Claim Missing Document
Check
Articles

Found 9 Documents
Search

Developing a secured image file management system using modified AES Heidilyn V. Gamido; Marlon V. Gamido; Ariel M. Sison
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (774.007 KB) | DOI: 10.11591/eei.v8i4.1317

Abstract

Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images.
An Improved Overlapping Clustering Algorithm to Detect Outlier Alvincent Egonia Danganan; Ariel M. Sison; Ruji P. Medina
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 6, No 4: December 2018
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.52549/ijeei.v6i4.499

Abstract

MCOKE algorithm in identifying data objects to multi cluster is known for its simplicity and effectiveness. Its drawback is the use of maxdist as a global threshold in assigning objects to one or more cluster while it is sensitive to outliers. Having outliers in the datasets can significantly affect the effectiveness of maxdist as regards to overlapping clustering. In this paper, the outlier detection is incorporated in MCOKE algorithm so that it can detect and remove outliers that can participate in the calculation of assigning objects to one or more clusters. The improved MCOKE algorithm provides better identification of overlapping clustering results. The performance was evaluated via F1 score performance criterion. Evaluation results revealed that the outlier detection demonstrated higher accuracy rate in identifying abnormal data (outliers) when applied to real datasets.
Modified AES Cipher Round and Key Schedule Edjie Malonzo De Los Reyes; Ariel M. Sison; Ruji Medina
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 7, No 1: March 2019
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (452.937 KB) | DOI: 10.52549/ijeei.v7i1.652

Abstract

In this paper, Advanced Encryption Standard was modified to address the lowdiffusion rate at the early rounds by adding additional primitive operationssuch as exclusive OR and modulo arithmetic in the cipher round. Furthermore,byte substitution and round constant addition were appended to the keyschedule algorithm. The modified AES was tested against the standard AESby means of avalanche effect and frequency test to measure the diffusion andconfusion characteristics respectively. The results of the avalanche effectevaluation show that there was an average increase in diffusion of 61.98% inround 1, 14.79% in round 2 and 13.87% in round 3. Consequently, the resultsof the frequency test demonstrated an improvement in the randomness of theciphertext since the average difference between the number of ones to zeros isreduced from 11.6 to 6.4 along with better-computed p-values. The resultsclearly show that the modified AES has improved diffusion and confusionproperties and the ciphertext can still be successfully decrypted and recoverback the original plaintext.
A modified genetic algorithm with a new crossover mating scheme Allemar Jhone P. Delima; Ariel M. Sison; Ruji P. Medina
Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol 7, No 2: June 2019
Publisher : IAES Indonesian Section

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (372.964 KB) | DOI: 10.52549/ijeei.v7i2.1047

Abstract

This study introduced the Inversed Bi-segmented Average Crossover (IBAX), a novel crossover operator that enhanced the offspring generation of the genetic algorithm (GA) for variable minimization and numerical optimization problems. An attempt to come up with a new mating scheme in generating new offspring under the crossover function through the novel IBAX operator has paved the way to a more efficient and optimized solution for variable minimization particularly on premature convergence problem using GA. A total of 597 records of student-respondents in the evaluation of the faculty instructional performance, represented by 30 variables, from the four State Universities and Colleges (SUC) in Caraga Region, Philippines were used as the dataset.  The simulation results showed that the proposed modification on the Average Crossover (AX) of the genetic algorithm outperformed the genetic algorithm with the original AX operator. The GA with IBAX operator combined with rank-based selection function has removed 20 or 66.66% of the variables while 13 or 43.33% of the variables were removed when GA with AX operator and roulette wheel selection function was used.
Developing a secured image file management system using modified AES Heidilyn V. Gamido; Marlon V. Gamido; Ariel M. Sison
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (774.007 KB) | DOI: 10.11591/eei.v8i4.1317

Abstract

Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images.
Developing a secured image file management system using modified AES Heidilyn V. Gamido; Marlon V. Gamido; Ariel M. Sison
Bulletin of Electrical Engineering and Informatics Vol 8, No 4: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (774.007 KB) | DOI: 10.11591/eei.v8i4.1317

Abstract

Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images.
File encryption based on reduced-round AES with revised round keys and key schedule Edjie Malonzo De Los Reyes; Ariel M. Sison; Ruji P. Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 16, No 2: November 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v16.i2.pp897-905

Abstract

The continuing advancement of technology had provided security issues in protecting the confidentiality of information. The need to protect unauthorized access of a third party is warranted.  In this paper, the reduced-round modified AES with revised round keys and key schedule is proposed to ensure file confidentiality.  The modifications to the AES cipher round was the reduction of the round iterations from 10 to 6, and additional key permutations were added in between states; while in the key schedule, additional byte substitution process was appended.  Time and throughput were utilized to measure the performance of the application's encryption/decryption process; while the avalanche effect and randomness tests were used to measure the security of the modified AES algorithm.  The results of evaluations have shown that the encryption and decryption time have improved by 1.27% and 1.21% respectively while the throughput has similarly improved by 1.29% and 3.19% for both encryption and decryption respectively.  Whereas the avalanche effect of the modified AES was 50.06% which was more than the ideal value of 50% and it was also better than the standard AES which was 49.94% using the sample dataset.  Finally, all the ciphertext outputs of the modified AES passed the randomness tests.
OCA: overlapping clustering application unsupervised approach for data analysis Alvincent Egonia Danganan; Ariel M. Sison; Ruji P. Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 14, No 3: June 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v14.i3.pp1471-1478

Abstract

In this paper, a new data analysis tool called Overlapping Clustering Application (OCA) was presented. It was developed to identify overlapping clusters and outliers in an unsupervised manner. The main function of OCA is composed of three phases. The first phase is the detection of the abnormal values(outliers) in the datasets using median absolute deviation. The second phase is to segment data objects into cluster using k-means algorithm. Finally, the last phase is the identification of overlapping clusters, it uses maxdist (maximum distance of data objects allowed in a cluster) as a predictor of data objects that can belong to multiple clusters.  Experimental results revealed that the developed OCA proved its capability in detecting overlapping clusters and outliers accordingly.
Modified AES for Text and Image Encryption Heidilyn V. Gamido; Ariel M. Sison; Ruji P. Medina
Indonesian Journal of Electrical Engineering and Computer Science Vol 11, No 3: September 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v11.i3.pp942-948

Abstract

Advanced Encryption Standard (AES) is one of the most frequently used encryption algorithms. In the study, the Advanced Encryption Standard is modified to address its high computational requirement due to the complex mathematical operations in MixColumns Transformation making the encryption process slow. The modified AES used Bit Permutation to replace the MixColumns Transformation in AES since bit permutation is easy to implement and it does not have any complex mathematical computation. Results of the study show that the modified AES algorithm exhibited increased efficiency due to the faster encryption time and reduced CPU usage. The modified AES algorithm also yielded higher avalanche effect which improved the performance of the algorithm.