko Hari
Jurnal Masyarakat Informatika Vol 13, No 1 (2022): JURNAL MASYARAKAT INFORMATIKA
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.13.1.43312

Abstract

Algoritma kriptografi merupakan sebuah seni matematis yang diimplementasikan untuk proses enkripsi dan dekripsi, medkanisme ini mengarah untuk mengenkripsi data asli menggunakan kombinasi berbeda dari kata, angka, atau ekspresi. Keamanan data terenkripsi sepenuhnya bergantung pada dua aspek penting, yaitu : kerahasiaan kunci dan kekuatan algoritma kriptografi. Teori chaos digunakan untuk memanggil bilangan secara acak, sehingga sifat dari gambar seperti redudansi data atau tingkat korelasi tinggi, hubungan antara nilai piksel dan biasanya berukuran besar akan diproses sehingga menghasilkan enkripsi menjadi kecil serta semakin acak bilangan yang dimunculkan semakin baik pula keamanannya. Macam-macam metode pada teori ini antara lain :  Henon Map, Logistic Map, Arnold’s Cat Map, Duffing Map, Tent Map, Beta Map dan sebagainya. Pada penilitian ini akan menggunakan dua metode yaitu Arnold’s Cat Map dan Henon Map untuk proses enkripsi dan dekripsi. Serta untuk menutupi kekurangan Henon Map jika citra awalnya homogen, citra hasil enkripsinya akan sama dengan data awal, maka pada penelitian ini akan di klasifikasikan menjadi citra homogen dan heterogen dengan ekstraksi ciri orde 1 menggunakan standar deviasi dan nilai mean.
A Combination of SHA-256 and DES for Visual Data Protection Wintaka, Aristides Bima; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.72615

Abstract

This study employs SHA-256 and DES algorithms to safeguard visual data through encryption and decryption processes. Research findings demonstrate that this method provides robust security with image histograms that are difficult to recognize and randomly encrypted. The MSE and PSNR values approximate 105 and 48, indicating that the decryption image quality closely resembles the original due to these relatively high values, which are considered excellent. The SSIM value of 1 which indicates no difference in structure, luminance, or contrast between images. Entropy and N.C values approach 8 and 0.92, respectively, suggesting pixel complexity within image with favorable pixel distribution. This technique prove effective for protecting confidential images and digital documents.
A Comparative Analysis of Convolutional Neural Network (CNN): MobileNetV2 and Xception for Butterfly Species Classification Pradnyatama, Mehta; Sari, Christy Atika; Rachmawanto, Eko Hari; Islam, Hussain Md Mehedul
Jurnal Masyarakat Informatika Vol 16, No 1 (2025): May 2025
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.1.72957

Abstract

This study aims to compare the effectiveness and efficiency of two convolutional neural network architectures, MobileNetV2 and Xception, for automated butterfly species classification. As biodiversity monitoring gains significance, effective species identification technologies are crucial for conservation. The research utilized a dataset of 100 butterfly species with 12,594 training images and 1,000 validation and test images. Transfer learning with pre-trained ImageNet weights was implemented, and both models were enhanced with custom classification layers. Data augmentation and class weighting mitigated dataset imbalance issues. Experimental results show Xception attained 93.40% test accuracy compared to MobileNetV2's 93.20%. These high accuracy rates were achieved through effective transfer learning that preserved general feature extraction capabilities, comprehensive class balancing techniques, and carefully tailored learning rate strategies for each architecture. Despite minimal performance difference, MobileNetV2 offers significant computational efficiency advantages with 4.15M parameters compared to Xception's 25.27M, while Xception provides marginally better classification. This study contributes to entomological research and highlights trade-offs between model complexity and performance in fine-grained classification tasks, supporting implementation decisions for butterfly identification systems in practical applications.
Performance Analysis Cryptography Using AES-128 and Key Encryption Based on MD5 Pratama, Reza Arista; Rachmawanto, Eko Hari; Irawan, Candra; Erawan, Lalang; Laksana, Deddy Award Widya; Ali, Rabei Raad
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.75091

Abstract

The rampant misuse of data theft has created data security techniques in cryptography. Cryptography has several algorithms that are very strong and difficult to crack, including the AES (Advanced Encryption Standard) algorithm consisting of 128 bits, 192 bits, and 256 bits which have been proven resistant to conventional linear analysis attacks and differential attacks, then there is the MD-5 algorithm (Message-Digest algorithm 5) which is a one-way hash function by changing data with a long size and inserting certain data in it to be recovered. If the two are combined, it becomes more difficult to crack; therefore, to determine its performance, this study conducted a combination experiment of AES-128 with a key encrypted by MD-5, including avalanche effect tests, encryption and decryption execution times, and entropy values of encryption. The types of documents for testing are files with the extensions .docx, .txt, .pptx, .pdf, and .xlsx. After conducting tests on document files obtained from the processing time test, it shows that .txt and .pptx documents dominate with a fast process, while the longest process is obtained by .xlsx and .docx documents for all test files, then the avalanche effect test with an average of 98% and the entropy test is classified as good between values 3 - 7 which are close to value 8. This proves that the combination of the AES-128 algorithm with the MD-5 key can be used as an alternative for securing documents with stronger security, while maintaining standard processing times
Multi-Level Secure Image Cryptosystem Using Logistic Map Chaos: Entropy, Correlation, and 3D Histogram Validation Latifa, Anidya Nur; Sari, Christy Atika; Rachmawanto, Eko Hari; Sarker, Md Kamruzzaman
Jurnal Masyarakat Informatika Vol 16, No 2 (2025): Issue in Progress
Publisher : Department of Informatics, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.14710/jmasif.16.2.74537

Abstract

This study presents a multi-level image encryption framework that combines password dependent SHA-256 key generation with a Logistic Map-based chaotic mechanism, supporting three operational modes: Speed, Balanced, and Security. The system is designed for scalability and robustness across diverse image sizes, achieving up to 27 percent faster encryption than AES on 1024×1024 images while maintaining high cryptographic strength. Experimental results show strong randomness with entropy reaching up to 7.98 bits per pixel, reduced adjacent pixel correlation below 0.01, and high resistance to differential attacks with NPCR above 99.6 percent and UACI around 33.4 percent. Structural integrity after decryption is also preserved with SSIM scores above 0.98. Compared to existing chaos based methods such as those proposed by Arif et al. and Riaz et al., the proposed system offers superior entropy performance, enhanced flexibility through multi-mode encryption, and broader resolution support up to 2048×2048 pixels. Comprehensive evaluations using entropy, correlation, PSNR, SSIM, XOR, and 3D histogram analysis confirm the method’s effectiveness. These findings highlight the system’s suitability for real-time, secure image transmission in environments such as IoT, medical imaging, and embedded applications.
Co-Authors Abdussalam Abdussalam Abdussalam Abdussalam, Abdussalam Abu Salam Adhitya Nugraha Adiyah Mahiruna Agustina, Feri Ahmad Salafuddin Ajib Susanto Akbar Aji Nugroho Akbar, Ilham Januar Al-Ghiffary, Maulana Malik Ibrahim Ali, Rabei Raad Alifia Salwa Salsabila Alvin Faiz Kurniawan Anak Agung Gede Sugianthara Andi Danang Krismawan Annisa Sulistyaningsih Antonio Ciputra Antonius Erick Handoyo Ardika Alaudin Arsa Arfian, Aldi Azmi Aryanta, Muhammad Syifa Aryaputra, Firman Naufal Astuti, Yani Parti Asyari, Fajar Husain Aulia, Lathifatul Auni, Amelia Gizzela Sheehan Bijanto Bijanto Briliantino Abhista Prabandanu Cahaya Jatmoko Cahyo, Nur Ryan Dwi Candra Irawan Candra Irawan Chaerul Umam Chaerul Umam Christy Atika Sari Cinantya Paramita Ciputra, Antonio D.R.I.M. Setiadi Danar Bayu Adi Saputra Danu Hartanto Daurat Sinaga De Rosal Ignatius Moses Setiadi Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Destriana, Rachmat Didik Hermanto Dila Ananda Oktafiani Dimas Irawan Ihya‘ Ulumuddin Doheir, Mohamed Doheir, Mohamed Dwi Puji Prabowo Dwi Puji Prabowo, Dwi Puji Egia Rosi Subhiyakto Egia Rosi Subhiyakto Elkaf Rahmawan Pramudya Ellen Proborini Eqania Oktayaessofa Erna Daniati Erna Zuni Astuti Erna Zuni Astuti Erna Zuni Astuti Ery Mintorini Faisal, Edi Farrel Athaillah Putra Fazlur Rahman Hafidz Fida Maisa Hana Fidela Azzahra Florentina Esti Nilawati Florentina Esti Nilawati Florentina Esti Nilawati Folasade Olubusola Isinkaye Giovani Ardiansyah Gumelar, Rizky Syah Guruh Fajar Shidik Hadi, Heru Pramono Haryanto, Christanto Antonius Haryanto, Christanto Antonius Hasbi, Hanif Maulana Hendra Sutrisno Herman Yuliansyah, Herman Heru Agus Santoso Heru Lestiawan Hidayat, Muhammad Taufiq Hidayati, Ulfa Himawan, Mahadika Pradipta Himawan, Reyshano Adhyarta Hyperastuty, Agoes Santika Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Imam Prayogo Pujiono Inzaghi, Reza Bayu Ahmad Isinkaye, Folasade Olubusola Islam, Hussain Md Mehedul Istiawan, Deden Istiqomah, Annisa Ayu Ivan Stepheng Kas Raygaputra Ilaga Krismawan, Andi Danang Kumala, Raffa Adhi Kunio Kondo Kurniawan, The, Obed Danny Kusuma, Edi Jaya L. Budi Handoko Laksana, Deddy Award Widya Lalang Erawan Latifa, Anidya Nur Liya Umaroh Liya Umaroh, Liya Lucky Arif Rahman Hakim Lungido, Joshua Mabina, Ibnu Farid Mahiruna, Adiyah Maulana Malik Ibrahim Al-Ghiffary Md Kamruzzaman Sarker Md Kamruzzaman Sarker Mohamed Doheir Mohamed Doheir Mohammad Rizal, Mohammad Mohd Yaacob, Noorayisahbe Muchamad Akbar Nurul Adzan Muhammad Mahdi Mulyono, Ibnu Utomo Wahyu Munis Zulhusni Musfiqur Rahman Sazal Muslih Muslih Muslih Muslih Mutiara Dolla Meitantya Mutiara Syabilla Nabila, Qotrunnada Nanna Suryana Herman NGATIMIN, NGATIMIN Ningrum, Amanda Prawita Nisa, Yuha Aulia Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yacoob Nova Rijati Novi Hendriyanto, Novi Nugroho, Dicky Anggriawan Nur Ryan Dwi Cahyo Nuri Nuri Oktaridha, Harwinanda Oleiwi, Ahmed Kareem Parti Astuti, Yani Parti Astuti, Yani parti astuti, yani Parti Astuti1, Yani Parti Astuti1, Yani Pradana, Luthfiyana Hamidah Sherly Pradana, Rizky Putra Pradnyatama, Mehta Praskatama, Vincentius Pratama, Reza Arista Pratama, Zudha Pratiwi, Saniya Rahma Proborini, Ellen Pulung Nurtantio Andono Purwanto Purwanto Putra, Ifan Perdana Putri, Ni Kadek Devi Adnyaswari Rabei Raad Ali Rabei Raad Ali Rabei Raad Ali Rabei Raad Ali Raisul Umah Nur Ramadhan Rakhmat Sani Ratih Ariska Ruri Suko Basuki Safitri, Melina Dwi Saifullah, Zidan Sania, Wulida Rizki Santoso, Bagus Raffi Saputro, Fakhri Rasyid Sarker, Md Kamruzzaman Setiarso, Ichwan Setiawan, Fachruddin Ari Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Solichul Huda, Solichul Sudibyo, Usman Sudibyo, Usman Sudibyo, Usman Sugianto, Castaka Agus Sumarni Adi, Sumarni Suprayogi Suprayogi Suprayogi Suprayogi Tan Samuel Permana Tan Samuel Permana Titien Suhartini Sukamto Tri Esti Rahayuningtyas Umam, Choerul Umaroh, Liya Umaroh, Liya Utomo, Danang Wahyu Velarati, Khoirizqi Vincentius Praskatama Wahyu Dwy Permana Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Widhi Bagus Nugroho Winarsih, Nurul Anisa Sri Winaryanti, Hida Sekar Wintaka, Aristides Bima Yaacob, Noorayisahbe Bt Mohd Yaacob, Noorayisahbe Mohd Yani Parti Astuti