Claim Missing Document
Check
Articles

Found 4 Documents
Search

STEGANOGRAPHY CAPACITY ANALYSIS OF TEXT IN TEXT WITH SENTENCE STRUCTURE IN INDONESIAN R. Fanry Siahaan; Amran Sitohang; Ibnu Febrian; Widia Putri
Jurnal Sistem Informasi dan Ilmu Komputer Prima(JUSIKOM PRIMA) Vol. 6 No. 1 (2022): Jurnal Sistem Informasi dan Ilmu Komputer Prima (JUSIKOM Prima)
Publisher : Fakultas Teknologi dan Ilmu Komputer Universitas Prima Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34012/jurnalsisteminformasidanilmukomputer.v6i1.2863

Abstract

Data security issues become very important when the computer has been used as a communication tool on a global network (internet). One method that is quite popular for securing data from irresponsible parties is text-based steganography, where confidential data or information is hidden or inserted into other text media so as not to arouse suspicion from other parties. Based on the input data calculated on the number of words, it has a significant influence on the results of the stegotext. This can be seen from the comparison of the length of the input message which is calculated in the number of words with the length of the output message (stegoteks) which is influenced by the length of the style (pattern) of the sentence structure used. For input data with a word length of 1, the average capacity of the stegotext is 8 to 9 words or 12.4%, for input word length 2, the average capacity of the stegotext is 22 words or 8.85% and the input word length is 4 then the capacity of the stegotext is between 30 to 33 words or equivalent to 12.91%. Keywords :Text Steganography; Sentence Pattern; Payload Balancing Capacity
Keamanan Komunikasi Data Pada Jaringan Komputer Berbasis Socket Programming R. Fanry Siahaan; Agustina Smangunsong; Ibnu Febrian; Widia Putri
Jurnal Mahajana Informasi Vol 7 No 2 (2022): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A socket is software used to communicate data between computers on a network, which is a combination of an IP (Internet Protocol) address and a port number. In data communication on a computer network, one of the important things that are lacking attention and understanding from users is information security, both in terms of information content and communication lines. So without realizing it that the communication lines used have been infiltrated by other people. Because one of the loopholes that can be exploited in infiltrating other people's networks is a socket on the network. One way or method of securing communication lines on a network is socket programming. Socket Programming is a protocol that makes connections between devices in a network so that one program can interact with other programs in a network.
Implementasi Metode Moora Pada Sistem Pendukung Keputusan Untuk Pemilihan Hotel Terbaik Di Kota Medan Preddy Marpaung; R. Fanry Siahaan; Ibnu Febrian; Widia Putri
Jurnal Mahajana Informasi Vol 7 No 2 (2022): JURNAL MAHAJANA INFORMASI
Publisher : Universitas Sari Mutiara Indonesia Medan

Show Abstract | Download Original | Original Source | Check in Google Scholar

Abstract

A hotel is a temporary lodging place intended for the general public, both individually and in groups, who come from different areas as well as for the people in the area. Hotels are often used by the community as a place to rest or stay because they are considered a comfortable place to rest or other things that support the convenience of the community. The development of hotels in various cities can be said to be very rapid, judging by the large number of hotels, both star and jasmine class, which are scattered in various cities in Indonesia, one of which is Medan City. According to the central statistics agency for North Sumatra in 2017 the city of Medan has 11,366 hotels. With the large number of hotels in the city of Medan scattered in several locations with various hotel classes, hotel rates and hotel facilities make it difficult for people to determine which hotel is appropriate according to existing criteria. If you choose the wrong hotel where to stay where there are no guarantees such as comfort, facilities and others as desired, it will not have an impact on people who want to stay overnight. Therefore it is necessary to implement a method to support a decision support system for choosing the best hotel in the city of Medan according to the desired criteria. Researchers implemented the Multi-Objective Optimization by Ratio Analysis method or commonly abbreviated as the MOORA method in a decision support system to choose the best hotel in the city of Medan. The reason researchers use this method is because several previous researchers used a lot of decision support systems using the MOORA method in solving problems in decision makers. With this research, the public will gain new knowledge to choose hospitality in the city of Medan. Where the outcome promised by the researchers in this study is the sinta 5 accredited journal.
Analisis Daya Tahan Keamanan Data Pada Steganografi Berbasis Teks Dalam Struktur Kalimat Bahasa Indonesia R. Fanry Siahaan; preddy marpaung; ibnu febrian; widia putri
Jurnal SAINTIKOM (Jurnal Sains Manajemen Informatika dan Komputer) Vol 22, No 2 (2023): Agustus 2023
Publisher : PRPM STMIK TRIGUNA DHARMA

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.53513/jis.v22i2.8773

Abstract

Data security in text-based steganography needs to be analyzed in depth to ensure the sustainability and security of the method. The purpose of this research is to analyze the durability of data security in text-based steganography. The analysis approach consists of steps to identify and evaluate the vulnerability of text steganography methods with Indonesian sentence patterns. The first step is to review previous relevant work in this field to understand the vulnerabilities that have been identified previously. The text insertion model carried out is dictionary-based as many as 1,929 words which are divided into seven-word classes that correspond to sentence patterns in Indonesian, namely adj (adjective), adv (adverb), nom (noun), num (numeral), par (particle), pro (pronominal) and ver (verb). Each word class is organized into sentence patterns and each has the same bit length of eight bits. The results of the durability analysis show that input data with a length of one word still can be hacked if the message insertion process with a choice of short sentence patterns. Whereas with a choice of sentence patterns that are more than two words it will start to be difficult to hack and even cannot be hacked because the number of possibilities is very large and even infinite or infinity.