Currently, most of the smartphones recognize uses based on static biometrics, such as face and fi... more Currently, most of the smartphones recognize uses based on static biometrics, such as face and fingerprint. However, those traits were vulnerable against spoofing attack. For overcoming this problem, dynamic biometrics like the keystroke and gaze are introduced since it is more resistant against spoofing attack. This research focuses on keystroke dynamics for strengthening the user recognition system against spoofing attacks. For recognizing a user, the user keystrokes feature used in the login process is compared with keystroke features stored in the keystroke features database. For evaluating the accuracy of the proposed system, words generated based on the Indonesian anagram are used. Furthermore, for conducting the experiment, 34 participants were asked to type a set of words using the smartphone keyboard. Then, each user’s keystroke is recorded. The keystroke dynamic feature consists of latency and digraph which are extracted from the record. According to the experiment result,...
Algoritma berbasis local string matching seperti Longest Common Subsequence (LCS) dapat dimanfaat... more Algoritma berbasis local string matching seperti Longest Common Subsequence (LCS) dapat dimanfaatkan untuk pendeteksian indikasi plagiarisme. Algoritma ini dapat menemukan lokasi segmen plagiarisme antar dokumen. Informasi lokasi ini perlu disampaikan dengan baik kepada pengguna. Dengan adanya sistem informasi deteksi indikasi plagiarisme, informasi lokasi potongan dapat disajikan dengan baik. Sistem informasi ini dibangun dengan framework CodeIgniter. Pada sistem informasi menangani fungsionalitas penyampaian hasil deteksi indikasi plagiarisme, pengumpulan tugas perkuliahan / konferensi bagi tugas/karya ilmiah yang dikumpulkan oleh guru, siswa, panitia, dan peserta. Deteksi dokumen terhadap ekstra-corpal yang memanfaatkan webcrawler dapat menemukan referensi plagiarisme diinternet dengan baik.
2021 the 11th International Conference on Communication and Network Security, 2021
In an electronic voting system, authentication is used to ensure that the voter is legitimate wit... more In an electronic voting system, authentication is used to ensure that the voter is legitimate without knowing his/her identity, while the vote collectors verify the data is received from a legitimate user without knowing the identity of the voter. One of the authentication schemes that fulfilled this requirement is called a deniable authentication scheme, where the receiver can prove the source of the message while another party cannot identify the source of the message. In 2013, Li-Takagi et al. proposed a deniable authentication scheme. However, Li-Takagi's scheme has weaknesses if the receiver fully cooperates with the third party. In this case, the third party can identify the source of a given message. In the proposed method, zero-knowledge proof is introduced to preserve the anonymity of the deniable authentication scheme when the receiver fully cooperates with the third party. Based on the analysis, the proposed scheme fulfills the requirement of the deniable authentication scheme when the receiver fully cooperates with the third party. However, the proposed scheme has additional computation costs for securing the shared secret key. Two attack schemes that are carried out on both Li-Takagi and the proposed scheme are the MITM attack and the impersonation attack. The probability of breaking the proposed scheme using an MITM attack is lower than when using Li-Takagi's scheme, but the probability of breaking the proposed scheme using an impersonation attack is the same as Li-Takagi's scheme.
The noiseless steganography method that has been proposed by Wibowo can embed up to six character... more The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences...
The noiseless steganography method that has been proposed by Wibowo can embed up to six character... more The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences...
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be f... more Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be faked. Recently cryptocurrency is widely used for transactions. Therefore, preserving its integrity and security is important. The technology underlying the digital currency is the Blockchain, as applied to Fawkescoin. But for securing the transaction, fawkescoin has a disadvantage when the fork occurs because it can provide opportunity to conduct double spending attack. To overcome this problem, Merkle tree proposed by applying DSA digital signatures. The application of DSA on Merkle tree is used to verify data without knowing the contents of the data. Based on the experiment results and analysis, the security of the proposed method can prevent fawkescoin against double spending attack on transactions when forking occurs than the previous method.
Abstrak Beberapa tahun terakhir, keamanan gambar merupakan masalah besar dalam komunikasi data me... more Abstrak Beberapa tahun terakhir, keamanan gambar merupakan masalah besar dalam komunikasi data melalui jaringan yang tidak aman. Dalam proposal ini, penulis ingin membandingkan teknik untuk mengamankan gambar antara teknik McEliece Cryptography dan RSA. Gambar akan diubah menjadi blok-blok dan setiap blok akan dibagi menjadi beberapa grid dengan transformasi, kemudian akhirnya kedua teknik tersebut diterapkan pada grid untuk mengamankan gambar. Kata Kunci: McEliece Cryptography, RSA, Enkripsi Gambar, Dekripsi Gambar Abstract In recent years, image security is a big problem in data communication over insecure networks. In this proposal, the author wants to compare techniques to secure images between McEliece Cryptography and RSA techniques. The image will be transformed into blocks and each block will be divided into grids with transformations, then finally the two techniques are applied to the grid to secure the image. Keywords: McEliece Cryptography, RSA, Image Encryption, Image De...
2018 IEEE World Symposium on Communication Engineering (WSCE), 2018
Due to the increasing use of internet, preserving confidentiality and integrity becomes important... more Due to the increasing use of internet, preserving confidentiality and integrity becomes important. One method for preserving them is steganography. There are two types of steganography, noisy and noiseless. One of noiseless steganography method is List Steganography based on syllable pattern proposed by David et al. Since List Steganography based on syllable pattern only embed one character into one column, then the capacity is still low. For increasing the capacity, the proposed method introduced embedding method for two columns where one column can be embedded with up to two characters (one bigram). The characters are embedded based on the syllable and code mapping. Syllable mapping is designed based on the occurrence frequency of syllable in the cover and English dictionary, while code mapping is designed based on the occurrence frequency of the code in the cover. Based on the experiment result, the embedding capacity using English secret message is increased with the rate of 17%...
In the digital era, an image can be used to hide secret message during the communication of two p... more In the digital era, an image can be used to hide secret message during the communication of two parties, using image steganography. The image steganography method based on the combination of LSB Substitution and PVD method has been introduced for increasing the payload of the stego-image. We proposed an image steganography method based on the modified combination of LSB Substitution and PVD to improve the imperceptibility of the stego-image. We evaluate our method by comparing the performance of the proposed method with Swain’s method. Using the proposed method, the maximum PSNR of the stego-image for 28.75 kB of payload is 50.052 dB, while using Swain’s method is 38.785 dB. However, the proposed method needs more time for executing the process than the other.
In this modern era there is rapid increase in use of internet to exchange sensitive information. ... more In this modern era there is rapid increase in use of internet to exchange sensitive information. However, communication via the internet is unsecure and unrealible. Due to these factors, data hiding techniques has been proposed to increase the confidentiality and security of sensitive information. Moreover, Crandall[14] introduced Code Based Steganography, which merges steganography with coding theory. It implemented matrix encoding using linear codes to increase the visual quality of stego image by preserving high embedding capacity. Molaei et al[3] proposed a steganography scheme which implemented Reed Muller codes and modulus function in attempt to increase embedding capacity. These fault tolerant schemes have ability to recover secret messages from attacks using error detection and correction. However, existing schemes have low embedding capacity (150%) and low PSNR value (48dB). To overcome this problem, this paper proposed a multiple embedding method that aims to re-embed secr...
Headstega (Head steganography) is a noiseless steganography that used email headers as a cover fo... more Headstega (Head steganography) is a noiseless steganography that used email headers as a cover for concealing messages. However, it has less embedding capacity and it raises suspicion. For overcoming the problem, bitwise operation is proposed. In the proposed method, the message was embedded into the cover by converting the message and the cover into binary representation based on a mapping table that was already known by the sender and the receiver. Furthermore, XOR bitwise operations were applied to the secret message and cover bits based on random numbers that were generated using a modular function. Moreover, the result was converted into characters that represent the secret message bits. After embedding the message into the cover, an email alias was generated to camouflage the secret message characters. Finally, the sender sends the embedded cover and the email alias to the recipient. Using the proposed method, the embedding capacity is 89% larger than using the original Heads...
Currently, most of the smartphones recognize uses based on static biometrics, such as face and fi... more Currently, most of the smartphones recognize uses based on static biometrics, such as face and fingerprint. However, those traits were vulnerable against spoofing attack. For overcoming this problem, dynamic biometrics like the keystroke and gaze are introduced since it is more resistant against spoofing attack. This research focuses on keystroke dynamics for strengthening the user recognition system against spoofing attacks. For recognizing a user, the user keystrokes feature used in the login process is compared with keystroke features stored in the keystroke features database. For evaluating the accuracy of the proposed system, words generated based on the Indonesian anagram are used. Furthermore, for conducting the experiment, 34 participants were asked to type a set of words using the smartphone keyboard. Then, each user’s keystroke is recorded. The keystroke dynamic feature consists of latency and digraph which are extracted from the record. According to the experiment result,...
Algoritma berbasis local string matching seperti Longest Common Subsequence (LCS) dapat dimanfaat... more Algoritma berbasis local string matching seperti Longest Common Subsequence (LCS) dapat dimanfaatkan untuk pendeteksian indikasi plagiarisme. Algoritma ini dapat menemukan lokasi segmen plagiarisme antar dokumen. Informasi lokasi ini perlu disampaikan dengan baik kepada pengguna. Dengan adanya sistem informasi deteksi indikasi plagiarisme, informasi lokasi potongan dapat disajikan dengan baik. Sistem informasi ini dibangun dengan framework CodeIgniter. Pada sistem informasi menangani fungsionalitas penyampaian hasil deteksi indikasi plagiarisme, pengumpulan tugas perkuliahan / konferensi bagi tugas/karya ilmiah yang dikumpulkan oleh guru, siswa, panitia, dan peserta. Deteksi dokumen terhadap ekstra-corpal yang memanfaatkan webcrawler dapat menemukan referensi plagiarisme diinternet dengan baik.
2021 the 11th International Conference on Communication and Network Security, 2021
In an electronic voting system, authentication is used to ensure that the voter is legitimate wit... more In an electronic voting system, authentication is used to ensure that the voter is legitimate without knowing his/her identity, while the vote collectors verify the data is received from a legitimate user without knowing the identity of the voter. One of the authentication schemes that fulfilled this requirement is called a deniable authentication scheme, where the receiver can prove the source of the message while another party cannot identify the source of the message. In 2013, Li-Takagi et al. proposed a deniable authentication scheme. However, Li-Takagi's scheme has weaknesses if the receiver fully cooperates with the third party. In this case, the third party can identify the source of a given message. In the proposed method, zero-knowledge proof is introduced to preserve the anonymity of the deniable authentication scheme when the receiver fully cooperates with the third party. Based on the analysis, the proposed scheme fulfills the requirement of the deniable authentication scheme when the receiver fully cooperates with the third party. However, the proposed scheme has additional computation costs for securing the shared secret key. Two attack schemes that are carried out on both Li-Takagi and the proposed scheme are the MITM attack and the impersonation attack. The probability of breaking the proposed scheme using an MITM attack is lower than when using Li-Takagi's scheme, but the probability of breaking the proposed scheme using an impersonation attack is the same as Li-Takagi's scheme.
The noiseless steganography method that has been proposed by Wibowo can embed up to six character... more The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences...
The noiseless steganography method that has been proposed by Wibowo can embed up to six character... more The noiseless steganography method that has been proposed by Wibowo can embed up to six characters in the provided cover text, but more than 59% of Indonesian words have a length of more than six characters, so there is room to improve Wibowo’s method. This paper proposes an improvement of Wibowo’s method by modifying the shifting codes and using context-based language generation. Based on 300 test messages, 99% of messages with more than six characters could be embedded by the proposed method, while using Wibowo’s method this was only 34%. Wibowo’s method can embed more than six characters only if the number of shifting codes is less than three, while the proposed method can embed more than six characters even if there are more than three shifting codes. Furthermore, the security for representing the number of code digits is increased by introducing a private key with the probability of guessing less than 1, while in Wibowo’s method this is 1. The naturalness of the cover sentences...
Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, 2019
Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be f... more Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be faked. Recently cryptocurrency is widely used for transactions. Therefore, preserving its integrity and security is important. The technology underlying the digital currency is the Blockchain, as applied to Fawkescoin. But for securing the transaction, fawkescoin has a disadvantage when the fork occurs because it can provide opportunity to conduct double spending attack. To overcome this problem, Merkle tree proposed by applying DSA digital signatures. The application of DSA on Merkle tree is used to verify data without knowing the contents of the data. Based on the experiment results and analysis, the security of the proposed method can prevent fawkescoin against double spending attack on transactions when forking occurs than the previous method.
Abstrak Beberapa tahun terakhir, keamanan gambar merupakan masalah besar dalam komunikasi data me... more Abstrak Beberapa tahun terakhir, keamanan gambar merupakan masalah besar dalam komunikasi data melalui jaringan yang tidak aman. Dalam proposal ini, penulis ingin membandingkan teknik untuk mengamankan gambar antara teknik McEliece Cryptography dan RSA. Gambar akan diubah menjadi blok-blok dan setiap blok akan dibagi menjadi beberapa grid dengan transformasi, kemudian akhirnya kedua teknik tersebut diterapkan pada grid untuk mengamankan gambar. Kata Kunci: McEliece Cryptography, RSA, Enkripsi Gambar, Dekripsi Gambar Abstract In recent years, image security is a big problem in data communication over insecure networks. In this proposal, the author wants to compare techniques to secure images between McEliece Cryptography and RSA techniques. The image will be transformed into blocks and each block will be divided into grids with transformations, then finally the two techniques are applied to the grid to secure the image. Keywords: McEliece Cryptography, RSA, Image Encryption, Image De...
2018 IEEE World Symposium on Communication Engineering (WSCE), 2018
Due to the increasing use of internet, preserving confidentiality and integrity becomes important... more Due to the increasing use of internet, preserving confidentiality and integrity becomes important. One method for preserving them is steganography. There are two types of steganography, noisy and noiseless. One of noiseless steganography method is List Steganography based on syllable pattern proposed by David et al. Since List Steganography based on syllable pattern only embed one character into one column, then the capacity is still low. For increasing the capacity, the proposed method introduced embedding method for two columns where one column can be embedded with up to two characters (one bigram). The characters are embedded based on the syllable and code mapping. Syllable mapping is designed based on the occurrence frequency of syllable in the cover and English dictionary, while code mapping is designed based on the occurrence frequency of the code in the cover. Based on the experiment result, the embedding capacity using English secret message is increased with the rate of 17%...
In the digital era, an image can be used to hide secret message during the communication of two p... more In the digital era, an image can be used to hide secret message during the communication of two parties, using image steganography. The image steganography method based on the combination of LSB Substitution and PVD method has been introduced for increasing the payload of the stego-image. We proposed an image steganography method based on the modified combination of LSB Substitution and PVD to improve the imperceptibility of the stego-image. We evaluate our method by comparing the performance of the proposed method with Swain’s method. Using the proposed method, the maximum PSNR of the stego-image for 28.75 kB of payload is 50.052 dB, while using Swain’s method is 38.785 dB. However, the proposed method needs more time for executing the process than the other.
In this modern era there is rapid increase in use of internet to exchange sensitive information. ... more In this modern era there is rapid increase in use of internet to exchange sensitive information. However, communication via the internet is unsecure and unrealible. Due to these factors, data hiding techniques has been proposed to increase the confidentiality and security of sensitive information. Moreover, Crandall[14] introduced Code Based Steganography, which merges steganography with coding theory. It implemented matrix encoding using linear codes to increase the visual quality of stego image by preserving high embedding capacity. Molaei et al[3] proposed a steganography scheme which implemented Reed Muller codes and modulus function in attempt to increase embedding capacity. These fault tolerant schemes have ability to recover secret messages from attacks using error detection and correction. However, existing schemes have low embedding capacity (150%) and low PSNR value (48dB). To overcome this problem, this paper proposed a multiple embedding method that aims to re-embed secr...
Headstega (Head steganography) is a noiseless steganography that used email headers as a cover fo... more Headstega (Head steganography) is a noiseless steganography that used email headers as a cover for concealing messages. However, it has less embedding capacity and it raises suspicion. For overcoming the problem, bitwise operation is proposed. In the proposed method, the message was embedded into the cover by converting the message and the cover into binary representation based on a mapping table that was already known by the sender and the receiver. Furthermore, XOR bitwise operations were applied to the secret message and cover bits based on random numbers that were generated using a modular function. Moreover, the result was converted into characters that represent the secret message bits. After embedding the message into the cover, an email alias was generated to camouflage the secret message characters. Finally, the sender sends the embedded cover and the email alias to the recipient. Using the proposed method, the embedding capacity is 89% larger than using the original Heads...
Uploads
Papers