scispace - formally typeset
Search or ask a question
Author

De Rosal Ignatius Moses Setiadi

Bio: De Rosal Ignatius Moses Setiadi is an academic researcher. The author has contributed to research in topics: Encryption & Steganography. The author has an hindex of 18, co-authored 126 publications receiving 898 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: This paper provides a broad and systematic review of research in the field of text summarization published from 2008 to 2019 and describes the techniques and methods that are often used by researchers as a comparison and means for developing methods.

75 citations

Proceedings ArticleDOI
01 Nov 2017
TL;DR: The proposed method can achieve the highest accuracy and can be classified to determined the maturity level of tomatoes by using K-Nearest Neighbour (K-NN) one of basic and simple classification method which utilizes the distance as a comparison of the similarity level of the image.
Abstract: Tomatoes at any given time has different maturity levels, therefore it is necessary to recognize the appropriate pattern to determine the level of maturity. One of the recognition patterns of tomatoes image is to use texture and color analysis. Texture analysis can be processed using the Gray Level Co-occurrence Matrix (GLCM) method. GLCM is chosen because it has a high degree of recognition based on the value of contrast, correlation, homogeneity, and energy. Furthermore, for color analysis one of the methods that can be used is Hue, Saturation, Value (HSV). By utilizing HSV, an object with a certain color can be detected and reduce the influence of the intensity of light from outside. The results of GLCM and HSV calculations can be classified to determined the maturity level of tomatoes by using K-Nearest Neighbour (K-NN) one of basic and simple classification method which utilizes the distance (k) as a comparison of the similarity level of the image. From the research we have done, using 100 data sets, consisting of 75 training data and 25 testing data that yields the highest accuracy rate of 100% with p value on GLCM is 9 and the membership value (k) in K-NN is 3. According to the experimental results, we can conclude that our proposed method can achieve the highest accuracy.

75 citations

Journal ArticleDOI
TL;DR: Combined steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter.
Abstract: Rapid development of Internet makes transactions message even easier and faster. The main problem in the transactions message is security, especially if the message is private and secret. To secure these messages is usually done with steganography or cryptography. Steganography is a way to hide messages into other digital content such as images, video or audio so it does not seem nondescript from the outside. While cryptography is a technique to encrypt messages so that messages can not be read directly. In this paper have proposed combination of steganography using discrete cosine transform (DCT) and cryptography using the one-time pad or vernam cipher implemented on a digital image. The measurement method used to determine the quality of stego image is the peak signal to noise ratio (PSNR) and ormalize cross Correlation (NCC) to measure the quality of the extraction of the decrypted message. Of steganography and encryption methods proposed obtained satisfactory results with PSNR and NCC high and resistant to JPEG compression and median filter. Keywords —Image Steganography, Discrete Cosine Transform (DCT), One Time Pad, Vernam, Chiper, Image Cryptography

55 citations

Journal ArticleDOI
TL;DR: In this research paper, Canny and Sobel detectors are combined to get a wider edge area for greater payload of messages while maintaining imperceptibility of stego-images.
Abstract: Abstract The Internet is a public network with many issues of data transfer security. Steganography is a data transmission security technique that is done by hiding the message in a container media, such as an image. The media certainly has its limited payload to accommodate the embedded data. This paper proposes a method for increasing the payload of secret messages in an image. The edge area is used to accommodate more message bits because the image edge area can better tolerate pixel value changes. In this research paper, Canny and Sobel detectors are combined to get a wider edge area. This two-detector combined method provides a larger edge area for greater payload of messages while maintaining imperceptibility of stego-images.

46 citations

Proceedings ArticleDOI
01 Oct 2019
TL;DR: This research aims to conduct surveys, test performance, and compare the accuracy of the results of recognizing the face of the FaceNet method with various other methods that have been developed previously, and showed excellent results and was superior to other methods.
Abstract: Face recognition that is technology used for recognizing human faces based on certain patterns and re-detect faces in various conditions. Face recognition is currently becoming popular to be applied in various ways, especially in security systems. Various methods of face recognition have been proposed in researches and increased accuracy is the main goal in the development of face recognition methods. FaceNet is one of the new methods in face recognition technology. This method is based on a deep convolutional network and triplet loss training to carry out training data, but the training process requires complex computing and a long time. By integrating the Tensorflow learning machine and pre-trained model, the training time needed is much shorter. This research aims to conduct surveys, test performance, and compare the accuracy of the results of recognizing the face of the FaceNet method with various other methods that have been developed previously. Implementation of the FaceNet method in research using two types of pre-trained models, namely CASIA-WebFace and VGGFace2, and tested on various data sets of standard face images that have been widely used before. From the results of this research experiment, FaceNet showed excellent results and was superior to other methods. By using VGGFace2 pre-trained models, FaceNet is able to touch 100% accuracy on YALE, JAFFE, AT & T datasets, Essex faces95, Essex grimace, 99.375% for Essex faces94 dataset and the worst 77.67% for the faces96 dataset.

42 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A thorough review of existing types of image steganography and the recent contributions in each category in multiple modalities including general operation, requirements, different aspects, different types and their performance evaluations is provided.

253 citations

Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations

Journal ArticleDOI
TL;DR: This research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.
Abstract: Peak signal to noise ratio (PSNR) and structural index similarity (SSIM) are two measuring tools that are widely used in image quality assessment. Especially in the steganography image, these two measuring instruments are used to measure the quality of imperceptibility. PSNR is used earlier than SSIM, is easy, has been widely used in various digital image measurements, and has been considered tested and valid. SSIM is a newer measurement tool that is designed based on three factors i.e. luminance, contrast, and structure to better suit the workings of the human visual system. Some research has discussed the correlation and comparison of these two measuring tools, but no research explicitly discusses and suggests which measurement tool is more suitable for steganography. This study aims to review, prove, and analyze the results of PSNR and SSIM measurements on three spatial domain image steganography methods, i.e. LSB, PVD, and CRT. Color images were chosen as container images because human vision is more sensitive to color changes than grayscale changes. Based on the test results found several opposing findings, where LSB has the most superior value based on PSNR and PVD get the most superior value based on SSIM. Additionally, the changes based on the histogram are more noticeable in LSB and CRT than in PVD. Other analyzes such as RS attack also show results that are more in line with SSIM measurements when compared to PSNR. Based on the results of testing and analysis, this research concludes that SSIM is a better measure of imperceptibility in all aspects and it is preferable that in the next steganographic research at least use SSIM.

204 citations

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the presented technique has a high-security, high embedding capacity and good visual quality, and the results prove that the constructed S-box has vital qualities for viable applications in security purposes.
Abstract: Substitution boxes play an essential role in designing secure cryptosystems. With the evolution of quantum technologies, current data security mechanisms may be broken due to their construction based on mathematical computation. Quantum walks, a universal quantum computational model, play an essential role in designing quantum algorithms. We utilize the benefits of quantum walks to present a novel technique for constructing substitution boxes (S-boxes) based on quantum walks (QWs). The performance of the presented QWs S-box technique is evaluated by S-box evaluation criteria, and our results prove that the constructed S-box has vital qualities for viable applications in security purposes. Furthermore, a new technique for image steganography is constructed. The proposed technique is an integrated mechanism between classical data hiding and quantum walks to achieve better security for the embedded data. The embedding and extraction procedures are controlled by QWs S-box. The inclusion of cryptographic QWs S-box ensures the security of both embedding and extraction phases. At the extraction phase, only the stego image and the secret values are needed for constructing the secret data. Experimental results demonstrate that the presented technique has a high-security, high embedding capacity and good visual quality.

124 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.
Abstract: In this paper, a novel robust color image watermarking method based on Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) is proposed. In this method, RGB cover image is divided into red, green and blue components. DCT and DWT are applied to each color components. Grayscale watermark image is scrambled by using Arnold transform. DCT is performed to the scrambled watermark image. Transformed watermark image is then divided into equal smaller parts. DCT coefficients of each watermark parts are embedded into four DWT bands of the color components of the cover image. The robustness of the proposed color image watermarking has been demonstrated by applying various image processing operations such as rotating, resizing, filtering, jpeg compression, and noise adding to the watermarked images. Experimental results show that the proposed method is robust to the linear and nonlinear attacks and the transparency of the watermarked images has been protected.

98 citations