Claim Missing Document
Check
Articles

Found 2 Documents
Search

PENENTUAN PRIORITAS PADA JARINGAN BACK-BONE PALAPA RING MENGGUNAKAN DERAJAT NODE DAN CUT VERTEX Stephanie Imelda Pella; Hendro FJ Lami
Jurnal Media Elektro Vol 8 N0.1 (2019): April 2019
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (385.916 KB) | DOI: 10.35508/jme.v8i1.1288

Abstract

Palapa Ring is a project aiming to connect provinces and cities in Indonesia via a high data speed telecommunication path. The purpose of this research is to identify the priority scale of each node in Palapa Ring Backbone network by considering the degree of each node and the cut vertices of the network. The result shows that the existing infrastructure in Palapa Ring comprised 48 nodes and 117 links. The nodes with the highest degree in the network were PBR, PTK, BJM, JK, SB and UP, with each of the nodes was connected to four links. Cut vertices in the network consisted of 22 nodes. The nodes in the network are classified into 4 categories. Five nodes (PBR, PTK, BJM, SB and UP) fell into the 1st priority group, two nodes (JK,MDN) fell into the 2nd priority group, 16 nodes fell into the 3rd priority group and the rest fell into the non priority group.
IMPLEMENTASI TEKNIK KRIPTOGRAFI VISUAL PADA CITRA KEABUAN DAN BERWARNA UNTUK OTENTIKASI PENGGUNA PADA TRANSAKSI ONLINE Stephanie Imelda Pella; Hendro FJ Lami
Jurnal Media Elektro Vol 10 No 2 (2021): Oktober 2021
Publisher : Universitas Nusa Cendana

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.35508/jme.v10i2.5103

Abstract

Visual cryptography (VC) technique encodes an image into two or more shares that appear random in human eyes. In the decryption section, the pixels in the shared images are combined to obtain the information contained in the original image. This study applies visual cryptographic techniques to graysle and color images for user authentication in online transactions using the VC2,2 scheme. The server computer encodes the CAPTCHA image into two shared images that are sent to the user through different channels or applications. To authenticate himself, the user performs an XOR operation on both share images, identifies the information contained in the CAPTCHA and sends it to the server. In encryption test, histogram of the share image has a different pattern from the original image. The description test shows the decrypted image in this study visually has a better quality than the binary image has better quality than binary images.