Articles
ANALISA ROBUSTNESS CITRA DIGITAL PADA WATERMARKING DCT-DWT
Christy Atika Sari;
Titien Suhartini Sukamto;
Eko Hari Rachmawanto
Prosiding SNST Fakultas Teknik Vol 1, No 1 (2018): PROSIDING SEMINAR NASIONAL SAINS DAN TEKNOLOGI 9 2018
Publisher : Prosiding SNST Fakultas Teknik
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (221.958 KB)
DCT dan DWT adalah domain frekuensi pada pengolahan citra digital yang sudah sering digunakan. Beberapa penerapan DCT-DWT dilakukan dengan tujuan perolehan aspek invisibility, robustness maupun pencapaian payload data. Pada penelitian sebelumnya, pengembangan DDCT-DWT telah dilakukan dengan menukar posisi aloritma namun belum menghasilkan output maksimal. Pada makalah ini, kami telah melakukan analisa robustness pada watermarking dengan mengimplementasikan filter haar pada DWT dengan oerasi pertama DCT terlebih dahulu. Level 2 pada DWT dipilih karena lebih invisible, sedangkan DCT menggunakan koefisien DC. Hasil program menyatakan nilai PSNR yang tidak terlalu tinggi namun tahan terhadap serangan. Hal ini dibuktikan dengan perhitungan NC yang lebih baik dari penelitian sebelumya yang telah kami lakukan. Dalam penelitian ini, nilai NC yang diperoleh yaitu 1 pada citra tanpa serangan pengolahan citra, sedangkan CC tertinggi yang diperoleh yaitu 0.9449 pada serangan JPEG Compression. Sedangkan pada serangan salt and pepper dan gausiian noise nilai yang didapat berturut-turut yaitu 0.9217 dan 0.9342. Terdapat beberapa nilai CC dan NC yang sedikit berbeda dengan penelitian pembanding telah diulas pada makalah ini. Kata kunci : DCT, DWT, watermarking, gambar
PENGACAKAN CITRA DIGITAL BERWARNA DENGAN KRIPTOGRAFI ARNOLD CAT MAP (ACM)
Noor Ageng Setiyanto;
Eko Hari Rachmawanto;
De Rosal Ignatius Moses Setiadi
Prosiding SNST Fakultas Teknik Vol 1, No 1 (2018): PROSIDING SEMINAR NASIONAL SAINS DAN TEKNOLOGI 9 2018
Publisher : Prosiding SNST Fakultas Teknik
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (509.187 KB)
Implementasi kriptografi dalam konteks watermarking masih jarang digunakan. Untuk menghasilkan keamanan citra yang lebih tinggi, terdapat fungsi chaos dalam kriptografi yang dapat diterapkan pada pengacakan piksel citra digital. Fungsi chaos merupakan salah satu fungsi pengacak bilangan. Dalam makalah ini kami mengevaluasi implementasi Arnold Cat Map (ACM) pada konsep non blind watermarking pada citra digital berwarna. Penggunaan ACM akan berakibat pada distorsi perubahan piksel citra, namun kami akan memodifikasi fungsi ACM sehingga tetap dapat memenuhi aspek imperceptibility melalui histogram citra yang membutktikan tidak terjadinya perubahan piksel secara signifikan. Evaluasi dilakukan dengan melakukan analisa pada hasil enkripsi dengan iterasi berbeda yaitu 10, 50 dan 100 iterasi. Ukuran citra yang digunakan beragam, hal ini di lakukan dengan tujuan pembuatan simpulan terhadap proses enkripsi. Dari percobaan, ACM mengacak citra pada masing-masing ietrasi dengan baik. Proses ini menggunakan fungsi modulo dan telah diimplementasikan dengan Matlab. Kata kunci : Arnold Cat Map (ACM), kriptografi, citra warna
Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting
Christy Atika Sari;
Eko Hari Rachmawanto;
Danang Wahyu Utomo;
Ramadhan Rakhmat Sani
Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016
Publisher : Universitas Dian Nuswantoro and IndoCEISS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33633/jais.v1i3.1252
Kriptografi sebagai salah satu cabang ilmu yang dapat digunakan untuk mengamankan data hingga saat ini terus dikembangkan melalui berbagai algoritma. Beberapa penelitian terkait mengenai kriptografi masih mengguankan media berupa teks saja, image saja, maupun file tertentu saja. Pada penelitian ini akan digunakan media berupa seluruh jenis file sebagai media inputan. Adapun algoritma yang dignuakan yaitu Vernam cipher dan Bit shiffting. Kedua algoritma ini dikenal cepat, mudah dan aman untuk digunakan. Percobaan yang dilakukan menggunakan 30 file berbeda ukuran maupun jenis file serta telah diuji melalui aplikasi yang dibangun dengan Visual Basic telah menghasilkan proses enkripsi dan dekripsi data yang berjalan dengan baik. File hasil enkripsi dapat dibuka dengan kunci yang telah ditetapkan dan tidak mengalami kerusakan, dan sebaliknya untuk proses dekripsi data juga demikian. Hasil percobaan menggunakan sampling file berukuran 1 kb hingga 24000 kb, dimana waktu terlama untuk mengenkripsi file yaitu 28,661 detik dan untuk proses dekripsi terlama membutuhkan waktu 27,222 detik. Kata kunci—Vernam cipher, Bit shiffting, Kriptografi, File
An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image
Christy Atika Sari;
Lalang Erawan;
Eko Hari Rachmawanto;
De Rosal Ignatius Moses Setiadi;
Tan Samuel Permana
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33633/jais.v2i2.1616
Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity, Â with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.
Secure Image Steganography Algorithm Based on DCT with OTP Encryption
De Rosal Ignatius Moses Setiadi;
Eko Hari Rachmawanto;
Christy Atika Sari
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33633/jais.v2i1.1330
Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography
A High Result for Image Security Using Crypto-Stegano Based on ECB Mode and LSB Encryption
Kas Raygaputra Ilaga;
Christy Atika Sari;
Eko Hari Rachmawanto
Journal of Applied Intelligent System Vol 3, No 1 (2018): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.33633/jais.v3i1.1694
The development of the digital world in the field of information technology is so rapid that making the exchange of information easy and fast. Such information may be general or specific. In general information there is no problem for the public, but specific information can not be free in the public. The main problem of the specific information is security, how the information is safe. To overcome these problems can be solved using cryptography and steganography. Cryptography is a technique for securing secret information from uninvolved parties, which the outcome is much different from the original information. Steganography is a technique to secure or hide the secret information on a digital object such as sound, image, vidio that applied results as seen the original information. In this paper proposed a combination of ECB Mode cryptographic method and LSB steganographic method on a digital image. The measurement method are PSNR and MSE to determine the quality of the stego image. Our results are excellent for digital image encryption of RGB and Grayscale type since the resulting image looks like the original image, with the best stego-image proof with MSE is 0.00013, PSNR is 87.00141, SSIM is 1 shown as excellent result.
Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital
Daurat Sinaga;
Chaerul Umam;
De Rosal Ignatius Moses Setiadi;
Eko Hari Rachmawanto
Dinamika Rekayasa Vol 14, No 1 (2018): Jurnal Ilmiah Dinamika Rekayasa - Februari 2018
Publisher : Jenderal Soedirman University
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.20884/1.dr.2018.14.1.198
Meretas data atau sering disebut hacking saat ini marak terjadi dalam internet, sehingga menyebabkan proses pengiriman data menjadi tidak aman. Oleh karena itu, kita memerlukan suatu sistem keamanan untuk mengamankan data kita ketika akan berkirim pesan antar satu dengan lainnya. Kriptografi merupakan salah satu sistem keamanan dengan konsep membuat data tersebut menjadi sandi - sandi yang tidak setiap orang dapat membacanya. Di dalam kriptografi terdapat berbagai macam algoritma untuk menyandikan sebuah data tersebut agak tidak mudah terbaca oleh orang lain yang tidak berhak, yaitu antara lain vigenere cipher dan transposisi kolom. Dengan mengkombinasikan algoritma ini didapatkan teknik super enkripsi yang kuat yang dapat mengamankan data yang akan dikirimkan oleh pengirim kepada penerima tanpa diketahui oleh orang lain.
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition
Christy Atika Sari;
Eko Hari Rachmawanto;
De Rosal Ignatius Moses Setiadi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (509.442 KB)
|
DOI: 10.11591/eecsi.v4.1018
Main problem frequently encountered in all schemes transform domain watermarking technique is the robustness and imperceptibility. Due to achieved optimal result most algorithms of image watermarking using combination two or more transformation domain. This paper proposed Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) to embed binary watermark to color Image. Before the message embedded in the color images, we converting RGB to YCbCr color space. Luminance component will be split into sub- block and it has been transformed by DCT to produce DC and AC coefficients. DC coefficients selected as embedding place because it is perceptually usefulness and robust against various attacks. DC coefficients will be collected from every sub-block to create a reference image. Then apply SVD on reference image and embed message in singular values. Various attacks have been implemented and tested due to achieve robustness using Normalized Cross Correlation (NCC) and imperceptibility tested using Peak Signal to Noise Ratio (PSNR). High values of the measurement results show the feasibility of the proposed method. A highest PSNR value resulted 42.3009 dB, whereas a highest NCC values 0.9993 after JPEG Compression.
A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography
Edi Jaya Kusuma;
Christy Atika Sari;
Eko Hari Rachmawanto;
De Rosal Ignatius Moses Setiadi
Journal of ICT Research and Applications Vol. 12 No. 2 (2018)
Publisher : LPPM ITB
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.5614/itbj.ict.res.appl.2018.12.2.1
Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.
Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA
Antonius Erick Handoyo;
De Rosal Ignatius Moses Setiadi;
Eko Hari Rachmawanto;
Christy Atika Sari;
Ajib Susanto
Jurnal Teknologi dan Sistem Komputer Volume 6, Issue 1, Year 2018 (January 2018)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1545.64 KB)
|
DOI: 10.14710/jtsiskom.6.1.2018.37-43
This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks.