p-Index From 2021 - 2026
13.196
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Ilmu Komputer dan Informasi Jurnal Masyarakat Informatika Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Prosiding SNATIF Journal of ICT Research and Applications Teknika: Jurnal Sains dan Teknologi Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics Jurnal Teknologi dan Sistem Komputer Sinkron : Jurnal dan Penelitian Teknik Informatika Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer Jurnal Nasional Pendidikan Teknik Informatika (JANAPATI) Jurnal Manajemen Informatika Jurnal Kridatama Sains dan Teknologi Infotekmesin Jurnal Mnemonic Abdimasku : Jurnal Pengabdian Masyarakat Variabel Journal of Intelligent Computing and Health Informatics (JICHI) SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Teknik Informatika (JUTIF) JUDIMAS (Jurnal Inovasi Pengabdian Kepada Masyarakat) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Soft Computing Exploration Advance Sustainable Science, Engineering and Technology (ASSET) Jurnal Ilmiah Sistem Informasi dan Ilmu Komputer Prosiding Seminar Nasional Hasil-hasil Penelitian dan Pengabdian Pada Masyarakat Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics LogicLink: Journal of Artificial Intelligence and Multimedia in Informatics Seminar Nasional Riset dan Teknologi (SEMNAS RISTEK) Advance Sustainable Science, Engineering and Technology (ASSET)
Claim Missing Document
Check
Articles

Imperceptible and Robust Encryption: Salsa20 Stream Cipher for Colour Image Data Arfian, Aldi Azmi; Sari, Christy Atika; Rachmawanto, Eko Hari; Isinkaye, Folasade Olubusola
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.13049

Abstract

Data security has become crucial, especially in today's era, therefore we need to protect our personal data to avoid unwanted incidents. The primary objective of this research is to empirically demonstrate the viability of our proposed methodology for encrypting color images using the Salsa20 algorithm, renowned for its stream cipher characteristics, which inherently afford it a swift processing speed. The encryption method we use is to take each pixel from the original image and convert it into bytes based on the RGB value in it, then encrypt it using a keyword that has been converted using a hash function. In this study, we carried out several evaluations to evaluate the performance of the encrypted and decrypted images to test the method we propose, including histogram analysis and compare patterns, visual image testing, and key space analysis. Through this experiment, it has been proven that Salsa20 is effective in maintaining confidentiality and image integrity. Histogram analysis reveals differences in pixel distribution patterns between the original and encrypted images. Visual testing shows that the encrypted image maintains good optical quality. Keyspace analysis ensures the security of encryption keys. The performance evaluation resulted in an NPCR above 99%, UACI had been reached 69.28%, MSE was closes to 0, and the highest PSNR was around 61.89dB, this shows that encrypted images recovered with high accuracy.
Text and Image Encryption Using Symmetric Cryptography Ron Rivest Cipher 2 (RC2) Pratiwi, Saniya Rahma; Sari, Christy Atika; Rachmawanto, Eko Hari
Sinkron : jurnal dan penelitian teknik informatika Vol. 8 No. 1 (2024): Articles Research Volume 8 Issue 1, January 2024
Publisher : Politeknik Ganesha Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33395/sinkron.v9i1.13054

Abstract

In the current context, ensuring the secure transmission of data over the internet has become a critical concern, with information technology playing a fundamental role. As society advances into the digital information age, the importance of network security issues continues to increase. Therefore, the need for cryptographic technology has emerged to overcome these challenges. Cryptography includes symmetric and asymmetric cryptography. An example of symmetric cryptography is the RC2 algorithm. RC2 is a symmetric encryption algorithm that uses a single key to encrypt and decrypt data. The ciphertext is then concealed within an image using the Stepic technique. The RC2 encryption method also utilizes symmetric encryption, ensuring the security of the encryption process while maintaining efficient encryption and decryption speeds. The result of this research is that the average percentage of MSE is 0.00%, and for PSNR and AVA are 70.85% and 34.93%. However, the AVA value is quite unstable because the average value is below 40%. Meanwhile, image encryption results in the longer the text that needs to be hidden in the image, the higher the UACI percentage. This is inversely proportional to the NPCR, the longer the text that needs to be hidden in the image, the lower the NPCR percentage. The average results obtained for UACI and NPCR values are 41.46% dan 98.13%.
KOMPARASI WATERMARKING DENGAN LIFTING WAVELET TRANSFORM DAN DISCTERE WAVELET TRANSFORM Ningrum, Amanda Prawita; Praskatama, Vincentius; Sari, Christy Atika; Rachmawanto, Eko Hari
Jurnal Mnemonic Vol 7 No 1 (2024): Mnemonic Vol. 7 No. 1
Publisher : Teknik Informatika, Institut Teknologi Nasional malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36040/mnemonic.v7i1.7779

Abstract

Privasi dan security merupakan hal yang sangat penting untuk dijaga pada era teknologi seperti sekarang. Cara untuk menjaga privasi dapat dilakukan dengan menggunakan pengamanan pada data. Data perlu dijaga karena didalam data tersebut terdapat informasi pribadi dan sangat bahaya apabila sampai disalahgunakan oleh pihak yang tidak bertanggung jawab. Watermarking merupakan proses yang dilakukan untuk melakukan pengamanan data dengan cara menyisipkan citra watermark ke dalam citra host atau utama. Tujuan dilakukannya watermarking yaitu untuk melakukan pengamanan pada citra. Pada penelitian ini akan dilakukan proses watermarking dengan menggunakan algoritma Lifting Wavelet Transform (LWT) dan Disctere Wavelet Transform (DWT). Tujuan dilakukannya penelitian ini yaitu untuk melakukan komparasi dari proses watermarking yang dimana nantinya dapat dilihat proses watermarking mana yang lebih baik untuk digunakan. Data yang digunakan pada penelitian ini yaitu citra host menggunakan citra Lena dan Baboon yang memiliki ukuran 512*512 pixel dan citra watermark dengan ukuran 64*64 pixel. Hasil yang didapatkan dari penelitian ini yaitu setelah dilakukan proses pengujian, dengan menggunakan citra lena, pada algoritma LWT mendapatkan nilai PSNR sebesar 47.5513 dB dan pada algoritma DWT mendapatkan PSNR sebesar 42.2207 dB
Improved Javanese script recognition using custom model of convolution neural network Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Sari, Christy Atika; Rachmawanto, Eko Hari; Setiadi, De Rosal Ignatius Moses; Sarker, Md Kamruzzaman
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i6.pp6629-6636

Abstract

Handwriting recognition in Javanese script is not widely developed with deep learning (DL). Previous DL and machine learning (ML) research is generally limited to basic characters (Carakan) only. This study proposes a deep learning model using a custom-built convolutional neural network to improve recognition accuracy performance and reduce computational costs. The main features of handwritten objects are textures, edges, lines, and shapes, so convolution layers are not designed in large numbers. This research maximizes optimization of other layers such as pooling, activation function, fully connected layer, optimizer, and parameter settings such as dropout and learning rate. There are eleven main layers used in the proposed custom convolutional neural network (CNN) model, namely four convolution layers+activation function, four pooling layers, two fully connected layers, and a softmax classifier. Based on the test results on the Javanese script handwritten image dataset with 120 classes consisting of 20 basic character classes and 100 compound character classes, the resulting accuracy is 97.29%.
The Implementation of Improved Advanced Encryption Standard and Least Significant Bit for Securing Messages in Images Pujiono, Imam Prayogo; Rachmawanto, Eko Hari; Nugroho, Dicky Anggriawan
Journal of Applied Intelligent System Vol. 8 No. 1 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i1.7324

Abstract

Security and confidentiality are essential aspects needed in the process of exchanging messages. Maintaining the message's security and confidentiality can be done by encrypting the message with cryptographic techniques to protect the message. However, the encrypted message (ciphertext) usually raises suspicion from eavesdroppers so that they try to unravel the contents of the message or damage the contents of the message or prevent the message from reaching the intended recipient. To avoid eavesdroppers' suspicion of encrypted messages, after encryption, the ciphertext can then be inserted into an image using steganography techniques so that eavesdroppers do not know whether there is a secret message in an image. In this research, the authors use the Improved AES-128 (Advanced Encryption Standard) Algorithm to encrypt messages and LSB (Least Significant Bit) Algorithm to insert ciphertext into an image. Where the AES Algorithm Improvement is made by adding a sending and receiving applications ID to modify the Key Schedule process, with modifications to the Key Schedule process, messages can only be read on the original recipient's cellphone by entering the correct key. The results of this study show that eavesdroppers do not easily know the existence of the ciphertext, besides that even if the eavesdroppers get the ciphertext and know the encryption key, the message remains unreadable on their cellphone because the ID of the application sending or receiving the message has changed.
Crypto-Stegano Color Image Based on Rivest Cipher 4 (RC4) and Least Significant Bit (LSB) Rachmawanto, Eko Hari; Hasbi, Hanif Maulana; Sari, Christy Atika; Irawan, Candra; Inzaghi, Reza Bayu Ahmad; Akbar, Ilham Januar
Journal of Applied Intelligent System Vol. 8 No. 2 (2023): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v8i2.8497

Abstract

Rivest Cipher 4 (RC4) has the main factors that make this algorithm widely used, namely its speed and simplicity, so it is known to be easy for efficient implementation. The nature of the key in the RC4 algorithm is symmetrical and performs a plain per digit or byte per byte encryption process with binary operations (usually XOR) with a semirandom number. To improve the visual image after the encryption process, in this article we use the Least Significant Bit (LSB). In this study, the quality of the stego image and the original image has been calculated using MSE, PSNR and Entropy. Experiments were carried out by images with a size of 128x128 pixels to 2048x2048 pixels. Experiments using imperceptibility prove that the stego image quality is very good. This is evidenced by the image quality which has an average PSNR value above 53 dB, while the lowest PSNR value is 48 dB with a minimum dimension of 128x128 pixels.
Counselor Application Frontend with Personality- matching Using Android-Based K-Means Clustering Algorithm Putra, Ifan Perdana; Rachmawanto, Eko Hari; Sari, Wellia Shinta; Rahayuningtyas, Tri Esti; Umam, Choerul; Himawan, Mahadika Pradipta; Yaacob, Noorayisahbe Bt Mohd
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10217

Abstract

Education is one of the most important things for people to have. Many people are competing for education to increase their abilities. Technology plays a big role in developing access to education to make it easier with many online applications and online classes education becomes easier. However, there are still many unresolved problems in this field of education, namely the emergence of the phenomenon of incompatibility between educators and students so that student interest decreases dramatically because of this. And also, the lack of learning materials taught that are not school subjects such as programming. Therefore, the author and team designed an application where this application can find students a learning mentor outside of school so that they can increase their knowledge. The application also provides a matching feature based on the student's personality so that the student can find a suitable tutor.
Customer Segmentation Using K-Means Clustering with RFM Method (Case Study : PT. Dewangga Travindo Semarang) Winaryanti, Hida Sekar; Hadi, Heru Pramono; Rachmawanto, Eko Hari
(JAIS) Journal of Applied Intelligent System Vol. 9 No. 1 (2024): Journal of Applied Intelligent System
Publisher : LPPM Universitas Dian Nuswantoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62411/jais.v9i1.10440

Abstract

PT. Dewangga Travindo is a company that operates in the field of travel services which includes tours, travel, and Hajj and Umrah pilgrimages which is based in the city of Semarang and has received permission from the Ministry of Religion No. D/606 of 2013. Every year there is always an increase in sales of services. Hajj and Umrah. The higher transaction activity every day results in a large buildup of data in the database which will only become data waste. The ability to process data is increasingly sophisticated using data mining, which is an activity of looking for relationships between items to obtain patterns as information to assist in decision making. However, considering the large number of competitors offering the same services, it is necessary to increase competitiveness to overcome market segmentation at PT Dewangga Travindo. For this reason, this research was carried out which aims to overcome customer segmentation using the Clustering method with the K-Means algorithm which produces a visual cluster model with RStudio tools using RFM attributes applied to carry out segmentation. The data used in this research is data on Hajj and Umrah pilgrims in the 2018-2020 period.
Lovebird image classification based on convolutional neural network Auni, Amelia Gizzela Sheehan; Sari, Christy Atika; Rachmawanto, Eko Hari; Doheir, Mohamed
Jurnal Teknika Vol 19, No 2 (2023): AVAILABLE ONLINE IN NOVEMBER 2023
Publisher : Faculty of Engineering, Universitas Sultan Ageng Tirtayasa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.36055/tjst.v19i2.21946

Abstract

Lovebird is a type of bird from the Psittacidae family, consisting of 90 generations. One of them is the genus Agapornis Selby or Lovebird, which has 9 species. In recognizing the differences of each species, you can use the Object Recognition system. One of them uses the popular CNN algorithm. The dataset was obtained from open sources totaling 8,992 datasets from 9 Agapornis species. It consists of 80% training images and 20% testing images from several datasets. After 10 accuracy tests, the results stated that the accuracy rate reached 89%. In addition, there are also extraction features extracted from images including color, shape, size, and texture characteristics. The things extracted in this study include the Mean, Standard Deviation, Kurtosis, Skewness, Variance, Entropy Value, Maximum Pixel, and Minimum Pixel. 
Facial Expression Recognition using Convolutional Neural Networks with Transfer Learning Resnet-50 Istiqomah, Annisa Ayu; Sari, Christy Atika; Susanto, Ajib; Rachmawanto, Eko Hari
Journal of Applied Informatics and Computing Vol. 8 No. 2 (2024): December 2024
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v8i2.8329

Abstract

Facial expression recognition is important for many applications, including sentiment analysis, human-computer interaction, and interactive systems in areas such as security, healthcare, and entertainment. However, this task is fraught with challenges, mainly due to large differences in lighting conditions, viewing angles, and differences in individual eye structures. These factors can drastically affect the appearance of facial expressions, making it difficult for traditional recognition systems to consistently and accurately identify emotions. Variations in lighting can alter the visibility of facial features, while different angles can obscure critical details necessary for accurate expression detection. This study addresses these issues by employing transfer learning with ResNet-50 and effective pre-processing techniques. The dataset consists of grayscale images with a 48 x 48 pixels resolution. It includes a total of 680 samples categorized into seven classes: anger, contempt, disgust, fear, happy, sadness, and surprise. The dataset was divided so that 80% was allocated for training and 20% for testing to ensure robust model evaluation. The results demonstrate that the model utilizing transfer learning achieved an exceptional performance level, with accuracy at 99.49%, precision at 99.49%, recall at 99.71%, and an F1-score of 99.60%, significantly outperforming the model without transfer learning. Future research will focus on implementing real-time facial recognition systems and exploring other advanced transfer learning models to further enhance accuracy and operational efficiency.
Co-Authors Abdussalam Abdussalam Abdussalam Abdussalam, Abdussalam Abu Salam Adhitya Nugraha Adiyah Mahiruna Agustina, Feri Ahmad Salafuddin Ajib Susanto Akbar Aji Nugroho Akbar, Ilham Januar Al-Ghiffary, Maulana Malik Ibrahim Ali, Rabei Raad Alifia Salwa Salsabila Alvin Faiz Kurniawan Anak Agung Gede Sugianthara Andi Danang Krismawan Anidya Nur Latifa Annisa Sulistyaningsih Antonio Ciputra Antonius Erick Handoyo Aqsel, Aryasatya Muhammad Ardika Alaudin Arsa Arfian, Aldi Azmi Ariska, Ratih Aristides Bima Wintaka Aryanta, Muhammad Syifa Aryaputra, Firman Naufal Astuti, Yani Parti Asyari, Fajar Husain Aulia, Lathifatul Auni, Amelia Gizzela Sheehan Azzahra, Fidela Bijanto Bijanto Briliantino Abhista Prabandanu Cahaya Jatmoko Cahyo, Nur Ryan Dwi Candra Irawan Candra Irawan Candra Irawan Castaka Agus Sugianto Chaerul Umam Chaerul Umam Christy Atika Sari Cinantya Paramita Ciputra, Antonio D.R.I.M. Setiadi Danar Bayu Adi Saputra Danu Hartanto Daurat Sinaga De Rosal Ignatius Moses Setiadi Deddy Award Widya Laksana Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Destriana, Rachmat Didik Hermanto Dila Ananda Oktafiani Doheir, Mohamed Doheir, Mohamed Dwi Puji Prabowo Dwi Puji Prabowo, Dwi Puji Egia Rosi Subhiyakto Egia Rosi Subhiyakto Elkaf Rahmawan Pramudya Ellen Proborini Erna Daniati Erna Zuni Astuti Ery Mintorini Faisal, Edi Farrel Athaillah Putra Fazlur Rahman Hafidz Fida Maisa Hana Fidela Azzahra Florentina Esti Nilawati Florentina Esti Nilawati Florentina Esti Nilawati Folasade Olubusola Isinkaye Giovani Ardiansyah Gumelar, Rizky Syah Guruh Fajar Shidik Hadi, Heru Pramono Haryanto, Christanto Antonius Haryanto, Christanto Antonius Hasbi, Hanif Maulana Herman Yuliansyah, Herman Heru Agus Santoso Heru Lestiawan Hidayat, Muhammad Taufiq Hidayati, Ulfa Himawan, Reyshano Adhyarta Hussain Md Mehedul Islam Hyperastuty, Agoes Santika Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ihya Ulumuddin, Dimas Irawan Imam Prayogo Pujiono Inzaghi, Reza Bayu Ahmad Iqtait, Musab Isinkaye, Folasade Olubusola Islam, Hussain Md Mehedul Istiawan, Deden Istiqomah, Annisa Ayu Ivan Stepheng Kamila, Izza Putri Kas Raygaputra Ilaga Krismawan, Andi Danang Kumala, Raffa Adhi Kunio Kondo Kurniawan, The, Obed Danny Kusuma, Edi Jaya L. Budi Handoko Laksana, Deddy Award Widya Lalang Erawan Lalang Erawan Liya Umaroh Liya Umaroh, Liya Lucky Arif Rahman Hakim Lungido, Joshua Mabina, Ibnu Farid Mahadika Pradipta Himawan Mahiruna, Adiyah Maulana Malik Ibrahim Al-Ghiffary Md Kamruzzaman Sarker Md Kamruzzaman Sarker Md Kamruzzaman Sarker Mehta Pradnyatama Meitantya, Mutiara Dolla Mohammad Rizal, Mohammad Mohd Yaacob, Noorayisahbe Muchamad Akbar Nurul Adzan Muhammad Mahdi Mulyono, Ibnu Utomo Wahyu Munis Zulhusni Musfiqur Rahman Sazal Muslih Muslih Muslih Muslih Nabila, Qotrunnada Nanna Suryana Herman Naufal, Muhammad Khanif NGATIMIN, NGATIMIN Ningrum, Amanda Prawita Nisa, Yuha Aulia Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Noorayisahbe Mohd Yacoob Nova Rijati Novi Hendriyanto, Novi Nugroho, Dicky Anggriawan Nugroho, Widhi Bagus Nur Ryan Dwi Cahyo Nuri Nuri Oktaridha, Harwinanda Oktayaessofa, Eqania Oleiwi, Ahmed Kareem Parti Astuti, Yani Parti Astuti, Yani parti astuti, yani Parti Astuti1, Yani Parti Astuti1, Yani Pradana, Luthfiyana Hamidah Sherly Pradana, Rizky Putra Praskatama, Vincentius Pratama, Zudha Pratiwi, Saniya Rahma Proborini, Ellen Pulung Nurtantio Andono Purwanto Purwanto Putra, Ifan Perdana Putri, Ni Kadek Devi Adnyaswari Rabei Raad Ali Rabei Raad Ali Rabei Raad Ali Rabei Raad Ali Raisul Umah Nur Ramadhan Rakhmat Sani Ratih Ariska Reza Arista Pratama Ruri Suko Basuki Safitri, Melina Dwi Saifullah, Zidan Salsabila, Alifia Salwa Sania, Wulida Rizki Santoso, Bagus Raffi Saputra, Danar Bayu Adi Saputro, Fakhri Rasyid Sarker, Md Kamruzzaman Setiarso, Ichwan Setiawan, Fachruddin Ari Setiawan, Tan Valencio Yobert Geraldo Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Sofyan, Ega Adiasa Solichul Huda, Solichul Sudibyo, Usman Sudibyo, Usman Sudibyo, Usman Sumarni Adi, Sumarni Suprayogi Suprayogi Suprayogi Suprayogi Sutrisno, Hendra Syabilla, Mutiara Tan Samuel Permana Tan Samuel Permana Titien Suhartini Sukamto Tri Esti Rahayuningtyas Umah Nur, Raisul Umam, Choerul Umaroh, Liya Umaroh, Liya Utomo, Danang Wahyu Velarati, Khoirizqi Wahyu Dwy Permana Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Winarsih, Nurul Anisa Sri Winaryanti, Hida Sekar Yaacob, Noorayisahbe Bt Mohd Yaacob, Noorayisahbe Mohd Yani Parti Astuti Zulhusni, Munis