Claim Missing Document
Check
Articles

Found 2 Documents
Search

WATERMARKING METHOD OF REMOTE SENSING DATA USING STEGANOGRAPHY TECHNIQUE BASED ON LEAST SIGNIFICANT BIT HIDING Destri Yanti Hutapea; Octaviani Hutapea
International Journal of Remote Sensing and Earth Sciences (IJReSES) Vol 15, No 1 (2018)
Publisher : National Institute of Aeronautics and Space of Indonesia (LAPAN)

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (575.07 KB) | DOI: 10.30536/j.ijreses.2018.v15.a2824

Abstract

Remote sensing satellite imagery is currently needed to support the needs of information in various fields. Distribution of remote sensing data to users is done through electronic media. Therefore, it is necessary to make security and identity on remote sensing satellite images so that its function is not misused. This paper describes a method of adding confidential information to medium resolution remote sensing satellite images to identify the image using steganography technique. Steganography with the Least Significant Bit (LSB) method is chosen because the insertion of confidential information on the image is performed on the rightmost bits in each byte of data, where the rightmost bit has the smallest value. The experiment was performed on three Landsat 8 images with different area on each composite band 4,3,2 (true color) and 6,5,3 (false color). Visually the data that has been inserted information does not change with the original data. Visually, the image that has been inserted with confidential information (or stego image) is the same as the original image. Both images cannot be distinguished on histogram analysis.  The Mean Squared Error value of stego images of  all three data less than 0.053 compared with the original image.  This means that information security with steganographic techniques using the ideal LSB method is used on remote sensing satellite imagery.
Implementasi Metode K-Medoids Untuk Masalah Intrusion Detection System Menggunakan Bahasa Pemrograman Matlab Octaviani Hutapea; Aini Suri Talita
Faktor Exacta Vol 14, No 2 (2021)
Publisher : LPPM

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30998/faktorexacta.v14i2.9429

Abstract

Based on data from the National Cyber And Crypto Agency (BSSN) of the Republic of Indonesia from 2018 to 2021, the threat of cyber attacks continues to experience a significant increase. In 2021, a significant change that is likely to be faced is with the emergence of new smart devices, which are more than just end-users and remotely connected networked devices. Surely, gives it the attention of all parties. There are many types of cyberattacks including Malware, Phishing, Ransomeware, etc. IDS (Intrusion Detection System) is a method that can detect suspicious activity in a system or network. Implementation of the Fuzzy K-Medoids method by using the Matlab programming language that retrieves data from KDDCUP’99 which has been normalized. The data used are normal data and anomaly attack data which are categorized as DoS, Probe, R2L, and U2R. From the research conducted the accuracy percentage is around 60-89% with three types of data preprocessing