Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where nan Rojali is active.

Publication


Featured researches published by nan Rojali.


Journal of Computer Science | 2014

STEGANOGRAPHY APPLICATION PROGRAM USING THE ID3V2 IN THE MP3 AUDIO FILE ON MOBILE PHONE

Afan Galih Salman; Rojali; Bayu Kanigoro; Nayoko

The MPEG Layer-III File or MP3 can contain the ID3v2 tag which able to store information not only the song and singer’s name but also song lyric and alblum cover figure. The steganography technique on audio generally only make use of the main body of the audio file, but has not ever use the part of the ID3v2 to hide an message. This study an steganography technique which make use of this ID3v2 tag space where message is encrypted using McEliece cryptosystem method which applying the public key in the form of matrix then inserted into the MP3 file applying Before All Frames (BAF) method, whereas the public key is inserted into album cover figure which is stored in the ID3v2 tag.


INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION: Empowering Engineering using Mathematics | 2017

Steganography algorithm multi pixel value differencing (MPVD) to increase message capacity and data security

Rojali; Ida Sri Rejeki Siahaan; Benfano Soewito

Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.Steganography is the art and science of hiding the secret messages so the existence of the message cannot be detected by human senses. The data concealment is using the Multi Pixel Value Differencing (MPVD) algorithm, utilizing the difference from each pixel. The development was done by using six interval tables. The objective of this algorithm is to enhance the message capacity and to maintain the data security.


INTERNATIONAL CONFERENCE ON MATHEMATICS: PURE, APPLIED AND COMPUTATION: Empowering Engineering using Mathematics | 2017

Website-based PNG image steganography using the modified Vigenere Cipher, least significant bit, and dictionary based compression methods

Rojali; Afan Galih Salman; George

Along with the development of information technology in meeting the needs, various adverse actions and difficult to avoid are emerging. One of such action is data theft. Therefore, this study will discuss about cryptography and steganography that aims to overcome these problems. This study will use the Modification Vigenere Cipher, Least Significant Bit and Dictionary Based Compression methods. To determine the performance of study, Peak Signal to Noise Ratio (PSNR) method is used to measure objectively and Mean Opinion Score (MOS) method is used to measure subjectively, also, the performance of this study will be compared to other method such as Spread Spectrum and Pixel Value differencing. After comparing, it can be concluded that this study can provide better performance when compared to other methods (Spread Spectrum and Pixel Value Differencing) and has a range of MSE values (0.0191622-0.05275) and PSNR (60.909 to 65.306) with a hidden file size of 18 kb and has a MOS value range (4.214 to 4.722) or ...


Seminar Nasional Aplikasi Teknologi Informasi (SNATI) | 2012

APLIKASI PENYEMBUNYIAN PESAN PADA CITRA JPEG DENGAN ALGORITMA F5 DALAM PERANGKAT MOBILE BERBASIS ANDROID

Derwin Suhartono; Afan Galih Salman; Rojali; Christian Octavianus


Seminar Nasional Matematika dan Pendidikan Matematika 2011 | 2011

Studi dan Implementasi Hill Cipher menggunakan binomial newton berbasis komputer

Rojali


Procedia Computer Science | 2018

Resource-Constrained Project Scheduling Problem using Firefly Algorithm

Tiffany Kassandra; Rojali; Derwin Suhartono


Procedia Computer Science | 2015

Reversible Data Hiding Technique on Jpeg Image By Quad-Tree Segmentation and Histogram Shifting Method Based On Android

Rojali; Afan Galih Salman


Journal of theoretical and applied information technology | 2015

Steganography Using Pixel Value Differencing Spiral

Afan Galih Salman; Rojali; Vivi


Proceedings SEMANTICS 2012 | 2012

Model Penjadwalan Sumber Simultan dengan Batching dan Sequencing dalam Formulasi Tunggal dalam Kriteria Minimasi Waktu Tinggal Aktual

Zahedi; Rojali


Proceedings SEMANTICS 2012 | 2012

Aplikasi Algoritma Enkripsi Modifikasi Vigenere Cipher untuk Mengirim Pesan Teks Terenkripsi pada Perangkat Mobile Berbasis Android

Rojali; Syaeful Karim; Bob Kristiawan

Collaboration


Dive into the nan Rojali's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge