(1)68
LAMPIRAN A: Kode Program
1. proses_teks_tanpa_stemming_executor.php
<?php
$teks = hapus_spesial_karakter_dan_nomor(strtolower($teks));
function hapus_spesial_karakter_dan_nomor($string){
return preg_replace('/[^A-Za-z]/', ' ', trim($string));
}
@$arrayKata = explode(" ", $teks);
foreach($arrayKata as $kata){
$kata = hapus_2_karakter($kata);
if(trim($kata) != "") {
@$teks_kata = $teks_kata . " " . $kata;
}
}
function hapus_2_karakter($kata){
if (strlen($kata) > 2){
return $kata;
} else {
return "";
}
}
?>
2. proses_teks_dengan_stemming_executor.php
<?php
function hapus_spesial_karakter_dan_nomor($string){
return preg_replace('/[^A-Za-z]/', ' ', trim($string));
}
@$arrayKata = explode(" ", $teks);
foreach ($arrayKata as $kata) {
$kata = hapus_2_karakter($kata);
if (trim($kata) != "") {
@$teks_kata = $teks_kata . " " . $kata;
}
}
function hapus_2_karakter($kata) {
if (strlen($kata) > 2) {
return $kata;
} else {
return "";
}
}
$arrayKata = explode(" ", $teks_kata);
foreach ($arrayKata as $kata) {
$a = hapus_stop_words(trim($kata));
if ($a != "") {
@$hasil_hapus_stop_words = $hasil_hapus_stop_words . " " . $a;
}
}
function hapus_stop_words($kata) {
$q=mysql_query("SELECT * FROM tb_stoplist WHERE
stoplist='$kata'") or die(mysql_error());
(2)69
if (mysql_num_rows($q) > 0) {
return "";
} else {
return $kata;
}
}
?>
3. ECS.php
//Hapus Inflection Suffixes (..-lah, ..-kah, ..-mu, atau ..-nya)
function Del_Inflection_Suffixes($kata) {
$kataAsal = $kata;
if(preg_match('([km]u|nya|[kl]ah|pun)', $kata)){
//Cek Inflection Suffixes
$__kata = preg_replace('/([km]u|nya|[kl]ah|pun)$/i', '', $kata);
if (preg_match('/([klt]ah|pun)$/i', $kata)){
//Jika berupa partikel (..-lah, ..-kah, ..-tah, atau ..-pun)
if (preg_match('/([km]u|nya)$/i', $__kata)){
//Hapus Possesive Pronouns (..-ku, ..-mu, atau ..-nya)
$__kata__ = preg_replace('([km]u|nya)$', '', $__kata);
return $__kata__;
}
}
return $__kata;
}
return $kataAsal;
}
//Cek Prefix Disallowed Sufixes (Kombinasi Awalan dan Akhiran yang
tidak diizinkan)
function Cek_Prefix_Disallowed_Sufixes($kata) {
if (preg_match("/^(be)[[:alpha:]]+(i)$/i", $kata)) {
//be-.. dan ..-i
return true;
}
if (preg_match("/^(di)[[:alpha:]]+(an)$/i", $kata)){
//di-.. dan ..-an
return true;
}
if (preg_match("/^(ke)[[:alpha:]]+(i|kan)$/i", $kata)){
//ke-.. dan ..-i, ..-kan
return true;
}
if (preg_match("/^(me)[[:alpha:]]+(an)$/i", $kata)){
//me-.. dan ..-an
return true;
}
if (preg_match("/^(se)[[:alpha:]]+(i|kan)$/i", $kata)){
//se-.. dan ..-i, ..-kan
return true;
}
return false;
}
//Hapus Derivation Suffixes (..-i, ..-an, atau ..-kan)
function Del_Derivation_Suffixes($kata) {
$kataAsal = $kata;
if (preg_match('/(kan)$/', $kata)){
//Cek Suffixes
$__kata = preg_replace('/(kan)$/', '', $kata);
if (cekKamus($__kata)) { //Cek Kamus
(3)70
return $__kata;
}
}
if (preg_match('/(an|i)$/', $kata)){
//cek ..-kan
$__kata__ = preg_replace('/(an|i)$/', '', $kata);
if (cekKamus($__kata__)) { //Cek Kamus
return $__kata__;
}
}
if (Cek_Prefix_Disallowed_Sufixes($kata)) {
return $kataAsal;
}
return $kataAsal;
}
//Hapus Derivation Prefix (di-.., ke-.., se-.., te-.., be-.., me-..,
atau pe-..)
function Del_Derivation_Prefix($kata) {
$kataAsal = $kata;
/* --- Tentukan Tipe Awalan --- */
if (preg_match('/^(di|[ks]e)\S{1,}/', $kata)) {
//Jika di-.., ke-.., se-..
$__kata = preg_replace('/^(di|[ks]e)/', '', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
}
if (preg_match('/^([tmbp]e)\S{1,}/', $kata)){
//Jika awalannya adala te-.., me-.., be-.., atau pe-..
/* --- Awalan be-.. --- */
if (preg_match('/^(be)\S{1,}/', $kata)){
//Jika awalan be-..
if(preg_match('/^(ber)[aiueo]\S{1,}/', $kata)) { //Aturan 1
$__kata = preg_replace('/^(ber)/', '', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
$__kata = preg_replace('/^(ber)/', 'r', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
}
/* --- Awalan te-.. --- */
if (preg_match('/^(ter)[aiueo]\S{1,}/', $kata)) { //Aturan 6
$__kata = preg_replace('/^(ter)/', '', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
(4)71
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
$__kata = preg_replace('/^(ter)/', 'r', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
}
/* --- Awalan me-.. --- */
if (preg_match('/^(me)\S{1,}/', $kata)) { //Jika awalan me-..
if (preg_match('/^(me)[lrwyv][aiueo]/', $kata)) { //Aturan 10
$__kata = preg_replace('/^(me)/', '', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
@$__kata__ = Del_Derivation_Suffixes($__kata__);
if (cekKamus($__kata__)) {
return $__kata__;
}
}
}
/* --- Awalan memper-.. --- */
if (preg_match('/^(memper)\S{1,}/', $kata)) {
$__kata = preg_replace('/^(memper)/', '', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
/* --- Cek luluh -r.. --- */
$__kata = preg_replace('/^(memper)/', '', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
}
/* --- Cek luluh -r.. --- */
$__kata = preg_replace('/^(mempel)/', 'l', $kata);
if (cekKamus($__kata)) {
return $__kata; //Jika ada maka balik
}
$__kata__ = Del_Derivation_Suffixes($__kata);
if (cekKamus($__kata__)) {
return $__kata__;
}
}
/* --- Cek Ada Tidaknya Prefix/Awalan di-.., ke-.., se-..,
te-.., be-te-.., me-te-.., atau pe-.. --- */
(5)72
return $kataAsal;
}
return $kataAsal;
}
function Enhanced_CS($kata) {
$kataAsal = $kata;
//1. Cek Kata di kamus, jika ada maka selesai
if (cekKamus($kata)) {
return $kata;
} else {
//2. Buang Infection Suffixes (..-lah, ..-kah, ..-ku, ..-mu, atau
..-nya)
$kata = Del_Inflection_Suffixes($kata);
//3. Buang Derivation Suffix (..-i atau ..-an)
$kata = Del_Derivation_Suffixes($kata);
//4. Buang Derivation Prefix
$kata = Del_Derivation_Prefix($kata);
return $kata;
}
}
?>
4. winnowing.php
<?php
function winnow($teks, $nilai_gram, $window) {
$teks = hapus_special_karakter_dan_nomor($teks);
$grams = pembentukan_grams($teks, $nilai_gram);
$hash = pembentukan_hash($grams);
$array_window = membuat_window($hash, $window);
$finger = finger_print($array_window);
$finger = array_unique($finger);
return $finger;
}
function similarity($finger1, $finger2) {
$finger_sama = 0;
foreach ($finger1 as $h1) {
foreach ($finger2 as $h2) {
if ($h1 == $h2) {
$finger_sama++;
break;
}
}
}
$finger_merge = array_merge($finger1, $finger2);
$finger_unik = array_unique($finger_merge);
$total_finger_unik = sizeof($finger_unik);
$jaccard_coefficient = $finger_sama / $total_finger_unik;
return $jaccard_coefficient;
}
function buat_hash($teks, $gram) {
$grams = pembentukan_grams($teks, $gram);
$hash = pembentukan_hash($grams);
return $hash;
}
function hapus_special_karakter_dan_nomor($teks) {
return preg_replace('/[^A-Za-z]/', '', trim(strtolower($teks)));
}
function pembentukan_grams($string, $kgram) {
$kgramAwal = $kgram;
(6)73
$jum = strlen($string);
$temp = 0;
$kgram_temp = 0;
$batas = $kgramAwal - 1;
for ($i = 0; $i < $jum - $batas; $i++) {
$res[] = substr($string, $i, $kgramAwal);
$temp = $kgram;
$kgram = $kgram + 1;
}
return $res;
}
function pembentukan_hash($grams) {
$arrayHash = array();
foreach ($grams as $pos => $gram) {
$basis_bilangan = 10;
$bilangan_prima = 10007;
$charArray = str_split($gram);
$pangkat = count($charArray);
$hash = 0;
foreach ($charArray as $karakter) {
$hash += (ord($karakter)*pow($basis_bilangan,($pangkat-1)));
$pangkat--;
}
$total_hash = $hash;
$hasil = fmod($total_hash, $bilangan_prima);
$arrayHash[] = $hasil;
}
return $arrayHash;
}
function membuat_window($array, $window) {
$arrayWindow = array();
for ($i = 0; $i < count($array) - $window + 1; $i++) {
for ($j = $i; $j < $window + $i; $j++) {
$arrayWindow[$i][$j] = $array[$j];
}
}
return $arrayWindow;
}
function finger_print($array) {
$finger = array();
foreach ($array as $obj) {
$finger[] = min($obj);
}
return $finger;
}
(7)74
LAMPIRAN B: Hasil Pendekteksian Kesamaan
1. Pengujian pendeteksian kesamaan dengan proses stemming
Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan
(%)
Lama
Proses (s)
Analisa PSNR
Pada Teknik
Steganografi
Menggunakan
Spread Spectrum
[2083,0] [906,4]
[187,8] [677,13]
[133,15] [550,20]
[2049,20] [2684,26]
[3617,29] [3140,30]
[532,32] [866,37]
[2091,38] [2789,40]
[4455,41] [4665,42] …
Implementasi Steganografi
Pesan Text Ke Dalam File
Sound (.Wav) Dengan
Modifikasi Jarak Byte Pada
Algoritma Least Significant
Bit (Lsb)
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1569,30] [4704,32]
[1376,33] [223,37]
[175,39] [3860,44]
[4131,45] [680,46] …
[187,2187] [677,1931]
[133,2643] [583,1394]
[2230,3977] [1071,3580]
[3978,763] [2384,6123]
[401,104] [45,1136] ...
21.27
± 84.08
Analisa PSNR
Pada Teknik
Steganografi
Menggunakan
Spread Spectrum
[2083, 0] [906,4]
[187,8] [677,13]
[133,15] [550,20]
[2049,20] [2684,26]
[3617,29] [3140,30]
[532,32] [866,37]
[2091,38] [2789,40]
[4455,41] [4665,42] …
Perancangan Perangkat Lunak
Steganografi Audio MP3
Menggunakan Metode Least
Significant Bit (LSB) Dengan
Visual Basic 6.0
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1647,30] [1154,31]
[1752,36] [1540,40]
[1144,43] [2311,48]
[3832,49] [1330,50] …
[677,2100] [2049,7854]
[532,873] [866,3285]
[2091,4320] [400,1152]
[1071,6069] [931,25]
[3317,4561]
[2384,2531]…
24.76
± 63.33
Analisa PSNR
Pada Teknik
Steganografi
Menggunakan
Spread Spectrum
[2083, 0] [906,4]
[187,8] [677,13]
[133,15] [550,20]
[2049,20] [2684,26]
[3617,29] [3140,30]
[532,32] [866,37]
[2091,38] [2789,40]
[4455,41] [4665,42] …
Implementasi Sistem
Keamanan Data dengan
Menggunakan Teknik
Steganografi End of File
(EOF) dan Rabin Public Key
Cryptosystem
[3105,0] [5798,1]
[3458,2] [103,3]
[2517,8] [3100,9]
[712,10] [754,15]
[3921,20] [3074,21]
[634,23] [217,27]
[318,32] [5284,35]
[7783,35] [7072,36] …
[906, 6232] [187, 13262]
[550, 1057] [2049, 11683]
[2684,1895] [3617, 3172]
[532, 5577] [2789, 4367]
[2383, 10775] [583, 5133]
…
25.34
± 70.50
(8)75
Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan)
Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan
(%)
Lama
Proses (s)
Implementasi
Kriptografi Dan
Steganografi
[1115,0] [446,2]
[1660,7] [2349,8]
[3234,9] [4009,11]
[882,12] [2202,17]
[1516,18] [1125,19]
[1929,24] [5270,27]
[3282,29] [420,30]
[3388,35] [3105,36] …
Implementasi Steganografi
Pesan Text Ke Dalam File
Sound (.Wav) Dengan
Modifikasi Jarak Byte Pada
Algoritma Least Significant
Bit (Lsb)
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1569,30] [4704,32]
[1376,33] [223,37]
[175,39] [3860,44]
[4131,45] [680,46] …
[1115,1936] [1660,5500]
[882,1869] [2202,3814]
[3282,3652] [3105,324]
[2773,3707] [1646,1619]
[2177,7111] [858,842] …
20.68
±
61.67
Implementasi
Kriptografi Dan
Steganografi
[1115,0] [446,2]
[1660,7] [2349,8]
[3234,9] [4009,11]
[882,12] [2202,17]
[1516,18] [1125,19]
[1929,24] [5270,27]
[3282,29] [420,30]
[3388,35] [3105,36] …
Perancangan Perangkat Lunak
Steganografi Audio MP3
Menggunakan Metode Least
Significant Bit (LSB) Dengan
Visual Basic 6.0
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1647,30] [1154,31]
[1752,36] [1540,40]
[1144,43] [2311,48]
[3832,49] [1330,50] …
[1660,7287] [2349,7794]
[3234,3791] [4009,2898]
[882,2038] [1516,6717]
[420,530] [3105,4360]
[5790,3720] [2773,3875]
…
22.40
± 59.77
Implementasi
Kriptografi Dan
Steganografi
[1115,0] [446,2]
[1660,7] [2349,8]
[3234,9] [4009,11]
[882,12] [2202,17]
[1516,18] [1125,19]
[1929,24] [5270,27]
[3282,29] [420,30]
[3388,35] [3105,36] …
Implementasi Sistem
Keamanan Data dengan
Menggunakan Teknik
Steganografi End of File
(EOF) dan Rabin Public Key
Cryptosystem
[3105,0] [5798,1]
[3458,2] [103,3]
[2517,8] [3100,9]
[712,10] [754,15]
[3921,20] [3074,21]
[634,23] [217,27]
[318,32] [5284,34]
[7783,35] [7072,36] …
[446, 3295] [1660,503]
[4009, 2303] [882, 544]
[2202, 11625]
[1125, 5708]
[3105, 0]
[2773, 7809]
[1646, 318]
[2177, 1466] …
23.40
± 64.00
(9)76
Pengujian pendeteksian kesamaan dengan proses stemming (lanjutan)
Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan
(%)
Lama
Proses (s)
Implementasi
Steganography
Menggunakan
Metode Least
Significant Bit
(Lsb) Pada Mobile
Phone Berbasis
Symbian Os
[3105,0] [5798,1]
[4405,2] [3211,5]
[328,9] [5383,14]
[1313,15] [630,17]
[641,22] [2797,26]
[3514,27] [4921,28]
[4730,29] [2400,30]
[975,31] [1130,36] …
Implementasi Steganografi
Pesan Text Ke Dalam File
Sound (.Wav) Dengan
Modifikasi Jarak Byte Pada
Algoritma Least Significant Bit
(Lsb)
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1569,30] [4704,32]
[1376,33] [223,37]
[175,39] [3860,44]
[4131,45] [680,46] …
[3105,324] [5798,1710]
[4405,1711]
[3211,1714] [328,845]
[5383,850] [1313,2975]
[630,772] [641,3130]
[2797,3133] …
20.83
± 111.90
Implementasi
Steganography
Menggunakan
Metode Least
Significant Bit
(Lsb) Pada Mobile
Phone Berbasis
Symbian Os
[3105,0] [5798,1]
[4405,2] [3211,5]
[328,9] [5383,14]
[1313,15] [630,17]
[641,22] [2797,26]
[3514,27] [4921,28]
[4730,29] [2400,30]
[975,31] [1130,36] …
Perancangan Perangkat Lunak
Steganografi Audio MP3
Menggunakan Metode Least
Significant Bit (LSB) Dengan
Visual Basic 6.0
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1647,30] [1154,31]
[1752,36] [1540,40]
[1144,43] [2311,48]
[3832,49] [1330,50] …
[3105, 4360][4405, 477]
[3211, 311]
[328, 145] [5383, 9402]
[1313, 5477]
[630, 2942]
[641, 1712]
[2797, 1717]
[3514, 1718] …
25.79
± 84.37
Implementasi
Steganography
Menggunakan
Metode Least
Significant Bit
(Lsb) Pada Mobile
Phone Berbasis
Symbian Os
[3105,0] [5798,1]
[4405,2] [3211,5]
[328,9] [5383,14]
[1313,15] [630,17]
[641,22] [2797,26]
[3514,27] [4921,28]
[4730,29] [2400,30]
[975,31] [1130,36] …
Implementasi Sistem Keamanan
Data dengan Menggunakan
Teknik Steganografi End of File
(EOF) dan Rabin Public Key
Cryptosystem
[3105,0] [5798,1]
[3458,2] [103,3]
[2517,8] [3100,9]
[712,10] [754,15]
[3921,20] [3074,21]
[634,23] [217,27]
[318,32] [5284,34]
[7783,35] [7072,36]…
[3105,0] [5798,1]
[4405,5681]
[3211,11085]
[641,12807]
[2797,4941]
[3514,9348]
[4921,12814]
[4730,4514]
[2400,12816] …
25.49
± 68.81
(10)77
2. Pengujian pendeteksian kesamaan dengan tanpa proses stemming
Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan
(%)
Lama
Proses (s)
Analisa PSNR
Pada Teknik
Steganografi
Menggunakan
Spread Spectrum
[2083,0] [906,4]
[187,8] [677,13]
[133,15] [550,20]
[2049,24] [2684,26]
[3617,29] [3140,30]
[532,32] [866,37]
[2091,38] [2789,40]
[4455,41] [4665,42] …
Implementasi Steganografi
Pesan Text Ke Dalam File
Sound (.Wav) Dengan
Modifikasi Jarak Byte Pada
Algoritma Least Significant
Bit (Lsb)
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1361,30] [612,31]
[4006,36] [734,38]
[175,43] [3860,48]
[4131,49] [680,50] …
[906,9306] [677,2847]
[133,232] [550,3885]
[3140,7885] [4455,2921]
[2118,6556] [400,1552]
[583,1183] [302,151] …
34.13
± 44.26
Analisa PSNR
Pada Teknik
Steganografi
Menggunakan
Spread Spectrum
[2083,0] [906,4]
[187,8] [677,13]
[133,15] [550,20]
[2049,24] [2684,26]
[3617,29] [3140,30]
[532,32] [866,37]
[2091,38] [2789,40]
[4455,41] [4665,42] …
Perancangan Perangkat
Lunak Steganografi Audio
MP3 Menggunakan Metode
Least Significant Bit (LSB)
Dengan Visual Basic 6.0
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[914,30] [3545,35]
[7318,37] [4357,38]
[7156,43] [7069,44]
[3172,47] [996,50]
…
[2083,8649] [906,8591]
[187,1425] [677,3904]
[133,9325] [550,12663]
[2049,14397] [2684,12996]
[532,12370] [866,12750] …
39.21
± 38.11
Analisa PSNR
Pada Teknik
Steganografi
Menggunakan
Spread Spectrum
[2083,0] [906,4]
[187,8] [677,13]
[133,15] [550,20]
[2049,24] [2684,26]
[3617,29] [3140,30]
[532,32] [866,37]
[2091,38] [2789,40]
[4455,41] [4665,42] …
Implementasi Sistem
Keamanan Data dengan
Menggunakan Teknik
Steganografi End of File
(EOF) dan Rabin Public
Key Cryptosystem
[3105,0] [5798,1]
[3458,2] [103,3]
[2517,8] [4020,9]
[6145,12] [6506,13]
[4036,14] [688,16]
[2009,21] [4657,22]
[696,23] [1091,28]
[6146,32] [2048,33] …
[2083, 19135] [906, 350]
[187, 4960] [677, 1494]
[550, 1595] [2684, 5977]
[3617, 5657] [3140, 14386]
[532, 20835] [862, 1221] …
40.13
± 47.95
(11)78
Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan)
Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan
(%)
Lama
Proses (s)
Implementasi
Kriptografi Dan
Steganografi
[1667,0] [1503,2]
[337,7] [3234,12]
[4009,16] [882,17]
[2202,22] [1516,24]
[1125,29] [1929,32]
[5270,34] [3282,35]
[3388,40] [3105,41]
[5790,46] …
Implementasi Steganografi
Pesan Text Ke Dalam File
Sound (.Wav) Dengan
Modifikasi Jarak Byte Pada
Algoritma Least Significant
Bit (Lsb)
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1361,30] [612,31]
[4006,36] [734,38]
[175,43] [3860,48]
[4131,49] [680,50] …
[1667, 2004] [337,133]
[4009,7525] [882,3324]
[2202,1244] [1516,5695]
[1929,6893] [3282,6456]
[3105,654] [5790,657] ...
30.93
± 43.83
Implementasi
Kriptografi Dan
Steganografi
[1667,0] [1503,2]
[337,7] [3234,12]
[4009,16] [882,17]
[2202,22] [1516,24]
[1125,29] [1929,32]
[5270,34] [3282,35]
[3388,40] [3105,41]
[5790,46] …
Perancangan Perangkat
Lunak Steganografi Audio
MP3 Menggunakan Metode
Least Significant Bit (LSB)
Dengan Visual Basic 6.0
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[914,30] [3545,35]
[7318,37] [4357,38]
[7156,43] [7069,44]
[3172,47] [996,50]
…
[1667,6011] [1503,3331]
[337,195] [3234,7469]
[882,3839] [2202,1167]
[1516,12373] [3105,3534]
[5790,16245] [2773,7235] …
34.62
± 43.48
Implementasi
Kriptografi Dan
Steganografi
[1667,0] [1503,2]
[337,7] [3234,12]
[4009,16] [882,17]
[2202,22] [1516,24]
[1125,29] [1929,32]
[5270,34] [3282,35]
[3388,40] [3105,41]
[5790,46] …
Implementasi Sistem
Keamanan Data dengan
Menggunakan Teknik
Steganografi End of File
(EOF) dan Rabin Public
Key Cryptosystem
[3105,0] [5798,1]
[3458,2] [103,3]
[2517,8] [4020,9]
[6145,12] [6506,13]
[4036,14] [688,16]
[2009,21] [4657,22]
[696,23] [1091,28]
[6146,32] [2048,33] …
[3105, 41] [103, 13765]
[4020, 11567] [4036, 11548]
[696, 8252] [1091, 95]
[6146, 100] [2048, 101]
[1757, 14318] [325, 250] …
35.60
± 42.59
(12)79
Pengujian pendeteksian kesamaan dengan tanpa proses stemming (lanjutan)
Jurnal Uji
Fingerprint
Jurnal Pembanding
Fingerprint
Fingerprint yang sama
Kesamaan
(%)
Lama
Proses (s)
Implementasi
Steganography
Menggunakan
Metode Least
Significant Bit
(Lsb) Pada Mobile
Phone Berbasis
Symbian Os
[3105,0] [5798,1]
[4405,2] [3211,5]
[328,9] [5383,14]
[1245,15] [1134,19]
[1687,24] [2037,29]
[2080,31] [641,32]
[2797,37] [3514,38]
[4921,39] [4730,40] …
Implementasi
Steganografi Pesan Text
Ke Dalam File Sound
(.Wav) Dengan
Modifikasi Jarak Byte
Pada Algoritma Least
Significant Bit (Lsb)
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[1361,30] [612,31]
[4006,36] [734,38]
[175,43] [3860,48]
[4131,49] [680,50] …
[3105,654] [5798,3150]
[4405,3151] [3211,3154]
[5383,2598] [1245,4826]
[1687,4241] [2037,4246]
[641,5461] [2797,2924] …
34.74
± 63.60
Implementasi
Steganography
Menggunakan
Metode Least
Significant Bit
(Lsb) Pada Mobile
Phone Berbasis
Symbian Os
[3105,0] [5798,1]
[4405,2] [3211,5]
[328,9] [5383,14]
[1245,15] [1134,19]
[1687,24] [2037,29]
[2080,31] [641,32]
[2797,37] [3514,38]
[4921,39] [4730,40] …
Perancangan Perangkat
Lunak Steganografi
Audio MP3
Menggunakan Metode
Least Significant Bit
(LSB) Dengan Visual
Basic 6.0
[116,0] [652,4]
[173,7] [529,12]
[1056,17] [1023,19]
[848,23] [619,25]
[914,30] [3545,35]
[7318,37] [4357,38]
[7156,43] [7069,44]
[3172,47] [996,50] ...
[3105, 3534] [3211, 1117]
[328, 17081] [5383, 17086]
[1245, 14338] [1134, 671]
[1687, 676] [2037, 681]
[2080, 3725] [641, 3339] …
39.28
± 51.10
Implementasi
Steganography
Menggunakan
Metode Least
Significant Bit
(Lsb) Pada Mobile
Phone Berbasis
Symbian Os
[3105,0] [5798,1]
[4405,2] [3211,5]
[328,9] [5383,14]
[1245,15] [1134,19]
[1687,24] [2037,29]
[2080,31] [641,32]
[2797,37] [3514,38]
[4921,39] [4730,40] …
Implementasi Sistem
Keamanan Data dengan
Menggunakan Teknik
Steganografi End of File
(EOF) dan Rabin Public
Key Cryptosystem
[3105,0] [5798,1]
[3458,2] [103,3]
[2517,8] [4020,9]
[6145,12] [6506,13]
[4036,14] [688,16]
[2009,21] [4657,22]
[696,23] [1091,28]
[6146,32] [2048,33] …
[3105,0] [5798,1]
[3211,18246] [1245,7545]
[1687,508] [2037,3230]
[641,22178] [2797,8630]
[3514,22184] [4921,22185]
…
40.22
± 39.96