Claim Missing Document
Check
Articles

Found 26 Documents
Search

Pemanfaatan Teknik Voice Activity Detection Untuk Mengamati Prosentase Pendudukan Sinyal Wicara Pada Saluran Telephon Rena Widyaningtyas, ; Mike Yuliana, ; Tri Budi Santoso, ; Titon Dutono,
Teknika Vol 9, No 2 (2008)
Publisher : Teknika

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Dalam penelitian ini dilakukan sebuah pengamatan nilai prosentase pendudukan sinyal wicara pada saluran telephon. Kondisi voice ditandai sebagai suatu kondisi di mana terdapat sinyal wicara yang terdeteksi oleh sistem. Kondisi silent dapat diartikan sebagai sebuah kondisi di mana tidak ada sinyal wicara yang menduduki sistem. Penentuan kapan kondisi voice atau silent dapat dilakukan dengan teknik voice activity detection (VAD). Sinyal wicara yang melalui jalur telephon disampel dan disusun dalam bentuk frame. Proses penghitungan energi pada setiap frame untuk penentuan kondisi voice atau silent dengan memanfaatkan short term energy (STE) dengan level standar dari ambang pendengaran. Hasil penghitungan ini dikombinasikan dengan proses pitch detection untuk menentukan kondisi voice atau bukan (silent). Berapa besar prosentase nilai voice dari total waktu yang digunakan akan menentukan prosentase pendudukan sinyal wicara pada saluran telephon. Hasil akhir dari penelitian ini berupa prosentase kondisi voice atau bukan voice (silent). Dari hasil ini dapat diketahui karakteristik penggunaan sinyal wicara pada saluran telephon kurang lebih 35.06% untuk pembicara perempuan dan 26,6% untuk pembicara laki-laki. Dengan  demikian akan memungkinkan prosentase saluran tanpa ada sinyal wicara bisa digunakan untuk keperluan transmisi data yang lain. This paper described an observation of the percentage of speech signal occupation on the telephone line. The voice signal was signed by the condition where the speech signals detected by the system. The silent condition was defined by the condition where the speech signals did not detected by the system. The decision when the voice or silent was happened can do by using voice activity detection (VAD) technique. Speech signal through telephone line was sampled and framed. Short term energy (STE) computation based on standard energy threshold of hearing, for each frame for make a decision when the voice or silent happened. The total value of voice compare the total duration of occupation the talking time is used as the percentage of voice occupation on the telephone line.   The result of the experiment indicated that the characteristics of speech occupation in the telephone line did not more than 35.06% for female speaker and 26.60% for male speaker. Based on this real condition of the telephone line, we can see there were opportunities for other utilization, especially for data transmission.  
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB)

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB)

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Jauhar, Ismed; Sudarsono, Amang; Yuliana, Mike
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Firdaus, Afany Zeinata; Yuliana, Mike; Samsono Hadi, Mochamman Zen
EMITTER International Journal of Engineering Technology Vol 1, No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB) | DOI: 10.24003/emitter.v1i1.6

Abstract

In todays era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.
Secret Key Establishment Using Modified Quantization Log For Vehicular Ad-Hoc Network Kriswantoro, M. Cahyo; Sudarsono, Amang; Yuliana, Mike
Inform : Jurnal Ilmiah Bidang Teknologi Informasi dan Komunikasi Vol. 6 No. 2 (2021)
Publisher : Universitas Dr. Soetomo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (600.096 KB) | DOI: 10.25139/inform.v6i2.4037

Abstract

Traditional cryptographic approaches such as symmetric and asymmetric cryptography are commonly employed to solve network security issues. The Secret Key Generation (SKG) system has the advantage of extracting secret keys from a wireless channel's physical layer information. It allows two wireless devices within the transmission range to extract a shared symmetric key without the use of a fixed key distribution infrastructure, allowing vehicular ad hoc networks to exchange information (VANET). This study aims to create a secure data communication system on the Vehicular Ad-Hoc Network using RSS Key Generation. Starting from the Modified Quantization Log, the results of the Modified Quantization Log show that the average KDRM between Alice and Bob is the average KDRM between Alice and Bob is 9.4%; meanwhile, the average KGR is 71.4 bps. This shows that the number of bit mismatches after the Modified Quantization Log process between the two valid users is already small, because they have used the pre-processing process in front of them, namely using the Kalman Filter and from the results of the BCH Code to be matched again so that it becomes the key. The next process is Universal Hash which is tested with the NIST test. The NIST Test parameters used are approximately entropy, frequency, block frequency, longest run, cumulative sum forward, and cumulative sum reverse. The existing results are appropriate; namely, the threshold in p whose value is above 0.01 is achieved. From the results of the Average Approximate Entropy, it is found that the largest value is obtained by the 40k10ms scheme, which is 0.7352.
Implementasi Real Time Voice Scrambler pada DSK TMS320C5402 dengan Menggunakan Metode Kriptografi RC4 Mike Yuliana; Titon Dutono; Wirawan Wirawan
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) 2007
Publisher : Jurusan Teknik Informatika, Fakultas Teknologi Industri, Universitas Islam Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

Pada paper ini, metode kriptografi RC4 akan diimplementasikan pada DSK TMS320C5402 sebagaimetode yang digunakan untuk mengacak suara. Sistem tersebut bisa berhasil bila proses enkripsi/dekripsi bisareal time, dan dari hasil pengukuran terlihat bahwa sistem yang dihasilkan bisa real time karena waktu eksekusiproses enkripsi/dekripsi tiap sampel tidak melebihi 125 μ detik, dimana waktu eksekusi yang dibutuhkan untukproses enkripsi adalah 1,260 μ detik sedangkan waktu eksekusi yang dibutuhkan untuk proses dekripsi adalah1,140 μ detik.Dari hasil analisa terlihat bahwa sinyal suara hasil enkripsi berbeda dengan sinyal suara aslinya,sedangkan sinyal suara hasil dekripsi sama dengan sinyal suara aslinya dan apabila kita dengarkan ternyatasinyal suara hasil dekripsi sama dengan sinyal suara aslinya . Hal ini menunjukkan keberhasilan DSKTMS320C5402 sebagai enkriptor/dekriptor suara, karena suara hasil dekripsi bisa didengarkan seperti sinyalsuara aslinyaKata kunci: DSK TMS320C5402, Metode enkripsi/dekripsi RC4, MOS, Intelligibility suara.
Steganography Based on Data Mapping and LSB Substitution With RSS Key Generation MUHAMMAD TAUFIQ SUMADI; AMANG SUDARSONO; MIKE YULIANA
Jurnal Elkomika Vol 10, No 1 (2022): ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektr
Publisher : Institut Teknologi Nasional, Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.26760/elkomika.v10i1.1

Abstract

ABSTRAKUntuk menghindari pihak ketiga yang tidak berwenang, berbagai solusi keamanan telah dibuat untuk mengamankan kerahasiaan pesan atau informasi, salah satunya adalah steganografi. Penelitian ini mengusulkan teknik pembangkitan kunci dalam proses steganografi. Secara umum steganografi menggunakan konsep kunci simetris, dimana metode ini membutuhkan pihak ketiga dalam proses pendistribusian kunci rahasia. Solusi dari permasalahan tersebut penulis mengusulkan metode baru dengan menggabungkan pembangkitan kunci rahasia menggunakan RSS pada jaringan nirkabel dengan steganografi untuk menyembunyikan pesan. Sistem yang kami usulkan diterapkan pada kondisi statis dan kondisi dinamis untuk menguji kinerja. Pada proses pembangkitan kunci didapatkan waktu rata-rata 110,52 detik untuk membangkitkan kunci. Pada proses embedding, waktu komputasi rata-rata untuk 65.536 karakter adalah 6,38 detik untuk menghasilkan citra stego. Pada proses ekstraksi didapatkan waktu komputasi rata-rata 0,63 detik untuk mendapatkan pesan rahasia.Kata kunci: RSS, Key Generation, Symmetric Cryptography, Steganography. ABSTRACTTo avoid unauthorised third parties, variety of security solutions have been created to secure the confidentiality of messages or information, one of which is steganography. This study proposes key generation technique in the steganography process. In general, steganography uses a symmetric key concept, where this method requires a third party in the secret key distribution process. The solution to this problem the authors propose a new method by combining secret key generation using RSS on a wireless network with steganography for hiding messages. To test performance, our proposed system is used in both static and dynamic condition. In the key generation process, an average time of 110.52 seconds was obtained to generate keys. In the embedding process, the average computation time for 65,536 characters is 6.38 seconds to produce a stego image. In the extraction process, an average computation time of 0.63 seconds is obtained to get a secret message.Keywords: RSS, Key Generation, Symmetric Cryptography, Steganography.
Secure Ubiquitous Sensor Network based on Elliptic Curve MenezesQu Vanstoneas Status Data Supply of EnvironmentinDisaster Management Ismed Jauhar; Amang Sudarsono; Mike Yuliana
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (8771.4 KB) | DOI: 10.24003/emitter.v1i1.1

Abstract

Along with the many environmental changes, it enables a disaster either natural or man-made objects. One of the efforts made to prevent disasters from happening is to make a system that is able to provide information about the status of the environment that is around. Many developments in the sensor system makes it possible to load a system that will supply real-time on the status of environmental conditions with a good security system. This study created a supply system status data of environmental conditions, especially on bridges by using Ubiquitous Sensor Network. Sensor used to detect vibrations are using an accelerometer. Supply of data between sensors and servers using ZigBee communication protocol wherein the data communication will be done using the Elliptic Curve Integrated security mechanisms Encryption Scheme and on the use of Elliptic Curve key aggrement Menezes-Qu-Vanstone. Test results show the limitation of distance for communication is as far as 55 meters, with the computation time for encryption and decryption with 97 and 42 seconds extra time for key exchange is done at the beginning of communication .Keywords: Ubiquitous Sensor Network, Accelerometer, ZigBee,Elliptic Curve Menezes-Qu-Vanstone
Implementation and Analysis Audio Steganography Used Parity Coding for Symmetric Cryptography Key Delivery Afany Zeinata Firdaus; Mike Yuliana; Mochamman Zen Samsono Hadi
EMITTER International Journal of Engineering Technology Vol 1 No 1 (2013)
Publisher : Politeknik Elektronika Negeri Surabaya (PENS)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (7105.913 KB) | DOI: 10.24003/emitter.v1i1.6

Abstract

In today's era of communication, online data transactions is increasing. Various information even more accessible, both upload and download. Because it takes a capable security system. Blowfish cryptographic equipped with Audio Steganography is one way to secure the data so that the data can not be accessed by unauthorized parties. In this study Audio Steganography technique is implemented using parity coding method that is used to send the key cryptography blowfish in e-commerce applications based on Android. The results obtained for the average computation time on stage insertion (embedding) the secret message is shorter than the average computation time making phase (extracting) the secret message. From the test results can also be seen that the more the number of characters pasted the greater the noise received, where the highest SNR is obtained when a character is inserted as many as 506 characters is equal to 11.9905 dB, while the lowest SNR obtained when a character is inserted as many as 2006 characters at 5,6897 dB .Keywords: audio steganograph, parity coding, embedding, extractin, cryptography blowfih.