• Tidak ada hasil yang ditemukan

LAMPIRAN A: Kode Program

N/A
N/A
Protected

Academic year: 2021

Membagikan "LAMPIRAN A: Kode Program"

Copied!
12
0
0

Teks penuh

(1)

68

LAMPIRAN A: Kode Program

1. proses_teks_tanpa_stemming_executor.php

<?php

$teks = hapus_spesial_karakter_dan_nomor(strtolower($teks)); function hapus_spesial_karakter_dan_nomor($string){

return preg_replace('/[^A-Za-z]/', ' ', trim($string)); }

@$arrayKata = explode(" ", $teks); foreach($arrayKata as $kata){

$kata = hapus_2_karakter($kata); if(trim($kata) != "") {

@$teks_kata = $teks_kata . " " . $kata; } } function hapus_2_karakter($kata){ if (strlen($kata) > 2){ return $kata; } else { return ""; } } ?>

2. proses_teks_dengan_stemming_executor.php

<?php function hapus_spesial_karakter_dan_nomor($string){

return preg_replace('/[^A-Za-z]/', ' ', trim($string)); }

@$arrayKata = explode(" ", $teks); foreach ($arrayKata as $kata) { $kata = hapus_2_karakter($kata); if (trim($kata) != "") {

@$teks_kata = $teks_kata . " " . $kata; } } function hapus_2_karakter($kata) { if (strlen($kata) > 2) { return $kata; } else { return ""; } }

$arrayKata = explode(" ", $teks_kata); foreach ($arrayKata as $kata) {

$a = hapus_stop_words(trim($kata)); if ($a != "") {

@$hasil_hapus_stop_words = $hasil_hapus_stop_words . " " . $a; }

}

function hapus_stop_words($kata) {

$q=mysql_query("SELECT * FROM tb_stoplist WHERE stoplist='$kata'") or die(mysql_error());

(2)

69

if (mysql_num_rows($q) > 0) { return ""; } else { return $kata; } } ?>

3. ECS.php

//Hapus Inflection Suffixes (..-lah, ..-kah, ..-mu, atau ..-nya) function Del_Inflection_Suffixes($kata) {

$kataAsal = $kata;

if(preg_match('([km]u|nya|[kl]ah|pun)', $kata)){ //Cek Inflection Suffixes

$__kata = preg_replace('/([km]u|nya|[kl]ah|pun)$/i', '', $kata); if (preg_match('/([klt]ah|pun)$/i', $kata)){

//Jika berupa partikel (..-lah, ..-kah, ..-tah, atau ..-pun) if (preg_match('/([km]u|nya)$/i', $__kata)){

//Hapus Possesive Pronouns (..-ku, ..-mu, atau ..-nya) $__kata__ = preg_replace('([km]u|nya)$', '', $__kata); return $__kata__; } } return $__kata; } return $kataAsal; }

//Cek Prefix Disallowed Sufixes (Kombinasi Awalan dan Akhiran yang tidak diizinkan)

function Cek_Prefix_Disallowed_Sufixes($kata) {

if (preg_match("/^(be)[[:alpha:]]+(i)$/i", $kata)) { //be-.. dan ..-i

return true; }

if (preg_match("/^(di)[[:alpha:]]+(an)$/i", $kata)){ //di-.. dan ..-an

return true; }

if (preg_match("/^(ke)[[:alpha:]]+(i|kan)$/i", $kata)){ //ke-.. dan ..-i, ..-kan

return true; }

if (preg_match("/^(me)[[:alpha:]]+(an)$/i", $kata)){ //me-.. dan ..-an

return true; }

if (preg_match("/^(se)[[:alpha:]]+(i|kan)$/i", $kata)){ //se-.. dan ..-i, ..-kan

return true; }

return false; }

//Hapus Derivation Suffixes (..-i, ..-an, atau ..-kan) function Del_Derivation_Suffixes($kata) {

$kataAsal = $kata;

if (preg_match('/(kan)$/', $kata)){ //Cek Suffixes

$__kata = preg_replace('/(kan)$/', '', $kata); if (cekKamus($__kata)) { //Cek Kamus

(3)

70

return $__kata; } } if (preg_match('/(an|i)$/', $kata)){ //cek ..-kan

$__kata__ = preg_replace('/(an|i)$/', '', $kata); if (cekKamus($__kata__)) { //Cek Kamus

return $__kata__; } } if (Cek_Prefix_Disallowed_Sufixes($kata)) { return $kataAsal; } return $kataAsal; }

//Hapus Derivation Prefix (di-.., ke-.., se-.., te-.., be-.., me-.., atau pe-..)

function Del_Derivation_Prefix($kata) { $kataAsal = $kata;

/* --- Tentukan Tipe Awalan --- */

if (preg_match('/^(di|[ks]e)\S{1,}/', $kata)) { //Jika di-.., ke-.., se-..

$__kata = preg_replace('/^(di|[ks]e)/', '', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } if (preg_match('/^([tmbp]e)\S{1,}/', $kata)){ //Jika awalannya adala te-.., me-.., be-.., atau pe-.. /* --- Awalan be-.. --- */

if (preg_match('/^(be)\S{1,}/', $kata)){ //Jika awalan be-..

if(preg_match('/^(ber)[aiueo]\S{1,}/', $kata)) { //Aturan 1 $__kata = preg_replace('/^(ber)/', '', $kata);

if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik }

$__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) {

return $__kata__; }

$__kata = preg_replace('/^(ber)/', 'r', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* --- Awalan te-.. --- */

if (preg_match('/^(ter)[aiueo]\S{1,}/', $kata)) { //Aturan 6 $__kata = preg_replace('/^(ter)/', '', $kata);

if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik }

(4)

71

$__kata__ = Del_Derivation_Suffixes($__kata);

if (cekKamus($__kata__)) { return $__kata__; }

$__kata = preg_replace('/^(ter)/', 'r', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* --- Awalan me-.. --- */

if (preg_match('/^(me)\S{1,}/', $kata)) { //Jika awalan me-.. if (preg_match('/^(me)[lrwyv][aiueo]/', $kata)) { //Aturan 10 $__kata = preg_replace('/^(me)/', '', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } @$__kata__ = Del_Derivation_Suffixes($__kata__); if (cekKamus($__kata__)) { return $__kata__; } } } /* --- Awalan memper-.. --- */ if (preg_match('/^(memper)\S{1,}/', $kata)) {

$__kata = preg_replace('/^(memper)/', '', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } /* --- Cek luluh -r.. --- */

$__kata = preg_replace('/^(memper)/', '', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } } /* --- Cek luluh -r.. --- */

$__kata = preg_replace('/^(mempel)/', 'l', $kata); if (cekKamus($__kata)) {

return $__kata; //Jika ada maka balik } $__kata__ = Del_Derivation_Suffixes($__kata); if (cekKamus($__kata__)) { return $__kata__; } }

/* --- Cek Ada Tidaknya Prefix/Awalan di-.., ke-.., se-.., te-.., be-te-.., me-te-.., atau pe-.. --- */

(5)

72

return $kataAsal; } return $kataAsal; } function Enhanced_CS($kata) { $kataAsal = $kata;

//1. Cek Kata di kamus, jika ada maka selesai if (cekKamus($kata)) {

return $kata; } else {

//2. Buang Infection Suffixes (..-lah, ..-kah, ..-ku, ..-mu, atau ..-nya)

$kata = Del_Inflection_Suffixes($kata);

//3. Buang Derivation Suffix (..-i atau ..-an) $kata = Del_Derivation_Suffixes($kata);

//4. Buang Derivation Prefix

$kata = Del_Derivation_Prefix($kata); return $kata; } } ?>

4. winnowing.php

<?php

function winnow($teks, $nilai_gram, $window) {

$teks = hapus_special_karakter_dan_nomor($teks); $grams = pembentukan_grams($teks, $nilai_gram); $hash = pembentukan_hash($grams);

$array_window = membuat_window($hash, $window); $finger = finger_print($array_window);

$finger = array_unique($finger); return $finger;

}

function similarity($finger1, $finger2) { $finger_sama = 0; foreach ($finger1 as $h1) { foreach ($finger2 as $h2) { if ($h1 == $h2) { $finger_sama++; break; } } }

$finger_merge = array_merge($finger1, $finger2); $finger_unik = array_unique($finger_merge); $total_finger_unik = sizeof($finger_unik);

$jaccard_coefficient = $finger_sama / $total_finger_unik; return $jaccard_coefficient;

}

function buat_hash($teks, $gram) {

$grams = pembentukan_grams($teks, $gram); $hash = pembentukan_hash($grams);

return $hash; }

function hapus_special_karakter_dan_nomor($teks) {

return preg_replace('/[^A-Za-z]/', '', trim(strtolower($teks))); }

function pembentukan_grams($string, $kgram) { $kgramAwal = $kgram;

(6)

73

$jum = strlen($string);

$temp = 0;

$kgram_temp = 0;

$batas = $kgramAwal - 1;

for ($i = 0; $i < $jum - $batas; $i++) { $res[] = substr($string, $i, $kgramAwal); $temp = $kgram; $kgram = $kgram + 1; } return $res; } function pembentukan_hash($grams) { $arrayHash = array();

foreach ($grams as $pos => $gram) { $basis_bilangan = 10;

$bilangan_prima = 10007;

$charArray = str_split($gram); $pangkat = count($charArray); $hash = 0;

foreach ($charArray as $karakter) {

$hash += (ord($karakter)*pow($basis_bilangan,($pangkat-1))); $pangkat--;

}

$total_hash = $hash;

$hasil = fmod($total_hash, $bilangan_prima); $arrayHash[] = $hasil;

}

return $arrayHash; }

function membuat_window($array, $window) { $arrayWindow = array();

for ($i = 0; $i < count($array) - $window + 1; $i++) { for ($j = $i; $j < $window + $i; $j++) {

$arrayWindow[$i][$j] = $array[$j]; } } return $arrayWindow; } function finger_print($array) { $finger = array();

foreach ($array as $obj) { $finger[] = min($obj); }

return $finger; }

(7)

74

LAMPIRAN B: Hasil Pendekteksian Kesamaan

1. Pengujian pendeteksian kesamaan dengan proses stemming

Jurnal Uji

Fingerprint

Jurnal Pembanding

Fingerprint

Fingerprint yang sama

Kesamaan

(%)

Lama

Proses (s)

Analisa PSNR

Pada Teknik

Steganografi

Menggunakan

Spread Spectrum

[2083,0] [906,4]

[187,8] [677,13]

[133,15] [550,20]

[2049,20] [2684,26]

[3617,29] [3140,30]

[532,32] [866,37]

[2091,38] [2789,40]

[4455,41] [4665,42] …

Implementasi Steganografi

Pesan Text Ke Dalam File

Sound (.Wav) Dengan

Modifikasi Jarak Byte Pada

Algoritma Least Significant

Bit (Lsb)

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1569,30] [4704,32]

[1376,33] [223,37]

[175,39] [3860,44]

[4131,45] [680,46] …

[187,2187] [677,1931]

[133,2643] [583,1394]

[2230,3977] [1071,3580]

[3978,763] [2384,6123]

[401,104] [45,1136] ...

21.27

± 84.08

Analisa PSNR

Pada Teknik

Steganografi

Menggunakan

Spread Spectrum

[2083, 0] [906,4]

[187,8] [677,13]

[133,15] [550,20]

[2049,20] [2684,26]

[3617,29] [3140,30]

[532,32] [866,37]

[2091,38] [2789,40]

[4455,41] [4665,42] …

Perancangan Perangkat Lunak

Steganografi Audio MP3

Menggunakan Metode Least

Significant Bit (LSB) Dengan

Visual Basic 6.0

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1647,30] [1154,31]

[1752,36] [1540,40]

[1144,43] [2311,48]

[3832,49] [1330,50] …

[677,2100] [2049,7854]

[532,873] [866,3285]

[2091,4320] [400,1152]

[1071,6069] [931,25]

[3317,4561]

[2384,2531]…

24.76

± 63.33

Analisa PSNR

Pada Teknik

Steganografi

Menggunakan

Spread Spectrum

[2083, 0] [906,4]

[187,8] [677,13]

[133,15] [550,20]

[2049,20] [2684,26]

[3617,29] [3140,30]

[532,32] [866,37]

[2091,38] [2789,40]

[4455,41] [4665,42] …

Implementasi Sistem

Keamanan Data dengan

Menggunakan Teknik

Steganografi End of File

(EOF) dan Rabin Public Key

Cryptosystem

[3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [3100,9]

[712,10] [754,15]

[3921,20] [3074,21]

[634,23] [217,27]

[318,32] [5284,35]

[7783,35] [7072,36] …

[906, 6232] [187, 13262]

[550, 1057] [2049, 11683]

[2684,1895] [3617, 3172]

[532, 5577] [2789, 4367]

[2383, 10775] [583, 5133]

25.34

± 70.50

(8)

75

Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan)

Jurnal Uji

Fingerprint

Jurnal Pembanding

Fingerprint

Fingerprint yang sama

Kesamaan

(%)

Lama

Proses (s)

Implementasi

Kriptografi Dan

Steganografi

[1115,0] [446,2]

[1660,7] [2349,8]

[3234,9] [4009,11]

[882,12] [2202,17]

[1516,18] [1125,19]

[1929,24] [5270,27]

[3282,29] [420,30]

[3388,35] [3105,36] …

Implementasi Steganografi

Pesan Text Ke Dalam File

Sound (.Wav) Dengan

Modifikasi Jarak Byte Pada

Algoritma Least Significant

Bit (Lsb)

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1569,30] [4704,32]

[1376,33] [223,37]

[175,39] [3860,44]

[4131,45] [680,46] …

[1115,1936] [1660,5500]

[882,1869] [2202,3814]

[3282,3652] [3105,324]

[2773,3707] [1646,1619]

[2177,7111] [858,842] …

20.68

±

61.67

Implementasi

Kriptografi Dan

Steganografi

[1115,0] [446,2]

[1660,7] [2349,8]

[3234,9] [4009,11]

[882,12] [2202,17]

[1516,18] [1125,19]

[1929,24] [5270,27]

[3282,29] [420,30]

[3388,35] [3105,36] …

Perancangan Perangkat Lunak

Steganografi Audio MP3

Menggunakan Metode Least

Significant Bit (LSB) Dengan

Visual Basic 6.0

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1647,30] [1154,31]

[1752,36] [1540,40]

[1144,43] [2311,48]

[3832,49] [1330,50] …

[1660,7287] [2349,7794]

[3234,3791] [4009,2898]

[882,2038] [1516,6717]

[420,530] [3105,4360]

[5790,3720] [2773,3875]

22.40

± 59.77

Implementasi

Kriptografi Dan

Steganografi

[1115,0] [446,2]

[1660,7] [2349,8]

[3234,9] [4009,11]

[882,12] [2202,17]

[1516,18] [1125,19]

[1929,24] [5270,27]

[3282,29] [420,30]

[3388,35] [3105,36] …

Implementasi Sistem

Keamanan Data dengan

Menggunakan Teknik

Steganografi End of File

(EOF) dan Rabin Public Key

Cryptosystem

[3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [3100,9]

[712,10] [754,15]

[3921,20] [3074,21]

[634,23] [217,27]

[318,32] [5284,34]

[7783,35] [7072,36] …

[446, 3295] [1660,503]

[4009, 2303] [882, 544]

[2202, 11625]

[1125, 5708]

[3105, 0]

[2773, 7809]

[1646, 318]

[2177, 1466] …

23.40

± 64.00

(9)

76

Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan)

Jurnal Uji

Fingerprint

Jurnal Pembanding

Fingerprint

Fingerprint yang sama

Kesamaan

(%)

Lama

Proses (s)

Implementasi

Steganography

Menggunakan

Metode Least

Significant Bit

(Lsb) Pada Mobile

Phone Berbasis

Symbian Os

[3105,0] [5798,1]

[4405,2] [3211,5]

[328,9] [5383,14]

[1313,15] [630,17]

[641,22] [2797,26]

[3514,27] [4921,28]

[4730,29] [2400,30]

[975,31] [1130,36] …

Implementasi Steganografi

Pesan Text Ke Dalam File

Sound (.Wav) Dengan

Modifikasi Jarak Byte Pada

Algoritma Least Significant Bit

(Lsb)

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1569,30] [4704,32]

[1376,33] [223,37]

[175,39] [3860,44]

[4131,45] [680,46] …

[3105,324] [5798,1710]

[4405,1711]

[3211,1714] [328,845]

[5383,850] [1313,2975]

[630,772] [641,3130]

[2797,3133] …

20.83

± 111.90

Implementasi

Steganography

Menggunakan

Metode Least

Significant Bit

(Lsb) Pada Mobile

Phone Berbasis

Symbian Os

[3105,0] [5798,1]

[4405,2] [3211,5]

[328,9] [5383,14]

[1313,15] [630,17]

[641,22] [2797,26]

[3514,27] [4921,28]

[4730,29] [2400,30]

[975,31] [1130,36] …

Perancangan Perangkat Lunak

Steganografi Audio MP3

Menggunakan Metode Least

Significant Bit (LSB) Dengan

Visual Basic 6.0

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1647,30] [1154,31]

[1752,36] [1540,40]

[1144,43] [2311,48]

[3832,49] [1330,50] …

[3105, 4360][4405, 477]

[3211, 311]

[328, 145] [5383, 9402]

[1313, 5477]

[630, 2942]

[641, 1712]

[2797, 1717]

[3514, 1718] …

25.79

± 84.37

Implementasi

Steganography

Menggunakan

Metode Least

Significant Bit

(Lsb) Pada Mobile

Phone Berbasis

Symbian Os

[3105,0] [5798,1]

[4405,2] [3211,5]

[328,9] [5383,14]

[1313,15] [630,17]

[641,22] [2797,26]

[3514,27] [4921,28]

[4730,29] [2400,30]

[975,31] [1130,36] …

Implementasi Sistem Keamanan

Data dengan Menggunakan

Teknik Steganografi End of File

(EOF) dan Rabin Public Key

Cryptosystem

[3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [3100,9]

[712,10] [754,15]

[3921,20] [3074,21]

[634,23] [217,27]

[318,32] [5284,34]

[7783,35] [7072,36]…

[3105,0] [5798,1]

[4405,5681]

[3211,11085]

[641,12807]

[2797,4941]

[3514,9348]

[4921,12814]

[4730,4514]

[2400,12816] …

25.49

± 68.81

(10)

77

2. Pengujian pendeteksian kesamaan dengan tanpa proses stemming

Jurnal Uji

Fingerprint

Jurnal Pembanding

Fingerprint

Fingerprint yang sama

Kesamaan

(%)

Lama

Proses (s)

Analisa PSNR

Pada Teknik

Steganografi

Menggunakan

Spread Spectrum

[2083,0] [906,4]

[187,8] [677,13]

[133,15] [550,20]

[2049,24] [2684,26]

[3617,29] [3140,30]

[532,32] [866,37]

[2091,38] [2789,40]

[4455,41] [4665,42] …

Implementasi Steganografi

Pesan Text Ke Dalam File

Sound (.Wav) Dengan

Modifikasi Jarak Byte Pada

Algoritma Least Significant

Bit (Lsb)

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1361,30] [612,31]

[4006,36] [734,38]

[175,43] [3860,48]

[4131,49] [680,50] …

[906,9306] [677,2847]

[133,232] [550,3885]

[3140,7885] [4455,2921]

[2118,6556] [400,1552]

[583,1183] [302,151] …

34.13

± 44.26

Analisa PSNR

Pada Teknik

Steganografi

Menggunakan

Spread Spectrum

[2083,0] [906,4]

[187,8] [677,13]

[133,15] [550,20]

[2049,24] [2684,26]

[3617,29] [3140,30]

[532,32] [866,37]

[2091,38] [2789,40]

[4455,41] [4665,42] …

Perancangan Perangkat

Lunak Steganografi Audio

MP3 Menggunakan Metode

Least Significant Bit (LSB)

Dengan Visual Basic 6.0

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[914,30] [3545,35]

[7318,37] [4357,38]

[7156,43] [7069,44]

[3172,47] [996,50]

[2083,8649] [906,8591]

[187,1425] [677,3904]

[133,9325] [550,12663]

[2049,14397] [2684,12996]

[532,12370] [866,12750] …

39.21

± 38.11

Analisa PSNR

Pada Teknik

Steganografi

Menggunakan

Spread Spectrum

[2083,0] [906,4]

[187,8] [677,13]

[133,15] [550,20]

[2049,24] [2684,26]

[3617,29] [3140,30]

[532,32] [866,37]

[2091,38] [2789,40]

[4455,41] [4665,42] …

Implementasi Sistem

Keamanan Data dengan

Menggunakan Teknik

Steganografi End of File

(EOF) dan Rabin Public

Key Cryptosystem

[3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [4020,9]

[6145,12] [6506,13]

[4036,14] [688,16]

[2009,21] [4657,22]

[696,23] [1091,28]

[6146,32] [2048,33] …

[2083, 19135] [906, 350]

[187, 4960] [677, 1494]

[550, 1595] [2684, 5977]

[3617, 5657] [3140, 14386]

[532, 20835] [862, 1221] …

40.13

± 47.95

(11)

78

Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan)

Jurnal Uji

Fingerprint

Jurnal Pembanding

Fingerprint

Fingerprint yang sama

Kesamaan

(%)

Lama

Proses (s)

Implementasi

Kriptografi Dan

Steganografi

[1667,0] [1503,2]

[337,7] [3234,12]

[4009,16] [882,17]

[2202,22] [1516,24]

[1125,29] [1929,32]

[5270,34] [3282,35]

[3388,40] [3105,41]

[5790,46] …

Implementasi Steganografi

Pesan Text Ke Dalam File

Sound (.Wav) Dengan

Modifikasi Jarak Byte Pada

Algoritma Least Significant

Bit (Lsb)

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1361,30] [612,31]

[4006,36] [734,38]

[175,43] [3860,48]

[4131,49] [680,50] …

[1667, 2004] [337,133]

[4009,7525] [882,3324]

[2202,1244] [1516,5695]

[1929,6893] [3282,6456]

[3105,654] [5790,657] ...

30.93

± 43.83

Implementasi

Kriptografi Dan

Steganografi

[1667,0] [1503,2]

[337,7] [3234,12]

[4009,16] [882,17]

[2202,22] [1516,24]

[1125,29] [1929,32]

[5270,34] [3282,35]

[3388,40] [3105,41]

[5790,46] …

Perancangan Perangkat

Lunak Steganografi Audio

MP3 Menggunakan Metode

Least Significant Bit (LSB)

Dengan Visual Basic 6.0

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[914,30] [3545,35]

[7318,37] [4357,38]

[7156,43] [7069,44]

[3172,47] [996,50]

[1667,6011] [1503,3331]

[337,195] [3234,7469]

[882,3839] [2202,1167]

[1516,12373] [3105,3534]

[5790,16245] [2773,7235] …

34.62

± 43.48

Implementasi

Kriptografi Dan

Steganografi

[1667,0] [1503,2]

[337,7] [3234,12]

[4009,16] [882,17]

[2202,22] [1516,24]

[1125,29] [1929,32]

[5270,34] [3282,35]

[3388,40] [3105,41]

[5790,46] …

Implementasi Sistem

Keamanan Data dengan

Menggunakan Teknik

Steganografi End of File

(EOF) dan Rabin Public

Key Cryptosystem

[3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [4020,9]

[6145,12] [6506,13]

[4036,14] [688,16]

[2009,21] [4657,22]

[696,23] [1091,28]

[6146,32] [2048,33] …

[3105, 41] [103, 13765]

[4020, 11567] [4036, 11548]

[696, 8252] [1091, 95]

[6146, 100] [2048, 101]

[1757, 14318] [325, 250] …

35.60

± 42.59

(12)

79

Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan)

Jurnal Uji

Fingerprint

Jurnal Pembanding

Fingerprint

Fingerprint yang sama

Kesamaan

(%)

Lama

Proses (s)

Implementasi

Steganography

Menggunakan

Metode Least

Significant Bit

(Lsb) Pada Mobile

Phone Berbasis

Symbian Os

[3105,0] [5798,1]

[4405,2] [3211,5]

[328,9] [5383,14]

[1245,15] [1134,19]

[1687,24] [2037,29]

[2080,31] [641,32]

[2797,37] [3514,38]

[4921,39] [4730,40] …

Implementasi

Steganografi Pesan Text

Ke Dalam File Sound

(.Wav) Dengan

Modifikasi Jarak Byte

Pada Algoritma Least

Significant Bit (Lsb)

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[1361,30] [612,31]

[4006,36] [734,38]

[175,43] [3860,48]

[4131,49] [680,50] …

[3105,654] [5798,3150]

[4405,3151] [3211,3154]

[5383,2598] [1245,4826]

[1687,4241] [2037,4246]

[641,5461] [2797,2924] …

34.74

± 63.60

Implementasi

Steganography

Menggunakan

Metode Least

Significant Bit

(Lsb) Pada Mobile

Phone Berbasis

Symbian Os

[3105,0] [5798,1]

[4405,2] [3211,5]

[328,9] [5383,14]

[1245,15] [1134,19]

[1687,24] [2037,29]

[2080,31] [641,32]

[2797,37] [3514,38]

[4921,39] [4730,40] …

Perancangan Perangkat

Lunak Steganografi

Audio MP3

Menggunakan Metode

Least Significant Bit

(LSB) Dengan Visual

Basic 6.0

[116,0] [652,4]

[173,7] [529,12]

[1056,17] [1023,19]

[848,23] [619,25]

[914,30] [3545,35]

[7318,37] [4357,38]

[7156,43] [7069,44]

[3172,47] [996,50] ...

[3105, 3534] [3211, 1117]

[328, 17081] [5383, 17086]

[1245, 14338] [1134, 671]

[1687, 676] [2037, 681]

[2080, 3725] [641, 3339] …

39.28

± 51.10

Implementasi

Steganography

Menggunakan

Metode Least

Significant Bit

(Lsb) Pada Mobile

Phone Berbasis

Symbian Os

[3105,0] [5798,1]

[4405,2] [3211,5]

[328,9] [5383,14]

[1245,15] [1134,19]

[1687,24] [2037,29]

[2080,31] [641,32]

[2797,37] [3514,38]

[4921,39] [4730,40] …

Implementasi Sistem

Keamanan Data dengan

Menggunakan Teknik

Steganografi End of File

(EOF) dan Rabin Public

Key Cryptosystem

[3105,0] [5798,1]

[3458,2] [103,3]

[2517,8] [4020,9]

[6145,12] [6506,13]

[4036,14] [688,16]

[2009,21] [4657,22]

[696,23] [1091,28]

[6146,32] [2048,33] …

[3105,0] [5798,1]

[3211,18246] [1245,7545]

[1687,508] [2037,3230]

[641,22178] [2797,8630]

[3514,22184] [4921,22185]

40.22

± 39.96

Referensi

Dokumen terkait

Tujuan penelitian ini adalah untuk mengetahui keragaan usaha peternakan kambing peranakan etawa yang meliputi aspek kewirausahaan (rencana pengembangan usaha) dan aspek

Dari hasil pengamatan diketahui bahwa bakto agar hasil ekstraksi dari rumput laut jenis Gelidium rigidum selama 2 jam mutunya menyamai bakto agar komersial,

Walaupun penelitian ini telah dapat menunjukkan bahwa media yang dikembangkan layak digunakan sebagai perangkat pembelajaran fisika bagi siswa SMP, namun

(b) Kewajiban SAP dalam Pasal 8.1 tidak akan berlaku jika klaim yang disebabkan oleh (i) pelanggaran terhadap Pasal 2 oleh Pelanggan, (ii) penggunaan Layanan Cloud

ketahanan suatu materil dibagi dengan gaya yang bekerja/terjadi pada material tersebut, dimana nilai faktor keselamatan harus bernilai minimal 1.5, sehigga ketika kita

Hasil dari pengujian disimpulkan bahwa kontroler yang dibuat sudah dapat untuk melakukan pengaturan frekuensi serta menjaga kestabilan dari turbin generator

Hak imunitas dalam UU MD 3 memberikan kekebalan hukum (tidak dapat dikenai tuntutan dihadaan hukum) atas pernyataan-pernyataan dan pendapat yang disampaikan dalam

[r]