Claim Missing Document
Check
Articles

Found 7 Documents
Search

Implementasi Algoritma Discrete Cosine Transform Untuk Kompresi Citra Pada Marker-Based Tracking Augmented Reality Iwan Sutrisman; Nur Widiyasono; Heni Sulastri
Computatio : Journal of Computer Science and Information Systems Vol 4, No 1 (2020): COMPUTATIO : JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS
Publisher : Faculty of Information Technology, Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24912/computatio.v4i1.5628

Abstract

Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khususnya pada marked-based tracking. Kompresi citra dilakukan dengan mengimplementasikan algoritma Discrete Cosine Transform pada program MATLAB. Hasil pengujian kompresi citra menunjukkan bahwa algoritma DCT dapat memampatkan citra hingga 26% dari ukuran aslinya tanpa mengurangi kualitas gambar secara signifikan. Hasil pengujian rating marker menunjukkan, pada Vuforia, tidak terdapat perubahan star rating, sedangkan pada ARCore, terdapat peningkatan nilai rating sebesar 5-40 quality score. Algoritma DCT dapat diterapkan untuk kompresi citra pada marker-based tracking, khususnya dalam meningkatkan kualitas marker pada ARCore.
Simulasi Analisis Bukti Digital Pada Layanan Cloud Computing Menggunakan Metode NIST 800-86 Irfan Helmi; Nur Widiyasono; Rohmat Gunawan
JURNAL MEDIA INFORMATIKA BUDIDARMA Vol 3, No 3 (2019): Juli 2019
Publisher : STMIK Budi Darma

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30865/mib.v3i3.1193

Abstract

Ease and support for cloud-based data storage It has supported an increase in the number of cloud services. The increasing number of uses for cloud services also increases the number of digital-based criminal actions related to the addition of facilities to cloud services. The cloud service feature designed to store data to support the smooth running of business processes can be misused by criminal assistance to store crime data. Accurate digital evidence is one way to prove a digital crime, which can then be used as supporting evidence in the trial. This study discusses the analysis of digital evidence from a cloud service. The analysis process using the NIST 800-86 method is carried out on digital evidence from 5 previously prepared scenarios related to the use of cloud service features that use being misused. Data acquisition techniques use the method of direct acquisition and physical imaging to obtain digital evidence. The experimental results showed that after scenario 1 and scenario 3, information on the file name and directory of the paths downloaded by client 1 and client 2 were obtained with information on the IP address, mac address, user name, password and time stamp. After scenario 2, digital evidence has been obtained that contains information on the name and location of the folder on the cloud server. After scenario 4, information on the name of the file and the shared folder is successfully obtained, equipped with client information that has the right to access the files and folders. After scenario 5, information about the file name and directory of the file path is successfully obtained.
Investigation of Fake Insider Threats on Private Cloud Computing Services Dwi Kurnia Wibowo; Ahmad Luthfi; Nur Widiyasono
International Journal of Science, Technology & Management Vol. 3 No. 5 (2022): September 2022
Publisher : Publisher Cv. Inara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46729/ijstm.v3i5.613

Abstract

Cloud-based services are service system mechanisms used by companies or organizations in conducting computerized and integrated transactions in a computer network. A service system must of course be balanced with a level of security. This is used to anticipate cyber crimes that have the potential to occur. Cloud-based services themselves are usually offered by a Cloud Service Provider (CSP). CSPs are generally configured so that they are accessible on the public internet for their services. Companies that prioritize data security want a system that is safe from a series of cyber crimes. Private cloud computing scheme is a solution that can be implemented as an alternative. The problem that occurs is the possibility of MITC (Man in the Cloud) attacks that infiltrate and manipulate identities so that they are detected as fake insider threats on cloud systems. This thesis aims to carry out threat analysis with the Man in the Cloud attack technique on private cloud computing services based on a study of the ISO 27032 standard. Reports and documentation of the results of the analysis are expected to become recommendations for the cybersecurity investigation and management process related to threats to cloud services with private schemes cloud computing.
Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab Fauzan Novaldi Suteja; Eka Wahyu Hidayat; Nur Widiyasono
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.314

Abstract

The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.
Analysis Malware Flawed Ammyy RAT Dengan Metode Reverse Engineering Tesa Pajar Setia; Nur Widiyasono; Aldy Putra Aldya
Jurnal Informatika: Jurnal Pengembangan IT Vol 3, No 3 (2018): JPIT, September 2018
Publisher : Politeknik Harapan Bersama

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30591/jpit.v3i3.1019

Abstract

Malware is currently growing rapidly, diverse and complex. But, human resources that can carry out malware analysis is limited, because special expertise is needed.Reverse engineering is one of many solution that can carry out malware analysis, because reverse engineering techniques can reveal malware code. On March 5, 2018, found spam email containing files, the file contained malware flawed ammyy. This flawed ammyy is a software that comes from Ammyy Admin version 3 and then misused by hackers TA505. This study aims to identify the malware, especially the Flawed Ammyy RAT malware. This research uses descriptive methodology, then to do malware analysis used dynamic analysis and reverse engineering methods. The results of the study show that the Flawed Ammyy RAT malware works by hiding in the Ammyy Admin application then connecting to the attacker with ip address 103.208.86.69. netname ip address 103.208.86.69 is zappie host. There are 50 registry changes that are carried out by malware on infected systems. After the attacker has been connected with the victim, the attacker can easily do the remote control without the victim's knowledge.
Implementasi Algoritma Discrete Cosine Transform Untuk Kompresi Citra Pada Marker-Based Tracking Augmented Reality Iwan Sutrisman; Nur Widiyasono; Heni Sulastri
Computatio : Journal of Computer Science and Information Systems Vol. 4 No. 1 (2020): COMPUTATIO : JOURNAL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS
Publisher : Faculty of Information Technology, Universitas Tarumanagara

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.24912/computatio.v4i1.5628

Abstract

Image compression with lossy techniques removes some information so it does not match the data received. This research was conducted to determine differences in the quality of original and compressed images, specifically on mark-based tracking. Image compression is done by implementing the Discrete Cosine Transform algorithm in the MATLAB program. DCT image compression test results can compress images up to 26% of the original size without significantly reducing image quality. The assessment results shown by the markers, in Vuforia, there was no change in star ratings, while in ARCore, there was an increase in the rating of 5-40 quality scores.DCT algorithm can be applied to image compression in marker-based tracking, especially in improving the quality of markers in ARCore.AbstrakKompresi citra dengan teknik lossy menghilangkan beberapa informasi sehingga tidak persis seperti data aslinya. Penelitian ini dilakukan untuk mengetahui perbedaan kualitas citra asli dan terkompresi, khususnya pada marked-based tracking. Kompresi citra dilakukan dengan mengimplementasikan algoritma Discrete Cosine Transform pada program MATLAB. Hasil pengujian kompresi citra menunjukkan bahwa algoritma DCT dapat memampatkan citra hingga 26% dari ukuran aslinya tanpa mengurangi kualitas gambar secara signifikan. Hasil pengujian rating marker menunjukkan, pada Vuforia, tidak terdapat perubahan star rating, sedangkan pada ARCore, terdapat peningkatan nilai rating sebesar 5-40 quality score. Algoritma DCT dapat diterapkan untuk kompresi citra pada marker-based tracking, khususnya dalam meningkatkan kualitas marker pada ARCore.
Implementation of Image Enhancement Algorithm for Image Forensics using Mathlab Fauzan Novaldi Suteja; Eka Wahyu Hidayat; Nur Widiyasono
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.314

Abstract

The purpose of this journal is to explain the implementation of the image enhancement algorithm for image forensics. Image Forensic deals with the types of digital evidence in the form of digital image files. One of the most commonly used digital devices in providing digital evidence for forensic analysis is CCTV (Closed-Circuit Television). CCTV images have a low quality such as noise, blur, lack of light intensity, etc., so that the image must be enhanced so that forensic analysis can be done. To enhance image quality, an application is needed by applying the image enhancement algorithm. The algorithm applied to the application is a Low Pass Filter to increase low pixel intensity, High Pass Filter to increase high pixel intensity, Median Filter to replaces the original pixel value with the pixel center value of the image, Mean Filter to replaces the original pixel value with a value the average pixel of the image, the Gaussian Filter for reducing noise in the image, the Wiener Filter to reduce blur in the image, the Histogram Equalization spreads the image histogram value, Contrast Stretching to stretch the contrast intensity in the image and Bicubic Interpolation to increase the image size and resize the image. In this study, the application was built using MATLAB and the testing process for each algorithm was based on Timing-Run, MSE and PSNR parameters. From the test, the average MSE value is 1058.512083 and the PSNR value is 541.61875 dB, which means that the resulting image has a fairly high level of similarity and the average time needed to process the algorithm for the image is 0.114627915 seconds.