Articles
A High Performace of Local Binary Pattern on Classify Javanese Character Classification
Susanto, Ajib;
Sinaga, Daurat;
Sari, Christy Atika;
Rachmawanto, Eko Hari;
Setiadi, De Rosal Ignatius Moses
Scientific Journal of Informatics Vol 5, No 1 (2018): May 2018
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v5i1.14017
The classification of Javanese character images is done with the aim of recognizing each character. The selected classification algorithm is K-Nearest Neighbor (KNN) at K = 1, 3, 5, 7, and 9. To improve KNN performance in Javanese character written by the author, and to prove that feature extraction is needed in the process image classification of Javanese character. In this study selected Local Binary Patter (LBP) as a feature extraction because there are research objects with a certain level of slope. The LBP parameters are used between [16 16], [32 32], [64 64], [128 128], and [256 256]. Experiments were performed on 80 training drawings and 40 test images. KNN values after combination with LBP characteristic extraction were 82.5% at K = 3 and LBP parameters [64 64].
Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security
Atika Sari, Christy;
Rachmawanto, Eko Hari;
Haryanto, Christanto Antonius
Scientific Journal of Informatics Vol 5, No 2 (2018): November 2018
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v5i2.14844
Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.
DWT-SVD Combination Method for Copyrights Protection
Kusumaningrum, Desi Purwanti;
Rachmawanto, Eko Hari;
Atika Sari, Christy;
Pradana, Rizky Putra
Scientific Journal of Informatics Vol 7, No 1 (2020): May 2020
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v7i1.21050
Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's name. Based on that problem an attempt was made to provide an invisible watermark so as not to be easy to do the watermark removal process on the artwork, using a 2-level DWT and SVD combination method that can embed watermarks invisibly and increase watermarking resistance to the image from various image manipulation processes such as noise, JPEG compression, and so on. From combination method of DWT-SVD got the highest PSNR value with watermark image size 32x32 and 64x64 which is 59.2656 dB and 54.7414 dB, respectively.
A Comparison of Non Blind Image Watermarking Using Transformation Domain
Kartikadarma, Etika;
Udayanti, Erika Devi;
Sari, Christy Atika;
Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
In digital image processing, there is an algorithm that is most often used because it has advantages in imperceptibility and robustness. The DCT and HWT algorithms are usually used together to get better results. However in this study we wanted to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect. Using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. On the other hand, robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.
A Combination of K-Means and Fuzzy C-Means for Brain Tumor Identification
Sari, Christy Atika;
Sari, Wellia Shinta;
Rahmalan, Hidayah
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v8i1.29357
Keywords are the labels of your manuscript and critical to correct indexing and searching. MRI or Magnetic Resonance Imaging is one of the health technologies used to scan the human body in order to get an image of an orgasm in the body. MRI imagery has a lot of noise that blends with the tumor object, so the tumor is quite difficult to detect automatically. In addition, it will be difficult to distinguish tumors from brain texture. Various methods have been carried out in previous studies. The method often used in the previous method is segmentation, but the process is quite heavy and the results that are less accurate are still the main obstacles. This study combines the K-Means method and Fuzzy C-Means (FCM) to detect tumors on MRI. The purpose of the combination is to get the advantages of each algorithm and minimize weaknesses. The method used is Contrast Adjustment using Fast Local Laplacian, K-Means FCM, Canny edge detection, Median Filter, and Morphological Area Selection. The dataset is taken from www.radiopedia.org. Data taken were 73 MRI of the brain, of which 57 MRIs with brain tumors and 16 MRIs of normal brain Evaluation of research results will be calculated using Confusion Matrix. The accuracy obtained is 91.78%.
A Comparison of Non Blind Image Watermarking Using Transformation Domain
Kartikadarma, Etika;
Udayanti, Erika Devi;
Sari, Christy Atika;
Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v8i1.28334
Purpose: This study aims to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. Methods: The DCT and HWT algorithms used to get better results. Result: The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect. using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. Novelty: Robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.
A Combination of K-Means and Fuzzy C-Means for Brain Tumor Identification
Sari, Christy Atika;
Sari, Wellia Shinta;
Rahmalan, Hidayah
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v8i1.29357
Purpose: Magnetic Resonance Imaging is one of the health technologies used to scan the human body in order to get an image of an orgasm in the body. MRI imagery has a lot of noise that blends with the tumor object, so the tumor is quite difficult to detect automatically. In addition, it will be difficult to distinguish tumors from brain texture. Various methods have been carried out in previous studies. Methods: This study combines the K-Means method and Fuzzy C-Means (FCM) to detect tumors on MRI. The purpose of the combination is to get the advantages of each algorithm and minimize weaknesses. The method used is Contrast Adjustment using Fast Local Laplacian, K-Means FCM, Canny edge detection, Median Filter, and Morphological Area Selection. The dataset is taken from www.radiopedia.org. Data taken were 73 MRI of the brain, of which 57 MRIs with brain tumors and 16 MRIs of normal brain Evaluation of research results will be calculated using Confusion Matrix. Result: The accuracy obtained is 91.78%. Novelty: K-Means method and Fuzzy C-Means (FCM) to detect tumors on MRI.
DWT-SVD Combination Method for Copyrights Protection
Kusumaningrum, Desi Purwanti;
Rachmawanto, Eko Hari;
Atika Sari, Christy;
Pradana, Rizky Putra
Scientific Journal of Informatics Vol 7, No 1 (2020): May 2020
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v7i1.21050
Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's name. Based on that problem an attempt was made to provide an invisible watermark so as not to be easy to do the watermark removal process on the artwork, using a 2-level DWT and SVD combination method that can embed watermarks invisibly and increase watermarking resistance to the image from various image manipulation processes such as noise, JPEG compression, and so on. From combination method of DWT-SVD got the highest PSNR value with watermark image size 32x32 and 64x64 which is 59.2656 dB and 54.7414 dB, respectively.
Histogram of Gradient in K-Nearest Neighbor for Javanese Alphabet Classification
Susanto, Ajib;
Atika Sari, Christy;
Mulyono, Ibnu Utomo Wahyu;
Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 2 (2021): November 2021
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v8i2.30788
Purpose: The Javanese script generally has a basic script or is commonly referred to as the “carakan” script. The script consists of 20 letters with different levels of difficulty. Some letters have similarities, so research is needed to make it easier to detect the image of Javanese characters. Methods: This study proposes recognizing Hiragana's writing characters using the K-Nearest Neighbor (K-NN) method. In the preprocessing stage, the segmentation process is carried out using the thresholding method to perform segmentation, followed by the Histogram of Gradient (HOG) feature extraction process and noise removal using median filtering. Histogram of Gradient (HoG) is one of the features used in computer vision and image processing in detecting an object in the form of a descriptor feature. There are 1000 data divided into 20 classes. Each class represents one letter of the basic Javanese script. Result: Based on data collection using the writings of 50 respondents where each respondent writes 20 basic Javanese characters, the highest accuracy was obtained at K = 1, namely 98.5%. Novelty: Using several preprocessing such as cropping, median filtering, otsu thresholding and HOG feature extraction before do classification, this experiment yields a good accuracy.
Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security
Atika Sari, Christy;
Rachmawanto, Eko Hari;
Haryanto, Christanto Antonius
Scientific Journal of Informatics Vol 5, No 2 (2018): November 2018
Publisher : Universitas Negeri Semarang
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
DOI: 10.15294/sji.v5i2.14844
Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.