p-Index From 2021 - 2026
5.919
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering IAES International Journal of Artificial Intelligence (IJ-AI) Dinamik Jurnal Sains dan Teknologi Semantik Techno.Com: Jurnal Teknologi Informasi Jurnal Simetris TELKOMNIKA (Telecommunication Computing Electronics and Control) Bulletin of Electrical Engineering and Informatics Prosiding Seminar Nasional Sains Dan Teknologi Fakultas Teknik Prosiding SNATIF Journal of ICT Research and Applications Scientific Journal of Informatics JAIS (Journal of Applied Intelligent System) Proceeding SENDI_U Jurnal Ilmiah Dinamika Rekayasa (DINAREK) Proceeding of the Electrical Engineering Computer Science and Informatics JADECS (Journal of Art, Design, Art Education and Culture Studies) Jurnal Teknologi dan Sistem Komputer SISFOTENIKA Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control Indonesian Journal of Information System Jurnal Eksplora Informatika JOURNAL OF APPLIED INFORMATICS AND COMPUTING Indonesian Journal of Electrical Engineering and Computer Science Abdimasku : Jurnal Pengabdian Masyarakat Jurnal Teknik Informatika (JUTIF) Jurnal Program Kemitraan dan Pengabdian Kepada Masyarakat Journal of Computing Theories and Applications Jurnal Informatika: Jurnal Pengembangan IT Journal of Fuzzy Systems and Control (JFSC) Journal of Information System and Application Development Journal of Multiscale Materials Informatics Journal of Future Artificial Intelligence and Technologies
Claim Missing Document
Check
Articles

ENKRIPSI GAMBAR GRAYSCALE MENGGUNAKAN KRIPTOGRAFI RIVEST CIPHER (RC) 4 Elkaf Rahmawan Pramudya; Abdussalam Abdussalam; De Rosal Ignatius Moses Setiadi
Prosiding SNST Fakultas Teknik Vol 1, No 1 (2018): PROSIDING SEMINAR NASIONAL SAINS DAN TEKNOLOGI 9 2018
Publisher : Prosiding SNST Fakultas Teknik

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (428.612 KB)

Abstract

Algoritma Rivest Cipher (RC) 4 diktagorikan sebagai bentuk kriptografi simteris dengan fungsi XOR. RC4 menggunakan S-Box dan permutasi 256 bit sehingga tidak rentan terhadap serangan. RC4 umumnya digunakan untuk mengenkripsi teks, dalam makalah ini RC4 digunakan untuk mengenkripsi gambar dengan format grayscale. Dalam hal ini konsep kriptografi dan watermarking di hybrid. Pengukuran hasil eksperimen dengan entropy, menunjukkan hasil yang mendekati nilai tertinggi. Nilai tertinggi entropi yaitu 8, dan dalam penelitian ini menghasilkan 7.9994. Untuk membuktikan hasil tersebut, secara kasat mata kami menyajikan histogram dalam bentuk mesh, plot dan bar sehingga terlihat adanya hasil operasi kriptografi, namun hasil tersebut dapat diterima dengan mata manusia meski telah terjadi sejumlah perubahan bit pada gambar yang digunakan. Pada histogram dan mesh  gambar asli dan hasil enkripsi dapat disimpulkan bahwa piksel gambar yang dienkipsi telah berubah dan pada saat dekripsi gambar dapat dikembalikan ke wujud semula. Kata kunci: RC4, kriptografi, gambar, grayscale.
An Enhancement of One Time Pad Based on Monoalphabeth Caesar Cipher to Secure Grayscale Image Christy Atika Sari; Lalang Erawan; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi; Tan Samuel Permana
Journal of Applied Intelligent System Vol 2, No 2 (2017): December 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i2.1616

Abstract

Image is an object that has been used by various people since long ago. Utilization of these images evolve in line with advances in technology. Image in this information technology era is not only in a physical form, there is also a form of so-called digital image. Many people use digital images for personal use, so prone to be manipulated by others. Cryptographic technique, such as Caesar Cipher and OTP is a security techniques that can be applied to the digital image to avoid manipulation or theft of data image. The result is, an image can be read only by the sender and the recipient's image alone. Combined the two algorithms have fast turnaround time, up to 0.017791 seconds for the image to the size of 512x341 and 0.032302 seconds for the image to the size of 768x512. In addition, the resulting image has a very low degree of similarity,  with the highest PSNR value obtained is 6.8653 dB. It can be concluded that the combined algorithm and OTP Caesar Cipher algorithm is fast and difficult to solve.
Secure Image Steganography Algorithm Based on DCT with OTP Encryption De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto; Christy Atika Sari
Journal of Applied Intelligent System Vol 2, No 1 (2017): April 2017
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v2i1.1330

Abstract

Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords—Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography
Tomato Maturity Classification using Naive Bayes Algorithm and Histogram Feature Extraction Arya Kusuma; De Rosal Ignatius Moses Setiadi; M. Dalvin Marno Putra
Journal of Applied Intelligent System Vol 3, No 1 (2018): Journal of Applied Intelligent System
Publisher : Universitas Dian Nuswantoro and IndoCEISS

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33633/jais.v3i1.1988

Abstract

Tomatoes have nutritional content that is very beneficial for human health and is one source of vitamins and minerals. Tomato classification plays an important role in many ways related to the distribution and sales of tomatoes. Classification can be done on images by extracting features and then classifying them with certain methods. This research proposes a classification technique using feature histogram extraction and Naïve Bayes Classifier. Histogram feature extractions are widely used and play a role in the classification results. Naïve Bayes is proposed because it has high accuracy and high computational speed when applied to a large number of databases, is robust to isolated noise points, and only requires small training data to estimate the parameters needed for classification. The proposed classification is divided into three classes, namely raw, mature and rotten. Based on the results of the experiment using 75 training data and 25 testing data obtained 76% accuracy
Teknik Super Enkripsi Menggunakan Transposisi Kolom Berbasis Vigenere Cipher Pada Citra Digital Daurat Sinaga; Chaerul Umam; De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto
Dinamika Rekayasa Vol 14, No 1 (2018): Jurnal Ilmiah Dinamika Rekayasa - Februari 2018
Publisher : Jenderal Soedirman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.dr.2018.14.1.198

Abstract

Meretas data atau sering disebut hacking saat ini marak terjadi dalam internet, sehingga menyebabkan proses pengiriman data menjadi tidak aman. Oleh karena itu, kita memerlukan suatu sistem keamanan untuk mengamankan data kita ketika akan berkirim pesan antar satu dengan lainnya. Kriptografi merupakan salah satu sistem keamanan dengan konsep membuat data tersebut menjadi sandi - sandi yang tidak setiap orang dapat membacanya. Di dalam kriptografi terdapat berbagai macam algoritma untuk menyandikan sebuah data tersebut agak tidak mudah terbaca oleh orang lain yang tidak berhak, yaitu antara lain vigenere cipher dan transposisi kolom. Dengan mengkombinasikan algoritma ini didapatkan teknik super enkripsi yang kuat yang dapat mengamankan data yang akan dikirimkan oleh pengirim kepada penerima tanpa diketahui oleh orang lain.
Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES) Ibnu Utomo Wahyu Mulyono; Wellia Shinta Sari; De Rosal Ignatius Moses Setiadi; Christy Atika Sari
Dinamika Rekayasa Vol 14, No 2 (2018): Jurnal Ilmiah Dinamika Rekayasa - Agustus 2018
Publisher : Jenderal Soedirman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.dr.2018.14.2.210

Abstract

Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai tingkat keamanan yang baik salah satunya yaitu Data Encryption Standard (DES). DES melakukan enkripsi dengan kunci simteris dengan panjang 64 bit kunci yang didapat dari kunci eksternal. Beberapa penelitian sebelumnya telah menggunakan DES pada media teks, dalam makalah ini DES akan digunakan pada media gambar. Gambar yang digunakan berukuran 512x512 piksel, dengan pesan berupa file .txt dengan panjang bervariasi antara 8 byte sampai dengan 1024 byte. Penggunaan file pesan yang bervariasi digunakan untuk mengetahui performa DES, baik dari segi waktu enkripsi dan dekripsi maupun hasil proses dekripsi. Hasil eksperimen menggunakan sejumlah pesan menghasilkan nilai Peak Signal to Noise Ratio (PSNR) tertinggi 86.7532 dB, dan waktu enkripsi pesan dengan ukuran kurang dari 64 bit tidak lebih dari 1 detik, sedangkan waktu dekripsi lebih cepat disbanding waktu enkripsi.
Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi Cahaya Jatmoko; L. Budi Handoko; Christy Atika Sari; De Rosal Ignatius Moses Setiadi
Dinamika Rekayasa Vol 14, No 1 (2018): Jurnal Ilmiah Dinamika Rekayasa - Februari 2018
Publisher : Jenderal Soedirman University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20884/1.dr.2018.14.1.200

Abstract

Salah satu teknik penyembunyian data yang populer adalah steganografi. Teknik ini dapat mengecoh pihak penyadap data sehingga informasi rahasia tetap aman. Steganografi dapat digunakan dengan menerapkan sejumlah algoritma dengan bantuan pemrosesan komputer. Algoritma steganografi yang sering diteliti antara lain Least Significant Bit (LSB) dan Most Significant Bit (MSB). LSB merupakan salah satu algoritma steganografi yang melakukan proses perhitungan bit dengan nilai paling kecil, sedangkan MSB melakukan proses yang sama namun dengan pilihan angka yang besar. LSB merupakan algoritma sederhana namun dapat digunakan pada proses steganografi, begitu pula dengan MSB. Penelitian ini membahas tentang uji performa algoritma LSB dan MSB dalam steganografi, baik dari segi kulitas hasil steganografi, dan ketahanan terhadap serangan. Alat ukur yang digunakan dalam penelitian ini adalah, Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), dan Coefficient Correlation (CC). Berdasarkan hasil penelitian metode LSB terbukti lebih baik dari segi kulitas, sedangkan ketahanan terhadap serangan MSB lebih unggul pada jenis serangan salt and pepper.
Robust and Imperceptible Image Watermarking by DC Coefficients Using Singular Value Decomposition Christy Atika Sari; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi
Proceeding of the Electrical Engineering Computer Science and Informatics Vol 4: EECSI 2017
Publisher : IAES Indonesia Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (509.442 KB) | DOI: 10.11591/eecsi.v4.1018

Abstract

Main problem frequently encountered in all schemes transform domain watermarking technique is the robustness and imperceptibility. Due to achieved optimal result most algorithms of image watermarking using combination two or more transformation domain. This paper proposed Discrete Cosine Transform (DCT) and Singular Value Decomposition (SVD) to embed binary watermark to color Image. Before the message embedded in the color images, we converting RGB to YCbCr color space. Luminance component will be split into sub- block and it has been transformed by DCT to produce DC and AC coefficients. DC coefficients selected as embedding place because it is perceptually usefulness and robust against various attacks. DC coefficients will be collected from every sub-block to create a reference image. Then apply SVD on reference image and embed message in singular values. Various attacks have been implemented and tested due to achieve robustness using Normalized Cross Correlation (NCC) and imperceptibility tested using Peak Signal to Noise Ratio (PSNR). High values of the measurement results show the feasibility of the proposed method. A highest PSNR value resulted 42.3009 dB, whereas a highest NCC values 0.9993 after JPEG Compression.
A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography Edi Jaya Kusuma; Christy Atika Sari; Eko Hari Rachmawanto; De Rosal Ignatius Moses Setiadi
Journal of ICT Research and Applications Vol. 12 No. 2 (2018)
Publisher : LPPM ITB

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.5614/itbj.ict.res.appl.2018.12.2.1

Abstract

Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's transformation (ACM) is used to encrypt an image by randomizing the image pixels. However, applying only a transformation algorithm is not secure enough to protect the image. In this study, ACM was combined with RSA, another encryption technique, which has an exponential process that uses large numbers. This can confuse attackers when they try to decrypt the cipher images. Furthermore, this paper also proposes combing ACM with RSA and subsequently embedding the result in a cover image with inverted two-bit LSB steganography, which replaces two bits in the bit plane of the cover image with message bits. This modified steganography technique can provide twice the capacity of the previous method. The experimental result was evaluated using PSNR and entropy as the parameters to obtain the quality of the stego images and the cipher images. The proposed method produced a highest PSNR of 57.8493 dB and entropy equal to 7.9948.
Teknik Penyembunyian dan Enkripsi Pesan pada Citra Digital dengan Kombinasi Metode LSB dan RSA Antonius Erick Handoyo; De Rosal Ignatius Moses Setiadi; Eko Hari Rachmawanto; Christy Atika Sari; Ajib Susanto
Jurnal Teknologi dan Sistem Komputer Volume 6, Issue 1, Year 2018 (January 2018)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1545.64 KB) | DOI: 10.14710/jtsiskom.6.1.2018.37-43

Abstract

This study proposed a combination of steganography and cryptography techniques using LSB and RSA methods. RSA is a popular cryptographic technique that can be applied to digital imagery. Digital image pixel values range from 0 to 255, making the keys used in RSA limited enough and less secure. So in this study, it is proposed to convert pixel image value to 16 bits so that the key used can be more varied. Experimental results proved that there was a steady increase in security and imperceptibility. This was shown by the results of PSNR 57.2258dB and MSE 0.1232dB. This method was also resistant to salt and pepper attacks.
Co-Authors Abdul Syukur Abdussalam Abdussalam Abdussalam Abdussalam Abdussalam Abere, Reuben Akporube Abugor Okpako, Ejaita Achmad Nuruddin Safriandono Adhitya Nugraha Adigwe, Wilfred Adimabua Ojugo, Arnold Adityawan, Harish Trio Afotanwo, Anderson Afridiansyah, Rahmanda Aghaunor, Tabitha Chukwudi Aghware, Fidelis Obukohwo Agustina, Feri Ahmad Salafuddin Ajib Susanto Akazue, Maureen Ifeanyi Akbar Aji Nugroho Akbar, Ismail Akhmad Dahlan Ako, Rita Erhovwo Akrom, Muhamad Alvin Faiz Kurniawan Amir Musthofa Anak Agung Gede Sugianthara Andik Setyono Antonio Ciputra Antonius Erick Handoyo Araaf, Mamet Adil Arya Kusuma Binitie, Amaka Patience Budi Widjajanto Budi, Setyo Cahaya Jatmoko Chaerul Umam Chaerul Umam Christian, Henry Christy Atika Sari Chukwudi Aghaunor, Tabitha Cinantya Paramita Ciputra, Antonio Danu Hartanto Daurat Sinaga Desi Purwanti Kusumaningrum Desi Purwanti Kusumaningrum Devi Purnamasari Dhendra Marutho Dian Kristiawan Nugroho Dumebi Okpor, Margaret Dutta, Pushan Kumar Dwi Puji Prabowo Dwi, Bernadetta Sri Endah Eboka, Andrew Okonji Edy Winarno Egia Rosi Subhiyakto Ejeh, Patrick Ogholuwarami Eko Hari Rachmanto Eko Hari Rachmawanto Eko Septyasari Elkaf Rahmawan Pramudya Eluemnor Anazia, Kizito Emordi, Frances Uche Enadona Oweimeito, Amanda Erhovwo Ako, Rita Erlin Dolphina Erna Zuni Astuti Etika Kartikadarma Farah Zakiyah Rahmanti Farooq, Omar Farroq, Omar Ferda Ernawan Firnando, Fadel Muhamad Fittria Shofrotun Ni'mah Florentina Esti Nilawati Florentina Esti Nilawati Gan, Hong-Seng Geteloma, Victor Ochuko Ghosal, Sudipta Kr Giovani Ardiansyah Gomiasti, Fita Sheila Hanny Haryanto Henry Christian Herowati, Wise Heru Agus Santoso Ibnu Gemaputra Ramadhan Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibnu Utomo Wahyu Mulyono Ibor, Ayei Egu Ihya Ulumuddin, Dimas Irawan Imanuel Harkespan Imanulloh, Satrio Bagus Indra Gamayanto Islam, Hussain Md Mehedul Isworo Nugroho Iwan Setiawan Wibisono Jutono Gondohanindijo, Jutono Kartikadarma , Etika Kusuma, Edi Jaya Kusuma, Muh Galuh Surya Putra L. Budi Handoko Lalang Erawan M. Dalvin Marno Putra Md Kamruzzaman Sarker Md Kamruzzaman Sarker Minh T. Nguyen, Minh T. Mohammad Rizal, Mohammad Muchamad Akbar Nurul Adzan Muhamada, Keny Mulyono, Ibnu Utomo Wahyu Musfiqur Rahman Sazal Muslikh, Ahmad Rofiqul Mustofa, Fachrul Noor Ageng Setiyanto Noor Ageng Setiyanto, Noor Ageng Nova Rijati Nugroho, Sandy Ochuko Geteloma, Victor Octara Pribadi Odiakaose , Christopher Chukwufunaya Odiakaose, Chris Chukwufunaya Odiakaose, Christopher Chukwufunaya Ojugo, Arnold Adimabua Okpor, Margaret Dumebi Omar Farooq Omoruwou, Felix Pradana, Akbar Ganang Prajanto Wahyu Adi, Prajanto Wahyu Pratama, Nizar Rafi Purnamasari, Devi Rachman, Rahadian Kristiyanto Ricardus Anggi Pramunendar Robet Robet Ruri Suko Basuki Sahu, Aditya Kumar Santoso, Siane Sarker, Md Kamruzzaman Sasono Wibowo Setiawan, Marcell Adi Setyoko, Bimo Haryo Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Sinaga, Daurat Stefanus Santosa Sudibyo, Usman Sukamto, Titien S Sunarjo, Macellino Setyaji Suyud Widiono Syahputra, Zulfikar Adi Syahroni Wahyu Iriananda, Syahroni Wahyu T Sutojo T. Sutojo Tan Samuel Permana Tan Samuel Permana Titien S sukamto Trisnapradika, Gustina Alfa Ugbotu, Eferhire Valentine Valentine Ugbotu, Eferhire Warto - Wellia Shinta Sari Wellia Shinta Sari Wibowo, Mochammad Abdurrochman Ari Wijaya, Nantalira Niar Wijayanti, Ella Budi Yoro, Rume Elizabeth Yusianto Rindra Zuama, Leygian Reyhan