Claim Missing Document
Check
Articles

Found 5 Documents
Search
Journal : UNEJ e-Proceeding

OTENTIKASI IMAGE BERBASIS MAGIC SQUARE ORDE n Kiswara Agung Santoso
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Image is a digital media that is easy to change, so it is susceptible to being used for crime. Image changes may be affected by the unstable internet during transmission or deliberate manipulation of images for specific purposes. Hence, we need a tool to determine the authenticity of the image. One strategy that can be used is to insert code into the entire image, so that any changes to the image information can be detected. The insertion process performed by dividing the image into several blocks, where the size of each block is adjusted according to the size of the magic square order 3. For the authentication process, the image that has been manipulated will be counted for each pixel. The results show that the manipulated image can be detected. The parts of the image that have changed can be identified because the pixel value doesn’t satisfy the magic square rule. Keywords: Authentication, Image, Magic Square, Pixel
PENGKODEAN TEKS MENGGUNAKAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK DAN MERKLE-HELLMAN KNAPSACK Innafajri Insyirah; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Data security needs to be maintained so that the messages sent to someone are not known by an unauthorized users. One of the data security techniques that can be applied is cryptography. Cryptography is a science and art to keep messages secure when messages are sent from one place to another. In this study, modification of Electronic Code Book and Merkle-Hellman Knapsack algorithms will be applied to secure messages. This research uses Matlab to create a program. The weaknesses of ECB and Merkle-Hellman Knapsack algorithms will be overcome by modifying key and XOR operations. The result of ciphertext is a random numbers which are difficult to understand by unauthorized users. In addition, the message pattern on the same plaintext no longer produces the same ciphertext. Ciphertext can be decrypted well even though the size is two times or longer than plaintext. This is proved by plaintext from the results of decryption is same as the original plaintext. Keywords: Cryptography, Electronic Code Book, Merkle-Hellman Knapsack.
DESAIN JARINGAN INTERNET INDIHOME DI PERUMAHAN MANGGAR PERMAI AMBULU MENGGUNAKAN ALGORITMA K-MEANS DAN KRUSKAL Reggy Valentinnes Septa Jeniusa; Kiswara Agung Santoso; Kusbudiono Kusbudiono
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Based on the survey results of the Association of Indonesian Internet Service Providers, internet users are increasing reaching 196.7 million people. This community need is the driving force for PT. Telkom to overcome the need for internet access, namely the presence of Indihome. The Indihome internet network is distributed to several houses through ODP. The grouping of houses on ODP is based on the closest distance using the k-means algorithm. Meanwhile, minimizing the use of Indihome internet cables using the Kruskal algorithm. The data used in this study are house coordinates data obtained from the Google Earth application. The data is processed using the k-means algorithm, then continued using the Kruskal algorithm. The results of the research are clustering in houses with ODP formed 16 clusters which are processed using the k-means algorithm and stop at the 5th iteration. The ODP used has capacities of 8 and 12. ODP 1, 2, 4, 5, 8, 9, 11, 12, 13, 14, 15, 16 have capacities of 8. While ODP 3, 6, 7, 10 has a capacity of 12. Fiber optic cable between ODP is processed using the Kruskal algorithm and produces a minimum weight of 0.006601782 or ± 735 meters. Keywords: Indihome, K-Means Algorithm, Kruskal Algorithm
PENENTUAN LOKASI ATM BANK SYARIAH INDONESIA DI WILAYAH JEMBER KOTA MENGGUNAKAN K-MEANS CLUSTERING Nila Al Indiani; Kiswara Agung Santoso; Dian Anggraeni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

All transactions are inseparable from the role of the ATM as a supporter the business entity financial improvement. Therefore, the existence of an ATM has now become a general need of modern society. Currently, the population of Jember Regency is 2,568.88 people, and 10 ATM have been established, which means the population ratio and the number of ATM are not balanced, so it is necessary to make a data grouping in order to obtain the location of the ATM establishment that can reach the surrounding villages. This research examined the K-Means Clustering method in the case of determining the location of an ATM based on the distance from the center of the crowd. Calculation of distance using Google Maps K-Means Clustering algorithm was used to group 40 data points for the center of each village into 6 clusters. This research assumed that the centroid is the location of the ATM establishment and the cluster members were the village that can be reached by the centroid. The results of C1-C6 grouping were Tanjung Market, Pakusari Market, MTSN 2 Jember, KUA Arjasa, SMPN 3 Arjasa, and SMAN 4 Jember, sequentially. Keywords: ATM Location, Euclid Distance, K-Means Clustering
PENGAMANAN TEKS MENGGUNAKAN ALGORITMA TRANSPOSISI DAN MODIFIKASI SANDI MORSE Rizki Gangsar Septiono; Kiswara Agung Santoso; Ahmad Kamsyakawuni
UNEJ e-Proceeding 2022: E-Prosiding Seminar Nasional Matematika, Geometri, Statistika, dan Komputasi (SeNa-MaGeStiK)
Publisher : UPT Penerbitan Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Humans as social beings communicate to exchange information. Information has many forms including text data, sound, images, and so on. Not all information is freely accessible. Information security is needed to prevent information from being misused by irresponsible parties. Cryptography studies how to convert information into a form that is unknown except for the sender and recipient of the information. Cryptography is divided into two, classical cryptography and modern cryptography. One form of cryptography that can be found around us is the use of Morse code in scouting. Classical cryptography and modern cryptography can be combined to increase the security of the algorithms used in hiding information. In this article, the transposition algorithm is applied in binary digits. Keys in the form of ASCII characters are converted into binary using modified Morse code and operated with plaintext. The results showed that the combination of transposition algorithm and Morse code modification adds complexity so that the proposed algorithm is difficult for cryptanalysts to solve. Keywords: Cryptography, Morse Code, Transposition Algorithm.