Search Results - "Sari, Christy Atika"

Refine Results
  1. 1

    Lovebird image classification based on convolutional neural network by Auni, Amelia Gizzela Sheehan, Sari, Christy Atika, Rachmawanto, Eko Hari, Doheir, Mohamed

    Published in Teknika (30-11-2023)
    “…Lovebird is a type of bird from the Psittacidae family, consisting of 90 generations. One of them is the genus Agapornis Selby or Lovebird, which has 9…”
    Get full text
    Journal Article
  2. 2

    A Combination of Inverted LSB, RSA, and Arnold Transformation to get Secure and Imperceptible Image Steganography by Kusuma, Edi Jaya, Sari, Christy Atika, Rachmawanto, Eko Hari, Setiadi, De Rosal Ignatius Moses

    Published in Journal of ICT Research and Applications (01-01-2018)
    “…Securing images can be achieved using cryptography and steganography. Combining both techniques can improve the security of images. Usually, Arnold's…”
    Get full text
    Journal Article
  3. 3

    DWT-SVD Combination Method for Copyrights Protection by Rachmawanto, Eko Hari, Atika Sari, Christy, Pradana, Rizky Putra

    Published in Scientific Journal of Informatics (31-05-2020)
    “…Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's…”
    Get full text
    Journal Article
  4. 4

    Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security by Atika Sari, Christy, Rachmawanto, Eko Hari, Haryanto, Christanto Antonius

    Published in Scientific Journal of Informatics (29-11-2018)
    “…Advances in technology in the field of internet, making the Internet become the most popular data transmission media for now. This is certainly not free from…”
    Get full text
    Journal Article
  5. 5

    A High Performace of Local Binary Pattern on Classify Javanese Character Classification by Susanto, Ajib, Sinaga, Daurat, Sari, Christy Atika, Rachmawanto, Eko Hari, Setiadi, De Rosal Ignatius Moses

    Published in Scientific Journal of Informatics (30-05-2018)
    “…The classification of Javanese character images is done with the aim of recognizing each character. The selected classification algorithm is K-Nearest Neighbor…”
    Get full text
    Journal Article
  6. 6

    Rancang Bangun Sistem Informasi Pengarsipan Data Pasien Klinik Cemara by Subhiyakto, Egia Rosi, Astuti, Yani Parti, Umaroh, Liya, Utomo, Danang Wahyu, Rachmawanto, Eko Hari, Sari, Christy Atika

    Published in Techno. Com (01-02-2017)
    “…Pengelolaan data pasien pada sebuah rumah sakit atau klinik menjadi hal yang penting demi lancarnya aktivitas di rumah sakit atau klinik tersebut. Penelitian…”
    Get full text
    Journal Article
  7. 7

    Implementasi E-Arsip Untuk Penyimpanan Dokumen Digital Pada PT BPD Jateng (Bank Jateng) by Nilawati, Florentina Esti, Rizal, Mohammad, Rachmawanto, Eko Hari, Setiadi, De Rosal Ignatius Moses, Sari, Christy Atika

    Published in Techno. Com (26-11-2019)
    “…Bank Pembangunan Daerah Jawa Tengah merupakan Bank milik Pemerintah Provinsi Jawa Tengah bersama-sama dengan Pemerintah Kota/Kabupaten Se-Jawa Tengah. Seiring…”
    Get full text
    Journal Article
  8. 8

    Uji Performa Penyisipan Pesan Dengan Metode LSB dan MSB Pada Citra Digital Untuk Keamanan Komunikasi by Jatmoko, Cahaya, Handoko, L. Budi, Sari, Christy Atika, Setiadi, De Rosal Ignatius Moses

    Published in Jurnal ilmiah dinamika rekayasa (Online) (14-03-2018)
    “…Salah satu teknik penyembunyian data yang populer adalah steganografi. Teknik ini dapat mengecoh pihak penyadap data sehingga informasi rahasia tetap aman…”
    Get full text
    Journal Article
  9. 9

    PERLINDUNGAN HAK CIPTA PADA CITRA DIGITAL MENGGUNAKAN LEAST SIGNIFICANT BIT BERBASIS DETEKSI TEPI CANNY by Susanto, Ajib, Sari, Christy Atika, Setiadi, De Rosal Ignatius Moses, Rachmawanto, Eko Hari

    Published in Simetris (Online) (01-11-2017)
    “…Watermarking merupakan salah satu ilmu penyembunyian data dengan tujuan untuk mengamankan citra, salah satunya yaitu copyright protection. Beberapa algoritma…”
    Get full text
    Journal Article
  10. 10

    KOMBINASI ALGORITMA ONE TIME PAD DAN CHAOTIC SEQUENCE DALAM OPTIMASI ENKRIPSI GAMBAR by Setiadi, De Rosal Ignatius Moses, Rachmawanto, Eko Hari, Sari, Christy Atika

    Published in Simetris (Online) (01-11-2017)
    “…Pada makalah ini, kriptografi dipilih sebagai teknik untuk mengamankan data, khusunya data gambar. Teknik kriptografi mempunyai kelebihan yaitu menyamarkan…”
    Get full text
    Journal Article
  11. 11

    Pengembangan Website Radio SSFM Semarang dengan Codeigniter Berbasis Model View Controller by Salafuddin, Ahmad, Setiadi, De Rosal Ignatius Moses, Kusumaningrum, Desi Purwanti, Rachmawanto, Eko Hari, Sari, Christy Atika

    Published in Jurnal Eksplora Informatika (Online) (28-09-2018)
    “…Radio SSFM Semarang merupakan salah satu radio yang pernah populer di Semarang. Radio ini merupakan salah satu anak perusahaan Suara Merdeka grup. Radio SSFM…”
    Get full text
    Journal Article
  12. 12

    Integrasi Aplikasi Desktop dan Mobile pada Koperasi Karyawan Mitra Makmur by Setiadi, De Rosal Ignatius Moses, Adzan, Muchamad Akbar Nurul, Kusumaningrum, Desi Purwanti, Rachmawanto, Eko Hari, Sari, Christy Atika

    Published in Jurnal Eksplora Informatika (Online) (28-09-2018)
    “…Koperasi Karyawan Mitra Makmur memiliki aplikasi Dekstop untuk menunjang kegiatannya. Walaupun demikian terdapat kendala dimana kurang praktisnya aplikasi…”
    Get full text
    Journal Article
  13. 13

    Modifikasi Enkripsi Gambar Menggunakan 64-Bit Kunci pada Algoritma Data Encryption Standard (DES) by Mulyono, Ibnu Utomo Wahyu, Sari, Wellia Shinta, Setiadi, De Rosal Ignatius Moses, Sari, Christy Atika

    Published in Jurnal ilmiah dinamika rekayasa (Online) (01-08-2018)
    “…Proteksi data menggunakan teknik kriptiografi telah dilakukan sejak abad ke 14. Algoritma kriptografi sampai saat ini masih dapat digunakan dan mempunyai…”
    Get full text
    Journal Article
  14. 14

    Implementasi Pengamanan Citra Digital Berbasis Metode Kriptografi Vernam Cipher by Permana, Tan Samuel, Sari, Christy Atika, Rachmawanto, Eko Hari, Setiadi, De Rosal Ignatius Moses, Subhiyakto, Egia Rosi

    Published in Techno. Com (06-02-2017)
    “…Penggunaan media online dalam melakukan aktivitas telah semakin marak terjadi pada dinamika masyarakat modern. Salah satu obyek sasaran dalam aktivitas online…”
    Get full text
    Journal Article
  15. 15

    StegoCrypt Scheme using LSB-AES Base64 by Anwar, Fahmi, Rachmawanto, Eko Hari, Atika Sari, Christy, Ignatius Moses Setiadi, De Rosal

    “…Many people use the internet in their daily communication. But the risks of data theft on the internet are quite high, so sending security is a very important…”
    Get full text
    Conference Proceeding
  16. 16

    A Comparative Study MD5 and SHA1 Algorithms to Encrypt REST API Authentication on Mobile-based Application by Ignatius Moses Setiadi, De Rosal, Faishal Najib, Afif, Rachmawanto, Eko Hari, Atika Sari, Christy, Sarker, Kamruzzaman, Rijati, Nova

    “…Mobile-based applications that use the Client-Server system certainly require an Application Programming Interface (API) as an intermediary to communicate with…”
    Get full text
    Conference Proceeding
  17. 17

    Remove Blur Image Using Bi-Directional Akamatsu Transform and Discrete Wavelet Transform by Andono, Pulung Nurtantio, Sari, Christy Atika

    “…Purpose: Image is an imitation of everything that can be materialized, and digital images are taken using a machine. Although digital image capture uses…”
    Get full text
    Journal Article
  18. 18

    Dual Protection on Message Transmission based on Chinese Remainder Theorem and Rivest Cipher 4 by Ronaldo Cahyono, H. Kevin, Atika Sari, Christy, Ignatius Moses Setiadi, De Rosal, Hari Rachmawanto, Eko

    “…This research proposes a combination of dual protection on text messages transmission using Chinese Remainder Theorem (CRT) steganography and Rivest Cipher 4…”
    Get full text
    Conference Proceeding
  19. 19

    An Improve Image Watermarking using Random Spread Technique and Discrete Cosine Transform by Susanto, Ajib, Ignatius Moses Setiadi, De Rosal, Hari Rachmawanto, Eko, Wahyu Mulyono, Ibnu Utomo, Atika Sari, Christy

    “…Watermarking is a powerful technique to protect copyright from cyber-crime. This study proposes a random spread technique based on the Discrete Cosine…”
    Get full text
    Conference Proceeding
  20. 20

    Comparative Study of Machine Learning Algorithms for Performing Ham or Spam Classification in SMS by Astuti, Erna Zuni, Sari, Christy Atika, Rachmawanto, Eko Hari, Ali, Rabei Raad

    “…Purpose: Fraud is rampant in the current era, especially in the era of technology where there is now easy access to a lot of information. Therefore, everyone…”
    Get full text
    Journal Article