Jurnal Info Sains : Informatika dan Sains
urnal Info Sains : Informatika dan Sains (JIS) discusses science in the field of Informatics and Science, as a forum for expressing results both conceptually and technically related to informatics science. The main topics developed include: Cryptography Steganography Artificial Intelligence Artificial Neural Networks Decision Support System Fuzzy Logic Data Mining Data Science
Articles
420 Documents
3D Image Side Sharpening Using Fourier Phase Only Synthetis Method
Amran Sihotang Sihotang;
Petti Indrayati
Jurnal Info Sains : Informatika dan Sains Vol. 10 No. 2 (2020): September, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (693.138 KB)
|
DOI: 10.54209/infosains.v10i2.34
In the process of the Fourier Phase Only Synthetis method on two images, the observer must get the impression that the imagery actually changes shape to an intermediate form before it changes to the destination image. These changes must occur in a regular and consistent manner to achieve the image of the goal. This sharpening system is one of the systems that aims for this form change process is widely used in applications in the field of entertainment, computer animation, scientific visualization and education. The sharpening system on the 3-dimensional side of the image aims to identify the pattern of the image. Good image quality if it has good contrast and can describe clear ridges and valleys structures. Based on previous research that the study was conducted improvements with Fourier Phase Only Synthetis where the algorithm used simultaneously estimates all the intrinsic properties of. The quality of image sharpening relates to the clarity of ridge structure on the image side. A good image will have a good contrast and will well depict ridges and valleys, if the fingerprint imagery is of poor quality then it will have less contrast so it will less clearly describe the boundaries of ridges (hills). From the implementation of Fourier Phase Only Synthetis Analysis, using the main parameters ridge orientation image, has been successfully obtained the results of image side improvement well. This image side improvement will greatly help to improve the quality of 3-dimensional image extraction, by specifying constant values to get the bestresults.
Semi-public watermarking digital implementation in the concealment of text messages
Sitompul, Noferianto;
Maranata Pasaribu
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (681.314 KB)
|
DOI: 10.54209/infosains.v11i1.36
The purpose of this study is to generate watermarking of an input image. The watermarking process will begin with the process of reading color image pixels. After that, the process will be continued by calculating the step message value inserted and inserting all the necessary values in the watermarking checking process. In the event of an attack, then at the time of watermarking formation, a specific noise value (randomly generated) will be calculated to be inserted into the image. After the process of watermarking formation, then the process can be continued with checking watermarking and extracting messages.
Analysis And Implementation of Noekeon Algorithms For Encryption and Description of Text Data
Effendi, Noverta;
Fauzan Azim
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (682.074 KB)
|
DOI: 10.54209/infosains.v11i1.37
As the times evolve, human needs increase. Including information needs. Therefore, sending and storing files through electronic media requires a process that can ensure the security and integrity of the file. To ensure the safety and integrity of a file, an encoding process is required. Encryption is performed when the file is sent. This process will convert the original file into a confidential unreadable file. Meanwhile, the decryption process is done by the recipient of the sent file. The personal file received will be converted back to the original file. By encoding, the original file will not be read by unauthorized parties but only by recipients who have a decryption key.
Steganography Formation by utilizing Enhanced Least Significant Bit Algorithm
Pristiwanto, Pristiwanto;
Abdul Halim Hasugian
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (533.546 KB)
|
DOI: 10.54209/infosains.v11i1.38
Steganography is the science and art of hiding secret messages in other messages so that the existence of those messages cannot be known. The letter sent does not attract attention with steganography, and the container media does not arouse suspicion. Steganography requires two properties, namely container media and secret messages. The LSB method (least significant bit)is the simplest and easiest steganography method to implement. An example of implementing this method is to use a digital image as a cover text. Each pixel in the image is 1 (one) to 3 (three) bytes in size. Pda bit arrangement in a byte ( 1 byte = 8 bits), there are the most significant bits ( MSB) and the least significant bits (LSB). For example, on 11010010 bytes, the first bit from the right is the MSB bit, and the last bit from the right is the LSB bit. The matching bit is replaced with the message bit is the LSB bit, because the modification only changes the byte value to one higher or one lower than the previous value
Implementation of Linear Congruent Method For Guess the Drawing Game
Sinaga, Magdalena Sinaga;
Agustina Simangunsong
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (532.022 KB)
|
DOI: 10.54209/infosains.v11i1.39
In face guessing game is a game with pictures that will be scrambled and questions in this guess the face game application. Linear Congruent methods are used to generate random values used to randomize images and questions displayed on the guess the face game. Random value generation will be used in this game using lcm formula Xn = ( a (Xn-1) + b mod m. The constantly changing variable value in the game has a significant effect on the random value displayed. The ever-changing administration of a, Xn and b can avoid fixed or repetitive patterns of consecutive random value generation effects. In addition, the provision of variable changes can also prevent the repetition of questions that will be randomized in a row. While to avoid the exit of unwanted random values and used variable m as a limiter maximum value. The implementation of the above method can be concluded that the game guess the face of badminton athletes displays varied images and questions that users can play with their respective difficulty levels.
Design Simulation Queue Cake Shop With Lamport's Bakery Algorithm
Roberth Ricki Manaha Manaha;
Janeman Summah
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (749.991 KB)
|
DOI: 10.54209/infosains.v11i2.40
Mutual exclusion is one of the mechanisms that can be used to solve concurrency problems in the operating system. In the operating system, there are resources that cannot be shared at the same time, such as printers. These kinds of resources are called critical resources. Programs that use critical resources are called entering critical regions/sections. Programmers cannot rely on the operating system to understand and enforce these limits. The mutual exclusion settlement process was submitted by several experts. One of them is Lamport with a method known as Lamport's Bakery Algorithm. The work process of Lamport's Bakery Algorithm starts from the buyer entering the store and receiving the sequence number. If there is a waiter who is idle (not being / will serve other buyers), then the buyer directly asks for service from the waiter. If not, then the buyer sits in the buyer's waiting area and waits until his turn. Shoppers who have finished being served out of the store and waiters who are idle serve the lowest numbered buyers who are waiting at the waiting place of the buyer
Use of Rc4 Method In Android-Based Sms Security Application
Oktovantua Butarbutar
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (794.028 KB)
|
DOI: 10.54209/infosains.v11i2.41
. In maintaining the confidentiality of SMS, it takes a way to secure information that is important or confidential, namely by encrypting the SMS text, the level of information security of the message can be increased. One way to use for data and or information security is to use cryptographic system, this application uses RC4 algorithm which has the advantage of having a high level of security and speed process. This makes RC4 the best choice for the encryption process required by the information world towards the next century. The purpose ofbya is to prevent the occurrence of information / data taker without being known by the owner.
Text Encoding Using Cipher Block Chaining Algorithm
Santana Sinurat;
Maranatha Pasaribu
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (1149.095 KB)
|
DOI: 10.54209/infosains.v11i2.42
. Data confidentiality and security are critical in data communication, both for the purpose of shared security, and for individual privacy. Computer users who want their data unknown to unauthorized parties are always trying to work out how to secure the information that will be communicated or that will be stored. Protection against data confidentiality is increasing, one way is by applying cryptographic science. Cipher Block Chaining (CBC), this mode is a feedback mechanism on a block, and in this case the result of the previous block encryption is feedback into the current block encryption. The trick is to block the current plaintext in XOR first with the ciphertext block of the previous encryption result, then the result of this XOR-ing goes into the encryption function. With CBC mode, each ciphertext block is calculated not only on its plaintext block but also on the entire previous plaintext block. The author tries to co-create a text encoding to secure the data with the Cipher Block Chaining (CBC) cryptographic method.
File Compression Application Design Using Half Byte Algorithm
Paska Marto Hasugian;
Rizki Manullang
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (513.682 KB)
|
DOI: 10.54209/infosains.v11i2.43
The need for large data storage capacity seems increasingly important. This need is caused by the data that must be stored more and more. The storage is not allocated in one place only. But they will also store data or files elsewhere as data backups. How much storage capacity must be provided to hold all the data. Half Byte algorithm is one of the data compression algorithms. The Half Byte algorithm utilizes four left bits that are often the same sequentially especially text files. When the first four bits of the character are received in a row seven or more times, the algorithm compresses the data with marker bits, then the first character of the same four-bit series is followed by the last four-bit pair of the next series
Analysis Of Voice Data Security Security By Using The Rc4 Algorithm
Rika Nurhidayati;
Salauddin Muis
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 2 (2021): September, Informatics and Science
Publisher : SEAN Institute
Show Abstract
|
Download Original
|
Original Source
|
Check in Google Scholar
|
Full PDF (790.664 KB)
|
DOI: 10.54209/infosains.v11i2.44
Data security and confidentiality is one of the most important aspects in the field of communication, especially communication using computer media. One of the fields of science that is used to secure data is cryptography. Cryptography is a science that uses mathematical equations to encrypt and decrypt data. Encryption is the process of converting plaintext (readable data) into ciphertext (unreadable data) and decryption is the opposite of encryption, which changes ciphertext back into plaintext. In this study, the RC4 algorithm will be discussed to encrypt and decrypt mp3 files stored on the computer.