p-Index From 2020 - 2025
13.633
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Ilmu Komputer dan Informasi Jurnal Masyarakat Informatika Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik JUTI: Jurnal Ilmiah Teknologi Informasi Prosiding SNATIF Journal of ICT Research and Applications Teknika: Jurnal Sains dan Teknologi Jurnal Informatika dan Teknik Elektro Terapan Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics Jurnal Teknologi dan Sistem Komputer Sinkron : Jurnal dan Penelitian Teknik Informatika SISFOTENIKA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control InComTech: Jurnal Telekomunikasi dan Komputer Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer English Language and Literature International Conference (ELLiC) Proceedings Infotekmesin Jurnal Mnemonic Abdimasku : Jurnal Pengabdian Masyarakat SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Teknik Informatika (JUTIF) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Soft Computing Exploration Advance Sustainable Science, Engineering and Technology (ASSET) Prosiding Seminar Nasional Hasil-hasil Penelitian dan Pengabdian Pada Masyarakat Prosiding Seminar Nasional Teknologi Informasi dan Bisnis Seminar Nasional Teknologi dan Multidisiplin Ilmu Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics LogicLink: Journal of Artificial Intelligence and Multimedia in Informatics Seminar Nasional Riset dan Teknologi (SEMNAS RISTEK) Advance Sustainable Science, Engineering and Technology (ASSET) INOVTEK Polbeng - Seri Informatika
Claim Missing Document
Check
Articles

Found 10 Documents
Search
Journal : Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control

An Enhancement of Data Hiding Imperceptibility using Slantlet Transform (SLT) Sinaga, Daurat; Rachmawanto, Eko Hari; Sari, Christy Atika; Setiadi, De Rosal Ignatius Moses; Setiyanto, Noor Ageng
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (877.058 KB) | DOI: 10.22219/kinetik.v4i1.702

Abstract

This study proposes a hybrid technique in securing image data that will be applied in telemedicine in future. Based on the web-based ENT diagnosis system using Virtual Hospital Server (VHS), patients are able to submit their physiological signals and multimedia data through the internet. In telemedicine system, image data need more secure to protect data patients in web. Cryptography and steganography are techniques that can be used to secure image data implementation. In this study, steganography method has been applied using hybrid between Discrete Cosine Transform (DCT) and Slantlet Transform (SLT) technique. DCT is calculated on blocks of independent pixels, a coding error causes discontinuity between blocks resulting in annoying blocking artifact. While SLT applies on entire image and offers better energy compaction compare to DCT without any blocking artifact. Furthermore, SLT splits component into numerous frequency bands called sub bands or octave bands. It is known that SLT is a better than DWT based scheme and better time localization. Weakness of DCT is eliminated by SLT that employ an improved version of the usual Discrete Wavelet Transform (DWT). Some comparison of technique is included in this study to show the capability of the hybrid SLT and DCT. Experimental results show that optimum imperceptibility is achieved.
Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit) Sari, Christy Atika; Mulyono, Ibnu Utomo Wahyu; Susanto, Ajib; Anggraeny, Tiara
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.723 KB) | DOI: 10.22219/kinetik.v4i1.701

Abstract

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.
Encryption of Text Message on Audio Steganography Using Combination Vigenere Cipher and LSB (Least Significant Bit) Ibnu Utomo Wahyu Mulyono; Ajib Susanto; Tiara Anggraeny; Christy Atika Sari
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (475.723 KB) | DOI: 10.22219/kinetik.v4i1.701

Abstract

 The growing information technology is very rapidly, the more evolving crime techniques to find information that is confidential. The Internet is one of the main media in disseminating information. The use of security on the internet still needs to be developed. Based on these problems, the type of research undertaken in the writing of this final task is the type of experimental research by developing methods that have been done by previous researchers to hide secret data that is inserted into the audio * .wav so that the security and confidentiality of data can be guaranteed. data security can be done with various methods, including cryptography and steganography. Cryptography is a technique for encrypting messages and steganography is a message concealment technique. This insertion type uses binary ASCII character code. In the cryptographic process, using the Vigenere Cipher algorithm and in the steganography, process using the algorithm (LSB) Least Significant Bits. The merger of the two techniques resulted in a better new digital image security system and increased the value of MSE, PSNR and Execution time. Then the test results in the evaluation using BER and histogram analysis. Good audio quality has a minimum value of 30 dB PSNR. In the embedding process using combinations of vigenere and LSB methods, Audio 15 is the best audio compared to other audio. Audio 15 has a smaller MSE (0.001656) value and a larger PSNR (124.138499) value than any other audio when embeded messages *.txt file with character 4096.
An Enhancement of Data Hiding Imperceptibility using Slantlet Transform (SLT) Daurat Sinaga; Eko Hari Rachmawanto; Christy Atika Sari; De Rosal Ignatius Moses Setiadi; Noor Ageng Setiyanto
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 1, February 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (877.058 KB) | DOI: 10.22219/kinetik.v4i1.702

Abstract

This study proposes a hybrid technique in securing image data that will be applied in telemedicine in future. Based on the web-based ENT diagnosis system using Virtual Hospital Server (VHS), patients are able to submit their physiological signals and multimedia data through the internet. In telemedicine system, image data need more secure to protect data patients in web. Cryptography and steganography are techniques that can be used to secure image data implementation. In this study, steganography method has been applied using hybrid between Discrete Cosine Transform (DCT) and Slantlet Transform (SLT) technique. DCT is calculated on blocks of independent pixels, a coding error causes discontinuity between blocks resulting in annoying blocking artifact. While SLT applies on entire image and offers better energy compaction compare to DCT without any blocking artifact. Furthermore, SLT splits component into numerous frequency bands called sub bands or octave bands. It is known that SLT is a better than DWT based scheme and better time localization. Weakness of DCT is eliminated by SLT that employ an improved version of the usual Discrete Wavelet Transform (DWT). Some comparison of technique is included in this study to show the capability of the hybrid SLT and DCT. Experimental results show that optimum imperceptibility is achieved.
A High Result in Wavelet Watermarking Using Singular Value Decomposition Wellia Shinta Sari; Christy Atika Sari
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol 4, No 3, August 2019
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (531.558 KB) | DOI: 10.22219/kinetik.v4i3.729

Abstract

Internet that has developed into a good distribution tool for digital data, causing a large increase in digital data sharing, especially in the form of digital images, and causing problems that need attention. One of them is about copyright protection. Watermarking is one technique that aims to protect digital image copyright. In this study, watermarking was carried out using the Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) algorithms in digital images with different file extensions. Transformation of 2 levels of DWT and SVD on the host image and SVD transformation on the watermarked image that inserted in the LL2 sub-band of the host image. Watermarking with the proposed method produces good image quality with PSNR values exceeding 40 dB, SSIM reaching 0.99 and NCC reaching 1. This shows a robust and imperceptible watermarking image.
Javanese Character Recognition Based on K-Nearest Neighbor and Linear Binary Pattern Features Susanto, Ajib; Mulyono, Ibnu Utomo Wahyu; Sari, Christy Atika; Rachmawanto, Eko Hari; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 7, No. 3, August 2022
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v7i3.1491

Abstract

Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that affects the character detection process. Punctuation marks, clothing, Swara script, vowels, and consonants are parts of the script that are often found in Javanetest scripts. Preserving Javanese script in the digital era, of course, must use technology that can support the digitization of Javanese script through the script detection process. The concept of script image is the image of Javanese script in ancient manuscripts. The process of character detection using certain techniques can be carried out to extract characters so that they can be read. Detection of Javanese characters can be found by finding a testing image. Here, we had been used 10 words images consisting of 3 to 5 syllables with the vowel aiu. Dataset process by Linear Binary Pattern (LBP) feature extraction, which is used to characterize images and describe image textures locally. LBP has been used in r=4 and preprocessing is also done by thresholding with d=0.3. This process can be done using the K-Nearest Neighbor algorithm. In 10 datasets of Javanese script words, an average accuracy value of 90.5% was obtained. The accuracy value of 100% is the highest and 50% is the lowest.
Visual Analysis Based on CMY and RGB Image Cryptography Using Vigenere and Beaufort Cipher Atika Sari, Christy; Utomo, Danang Wahyu; Doheir, Mohamed A S
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 2, May 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i2.1664

Abstract

The achievement of visual aspects and image security often cannot meet visibility standards, for example the acquisition of PSNR and UACI NPCR values. To increase security, this research has implemented a combination of the Vigenere cipher and Beaufort and the use of Fibonacci as a randomizer. The combination of the Vigenere Cipher and Beaufort Cipher substitution algorithms with the Fibonacci technique can be applied to encrypt color images in RGB and CMY, with a size of 256x256 pixels and in .bmp format. The Fibonacci cut-off value used in this study is 10000. The highest entropy value of the cipher image peppers.bmp is 7,991. The lowest PSNR cipher image value is accordion.bmp where for RGB it is 5,439 dB and for CMY it is 5,403 dB. accordion.bmp's highest UACI value is 44.018% for RGB and 44.312% for CMY. The NPCR value in the airplane.bmp image has the highest value in RGB of 99.792% and for CMY the highest value is in splash.bmp with a value of 99.798%. Evaluation of the decryption results shows that the decryption process can run perfectly as indicated by the values of MSE=0, PSNR=inf, UACI and NPCR=0%. Therefore, encrypt and decrypt was proven that the results obtained in the visual aspect are very good.
Testing Data Security Using a Vigenere Cipher Based on the QR Code Rachmawanto, Eko Hari; Gumelar, Rizky Syah; Nabila, Qotrunnada; Sari, Christy Atika; Ali, Rabei Raad
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1734

Abstract

Data, especially personal data, is sensitive and if misused, it can become a source of threats and crimes for ourselves or for others. Therefore, data security is very important. Cryptography is a way to secure data that aims to safeguard the information that contained in data, so the information contained is not known by unauthorized parties. Vigenere Cipher is a cryptographic method used to hide data with steganography. In the process, the Vigenere cipher converts information called plain text into ciphertext or text that has been steganographed. In this research, process of encryption was carried out on the text based on the given key. The results of the text encryption were stored in the form of a QR-Code which can later be decrypted from the QR-Code using the key, so that the text contained in the QR-Code can be identified.
Discrete Cosine Transform and Singular Value Decomposition Based on Canny Edge Detection for Image Watermarking Astuti, Erna Zuni; Sari, Christy Atika; Rachmawanto, Eko Hari; Astuti, Yani Parti; Oktaridha, Harwinanda; Isinkaye, Folasade Olubusola
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 8, No. 4, November 2023
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v8i4`.1768

Abstract

The development of an increasingly sophisticated internet allows for the distribution of digital images that can be done easily. However, with the development of increasingly sophisticated internet networks, it becomes an opportunity for some irresponsible people to misuse digital images, such as taking copyrights, modification and duplicating digital images. Watermarking is an information embedding technique to show ownership descriptions that can be conveyed into text, video, audio, and digital images. There are 2 groups of watermarking based on their working domain, namely the spatial domain and the transformation domain. In this study, three domain transformation techniques were used, namely Singular Value Descomposition (SVD), Discrete Cosine Transform (DCT) and Canny Edge Detection Techniques. The proposed attacks are rotation, gaussian blurness, salt and pepper, histogram equalization, and cropping. The results of the experiment after inserting the watermark image were measured by the Peak Signal to Noise Ratio (PSNR). The results of the image robustness test were measured by the Correlation Coefficient (Corr) and Normalized Correlation (NC). The analysis and experimental results show that the results of image extraction are good with PSNR values from watermarked images above 50dB and Corr values reaching 0.95. The NC value obtained is also high, reaching 0.98. Some of the extracted images are of fairly good quality and are similar with the original image.
Optimized Visualization of Digital Image Steganography using Least Significant Bits and AES for Secret Key Encryption Jatmoko, Cahaya; Sinaga, Daurat; Lestiawan, Heru; Astuti, Erna Zuni; Sari, Christy Atika; Shidik, Guruh Fajar; Andono, Pulung Nurtantio; Yaacob, Noorayisahbe Mohd
Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Vol. 10, No. 3, August 2025
Publisher : Universitas Muhammadiyah Malang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.22219/kinetik.v10i3.2252

Abstract

Data hiding is a technique used to embed secret information into a cover medium, such as an image, audio, or video, with minimal distortion, ensuring that the hidden data remains imperceptible to an observer. The key challenge lies in embedding secret information securely while maintaining the original quality of the host medium. In image-based data hiding, this often means ensuring the hidden data cannot be easily detected or extracted while still preserving the visual integrity of the host image. To overcome this, we propose a combination of AES (Advanced Encryption Standard) encryption and Least Significant Bit (LSB) steganography. AES encryption is used to protect the secret images, while the LSB technique is applied to embed the encrypted images into the host images, ensuring secure data transfer. The dataset includes grayscale 256x256 images, specifically "aerial.jpg," "airplane.jpg," and "boat.jpg" as host images, and "Secret1," "Secret2," and "Secret3" as the encrypted secret images. Evaluation metrics such as Mean Squared Error (MSE), Peak Signal-to-Noise Ratio (PSNR), Unified Average Changing Intensity (UACI), and Number of Pixels Changed Rate (NPCR) were used to assess both the image quality and security of the stego images. The results showed low MSE (0.0012 to 0.0013), high PSNR (58 dB), and consistent UACI and NPCR values, confirming both the preservation of image quality and the effectiveness of encryption for securing the secret data.
Co-Authors AA Sudharmawan, AA Abdussalam Abdussalam Abdussalam Abdussalam, Abdussalam Abiyyi, Ryandhika Bintang Agustina, Feri Ahmad Salafuddin Ajib Susanto Akbar, Ilham Januar Alfany, Fauzan Maulana Ali, Rabei Raad Alifia Salwa Salsabila Alvian Ideastari, Nukat Alvin Faiz Kurniawan Anak Agung Gede Sugianthara Andi Danang Krismawan Anggraeny, Tiara Annisa Sulistyaningsih Anny Yuniarti Antonius Erick Handoyo Ardy, Rizky Damara Arfian, Aldi Azmi Aryanta, Muhammad Syifa Aryaputra, Firman Naufal Astuti, Yani Parti Auni, Amelia Gizzela Sheehan Bambang Sugiarto Briliantino Abhista Prabandanu Cahaya Jatmoko Candra Irawan Candra Irawan Chaerul Umam Chaerul Umam Cinantya Paramita D.R.I.M. Setiadi Danang Krismawan, Andi Danang Wahyu Utomo Danar Bayu Adi Saputra Danu Hartanto Daurat Sinaga Daurat Sinaga De Rosal Ignatius Moses Setiadi Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Didik Hermanto Dimas Irawan Ihya‘ Ulumuddin Doheir, Mohamed Doheir, Mohamed Doheir, Mohamed A S Dwi Puji Prabowo Edi Faisal Egia Rosi Subhiyakto Egia Rosi Subhiyakto Eko Hari Rachmanto Eko Hari Rachmawanto Eko Septyasari Elkaf Rahmawan Pramudya Eqania Oktayaessofa Ericsson Dhimas Niagara Erika Devi Udayanti Erlin Dolphina Erna Daniati Erna Zuni Astuti Erna Zuni Astuti Erna Zuni Astuti Ery Mintorini Etika Kartikadarma Farrel Athaillah Putra Fidela Azzahra Florentina Esti Nilawati Florentina Esti Nilawati Florentina Esti Nilawati Folasade Olubusola Isinkaye Folasade Olubusola Isinkaye Folasade Olubusola Isinkaye Giovani Ardiansyah Gumelar, Rizky Syah Guruh Fajar Shidik Gusta, Muhammad Bima Hadi, Heru Pramono Haqikal, Hafidz Hartono, Matthew Raymond Haryanto, Christanto Antonius Haryanto, Christanto Antonius Hasbi, Hanif Maulana Hayu Wikan Kinasih Hendra Sutrisno Heru Lestiawan Heru Lestiawan Himawan, Reyshano Adhyarta Hussain Md Mehedul Islam Hyperastuty, Agoes Santika Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ifan Rizqa Ikhsanuddin, Rohmatulloh Muhamad Imam Prayogo Pujiono Inzaghi, Reza Bayu Ahmad Isinkaye, Folasade Olubusola Islam, Hussain Md Mehedul Istiqomah, Annisa Ayu Ivan Stepheng Kas Raygaputra Ilaga Krismawan, Andi Danang Kumala, Raffa Adhi Kusuma, Edi Jaya Kusuma, Mohammad Roni L. Budi Handoko Laksana, Deddy Award Widya Lalang Erawan Latifa, Anidya Nur Liya Umaroh Liya Umaroh, Liya Lucky Arif Rahman Hakim Mabina, Ibnu Farid Maulana Malik Ibrahim Al-Ghiffary Md Kamruzzaman Sarker Md Kamruzzaman Sarker Mohamed Doheir Mohamed Doheir Mohamed Doheir Mohamed Doheir Mohammad Rizal, Mohammad Mohd Yaacob, Noorayisahbe Muchamad Akbar Nurul Adzan Muhammad Rikzam Kamal Mulyono, Ibnu Utomo Wahyu Mulyono, Ibnu Utomo Wahyu Munis Zulhusni Musfiqur Rahman Sazal Muslih Muslih Mutiara Dolla Meitantya Mutiara Syabilla Nabila, Qotrunnada Neni Kurniawati Ningrum, Amanda Prawita Nisa, Yuha Aulia Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yacoob Nova Rijati Nur Ryan Dwi Cahyo Oktaridha, Harwinanda Ozagastra Caluella Prambudi Parti Astuti, Yani Parti Astuti, Yani parti astuti, yani Parti Astuti1, Yani Parti Astuti1, Yani Permana langgeng wicaksono ellwid putra Pradana, Luthfiyana Hamidah Sherly Pradana, Rizky Putra Pradnyatama, Mehta Praskatama, Vincentius Pratama, Zudha Pratiwi, Saniya Rahma Prayogi, Arditya Pulung Nurtantio Andono Purwanto Purwanto Puspa, Silfi Andriana Putri Mega Arum Wijayanti Rabei Raad Ali Rabei Raad Ali Rabei Raad Ali Rahmalan, Hidayah Raisul Umah Nur Ramadhan Rakhmat Sani Ratih Ariska Robert Setyawan Sabilillah, Ferris Tita Saifullah, Zidan Salma Shafira Fatya Ardyani Sania, Wulida Rizki Santoso, Bagus Raffi Sari, Wellia Shinta Sari Shinta Sarker, Md Kamruzzaman Setiarso, Ichwan Setiawan, Fachruddin Ari Shelomita, Viki Ari Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Solichul Huda, Solichul Sudibyo, Usman Sudibyo, Usman Sudibyo, Usman Sugianto, Castaka Agus Sumarni Adi, Sumarni Suprayogi Suprayogi Suprayogi Suprayogi Syafira, Zahra Ghina Tan Samuel Permana Tan Samuel Permana Tiara Anggraeny Titien Suhartini Sukamto Umaroh, Liya Umaroh, Liya Utomo, Danang Wahyu Velarati, Khoirizqi Vincentius Praskatama Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Widhi Bagus Nugroho Wintaka, Aristides Bima Yaacob, Noorayisahbe Mohd Yani Parti Astuti Yupie Kusumawati Yupie Kusumawati Zaenal Arifin