nan Rojali
Binus University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by nan Rojali.
Journal of Computer Science | 2014
Afan Galih Salman; Rojali; Bayu Kanigoro; Nayoko
The MPEG Layer-III File or MP3 can contain the ID3v2 tag which able to store information not only the song and singer’s name but also song lyric and alblum cover figure. The steganography technique on audio generally only make use of the main body of the audio file, but has not ever use the part of the ID3v2 to hide an message. This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix then inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag.
INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION: Empowering Engineering using Mathematics | 2017
Rojali; Ida Sri Rejeki Siahaan; Benfano Soewito
Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.
INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION: Empowering Engineering using Mathematics | 2017
Rojali; Afan Galih Salman; George
Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or ...
Seminar Nasional Aplikasi Teknologi Informasi (SNATI) | 2012
Derwin Suhartono; Afan Galih Salman; Rojali; Christian Octavianus
Seminar Nasional Matematika dan Pendidikan Matematika 2011 | 2011
Rojali
Procedia Computer Science | 2018
Tiffany Kassandra; Rojali; Derwin Suhartono
Procedia Computer Science | 2015
Rojali; Afan Galih Salman
Journal of theoretical and applied information technology | 2015
Afan Galih Salman; Rojali; Vivi
Proceedings SEMANTICS 2012 | 2012
Zahedi; Rojali
Proceedings SEMANTICS 2012 | 2012
Rojali; Syaeful Karim; Bob Kristiawan