Claim Missing Document
Check
Articles

Found 27 Documents
Search

PENDETEKSIAN CITRA DAUN TANAMAN MENGGUNAKAN METODE BOX COUNTING Juwitarty, Novita Anggraini; Purnomo, Kosala Dwidja; Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 20 No 1 (2020): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v20i1.17221

Abstract

Different types of plants make identification difficult. Therefore, we need a system that can identify the similarity of the leaves based on a reference leaf. Extraction can be done by taking one part of the plant and the most easily obtained part is the leaf part. Natural objects such as leaves have irregular shapes and are difficult to measure, but this can be overcome by using fractal dimensions. In this research, image detection of plant leaves will be carried out using the box counting method. The box counting method is a method of calculating fractal dimensions by dividing images into small boxes in various sizes. Image detection using fractal dimension values, we know which leaves the match with the reference. In this study,10 species of leave were tested, with each species 10 samples of plant leaves. Image testing of plant leaves uses a variety of r box size, namely 1/2 ,1/4 , 1/8 , 1/16 ,1/32 , 1/64 , 128which obtain an average match accuracy of 44%. Keywords: Box Counting, Fractal dimension
PENGAMANAN IMAGE DENGAN MODIFIKASI ALGORITMA ELECTRONIC CODE BOOK (ECB) Asti, Melinda; Kamsyakawuni, Ahmad; Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 18 No 2 (2018): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v18i2.17252

Abstract

Cryptography is knowledge of encoding data to ensure the confidentiality, security, validity and integrity of data. Cryptography is divided into two namely classical cryptography and modern cryptography. One example of modern cryptography is the Electronic Code Book (ECB). Electronic Code Book (ECB) is a modern cryptographic method used to encrypt and decrypt text, images and more. The image is formed from several pixels which consist of several bits in a pixel. Bits are divided into two namely Least Significant Bit (LSB) and Most Significant Bit (MSB).LSB is the four rightmost bits while MSB is the leftmost four bits of a pixel. The purpose of this study is to compare the level of security of Electronic Code Book (ECB) image security results with the results of securing an Electronic Code Book (ECB) modified image. The data used in this study are 8 RGB and Greyscale images also a key in the form of one ASCII character. The results obtained show that securing images with modified Electronic Code Book (ECB) is safer than securing images with Electronic Code Book (ECB) based on histogram analysis, differential analysis and correlation coefficients. Keywords: ASCII, Electronic Code Book (ECB), Most Significant Bit (MSB)
A Menezes Vanstone Cryptosystem Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 15 No 2 (2015): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v15i2.23724

Abstract

Many kinds of cryptosystem models we have known. Generally if input of plaintext is alphabet so ciphertext is alphabet or real number that can be transform to alphabet. This paper will introduce a type of cryptosystem that have special output. It model is Menezes Vanstone cryptosystem. The plaintext of its method is pair of real number and ciphertext was produced is pair of real number too. If we want to know the meaning of ciphertext have to transform from real number to alphabet.
KOMBINASI CAESAR CIPHER DAN REVERSE CIPHER BERDASARKAN CIPHER BLOCK CHAINING Najah, Maulidyah Lailatun; Santoso, Kiswara Agung
Majalah Ilmiah Matematika dan Statistika Vol 21 No 2 (2021): Majalah Ilmiah Matematika dan Statistika
Publisher : Jurusan Matematika FMIPA Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/mims.v21i2.26978

Abstract

Communication in the current era of globalization is very developed. Many applications that can be used to facilitate communication. However, because of this convenience, the security of the information contained in it will be more easily hacked by irresponsible people. Cryptography is the science or art for security message. In cryptography there are two important processes, namely encryption and decryption. The sender's job is to encrypt the message and the receiver's job is to decrypt the message. The key used for this cryptographic process is the Cipher Block Chaining (CBC) operation mode. CBC mode is a very simple operation mode, so additional techniques are needed to make it more secure. The plaintext will be replaced with new plaintext resulting from a combination of Caesar Cipher and Reverse Cipher techniques. The results obtained indicate that the application of plaintext modifications to CBC can improve message security because the keys used are increasingly complex.
DESAIN MOTIF MOZAIK PADA REGULER DECAGON BERBASIS GOLDEN TRIANGLE Itaniza Rosyadi; K Kusno; Kiswara Agung Santoso
KadikmA Vol 3 No 3 (2012): Desember 2012
Publisher : Department of Mathematics Education , University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/kdma.v3i3.1012

Abstract

Abstract. Decagonal Penrose Mosaic is a decagonal interior design constructed by applying the basic of golden triangle Penrose tile. There are several techniques to design the mosaic, some of them are as follows: (1) constructing Penrose tile on the fifth iterations constructed from isosceles triangles which on each triangle is defined by decagon sector; (2) stating  Penrose symmetry base as the mosaic design base;  (3) dividing each Penrose tile golden triangle into 3 zone; (4) stating Penrose symmetry base to fill in Penrose tile golden triangle in each zone; (5) coloring the interior  Penrose symmetry base and the backgrounds. The formed design has been found several Penrose mosaic models in full symmetry, not fully symmetry, similar and overlap, which each models has natural motive and symmetry characteristics. By using the different coloring techniques it has been formed some coloring pattern on the centre, homogenous distribution, or spreading. This would enrich the varieties of mosaic design forms. Key Words : decagonal golden triangle Penrose tile, Penrose mosaic
DESAIN MOZAIK PADA INTERIOR PERSEGI BERKARAKTER BARISAN GEOMETRI Endang Murihani; K Kusno; Kiswara Agung Susanto
KadikmA Vol 3 No 3 (2012): Desember 2012
Publisher : Department of Mathematics Education , University of Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.19184/kdma.v3i3.1013

Abstract

Abstract. Mosaic is a creation that arrangs a piece of geometric in a space. This mosaic design which has geometric line character enrichs the-varieties of mosaic designs more attractive and various. The result of research is to develop the mosaic design in rectangle interior for geometric line the character and it needs some steps follows: (1) constructing pieces of rectangle in which the size is arranged in geometric line form through spot among each side, (2) fill each piece with the previous result step (1) fill curve permanently or exchang by using the rotation or dilatation, (3) combains some rectangles with the previous result (2) and colors the background or the filling curve.   Key Words: geometric line, mosaic design.
Digital Image Encryption by Using a Modified Hill Code Sochif Prasetiya; Mohammad Hasan; Kiswara Agung Santoso
Jurnal ILMU DASAR Vol 15 No 2 (2014)
Publisher : Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (399.02 KB) | DOI: 10.19184/jid.v15i2.524

Abstract

Data security is very important data needed to stay awake in strict confidence from hacker intrusion or criminals who want to steal the data. Data security methods that are used in this paper is a digital image encryption by using a modified Hill’s code which is done by changing the way of encryption. If we are using Hill’s code then matrix pixel multiplied is the key matrix while on the modification Hill’s code before the key matrix then the matrix is multiplied pixels must be added to the results of the main diagonal elements of the matrix times key. The results obtained in the process of digital image encoding indicating that the image is encoded with password modification results of modified Hill's code more mixed reviews when compared to the image that was encoded with password Hill so that more effective in securing data in the form of a digital image. The size of the image file using the encoding results in a modification password Hill is smaller than ordinary password Hill with a percentage decrease of 4.6 % so more ease in delivery through electronic media Keyword: Digital image, modified Hill code, encryption, description  
Super (a, d)-Edge Antimagic Total Labeling of Connected Ferris Wheel Graph Djoni Budi Sumarno; D Dafik; Kiswara Agung Santoso
Jurnal ILMU DASAR Vol 15 No 2 (2014)
Publisher : Fakultas Matematika dan Ilmu Pengetahuan Alam Universitas Jember

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (127.85 KB) | DOI: 10.19184/jid.v15i2.1051

Abstract

Let G be a simple graph of order p and size q. Graph G is called an (a,d)-edge-antimagic totalifthereexistabijectionf :V(G)∪E(G)→{1,2,...,p+q}suchthattheedge-weights,w(uv)= f(u)+f(v)+f(uv); u, v ∈ V (G), uv ∈ E(G), form an arithmetic sequence with first term a and common difference d. Such a graph G is called super if the smallest possible labels appear on the vertices. In this paper we study super (a, d)-edge antimagic total properties of connected of Ferris Wheel F Wm,n by using deductive axiomatic method. The results of this research are a lemma or theorem. The new theorems show that a connected ferris wheel graphs admit a super (a, d)-edge antimagic total labeling for d = 0, 1, 2. It can be concluded that the result of this research has covered all feasible d. Key Words : (a, d)-edge antimagic vertex labeling, super (a, d)-edge antimagic total labeling, Ferris Wheel graph FWm,n.  
Penyembunyian Pesan Terenkripsi pada Citra menggunakan Algoritma LSB dan Transposisi Kolom Kiswara Agung Santoso; Ahmad Tanto Wiraga; Abduh Riski
Journal of Applied Informatics and Computing Vol 6 No 1 (2022): July 2022
Publisher : Politeknik Negeri Batam

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30871/jaic.v6i1.3819

Abstract

Data security is a very important thing to do so that messages or information are sent to someone who is not known by unauthorized persons. Data security techniques that The ones that are often used today are cryptography and steganography. In this study, the data is to be secured in text. To increase security, text messages are first encrypted using the vigenere algorithm and column transposition. This text message is then hidden into an image (cover image). The encrypted text message was hidden in the image using the LSB algorithm and column transposition. The results of the study show that the virtual stego image generated is very effective similar to the original image. Based on the results of the MSE and PSNR analysis, it can be seen that the resulting image quality can be categorized as good. This can be seen from the PSNR value above 50 dB and some even above 60 dB. Based on the results of the LSB analysis, the stego image does not look strange so it will not be suspected by unauthorized people that there is a hidden message in the image.
MEDICAL IMAGE ENCRYPTION USING DNA ENCODING AND MODIFIED CIRCULAR SHIFT Kiswara Agung Santoso; Ahmad Kamsyakawuni; Muhammad Seggaf
BAREKENG: Jurnal Ilmu Matematika dan Terapan Vol 16 No 1 (2022): BAREKENG: Jurnal Ilmu Matematika dan Terapan
Publisher : PATTIMURA UNIVERSITY

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1010.265 KB) | DOI: 10.30598/barekengvol16iss1pp233-240

Abstract

This paper proposes a new encryption method for the encryption of medical images. The method is used to divide the image into several blocks and then scramble the image blocks using DNA chains and then shift the pixels in a circle with certain rules. To provide a more secure result, the input key contains a DNA chain and is equipped with complementary rules, and is converted into a hexadecimal number using a DNA coding table. Experimental results and values of NPCR and UACI show that the scheme achieves good encryption and decryption results.