cover
Contact Name
Paska Marto Hasugian
Contact Email
siskahhasugian@gmail.com
Phone
+6281264451404
Journal Mail Official
editorjournal@seaninstitute.or.id
Editorial Address
Komplek New Pratama ASri Blok C, No.2, Deliserdang, Sumatera Utara, Indonesia
Location
Unknown,
Unknown
INDONESIA
Jurnal Info Sains : Informatika dan Sains
Published by SEAN INSTITUTE
ISSN : 20893329     EISSN : 27977889     DOI : -
Core Subject : Science,
urnal Info Sains : Informatika dan Sains (JIS) discusses science in the field of Informatics and Science, as a forum for expressing results both conceptually and technically related to informatics science. The main topics developed include: Cryptography Steganography Artificial Intelligence Artificial Neural Networks Decision Support System Fuzzy Logic Data Mining Data Science
Articles 5 Documents
Search results for , issue "Vol. 11 No. 1 (2021): March, Informatics and Science" : 5 Documents clear
Text Insertion By Utilizing Masking-Filtering Algorithms As Part of Text Message Security Doni El Rezen Purba; Desinta Purba
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (720.125 KB) | DOI: 10.54209/infosains.v11i1.18

Abstract

For a secret message to be read and understood by a specific person only, a way is needed to hide the message, namely by steganography. Steganography is the concealment of secret messages in other media, such as images, audio, or video, so that the media inserted into the message looks as usual. Digital photos are one of the container media that are widely used for data hiding. However, when processing images such as compression, rotation, noise, and so on, confidential messages in the picture are prone to damage or loss. Then it takes the correct steganography method to hide secret messages into images to keep messages safe, not damaged even if the container image is manipulated, and the hidden message can be extracted again. on this thesis, applied masking method – filtering. Masking-filtering is included in the spatial domain. Message hiding is done by manipulating the luminance value of the image. Its use is applied to color or grayscale images. Masking serves as a tagging place on the picture that can be inserted message. Filtering passes a value to the marked section. the result is a stego image where the news is integrated with the container image, more robust to image processing when compared to methods that are also classified in the spatial domain, such as the least significant bit.
Semi-public watermarking digital implementation in the concealment of text messages Noferianto Sitompul; Maranata Pasaribu
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (681.314 KB) | DOI: 10.54209/infosains.v11i1.36

Abstract

The purpose of this study is to generate watermarking of an input image. The watermarking process will begin with the process of reading color image pixels. After that, the process will be continued by calculating the step message value inserted and inserting all the necessary values in the watermarking checking process. In the event of an attack, then at the time of watermarking formation, a specific noise value (randomly generated) will be calculated to be inserted into the image. After the process of watermarking formation, then the process can be continued with checking watermarking and extracting messages.
Analysis And Implementation of Noekeon Algorithms For Encryption and Description of Text Data Noverta Effendi; Fauzan Azim
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (682.074 KB) | DOI: 10.54209/infosains.v11i1.37

Abstract

As the times evolve, human needs increase. Including information needs. Therefore, sending and storing files through electronic media requires a process that can ensure the security and integrity of the file. To ensure the safety and integrity of a file, an encoding process is required. Encryption is performed when the file is sent. This process will convert the original file into a confidential unreadable file. Meanwhile, the decryption process is done by the recipient of the sent file. The personal file received will be converted back to the original file. By encoding, the original file will not be read by unauthorized parties but only by recipients who have a decryption key.
Steganography Formation by utilizing Enhanced Least Significant Bit Algorithm Pristiwanto Pristiwanto; Abdul Halim Hasugian
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (533.546 KB) | DOI: 10.54209/infosains.v11i1.38

Abstract

Steganography is the science and art of hiding secret messages in other messages so that the existence of those messages cannot be known. The letter sent does not attract attention with steganography, and the container media does not arouse suspicion. Steganography requires two properties, namely container media and secret messages. The LSB method (least significant bit)is the simplest and easiest steganography method to implement. An example of implementing this method is to use a digital image as a cover text. Each pixel in the image is 1 (one) to 3 (three) bytes in size. Pda bit arrangement in a byte ( 1 byte = 8 bits), there are the most significant bits ( MSB) and the least significant bits (LSB). For example, on 11010010 bytes, the first bit from the right is the MSB bit, and the last bit from the right is the LSB bit. The matching bit is replaced with the message bit is the LSB bit, because the modification only changes the byte value to one higher or one lower than the previous value
Implementation of Linear Congruent Method For Guess the Drawing Game Magdalena Sinaga Sinaga; Agustina Simangunsong
Jurnal Info Sains : Informatika dan Sains Vol. 11 No. 1 (2021): March, Informatics and Science
Publisher : SEAN Institute

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (532.022 KB) | DOI: 10.54209/infosains.v11i1.39

Abstract

In face guessing game is a game with pictures that will be scrambled and questions in this guess the face game application. Linear Congruent methods are used to generate random values used to randomize images and questions displayed on the guess the face game. Random value generation will be used in this game using lcm formula Xn = ( a (Xn-1) + b mod m. The constantly changing variable value in the game has a significant effect on the random value displayed. The ever-changing administration of a, Xn and b can avoid fixed or repetitive patterns of consecutive random value generation effects. In addition, the provision of variable changes can also prevent the repetition of questions that will be randomized in a row. While to avoid the exit of unwanted random values and used variable m as a limiter maximum value. The implementation of the above method can be concluded that the game guess the face of badminton athletes displays varied images and questions that users can play with their respective difficulty levels.

Page 1 of 1 | Total Record : 5