p-Index From 2021 - 2026
12.91
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Ilmu Komputer dan Informasi Jurnal Masyarakat Informatika Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik JUTI: Jurnal Ilmiah Teknologi Informasi Prosiding SNATIF Journal of ICT Research and Applications Teknika: Jurnal Sains dan Teknologi Jurnal Informatika dan Teknik Elektro Terapan Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics Jurnal Teknologi dan Sistem Komputer Sinkron : Jurnal dan Penelitian Teknik Informatika SISFOTENIKA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control InComTech: Jurnal Telekomunikasi dan Komputer Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer English Language and Literature International Conference (ELLiC) Proceedings Infotekmesin Jurnal Mnemonic Abdimasku : Jurnal Pengabdian Masyarakat SKANIKA: Sistem Komputer dan Teknik Informatika Jurnal Teknik Informatika (JUTIF) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Soft Computing Exploration Advance Sustainable Science, Engineering and Technology (ASSET) Prosiding Seminar Nasional Hasil-hasil Penelitian dan Pengabdian Pada Masyarakat Prosiding Seminar Nasional Teknologi Informasi dan Bisnis Seminar Nasional Teknologi dan Multidisiplin Ilmu Jurnal Informatika Polinema (JIP) Jurnal Informatika: Jurnal Pengembangan IT Scientific Journal of Informatics LogicLink: Journal of Artificial Intelligence and Multimedia in Informatics Seminar Nasional Riset dan Teknologi (SEMNAS RISTEK) Advance Sustainable Science, Engineering and Technology (ASSET) INOVTEK Polbeng - Seri Informatika
Claim Missing Document
Check
Articles

Penyembunyian Data Untuk Seluruh Ekstensi File Menggunakan Kriptografi Vernam Cipher dan Bit Shiffting Christy Atika Sari; Eko Hari Rachmawanto; Danang Wahyu Utomo; Ramadhan Rakhmat Sani
Journal of Applied Intelligent System Vol 1, No 3 (2016): Oktober 2016
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v1i3.1252

Abstract

Kriptografi sebagai salah satu cabang ilmu yang dapat digunakan untuk mengamankan data hingga saat ini terus dikembangkan melalui berbagai algoritma. Beberapa penelitian terkait mengenai kriptografi masih mengguankan media berupa teks saja, image saja, maupun file tertentu saja. Pada penelitian ini akan digunakan media berupa seluruh jenis file sebagai media inputan. Adapun algoritma yang dignuakan yaitu Vernam cipher dan Bit shiffting. Kedua algoritma ini dikenal cepat, mudah dan aman untuk digunakan. Percobaan yang dilakukan menggunakan 30 file berbeda ukuran maupun jenis file serta telah diuji melalui aplikasi yang dibangun dengan Visual Basic telah menghasilkan proses enkripsi dan dekripsi data yang berjalan dengan baik. File hasil enkripsi dapat dibuka dengan kunci yang telah ditetapkan dan tidak mengalami kerusakan, dan sebaliknya untuk proses dekripsi data juga demikian. Hasil percobaan menggunakan sampling file berukuran 1 kb hingga 24000 kb, dimana waktu terlama untuk mengenkripsi file yaitu 28,661 detik dan untuk proses dekripsi terlama membutuhkan waktu 27,222 detik. Kata kunci—Vernam cipher, Bit shiffting, Kriptografi, File
An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image Christy Atika Sari; Lalang Erawan; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi; Tan Samuel Permana
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i2.1616

Abstract

Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity,  with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.
Secure Image Steganography Algorithm Based on DCT with OTP Encryption De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto; Christy Atika Sari
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1330

Abstract

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography
Classification of Student Aspiration Using Naïve Bayes Classifier Ifan Rizqa; Christy Atika Sari; Mohamed Doheir
Journal of Applied Intelligent System Vol 6, No 1 (2021): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v6i1.4459

Abstract

Students aspiration are various demands from the student that packed in creative idea to propose changing process of a thing. Mostly, aspiration delivered in complaints and expectation. Aspiration is used for evaluating the laxity and early detection in university quality system for the better. This activity took place in Dian Nuswantoro University, and Student Representative Council (SRC) is the unit to manage the students aspiration. Aspiration is obtained through predetermined mechanism such as manual questionnaire distribution and or using google form. The provided questionnaire requires student to fill the content according to the provided aspiration categories. However, the problem is sometimes the student choose the wrong category according to the content. Therefore it is needed to create an application that can classified the students aspiration automatically. Document text classification become the best way to determine the category based on the content of the students aspiration. Naïve bayes classifier method is used because it is capable to produce high accuracy. With 1000 data training document of each category, "facilities and infrastructure" (facilities), "lecturers" (attitudes, teaching methods, material delivered), "staffing and the academic system"(attitudes, ways of working, providing information), and "suggestions and feedback". This experiment achieved 90.20% accuracy. It can be said that this method is worth to implement in this research.
A High Result for Image Security Using Crypto-Stegano Based on ECB Mode and LSB Encryption Kas Raygaputra Ilaga; Christy Atika Sari; Eko Hari Rachmawanto
Journal of Applied Intelligent System Vol 3, No 1 (2018): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v3i1.1694

Abstract

The development of the digital world in the field of information technology is so rapid that making the exchange of information easy and fast. Such information may be general or specific. In general information there is no problem for the public, but specific information can not be free in the public. The main problem of the specific information is security, how the information is safe. To overcome these problems can be solved using cryptography and steganography. Cryptography is a technique for securing secret information from uninvolved parties, which the outcome is much different from the original information. Steganography is a technique to secure or hide the secret information on a digital object such as sound, image, vidio that applied results as seen the original information. In this paper proposed a combination of ECB Mode cryptographic method and LSB steganographic method on a digital image. The measurement method are PSNR and MSE to determine the quality of the stego image. Our results are excellent for digital image encryption of RGB and Grayscale type since the resulting image looks like the original image, with the best stego-image proof with MSE is 0.00013, PSNR is 87.00141, SSIM is 1 shown as excellent result.
Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES) Ibnu Utomo Wahyu Mulyono; Wellia Shinta Sari; De Rosal Ignatius Moses Setiadi; Christy Atika Sari
Dinamika Rekayasa Vol 14, No 2 (2018): Jurnal Ilmiah Dinamika Rekayasa - Agustus 2018
Publisher : Jenderal Soedirman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.dr.2018.14.2.210

Abstract

Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai tingkat keamanan yang baik salah satunya yaitu Data Encryption Standard (DES). DES melakukan enkripsi dengan kunci simteris dengan panjang 64 bit kunci yang didapat dari kunci eksternal. Beberapa penelitian sebelumnya telah menggunakan DES pada media teks, dalam makalah ini DES akan digunakan pada media gambar. Gambar yang digunakan berukuran 512x512 piksel, dengan pesan berupa file .txt dengan panjang bervariasi antara 8 byte sampai dengan 1024 byte. Penggunaan file pesan yang bervariasi digunakan untuk mengetahui performa DES, baik dari segi waktu enkripsi dan dekripsi maupun hasil proses dekripsi. Hasil eksperimen menggunakan sejumlah pesan menghasilkan nilai Peak Signal to Noise Ratio (PSNR) tertinggi 86.7532 dB, dan waktu enkripsi pesan dengan ukuran kurang dari 64 bit tidak lebih dari 1 detik, sedangkan waktu dekripsi lebih cepat disbanding waktu enkripsi.
Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi Cahaya Jatmoko; L. Budi Handoko; Christy Atika Sari; De Rosal Ignatius Moses Setiadi
Dinamika Rekayasa Vol 14, No 1 (2018): Jurnal Ilmiah Dinamika Rekayasa - Februari 2018
Publisher : Jenderal Soedirman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.dr.2018.14.1.200

Abstract

Salah satu teknik penyembunyian data yang populer adalah steganografi. Teknik ini dapat mengecoh pihak penyadap data sehingga informasi rahasia tetap aman. Steganografi dapat digunakan dengan menerapkan sejumlah algoritma dengan bantuan pemrosesan komputer. Algoritma steganografi yang sering diteliti antara lain Least Significant Bit (LSB) dan Most Significant Bit (MSB). LSB merupakan salah satu algoritma steganografi yang melakukan proses perhitungan bit dengan nilai paling kecil, sedangkan MSB melakukan proses yang sama namun dengan pilihan angka yang besar. LSB merupakan algoritma sederhana namun dapat digunakan pada proses steganografi, begitu pula dengan MSB. Penelitian ini membahas tentang uji performa algoritma LSB dan MSB dalam steganografi, baik dari segi kulitas hasil steganografi, dan ketahanan terhadap serangan. Alat ukur yang digunakan dalam penelitian ini adalah, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), dan Coefficient Correlation (CC). Berdasarkan hasil penelitian metode LSB terbukti lebih baik dari segi kulitas, sedangkan ketahanan terhadap serangan MSB lebih unggul pada jenis serangan salt and pepper.
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Christy Atika Sari; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.442 KB) | DOI: 10.11591/eecsi.v4.1018

Abstract

Main problem frequently encountered in all schemes transform domain watermarking technique is the robustness and imperceptibility. Due to achieved optimal result most algorithms of image watermarking using combination two or more transformation domain. This paper proposed Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) to embed binary watermark to color Image. Before the message embedded in the color images, we converting RGB to YCbCr color space. Luminance component will be split into sub- block and it has been transformed by DCT to produce DC and AC coefficients. DC coefficients selected as embedding place because it is perceptually usefulness and robust against various attacks. DC coefficients will be collected from every sub-block to create a reference image. Then apply SVD on reference image and embed message in singular values. Various attacks have been implemented and tested due to achieve robustness using Normalized Cross Correlation (NCC) and imperceptibility tested using Peak Signal to Noise Ratio (PSNR). High values of the measurement results show the feasibility of the proposed method. A highest PSNR value resulted 42.3009 dB, whereas a highest NCC values 0.9993 after JPEG Compression.
A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography Edi Jaya Kusuma; Christy Atika Sari; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi
Journal of ICT Research and Applications Vol. 12 No. 2 (2018)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2018.12.2.1

Abstract

Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.
Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA Antonius Erick Handoyo; De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto; Christy Atika Sari; Ajib Susanto
Jurnal Teknologi dan Sistem Komputer Volume 6, Issue 1, Year 2018 (January 2018)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1545.64 KB) | DOI: 10.14710/jtsiskom.6.1.2018.37-43

Abstract

This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks.
Co-Authors AA Sudharmawan, AA Abdussalam Abdussalam Abdussalam Abdussalam, Abdussalam Abiyyi, Ryandhika Bintang Agustina, Feri Ahmad Salafuddin Ajib Susanto Akbar, Fadhilah Aditya Akbar, Ilham Januar Alfany, Fauzan Maulana Ali, Rabei Raad Alifia Salwa Salsabila Alvian Ideastari, Nukat Alvin Faiz Kurniawan Anak Agung Gede Sugianthara Andi Danang Krismawan Anggraeny, Tiara Annisa Sulistyaningsih Anny Yuniarti Antonius Erick Handoyo Ardy, Rizky Damara Ardyani, Salma Shafira Fatya Arfian, Aldi Azmi Ariska, Ratih Aryanta, Muhammad Syifa Aryaputra, Firman Naufal Astuti, Yani Parti Auni, Amelia Gizzela Sheehan Azzahra, Fidela Bambang Sugiarto Briliantino Abhista Prabandanu Budi Harjo Cahaya Jatmoko Cahyo, Nur Ryan Dwi Candra Irawan Candra Irawan Chaerul Umam Chaerul Umam Cinantya Paramita D.R.I.M. Setiadi Danang Krismawan, Andi Danang Wahyu Utomo Danar Bayu Adi Saputra Danu Hartanto Daurat Sinaga Daurat Sinaga De Rosal Ignatius Moses Setiadi Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Didik Hermanto Doheir, Mohamed Doheir, Mohamed Doheir, Mohamed A S Dwi Puji Prabowo Edi Faisal Egia Rosi Subhiyakto Egia Rosi Subhiyakto Eko Hari Rachmanto Eko Hari Rachmawanto Eko Septyasari Elkaf Rahmawan Pramudya Ericsson Dhimas Niagara Erika Devi Udayanti Erlin Dolphina Erna Daniati Erna Zuni Astuti Ery Mintorini Etika Kartikadarma Farrel Athaillah Putra Fidela Azzahra Florentina Esti Nilawati Florentina Esti Nilawati Florentina Esti Nilawati Folasade Olubusola Isinkaye Folasade Olubusola Isinkaye Giovani Ardiansyah Gumelar, Rizky Syah Guruh Fajar Shidik Gusta, Muhammad Bima Hadi, Heru Pramono Haqikal, Hafidz Hartono, Matthew Raymond Haryanto, Christanto Antonius Haryanto, Christanto Antonius Hasbi, Hanif Maulana Hayu Wikan Kinasih Heru Lestiawan Heru Lestiawan Himawan, Reyshano Adhyarta Hyperastuty, Agoes Santika Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ifan Rizqa Ihya Ulumuddin, Dimas Irawan Ikhsanuddin, Rohmatulloh Muhamad Imam Prayogo Pujiono Inzaghi, Reza Bayu Ahmad Isinkaye, Folasade Olubusola Islam, Hussain Md Mehedul Istiqomah, Annisa Ayu Ivan Stepheng Kamila, Izza Putri Kas Raygaputra Ilaga Krismawan, Andi Danang Kumala, Raffa Adhi Kurniawan, Nicholas Alfandhy Kusuma, Edi Jaya Kusuma, Mohammad Roni Kusumawati, Yupie L. Budi Handoko Laksana, Deddy Award Widya Lalang Erawan Latifa, Anidya Nur Liya Umaroh Liya Umaroh, Liya Lucky Arif Rahman Hakim Mabina, Ibnu Farid Maulana Malik Ibrahim Al-Ghiffary Md Kamruzzaman Sarker Md Kamruzzaman Sarker Meitantya, Mutiara Dolla Mohamed Doheir Mohammad Rizal, Mohammad Mohd Yaacob, Noorayisahbe Muchamad Akbar Nurul Adzan Muhammad Rikzam Kamal Mulyono, Ibnu Utomo Wahyu Mulyono, Ibnu Utomo Wahyu Munis Zulhusni Musfiqur Rahman Sazal Muslih Muslih Nabila, Qotrunnada Neni Kurniawati Ningrum, Amanda Prawita Nisa, Yuha Aulia Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Noorayisahbe Mohd Yacoob Nova Rijati Nugroho, Widhi Bagus Nur Ryan Dwi Cahyo Oktaridha, Harwinanda Oktayaessofa, Eqania Ozagastra Caluella Prambudi Parti Astuti, Yani Parti Astuti, Yani parti astuti, yani Parti Astuti1, Yani Parti Astuti1, Yani Permana langgeng wicaksono ellwid putra Pradana, Luthfiyana Hamidah Sherly Pradana, Rizky Putra Pradnyatama, Mehta Praskatama, Vincentius Pratama, Zudha Pratiwi, Saniya Rahma Prayogi, Arditya Pulung Nurtantio Andono Purwanto Purwanto Puspa, Silfi Andriana Putri Mega Arum Wijayanti Rabei Raad Ali Rahmalan, Hidayah Raisul Umah Nur Ramadhan Rakhmat Sani Ratih Ariska Robert Setyawan Sabilillah, Ferris Tita Saifullah, Zidan Salma Shafira Fatya Ardyani Salsabila, Alifia Salwa Sania, Wulida Rizki Santoso, Bagus Raffi Saputra, Danar Bayu Adi Sari, Wellia Shinta Sari Shinta Sarker, Md Kamruzzaman Sarker, Md. Kamruzzaman Setiarso, Ichwan Setiawan, Fachruddin Ari Shelomita, Viki Ari Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Sofyan, Ega Adiasa Solichul Huda, Solichul Sudibyo, Usman Sudibyo, Usman Sudibyo, Usman Sugianto, Castaka Agus Sumarni Adi, Sumarni Suprayogi Suprayogi Suprayogi Suprayogi Sutrisno, Hendra Syabilla, Mutiara Syafira, Zahra Ghina Tan Samuel Permana Tan Samuel Permana Tiara Anggraeny Titien Suhartini Sukamto Umah Nur, Raisul Umaroh, Liya Umaroh, Liya Utomo, Danang Wahyu Velarati, Khoirizqi Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wellia Shinta Sari Wintaka, Aristides Bima Yaacob, Noorayisahbe Mohd Yani Parti Astuti Yupie Kusumawati Zaenal Arifin Zulhusni, Munis