Search Results - "Sari, Christy Atika"
-
1
Lovebird image classification based on convolutional neural network
Published in Teknika (30-11-2023)“…Lovebird is a type of bird from the Psittacidae family, consisting of 90 generations. One of them is the genus Agapornis Selby or Lovebird, which has 9…”
Get full text
Journal Article -
2
A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography
Published in Journal of ICT Research and Applications (01-01-2018)“…Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's…”
Get full text
Journal Article -
3
DWT-SVD Combination Method for Copyrights Protection
Published in Scientific Journal of Informatics (31-05-2020)“…Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's…”
Get full text
Journal Article -
4
Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security
Published in Scientific Journal of Informatics (29-11-2018)“…Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from…”
Get full text
Journal Article -
5
A High Performace of Local Binary Pattern on Classify Javanese Character Classification
Published in Scientific Journal of Informatics (30-05-2018)“…The classification of Javanese character images is done with the aim of recognizing each character. The selected classification algorithm is K-Nearest Neighbor…”
Get full text
Journal Article -
6
Rancang Bangun Sistem Informasi Pengarsipan Data Pasien Klinik Cemara
Published in Techno. Com (01-02-2017)“…Pengelolaan data pasien pada sebuah rumah sakit atau klinik menjadi hal yang penting demi lancarnya aktivitas di rumah sakit atau klinik tersebut. Penelitian…”
Get full text
Journal Article -
7
Implementasi E-Arsip Untuk Penyimpanan Dokumen Digital Pada PT BPD Jateng (Bank Jateng)
Published in Techno. Com (26-11-2019)“…Bank Pembangunan Daerah Jawa Tengah merupakan Bank milik Pemerintah Provinsi Jawa Tengah bersama-sama dengan Pemerintah Kota/Kabupaten Se-Jawa Tengah. Seiring…”
Get full text
Journal Article -
8
Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi
Published in Jurnal ilmiah dinamika rekayasa (Online) (14-03-2018)“…Salah satu teknik penyembunyian data yang populer adalah steganografi. Teknik ini dapat mengecoh pihak penyadap data sehingga informasi rahasia tetap aman…”
Get full text
Journal Article -
9
PERLINDUNGAN HAK CIPTA PADA CITRA DIGITAL MENGGUNAKAN LEAST SIGNIFICANT BIT BERBASIS DETEKSI TEPI CANNY
Published in Simetris (Online) (01-11-2017)“…Watermarking merupakan salah satu ilmu penyembunyian data dengan tujuan untuk mengamankan citra, salah satunya yaitu copyright protection. Beberapa algoritma…”
Get full text
Journal Article -
10
KOMBINASI ALGORITMA ONE TIME PAD DAN CHAOTIC SEQUENCE DALAM OPTIMASI ENKRIPSI GAMBAR
Published in Simetris (Online) (01-11-2017)“…Pada makalah ini, kriptografi dipilih sebagai teknik untuk mengamankan data, khusunya data gambar. Teknik kriptografi mempunyai kelebihan yaitu menyamarkan…”
Get full text
Journal Article -
11
Pengembangan Website Radio SSFM Semarang dengan Codeigniter Berbasis Model View Controller
Published in Jurnal Eksplora Informatika (Online) (28-09-2018)“…Radio SSFM Semarang merupakan salah satu radio yang pernah populer di Semarang. Radio ini merupakan salah satu anak perusahaan Suara Merdeka grup. Radio SSFM…”
Get full text
Journal Article -
12
Integrasi Aplikasi Desktop dan Mobile pada Koperasi Karyawan Mitra Makmur
Published in Jurnal Eksplora Informatika (Online) (28-09-2018)“…Koperasi Karyawan Mitra Makmur memiliki aplikasi Dekstop untuk menunjang kegiatannya. Walaupun demikian terdapat kendala dimana kurang praktisnya aplikasi…”
Get full text
Journal Article -
13
Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES)
Published in Jurnal ilmiah dinamika rekayasa (Online) (01-08-2018)“…Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai…”
Get full text
Journal Article -
14
Implementasi Pengamanan Citra Digital Berbasis Metode Kriptografi Vernam Cipher
Published in Techno. Com (06-02-2017)“…Penggunaan media online dalam melakukan aktivitas telah semakin marak terjadi pada dinamika masyarakat modern. Salah satu obyek sasaran dalam aktivitas online…”
Get full text
Journal Article -
15
StegoCrypt Scheme using LSB-AES Base64
Published in 2019 International Conference on Information and Communications Technology (ICOIACT) (01-07-2019)“…Many people use the internet in their daily communication. But the risks of data theft on the internet are quite high, so sending security is a very important…”
Get full text
Conference Proceeding -
16
A Comparative Study MD5 and SHA1 Algorithms to Encrypt REST API Authentication on Mobile-based Application
Published in 2019 International Conference on Information and Communications Technology (ICOIACT) (01-07-2019)“…Mobile-based applications that use the Client-Server system certainly require an Application Programming Interface (API) as an intermediary to communicate with…”
Get full text
Conference Proceeding -
17
Remove Blur Image Using Bi-Directional Akamatsu Transform and Discrete Wavelet Transform
Published in Scientific journal of informatics (Semarang) (17-11-2022)“…Purpose: Image is an imitation of everything that can be materialized, and digital images are taken using a machine. Although digital image capture uses…”
Get full text
Journal Article -
18
Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4
Published in 2019 International Conference on Information and Communications Technology (ICOIACT) (01-07-2019)“…This research proposes a combination of dual protection on text messages transmission using Chinese Remainder Theorem (CRT) steganography and Rivest Cipher 4…”
Get full text
Conference Proceeding -
19
An Improve Image Watermarking using Random Spread Technique and Discrete Cosine Transform
Published in 2019 International Conference on Information and Communications Technology (ICOIACT) (01-07-2019)“…Watermarking is a powerful technique to protect copyright from cyber-crime. This study proposes a random spread technique based on the Discrete Cosine…”
Get full text
Conference Proceeding -
20
Comparative Study of Machine Learning Algorithms for Performing Ham or Spam Classification in SMS
Published in Scientific journal of informatics (Semarang) (29-02-2024)“…Purpose: Fraud is rampant in the current era, especially in the era of technology where there is now easy access to a lot of information. Therefore, everyone…”
Get full text
Journal Article