p-Index From 2020 - 2025
13.633
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Ilmu Komputer dan Informasi Jurnal Masyarakat Informatika Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik JUTI: Jurnal Ilmiah Teknologi Informasi Prosiding SNATIF Journal of ICT Research and Applications Teknika: Jurnal Sains dan Teknologi Jurnal Informatika dan Teknik Elektro Terapan Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics Jurnal Teknologi dan Sistem Komputer Sinkron : Jurnal dan Penelitian Teknik Informatika SISFOTENIKA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control InComTech: Jurnal Telekomunikasi dan Komputer Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer English Language and Literature International Conference (ELLiC) Proceedings Infotekmesin Jurnal Mnemonic Abdimasku : Jurnal Pengabdian Masyarakat SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Teknik Informatika (JUTIF) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Soft Computing Exploration Advance Sustainable Science, Engineering and Technology (ASSET) Prosiding Seminar Nasional Hasil-hasil Penelitian dan Pengabdian Pada Masyarakat Prosiding Seminar Nasional Teknologi Informasi dan Bisnis Seminar Nasional Teknologi dan Multidisiplin Ilmu Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics LogicLink: Journal of Artificial Intelligence and Multimedia in Informatics Seminar Nasional Riset dan Teknologi (SEMNAS RISTEK) Advance Sustainable Science, Engineering and Technology (ASSET) INOVTEK Polbeng - Seri Informatika
Claim Missing Document
Check
Articles

Found 15 Documents
Search
Journal : Scientific Journal of Informatics

A High Performace of Local Binary Pattern on Classify Javanese Character Classification Susanto, Ajib; Sinaga, Daurat; Sari, Christy Atika; Rachmawanto, Eko Hari; Setiadi, De Rosal Ignatius Moses
Scientific Journal of Informatics Vol 5, No 1 (2018): May 2018
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v5i1.14017

Abstract

The classification of Javanese character images is done with the aim of recognizing each character. The selected classification algorithm is K-Nearest Neighbor (KNN) at K = 1, 3, 5, 7, and 9. To improve KNN performance in Javanese character written by the author, and to prove that feature extraction is needed in the process image classification of Javanese character. In this study selected Local Binary Patter (LBP) as a feature extraction because there are research objects with a certain level of slope. The LBP parameters are used between [16 16], [32 32], [64 64], [128 128], and [256 256]. Experiments were performed on 80 training drawings and 40 test images. KNN values after combination with LBP characteristic extraction were 82.5% at K = 3 and LBP parameters [64 64].
Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security Atika Sari, Christy; Rachmawanto, Eko Hari; Haryanto, Christanto Antonius
Scientific Journal of Informatics Vol 5, No 2 (2018): November 2018
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v5i2.14844

Abstract

Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.
DWT-SVD Combination Method for Copyrights Protection Kusumaningrum, Desi Purwanti; Rachmawanto, Eko Hari; Atika Sari, Christy; Pradana, Rizky Putra
Scientific Journal of Informatics Vol 7, No 1 (2020): May 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i1.21050

Abstract

Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's name. Based on that problem an attempt was made to provide an invisible watermark so as not to be easy to do the watermark removal process on the artwork, using a 2-level DWT and SVD combination method that can embed watermarks invisibly and increase watermarking resistance to the image from various image manipulation processes such as noise, JPEG compression, and so on. From combination method of DWT-SVD got the highest PSNR value with watermark image size 32x32 and 64x64 which is 59.2656 dB and 54.7414 dB, respectively.
A Comparison of Non Blind Image Watermarking Using Transformation Domain Kartikadarma, Etika; Udayanti, Erika Devi; Sari, Christy Atika; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

In digital image processing, there is an algorithm that is most often used because it has advantages in imperceptibility and robustness. The DCT and HWT algorithms are usually used together to get better results. However in this study we wanted to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect. Using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. On the other hand, robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.
A Combination of K-Means and Fuzzy C-Means for Brain Tumor Identification Sari, Christy Atika; Sari, Wellia Shinta; Rahmalan, Hidayah
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29357

Abstract

Keywords are the labels of your manuscript and critical to correct indexing and searching. MRI or Magnetic Resonance Imaging is one of the health technologies used to scan the human body in order to get an image of an orgasm in the body. MRI imagery has a lot of noise that blends with the tumor object, so the tumor is quite difficult to detect automatically. In addition, it will be difficult to distinguish tumors from brain texture. Various methods have been carried out in previous studies. The method often used in the previous method is segmentation, but the process is quite heavy and the results that are less accurate are still the main obstacles. This study combines the K-Means method and Fuzzy C-Means (FCM) to detect tumors on MRI. The purpose of the combination is to get the advantages of each algorithm and minimize weaknesses. The method used is Contrast Adjustment using Fast Local Laplacian, K-Means FCM, Canny edge detection, Median Filter, and Morphological Area Selection. The dataset is taken from www.radiopedia.org. Data taken were 73 MRI of the brain, of which 57 MRIs with brain tumors and 16 MRIs of normal brain Evaluation of research results will be calculated using Confusion Matrix. The accuracy obtained is 91.78%.
A Comparison of Non Blind Image Watermarking Using Transformation Domain Kartikadarma, Etika; Udayanti, Erika Devi; Sari, Christy Atika; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.28334

Abstract

Purpose: This study aims to know which of the algorithms had the better results for image processing by comparing these two algorithms for blind watermarking as the prevention of image plagiarism. Methods: The DCT and HWT algorithms used to get better results. Result: The results of this study indicate that HWT has better results for image processing, especially blind watermarking because the results with MSE, PSNR, and NC show that HWT has advantages in every aspect.  using 512x512 pixels grayscale image as cover image, the MSE result from HWT is 0.0004156 with PSNR 81.9440 better than MSE from DCT 0.003 with PSNR 73.2949. Novelty: Robustness aspect has been tested using NC. DCT has good NC than HWT only in JPEG compression attack with value is 1, while another attack has better NC in HWT that yield close to 1.
A Combination of K-Means and Fuzzy C-Means for Brain Tumor Identification Sari, Christy Atika; Sari, Wellia Shinta; Rahmalan, Hidayah
Scientific Journal of Informatics Vol 8, No 1 (2021): May 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i1.29357

Abstract

Purpose: Magnetic Resonance Imaging is one of the health technologies used to scan the human body in order to get an image of an orgasm in the body. MRI imagery has a lot of noise that blends with the tumor object, so the tumor is quite difficult to detect automatically. In addition, it will be difficult to distinguish tumors from brain texture. Various methods have been carried out in previous studies. Methods: This study combines the K-Means method and Fuzzy C-Means (FCM) to detect tumors on MRI. The purpose of the combination is to get the advantages of each algorithm and minimize weaknesses. The method used is Contrast Adjustment using Fast Local Laplacian, K-Means FCM, Canny edge detection, Median Filter, and Morphological Area Selection. The dataset is taken from www.radiopedia.org. Data taken were 73 MRI of the brain, of which 57 MRIs with brain tumors and 16 MRIs of normal brain Evaluation of research results will be calculated using Confusion Matrix. Result: The accuracy obtained is 91.78%. Novelty: K-Means method and Fuzzy C-Means (FCM) to detect tumors on MRI.
DWT-SVD Combination Method for Copyrights Protection Kusumaningrum, Desi Purwanti; Rachmawanto, Eko Hari; Atika Sari, Christy; Pradana, Rizky Putra
Scientific Journal of Informatics Vol 7, No 1 (2020): May 2020
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v7i1.21050

Abstract

Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's name. Based on that problem an attempt was made to provide an invisible watermark so as not to be easy to do the watermark removal process on the artwork, using a 2-level DWT and SVD combination method that can embed watermarks invisibly and increase watermarking resistance to the image from various image manipulation processes such as noise, JPEG compression, and so on. From combination method of DWT-SVD got the highest PSNR value with watermark image size 32x32 and 64x64 which is 59.2656 dB and 54.7414 dB, respectively.
Histogram of Gradient in K-Nearest Neighbor for Javanese Alphabet Classification Susanto, Ajib; Atika Sari, Christy; Mulyono, Ibnu Utomo Wahyu; Doheir, Mohamed
Scientific Journal of Informatics Vol 8, No 2 (2021): November 2021
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v8i2.30788

Abstract

Purpose: The Javanese script generally has a basic script or is commonly referred to as the “carakan” script. The script consists of 20 letters with different levels of difficulty. Some letters have similarities, so research is needed to make it easier to detect the image of Javanese characters. Methods: This study proposes recognizing Hiragana's writing characters using the K-Nearest Neighbor (K-NN) method. In the preprocessing stage, the segmentation process is carried out using the thresholding method to perform segmentation, followed by the Histogram of Gradient (HOG) feature extraction process and noise removal using median filtering. Histogram of Gradient (HoG) is one of the features used in computer vision and image processing in detecting an object in the form of a descriptor feature. There are 1000 data divided into 20 classes. Each class represents one letter of the basic Javanese script. Result: Based on data collection using the writings of 50 respondents where each respondent writes 20 basic Javanese characters, the highest accuracy was obtained at K = 1, namely 98.5%. Novelty: Using several preprocessing such as cropping, median filtering, otsu thresholding and HOG feature extraction before do classification, this experiment yields a good accuracy.
Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security Atika Sari, Christy; Rachmawanto, Eko Hari; Haryanto, Christanto Antonius
Scientific Journal of Informatics Vol 5, No 2 (2018): November 2018
Publisher : Universitas Negeri Semarang

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15294/sji.v5i2.14844

Abstract

Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from the incidence of cyber crime, such as theft and data modification. Given the losses caused by data manipulation is very detrimental to the owner, then the original data can be misused in the cyber world. Cryptography offers an algorithm for randomizing data, so it can not be read by unauthorized people. The cryptography technique was implemented using Triple Data Encyption Standard (3DES) given the results of a randomized cryptographic algorithm, it is possible to arouse suspicion from the viewer. For that will be done the process of insertion of cryptographic files into another media in the form of images commonly referred to as steganography. The steganography technique that will be used is End of File (EOF). The combination of 3DES and EOF in the 64x64 pixel image with grayscale color format produces the fastest image processing time of 173.00192 seconds with the highest Peak Signal to Noise Ratio (PSNR) value of 25.0004 dB, while in the 128x128 pixel image with grayscale format has produced the highest PSNR 21.0084 dB.
Co-Authors AA Sudharmawan, AA Abdussalam Abdussalam Abdussalam Abdussalam, Abdussalam Abiyyi, Ryandhika Bintang Agustina, Feri Ahmad Salafuddin Ajib Susanto Akbar, Ilham Januar Alfany, Fauzan Maulana Ali, Rabei Raad Alifia Salwa Salsabila Alvian Ideastari, Nukat Alvin Faiz Kurniawan Anak Agung Gede Sugianthara Andi Danang Krismawan Anggraeny, Tiara Annisa Sulistyaningsih Anny Yuniarti Antonius Erick Handoyo Ardy, Rizky Damara Arfian, Aldi Azmi Aryanta, Muhammad Syifa Aryaputra, Firman Naufal Astuti, Yani Parti Auni, Amelia Gizzela Sheehan Bambang Sugiarto Briliantino Abhista Prabandanu Cahaya Jatmoko Candra Irawan Candra Irawan Chaerul Umam Chaerul Umam Cinantya Paramita D.R.I.M. Setiadi Danang Krismawan, Andi Danang Wahyu Utomo Danar Bayu Adi Saputra Danu Hartanto Daurat Sinaga Daurat Sinaga De Rosal Ignatius Moses Setiadi Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Didik Hermanto Dimas Irawan Ihya‘ Ulumuddin Doheir, Mohamed Doheir, Mohamed Doheir, Mohamed A S Dwi Puji Prabowo Edi Faisal Egia Rosi Subhiyakto Egia Rosi Subhiyakto Eko Hari Rachmanto Eko Hari Rachmawanto Eko Septyasari Elkaf Rahmawan Pramudya Eqania Oktayaessofa Ericsson Dhimas Niagara Erika Devi Udayanti Erlin Dolphina Erna Daniati Erna Zuni Astuti Erna Zuni Astuti Erna Zuni Astuti Ery Mintorini Etika Kartikadarma Farrel Athaillah Putra Fidela Azzahra Florentina Esti Nilawati Florentina Esti Nilawati Florentina Esti Nilawati Folasade Olubusola Isinkaye Folasade Olubusola Isinkaye Folasade Olubusola Isinkaye Giovani Ardiansyah Gumelar, Rizky Syah Guruh Fajar Shidik Gusta, Muhammad Bima Hadi, Heru Pramono Haqikal, Hafidz Hartono, Matthew Raymond Haryanto, Christanto Antonius Haryanto, Christanto Antonius Hasbi, Hanif Maulana Hayu Wikan Kinasih Hendra Sutrisno Heru Lestiawan Heru Lestiawan Himawan, Reyshano Adhyarta Hussain Md Mehedul Islam Hyperastuty, Agoes Santika Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ifan Rizqa Ikhsanuddin, Rohmatulloh Muhamad Imam Prayogo Pujiono Inzaghi, Reza Bayu Ahmad Isinkaye, Folasade Olubusola Islam, Hussain Md Mehedul Istiqomah, Annisa Ayu Ivan Stepheng Kas Raygaputra Ilaga Krismawan, Andi Danang Kumala, Raffa Adhi Kusuma, Edi Jaya Kusuma, Mohammad Roni L. Budi Handoko Laksana, Deddy Award Widya Lalang Erawan Latifa, Anidya Nur Liya Umaroh Liya Umaroh, Liya Lucky Arif Rahman Hakim Mabina, Ibnu Farid Maulana Malik Ibrahim Al-Ghiffary Md Kamruzzaman Sarker Md Kamruzzaman Sarker Mohamed Doheir Mohamed Doheir Mohamed Doheir Mohamed Doheir Mohammad Rizal, Mohammad Mohd Yaacob, Noorayisahbe Muchamad Akbar Nurul Adzan Muhammad Rikzam Kamal Mulyono, Ibnu Utomo Wahyu Mulyono, Ibnu Utomo Wahyu Munis Zulhusni Musfiqur Rahman Sazal Muslih Muslih Mutiara Dolla Meitantya Mutiara Syabilla Nabila, Qotrunnada Neni Kurniawati Ningrum, Amanda Prawita Nisa, Yuha Aulia Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yaacob Noorayisahbe Mohd Yacoob Nova Rijati Nur Ryan Dwi Cahyo Oktaridha, Harwinanda Ozagastra Caluella Prambudi Parti Astuti, Yani Parti Astuti, Yani parti astuti, yani Parti Astuti1, Yani Parti Astuti1, Yani Permana langgeng wicaksono ellwid putra Pradana, Luthfiyana Hamidah Sherly Pradana, Rizky Putra Pradnyatama, Mehta Praskatama, Vincentius Pratama, Zudha Pratiwi, Saniya Rahma Prayogi, Arditya Pulung Nurtantio Andono Purwanto Purwanto Puspa, Silfi Andriana Putri Mega Arum Wijayanti Rabei Raad Ali Rabei Raad Ali Rabei Raad Ali Rahmalan, Hidayah Raisul Umah Nur Ramadhan Rakhmat Sani Ratih Ariska Robert Setyawan Sabilillah, Ferris Tita Saifullah, Zidan Salma Shafira Fatya Ardyani Sania, Wulida Rizki Santoso, Bagus Raffi Sari, Wellia Shinta Sari Shinta Sarker, Md Kamruzzaman Setiarso, Ichwan Setiawan, Fachruddin Ari Shelomita, Viki Ari Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Solichul Huda, Solichul Sudibyo, Usman Sudibyo, Usman Sudibyo, Usman Sugianto, Castaka Agus Sumarni Adi, Sumarni Suprayogi Suprayogi Suprayogi Suprayogi Syafira, Zahra Ghina Tan Samuel Permana Tan Samuel Permana Tiara Anggraeny Titien Suhartini Sukamto Umaroh, Liya Umaroh, Liya Utomo, Danang Wahyu Velarati, Khoirizqi Vincentius Praskatama Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Widhi Bagus Nugroho Wintaka, Aristides Bima Yaacob, Noorayisahbe Mohd Yani Parti Astuti Yupie Kusumawati Yupie Kusumawati Zaenal Arifin