p-Index From 2020 - 2025
0.408
P-Index
This Author published in this journals
All Journal Jurnal Tunas
Negoro, Wahyu Sapta
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Digital Image Processing Education for Detection and Knowledge Information Hidden in Images Negoro, Wahyu Sapta; Azhar, Asbon Hendra; Destari, Ratih Adinda; Syahrian, Achmad
Jurnal TUNAS Vol 6, No 1 (2024): Edisi November
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jtunas.v6i1.117

Abstract

AbstractDigital Image Processing, known as Digital Image Processing, is a scientific discipline related to techniques for processing an image using a computer. There are several types of images, namely color images (RGB), grayscale images (grayscale), binary images (monochrome) (Akhmad Fadjeri et al, 2023). In the world of medicine, image segmentation is used to detect an object in a medical image or analyze the nature of a disease such as eye disease (keratitis) (Kon et al, 2023).Image is a representation or can also be said to be a picture, imitation, imitation, or similarity, of a particular object. Images, when grouped based on the type of data that makes up the image, are divided into 2 types, namely analog images and digital images (Yao et al, 2022). Analog Images and Digital Images Analog images are produced using analog tools, such as analog video cameras, CT scans, analog photo cameras, x-ray sensors for thorax photos, cams, short wave sensors in radar systems, ultrasound sensors in ultrasound systems, and others. -other (Tarpley et al., 2021).
Pelatihan Teknik Caesar Cipher Terhadap Keamanan Informasi Azhar, Asbon Hendra; Destari, Ratih Adinda; Negoro, Wahyu Sapta; Ardansyah, A
Jurnal TUNAS Vol 5, No 2 (2024): Edisi April
Publisher : LPPM STIKOM Tunas Bangsa

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30645/jtunas.v5i2.111

Abstract

The concept of cryptography has been used since ancient times by Julius Caesar and continues to develop today. Based on the era, cryptography is divided into two parts, namely classical cryptography and modern cryptography. The similarity between the two is that they both use mathematical concepts in the technique of creating and breaking a message. But in classical cryptography, the mathematical concepts used are still very simple, such as substitution, permutation and transpose. Meanwhile, in modern cryptography the mathematical concepts used are no longer simple, such as polynomials, prime numbers, groups, rings and fields. The advantage of classical cryptography is that it is easy to encrypt messages, but some encryption techniques also have a fatal weakness, namely that they are very easy to crack. An example of classic cryptography that is very easy to create and solve is the Caesar Cipher which only has 26 possible keys. Caesar Cipher is included in the Substitution Cipher encryption, where a random code or script is obtained by replacing each character in the original text.