Claim Missing Document
Check
Articles

Found 10 Documents
Search

Teknik Penyembunyian Data Rahasia pada Berkas Gambar Digital Menggunakan Steganografi Least Significant Bit Variable-Size Neyman, Shelvie Nidya; Lindayati, Lindayati; Guritman, Sugi
Jurnal Ilmu Komputer dan Agri-Informatika Vol 1, No 1 (2012)
Publisher : Departemen Ilmu Komputer IPB

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (174.412 KB)

Abstract

Salah satu teknik pengamanan data dengan cara penyisipan informasi rahasia pada berkas gambar digital sebagai media penampung ialah steganografi berbasis least significant bit (LSB) dengan penambahan kemampuan penyisipan yang bersifat variable-size. Operasi teknik steganografi ini menggunakan tiga parameter, yaitu capacity evaluation untuk menentukan kapasitas maksimum LSB dari masing-masing pixel media penampung, minimum error replacement untuk memperkecil tingkat kesalahan saat penyisipan, dan improved grayscale compensation untuk memisahkan kesalahan penempelan agar tidak berdekatan pada tempat pixel bekerja. Penelitian ini bertujuan mengimplementasikan teknik tersebut untuk menyembunyikan data rahasia pada berkas gambar digital sebagai media penampung dan menghasilkan stego-image dengan kesamaan tampilan dan ukuran berkas. Berkas hasil penyisipan (stego-image) yang diperoleh diharapkan tidak menimbulkan kecurigaan pihak lawan, serta mampu memaksimumkan kapasitas penyisipan data rahasia, dengan memungkinkan penyisipan mencapai bit ke-5 dari LSB media penampung. Hasil penelitian menunjukkan bahwa stego-image yang diperoleh secara visual memiliki tampilan hampir sama dengan media penampungnya dan kapasitas penyisipannya mencapai lebih dari 50% ukuran media penampungnya. Kapasitas ini diperoleh tanpa mempertimbangkan border dan jumlah bit data pada setiap pixel minimal berjumlah empat.Kata kunci: capacity evaluation, improved grayscale compensation, least significant bit variabel-size, steganografi
Pemodelan Proxy Anonim Menggunakan Algoritme Expectation Maximization Dengan Data Balancing Yanto, Nur Witdi; Sukoco, Heru; Neyman, Shelvie Nidya
Jurnal Ilmu Komputer dan Bisnis Vol. 12 No. 1 (2021): Vol. 12 No. 1 (2021): Vol. 12 No. 1 (2021)
Publisher : STMIK Dharmapala Riau

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.47927/jikb.v12i1.91

Abstract

Penggunaan internet untuk mengakses situs-situs tertentu yang tidak berhubungan dengan pekerjaan dibatasi akses nya oleh perusahaan atau organisasi. Perusahaan atau organisasi melakukan pemblokiran untuk tujuan mengamankan jaringan mereka terhadap ancaman virus, spyware, hacker dan ancaman lainnya yang dapat merugikan perusahaan dengan cara menerapkan firewall, filter URL serta sistem deteksi intrusi. Namun, pengamanan tersebut masih dapat ditembus dengan menggunakan layanan proxy anonim. Penggunaan proxy anonim memungkinkan user untuk melakukan bypass sebagian besar sistem penyaringan. Dalam penelitian ini, data proxy anonim diperoleh dengan cara menangkap (capture) paket data menggunakan aplikasi wireshark. Data tersebut dimodelkan dengan algoritme expectation maximization sehingga diperoleh akurasi model sebesar 71.22% pada pembagian data yang seimbang. Hasil ini menunjukkan bahwa model mampu mengenali penggunaan proxy anonim pada traffic internet.
A New Copyright Protection for Vector Map using FFT-based Watermarking Shelvie Nidya Neyman; I Nyoman Prama Pradnyana; Benhard Sitohang
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 2: June 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i2.49

Abstract

This study proposed a new approach of copyright protection for vector map using robust watermarking on FFT algorithm. A copyright marker inserted in vector map as the watermark. In addition to data origin authentication capabilities watermark, RSA cryptographic algorithm is used when generating the watermark. Quality measurement of the results was based on the three characteristics of digital watermarking: (1) invisibility using RMSE calculations, (2) fidelity with the farthest distance and (3) NC calculation and gemotrical level of robustness against attacks. Result of experiments showed that the approach used in this study succeeded in inserting copyright as watermark on vector maps. Invisibility test showed good results, demonstrated by RMSE close to zero. Fidelity of the watermarked map was also maintained. Level of watermark robustness against geometric attacks on vector map results has been maintained within the limits that these attacks do not affect the watermark bit value directly.
Teknik Penyembunyian Data Rahasia pada Berkas Gambar Digital Menggunakan Steganografi Least Significant Bit Variable-Size Shelvie Nidya Neyman; Lindayati Lindayati; Sugi Guritman
Jurnal Ilmu Komputer dan Agri-Informatika Vol 1 No 1 (2012)
Publisher : Departemen Ilmu Komputer, Institut Pertanian Bogor

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (174.412 KB) | DOI: 10.29244/jika.1.1.30-36

Abstract

Salah satu teknik pengamanan data dengan cara penyisipan informasi rahasia pada berkas gambar digital sebagai media penampung ialah steganografi berbasis least significant bit (LSB) dengan penambahan kemampuan penyisipan yang bersifat variable-size. Operasi teknik steganografi ini menggunakan tiga parameter, yaitu capacity evaluation untuk menentukan kapasitas maksimum LSB dari masing-masing pixel media penampung, minimum error replacement untuk memperkecil tingkat kesalahan saat penyisipan, dan improved grayscale compensation untuk memisahkan kesalahan penempelan agar tidak berdekatan pada tempat pixel bekerja. Penelitian ini bertujuan mengimplementasikan teknik tersebut untuk menyembunyikan data rahasia pada berkas gambar digital sebagai media penampung dan menghasilkan stego-image dengan kesamaan tampilan dan ukuran berkas. Berkas hasil penyisipan (stego-image) yang diperoleh diharapkan tidak menimbulkan kecurigaan pihak 'lawan', serta mampu memaksimumkan kapasitas penyisipan data rahasia, dengan memungkinkan penyisipan mencapai bit ke-5 dari LSB media penampung. Hasil penelitian menunjukkan bahwa stego-image yang diperoleh secara visual memiliki tampilan hampir sama dengan media penampungnya dan kapasitas penyisipannya mencapai lebih dari 50% ukuran media penampungnya. Kapasitas ini diperoleh tanpa mempertimbangkan border dan jumlah bit data pada setiap pixel minimal berjumlah empat. Kata kunci: capacity evaluation, improved grayscale compensation, least significant bit variabel-size, steganografi
Pemodelan Identifikasi Trafik Bittorrent Dengan Pendekatan Correlation Based Feature Selection (CFS) Menggunakan Algoritme Decision Tree (C4.5) Hesmi Aria Yanti; Heru Sukoco; Shelvie Nidya Neyman
CESS (Journal of Computer Engineering, System and Science) Vol 6, No 1 (2021): Januari 2021
Publisher : Universitas Negeri Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (676.079 KB) | DOI: 10.24114/cess.v6i1.20855

Abstract

Abstract— BitTorrent is a P2P file sharing software protocol that allows clients to apply data to other clients and can affect network performance. Bittorent client traffic data collection uses secondary data taken from official sources on the link https://unb.ca/cic/datasets/index.html in 2016. Traffic data is used as a model for BitTorrent traffic identification using feature-based correlation selection (CFS) and traffic analysis model analysis using Decision Tree Algorithm (C4.5). Feature selection is done to clean irrelevant features so that they can affect the results of the accuracy value. The results of feature selection obtained 7 features and 1 category with 244,689 records and the system connecting the rule tree data training model selected the four best accuracy values. Furthermore, the model training data is carried out by testing the BitTorrent traffic trial data. The results of data testing obtained the best BitTorrent traffic accuracy value of 98.82% with 73,406 records on the 30% data test. Keywords— BitTorrent, C4.5 algorithm, correlation based feature selection, traffic identification, modeling.
Penerapan Sistem E-Voting pada Pemilihan Kepala Daerah di Indonesia (The Application of E-Voting Systems in the Local Elections in Indonesia) Shelvie Nidya Neyman; Muhammad Fikri Isnaini; Sri Nurdiati
Jurnal Sains Terapan : Wahana Informasi dan Alih Teknologi Pertanian Vol. 3 No. 1 (2013): Jurnal Sains Terapan, Volume 3, Nomor 1, Tahun 2013
Publisher : IPB University

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (973.764 KB) | DOI: 10.29244/jstsv.3.1.35-49

Abstract

On this research, the protocol and simulation of e-voting system were designed for the local election. The functions on this system were tailored to the e-voting scheme which must meet several criterias: Eligibility, Unreusability, Anonymity, Accuracy, Fairness, Vote and Go, and Public Verifiability. The protocol which was made in this research was a system for voter registration, validation and activation voters, the election system, and the election calculation system. To maintain the security of data, the e-voting system used public key algorithm and symmetric key algorithm. The result of this research was a web-based e-voting system which runs on the computer network that meets the criteria of e-voting scheme. The result of this research showed that the e-voting process can accelerate the vote calculation and decrease human errors.Keywords: voting, e-voting, the public key cryptography algorithm, pilkada
Rancang Bangun Protokol Perutean SDGR+R pada Vehicular AD-HOC Network Berbasis Arah Eliyah Acantha Manapa; Sri Wahjuni; Shelvie Nidya Neyman
Jurnal Teknologi Informasi dan Ilmu Komputer Vol 7, No 6: Desember 2020
Publisher : Fakultas Ilmu Komputer, Universitas Brawijaya

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.25126/jtiik.2020722927

Abstract

Vehicular Ad-Hoc Network (VANET) merupakan pengembangan jaringan wiresless yang melakukan komunikasi secara Inter Vehicle Communication (IVC). VANET memiliki mobilitas yang tinggi untuk setiap node nya sehingga jaringan komunikasi jenis ini adalah jaringan yang bersifat sementara dikarenakan node bergerak di lintasan dengan arah dan kecepatan yang dinamis. Dengan demikian, pengiriman paket data dari node sumber ke node tujuan menggunakan VANET memerlukan beberapa teknik komunikasi. Teknik terbaru komunikasi VANET saat ini adalah menggunakan SDN (Software Defined Network) yang berbasis geographic (SDGR) sebagai control plane dalam mengontrol komunikasi ad-hoc antar node. Dalam membentuk topologi jaringan komunikasi, SDGR mencari nilai jalur terpendek antar node dan kepadatan node yang tinggi. Tujuan utama penelitian ini melakukan analisis konsep protokol perutean (routing protocol) SDGR dan dilakukan pengembangannya dengan mempertimbangkan arah rute (SDGR+R). Pada SDGR+R, penambahan basis arah rute menggunakan multicast. Selanjutnya, dilakukan perbandingan kinerja antara SDGR dan SDGR+R. Hasil simulasi menunjukkan SDGR+R memiliki kinerja lebih baik daripada SDGR dalam hal latency sebesar 1.88% dan packet delivery ratio (PDR) sebesar 8.12%. Perancangan protokol perutean SDGR+R menambah ide pengembangan teknologi pada VANET untuk masa mendatang. AbstractVehicular Ad-Hoc Network (VANET) is a wireless network developed for communication on Inter-Vehicle Communication (IVC). Each node in a VANET has high mobility so that this type of communication network is a temporary network because the node moves on the track with dynamic direction and speed. Thus, sending data packets from source node to destination node using VANET requires some communication techniques. The latest technology for VANET communication is to use SDN-based geographic-based SDN (SDGR) as a control plane in controlling Ad-hoc communication between nodes. In forming the communication network topology, SDGR looks for the shortest path value between nodes and high node density. The main objective of this research is to analyze the concept of SDGR routing protocol and to develop it, considering the direction of the route (SDGR+R). In SDGR + R, the addition of route base directions uses multicast. Next, we compare the performance between SDGR and SDGR+R. Simulation results show SDGR+R has better performance than SDGR in terms of latency of 1.88% and packet delivery ratio of 8.12%. The design of the SDGR+R routing protocol gives to the idea of technology development on VANET in the future.
Manajemen Alokasi Bandwidth Layanan Internet Menggunakan Fractional Knapsack Problem Ahmad Rizaqu Muttaqi; Sri Wahjuni; Shelvie Nidya Neyman
Jurnal Teknologi dan Sistem Komputer Volume 7, Issue 2, Year 2019 (April 2019)
Publisher : Department of Computer Engineering, Engineering Faculty, Universitas Diponegoro

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (328.313 KB) | DOI: 10.14710/jtsiskom.7.2.2019.71-76

Abstract

The technical problems faced in e-government implemented by the Ministry of Religion of Indonesia since 2015 are minimal bandwidth requirements to provide information services and behavior of users who access entertainment sites. When peak hours occur, the congested network often occurs which becomes a significant bottleneck. This study aims to implement bandwidth management using the fractional knapsack problem method by limiting access to entertainment services. The QoS parameters used in this management are throughput, delay, and jitter. The method was tested using a paired t-test using throughput, jitter, and delay test parameters by comparing test parameters before and after bandwidth management applied. The significance value produced is between 75-85%. The method used can control the amount of traffic for each service, but on the other, hand the delay and jitter are still high. It is necessary to add additional free space to each service that can be used when needed to reduce the delay and jitter.
Smart Water Management Framework Berbasis IoT Untuk Mendukung Pertanian Urban Yan Mitha Djaksana; Heru Sukoco; Sri Wahjuni; Hendra Rahmawan; Shelvie Nidya Neyman
PETIR Vol 14 No 1 (2021): PETIR (Jurnal Pengkajian Dan Penerapan Teknik Informatika)
Publisher : Sekolah Tinggi Teknik - PLN

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33322/petir.v14i1.1112

Abstract

Related to water resources is one of the problems that often occurs in certain areas that have large populations such as urban areas, in addition to having to provide water that is used for daily activities, today many urban residents live in urban hardships, so an alternative is needed in providing resources water that must be purchased in daily necessities, in this paper we proposed a framework for support urban farming that we called the smart water management system by utilizing the IoT (Internet of Thinks) technology specifically sensors and machine learning algorithms in managing available water resources. many researchers have developed a similar model, but the framework model that we proposed using reuse water and filtered rainwater so that it meets the minimum quality requirements of water that can be reused in agriculture, so we hopes to make domestic water use more effective and efficient and predictable water consumption and availability.
Robust Digital Watermarking pada Arsip Vital Mnggunakan Metode Hybrid SVD Dengan DWT Alita Wulan Dini; Shelvie Nidya Neyman; Toto Haryanto
Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) Vol 7 No 5 (2023): October 2023
Publisher : Ikatan Ahli Informatika Indonesia (IAII)

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.29207/resti.v7i5.5003

Abstract

The development of Internet technology affects the dissemination of data, especially in vital government archives. This research uses a hybrid singular value decomposition (SVD) and discrete wavelet transform (DWT) method, which aims to protect the copyright of vital archives. The stages of the insertion and extraction process are carried out to test the effect of the alpha value on the quality (imperceptibility) and robustness of the inserted image by measuring the Peak Signal-to-Noise Ratio (PSNR), verifying similarity by measuring the Normalized Cross-Correlation (NC) and Structural Similarity Index (SSIM). The results of research with ten vital archives and a watermark protection logo in JPEG format with a size of 512x512 pixels obtained a maximum PSNR with a value of α = 0.01 of 41.0567 dB, NC of 0.98904, and SSIM of 0.98023 in the Cibereum Land Certificate. So, it can be proven that this method produces vital archive watermarks that can be extracted and are robust to JPEG compression attacks of 75%, median filtering 3x3, Gaussian noise 0.01, speckle noise 0.01, and salt and pepper noise 0.01 but not resistant to rotation 80 and cropping attacks 2%.