Made Adi Paramartha Putra, Gelar Budiman, L. Novamizanti
{"title":"Implementation of steganography using LSB with encrypted and compressed text using TEA-LZW on Android","authors":"Made Adi Paramartha Putra, Gelar Budiman, L. Novamizanti","doi":"10.1109/IC3INA.2014.7042607","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042607","url":null,"abstract":"The development of data communications enabling the exchange of information via mobile devices more easily. Security in the exchange of information on mobile devices is very important. One of the weaknesses in steganography is the capacity of data that can be inserted. With compression, the size of the data will be reduced. In this paper, designed a system application on the Android platform with the implementation of LSB steganography and cryptography using TEA to the security of a text message. The size of this text message may be reduced by performing lossless compression technique using LZW method. The advantages of this method is can provide double security and more messages to be inserted, so it is expected be a good way to exchange information data. The system is able to perform the compression process with an average ratio of 67.42 %. Modified TEA algorithm resulting average value of avalanche effect 53.8%. Average result PSNR of stego image 70.44 dB. As well as average MOS values is 4.8.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Indarjani, Gigih Supriyatno, A. Nugraha, I Made Mustika Astawa
{"title":"Insertion attack effects on some PRNGs based on NIST randomness tests tool: Case study on ANSI-X9.17, ANSIX9.31, Dragon and Rabbit algorithms","authors":"S. Indarjani, Gigih Supriyatno, A. Nugraha, I Made Mustika Astawa","doi":"10.1109/IC3INA.2014.7042624","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042624","url":null,"abstract":"Based on previous research [1], the 1-bit insertion attack with random bits on AES-based PRNG had some effects on randomness property of the output sequences after the attack, where about 8 from total 45 experiments (17.17%) had failed test at most 3 tests on AES-128, 11 experiments from 45 (24.44%) on AES-192 mostly had one failed test where only one experiment has two failed tests, and on AES 256 we got 10 experiments from 45 (22.22%) had failed test at most 3 tests, where 8 of them just have one test. So globally the 1-bit insertion attack with random bits affected the randomness property of AES-based PRNG even not significant based on NIST randomness tests under α =0.01. In this research, we also expand the case study on the other 4 algorithms ANSI X9.17, X9.31, Dragon and Rabbit Stream Cipher. The scenario still the same with level of significant α = 0.01. From the experiments, we found that the insertion attack with random bits on the four algorithms has affected the randomness property of the output sequences after the attack indicated by at least 2 experiments from 30 experiments on each algorithms has failed tests at most 2 tests on average on each experiment. The effects are increasing for higher intensity level. Among the 4 algorithms, the Dragon-based algorithm is stronger against the three other algorithms indicated by only 2 failed tests occurred in two different experiments. It is also shown that the insertion attack effect with extreme bits is very significant which may danger the randomness of the target PRNG that should be anticipated.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, Ridho Luberski
{"title":"Analysis of slotted and unslotted CSMA/CA Wireless Sensor Network for E-healthcare system","authors":"M. A. Rasyid, Isbat Uzzin Nadhori, Amang Sudarsono, Ridho Luberski","doi":"10.1109/IC3INA.2014.7042600","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042600","url":null,"abstract":"Wireless Sensor Network (WSN) have emerged as an important area for research and development because of their application such as in e-healthcare monitoring system. This paper presents and discusses the performance of slotted and unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol WSN for medical system, with a few additions to the protocol and adequate tuning parameters. Performance of slotted and unslotted protocol CSMA/CA were evaluated and analyzed for different network configurations to understand the impact of protocol parameters such as Superframe Order (SO), Beacon Order (BO), Backoff Exponent (BE), and Maximum Backoff Exponent (maxBE). Network performances Quality of Service (QoS) are analyzed, namely Throughput, Power Consumption, Average Delay, and Packet Success Probability. The proposed work is implemented in Network Simulator 2 (NS2). The performance of the protocol CSMA/CA was evaluated for WSN star topology. The simulation results show that of unslotted CSMA/CA is better than slotted CSMA/CA in terms of the packet success probability, energy consumption, and delay. While slotted CSMA/CA is better than unslotted CSMA/CA in term of throughput.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132314563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. A. Nugroho, N. Faisal, I. Soesanti, L. Choridah
{"title":"Analysis of digital mammograms for detection of breast cancer","authors":"H. A. Nugroho, N. Faisal, I. Soesanti, L. Choridah","doi":"10.1109/IC3INA.2014.7042595","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042595","url":null,"abstract":"Digital mammogram has become the most effective technique for early breast cancer detection. The most common abnormality that may indicate breast cancer is masses. The challenge lies in early and accurate detection to overcome the development of breast cancer that affects more and more women throughout the world. Computer Aided Diagnosis (CAD) is used to help the radiologist in interpretation and recognition the pattern of the mammogram abnormality. The main objective of this research is to perform and analyze the contrast enhancement and feature selection method in order to build a CAD to discriminate normal, benign, and malignant. Preprocessing needs to enhance the poor quality of image and remove the artifact caused by preprocessing step. ROI as the suspicious area segmented, and then extracted by texture feature approach. High dimensionality of feature is selected by feature selection technique and would be classified according to their class each other. The digital mammogram images are taken from the Private database of Oncology Clinic Kotabaru Yogyakarta. The dataset consists of 40 mammogram images with 14 benign cases, 6 malignant cases, and 20 normal cases. The proposed method in preprocessing step made the image enhanced and proved by MSE and PSNR value. Histogram and gray level co-occurrence matrix (GLCM) as the texture feature are used to extract the suspicious area. Correlation based feature selection (CFS) is used to select the best feature among 12 extracted features before. Mean, standard deviation, smoothness, angular second moment (ASM), entropy, and correlation are the best feature that guarantee the improvement of classification with less feature dimension. The result shows that the proposed method was achieved the accuracy 96.66%, sensitivity 96.73%, specificity 97.35% and ROC 96.6% It is expected to contribute for helping the radiologist as material consideration in decision-making.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121563847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An implementation of secure wireless sensor network for e-healthcare system","authors":"Amang Sudarsono, M. A. Rasyid, Hendhi Hermawan","doi":"10.1109/IC3INA.2014.7042603","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042603","url":null,"abstract":"In wireless sensor networks (WSNs), information carried in data sensor is very important for everyone, especially for critical data such as disaster warning, location based in military, and other high-risk data. Wireless Body Area Network (WBAN) which informs data sensor of body status, such as blood pressure, electrocardiogram, air-flow of breathing, body temperature, patient position and falls, galvanic skin response, etc. as well as environment conditions such as humidity, gases, noise, etc. Such data sensor should be transferred through wireless to the data center server securely and can be easily accessed by everyone at anytime and anywhere. However, data exchange in WSNs has a big possibility to be illegally intercepted by many threats and attacks. Hence, security mechanism would be desirable to address the problem. In fact, sensor nodes usually have low power, low performance and limited resources. In this paper, we propose a security system in WSN for e-healthcare system that satisfies confidentiality, authenticity, and data integrity with consideration on low overhead of cryptographic computation. Our experimental results showed that total computation time for cryptographic is about 3.61 seconds on Waspmote ATmegal281 microcontroller 14MHz.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Ahmad, H. Studiawan, Hafidh Sholihuddin Ahmad, R. Ijtihadie, W. Wibisono
{"title":"Shared secret-based steganography for protecting medical data","authors":"T. Ahmad, H. Studiawan, Hafidh Sholihuddin Ahmad, R. Ijtihadie, W. Wibisono","doi":"10.1109/IC3INA.2014.7042606","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042606","url":null,"abstract":"Medical data (i.e., medical image and medical record) is private which should be protected before being transferred or stored. There have been some methods proposed by implementing various algorithms, such as steganography. It is sometimes combined with the shared secret method, so that, the reconstruction of the original data must be done by some users. It is believed that this method increases the security of the data. However, there is still a need to make the stego data (i.e, stego image) has an as good as possible quality. This means that the stego image has high similarity to the cover (carrier) image. In this paper, we propose methods to protect the medical data by using the shared secret mechanism and steganography for 2 and 1 bit LSB. The experimental results show that they produce relatively good quality (similarity) in terms of PSNR.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124116198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attendance Management System (AMS) with fast track analysis","authors":"M. A. Abas, T. B. Tuck, M. Dahlui","doi":"10.1109/IC3INA.2014.7042597","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042597","url":null,"abstract":"Fast track analysis for Attendance Management System (AMS) is designed to facilitate the lecturer in monitoring student attendance during lecture session. Monitoring attendance is crucial especially for large group of students. Lecturers have difficulties to verify student's attendance during class and would take up some time. Error in key in the attendance into the system is also likely when transferring the attendance into the main system, with no way to trace the mistakes once the class is over. Late comers would be overlooked due to recording on the time they join the classes. Hence, a new system was innovated applying simple mechanism which consists of RFID data logger and data analysis using ASP.net. The system is portable and quick to verify attendances within 5 minutes regardless, of the size of the class.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129259271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved timing estimation based on symmetric correlator using statistical change of correlator for OFDM systems","authors":"S. Suyoto, A. Kurniawan, Sugihartono","doi":"10.1109/IC3INA.2014.7042609","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042609","url":null,"abstract":"An improved method for estimating the symbol timing offset based on symmetric correlator using statistical change of correlator in preamble-aided OFDM systems is presented. It uses a preamble structure that have symmetrical property and combines with statistical change of Correlator to achieve a near-ideal timing performance without degradation in multipath channel environment. Computer simulations show that the method is robust in fading multipath channels, achieving better performance than the existing methods.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"1559 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128070299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling flight departure delay distributions","authors":"Khusnul Novianingsih, R. Hadianti","doi":"10.1109/IC3INA.2014.7042596","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042596","url":null,"abstract":"In this paper, we construct a probability distribution for flight departure delay durations. The probability distribution is developed by fitting historical departure delay data of an airline to a number of probability distributions. Then, we choose the most fitted model by applying two-stage Genetic Algorithm. In the first stage, the algorithm works for maximizing log-likelihood function, and then we proceed to the second stage by facing the optimization model for minimizing the sum of squared error. The second stage is intended to avoid getting trapped in a local optimal solution which often occurs in log-likelihood approach. Since the historical data show that at a certain time in a day a flight has a bigger probability to be delayed, we also analyze the probability distribution of flight departure delay-time by using a similar approach for distribution of flight departure delay duration. The distributions can be used by the airline for measuring the sensitivity of flight schedules, so that a robust flight schedule can be constructed.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132270094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of classical and modern landing control system for a small unmanned aerial vehicle","authors":"Larasmoyo Nugroho","doi":"10.1109/IC3INA.2014.7042625","DOIUrl":"https://doi.org/10.1109/IC3INA.2014.7042625","url":null,"abstract":"Research presented in the following paper contrasted the modern optimal robust control method with classical one, applied for a landing control system of a small unmanned aerial vehicle. Philosophically speaking, the optimal control used H2 method meets excellent dynamic performance, while the robustness given by the H∞ method diminish the effect of disturbance to the performance output. Accordingly, implemented mixed H2/H∞ optimal robust control method in this paper appear to meet a balancing result between performance and robustness stability. Three phases of flight, level flight, descent and flare used both classical and modern control system to stabilize and track the desired trajectory, which is exposed heavily to the presence of wind disturbance and ground effect. PID with fuzzy logic approach is employed to switch autopilot between the flight phases. Linear matrix inequality (LMI) approach is clearly suited to find the balanced H2/H∞ gain. To sum up, all results simulated in linearized model (Simulink-Flight Gear), strengthened with non-linear model flight simulation (X-Plane). The optimal robust landing control system delivers the performance and stability superior than classical controller one as expected.","PeriodicalId":120043,"journal":{"name":"2014 International Conference on Computer, Control, Informatics and Its Applications (IC3INA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130090413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}