Ari moesriami Barmawi

Ari moesriami Barmawi
Telkom University · Department of Informatics

PhD

About

44
Publications
12,369
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
142
Citations

Publications

Publications (44)
Article
Headstega (Head steganography) is a noiseless steganography that used email headers as a cover for concealing messages. However, it has less embedding capacity and it raises suspicion. For overcoming the problem, bitwise operation is proposed. In the proposed method, the message was embedded into the cover by converting the message and the cover in...
Chapter
In the digital era, an image can be used to hide secret message during the communication of two parties, using image steganography. The image steganography method based on the combination of LSB Substitution and PVD method has been introduced for increasing the payload of the stego-image. We proposed an image steganography method based on the modif...
Article
Generating paraphrases is an important component of natural language processing and generation. There are sev­eral applications that use paraphrasing, for example linguistic steganography, recommender systems, machine translation, etc. One method for paraphrasing sentences is by using synonym substitution, such as the NGM-based paraphrasing method...
Conference Paper
Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be faked. Recently cryptocurrency is widely used for transactions. Therefore, preserving its integrity and security is important. The technology underlying the digital currency is the Blockchain, as applied to Fawkescoin. But for securing the transaction, f...
Article
An important problem in visual cryptography is the alignment problem. Although Liu, et al. have proposed a method for aligning the shares, there is still a problem with the non-identical mathematical support visual cryptography schemes. For overcoming this problem, the Three-Orthogonal-Point (3OP) method is proposed in this paper. Based on the expe...
Article
Full-text available
Recently, information exchange using internet is increasing, such that information security is necessary for securing confidential information because it is possible to eavesdrop the information. There are several methods for securing the exchanged information such as was proposed by Rejani et al. Rejani's method can be noiseless in low capacity bu...
Article
Full-text available
Recently, preserving the integrity of medical record, especially image medical record is important. One method for preserving the integrity is reversible data hiding (RDH) proposed by Huang et al. Reversible data hiding algorithm can recover the original image from marked image. In this paper, we implement reversible data hiding (RDH) on medical im...
Article
Recently, the use of smart cards in human life is increasing. One important aspect in implementing smart cards in human life is its security. Security should be considered because smart cards can contain important data that must be protected, and specific research is needed to address attacks against smart card. There are weaknesses in preserving f...
Article
Recently, information exchange using internet is increasing, such that information security is necessary for securing confidential information because it is possible to eavesdrop the information. There are several methods for securing the exchanged information such as was proposed by Rejani et al. Rejani’s method can be noiseless in low capacity bu...
Conference Paper
Recently, the use of QR code is becoming increasingly popular such that the majority smart-phone devices nowadays are capable reading them. Based on the development of camera technology in latest smart-phone devices, Teraura et al. proposed a method for hiding an additional data into a fine subcell structure of a monochrome QR code. Based on \(3 \t...
Chapter
A QR code is usually used for coding identity or other specific data. The information contained in the QR code is a feature of the owner such as a fingerprint or other biometric feature. Nowadays, the use of QR code is gaining popularity, especially in business, banking and government, because of the high storage capacity compared to a conventional...
Conference Paper
NORMALS or Normal Linguistic Methodology Steganography is a steganography method based on noiseless steganography paradigm or Nostega. In this method, a message is embedded into cover text by modifying the external input of a Natural Language Generation (NLG) system that produces text. The main problem of NORMALS method is small embedding capacity....
Conference Paper
Recently, secure information transmission is necessary such that no one can detect information sent via an open channel. In 2013, Chang and Clark proposed a method using lexical substitution and vertex coding for securing the information exchange between parties, such that no one can detect the exchanged information. However, the maximum payload ca...
Conference Paper
Full-text available
Recently, steganography is frequently used for providing covert channel. There are two types of steganography, noisy and noiseless. Noisy steganography approach hides the message by altering the bit of cover. The alteration process produce noise such that it will raise suspicion. Desoky and Younis proposed a noiseless steganography method namely Gr...
Conference Paper
Full-text available
This paper investigates a novel approach to secret sharing using QR codes. The proposed QR code secret sharing approach exploits the error correction mechanism inherent in the QR code structure, to distribute and encode information about a secret message in a number of shares. Each share in the scheme is constructed from a cover QR code, and each s...
Conference Paper
User authentication is a method for authenticating a user. Recently there were some authentication method proposed by researchers, such as a method proposed by Seung .etal where the user authentication process was done using biometric (fingerprint) and password. However, this method has weaknesses such as weak against fake user attack, high time co...
Conference Paper
The Indonesian communities have the difficulties for interpreting the chart image, especially the health surveillance chart image. This condition is impacted on late awareness of disease threat. In Indonesia, the chart interpreter system based on Indonesian language is available, but it still has the limitation in generating the textual representat...
Conference Paper
Full-text available
List-based steganography or Listega is a steganography methodology with noiseless steganography paradigm, or Nostega. In this methodology, a message is embedded in the first characters of list items to create a list-cover. Listega uses filtered cover, which contains only the embedded list items. There are some rooms of improvements in Listega due t...
Conference Paper
Full-text available
The use of passwords for user authentication has become ubiquitous in our everyday lives. However, password theft is becoming a common occurrence due to a variety of security problems associated with passwords. As such, many organizations are moving towards adopting alternative solutions like one-time passwords, which are only valid for a single se...
Article
Full-text available
In the last few years, several studies addressed the problem of data security in Mifare Classic. One of its weaknesses is the low random number quality. This causes SAT solver attacks to have lower complexity. In order to strengthen Crypto-1 against SAT solver attacks, a modification of the feedback function with better cryptographic properties is...
Conference Paper
Full-text available
Anti-plagiarism applications have been developed using various approaches. Many methods compare one document to others, regardless of their relevance. This paper proposes a method to reduce non-relevant documents (those having no similar topic with query document) by using asymmetric similarity. Whole documents are collected in one corpus. Each doc...
Conference Paper
Matching one document with other documents is one of anti-plagiarism tasks. Matching can be performed both intra and extra-corpal. This paper will discuss extra-corpal matching utilize the web crawlers as reference search. The role of web-crawler described in extra-corpal anti-plagiarism architecture. Matching of plagiarism indication will use Modi...
Conference Paper
Full-text available
Recently, Indonesian Health Ministry has problems with interpreting health surveillance chart, because they need experts for interpreting the chart. Since it is difficult to provide experts especially in rural area, intelligent system for interpreting the health surveillance chart is necessary. This paper proposed a method to generate sentences in...
Conference Paper
Full-text available
Plagiarism detection has been widely discussed in recent years. Various approaches have been proposed such as the text-similarity calculation, structural-approaches, and the fingerprint. In fingerprint-approaches, small parts of document are taken to be matched with other documents. In this paper, fingerprint and Winnowing algorithm is proposed. Th...
Conference Paper
Dynamic Cell Spreading (DCS) Steganography has advantages in terms of security because it uses a bit stream as a key and in terms of speed as it involves the allocation of memory. But there are still weaknesses which is the current distance of bits to cover information is still limited such that it will decrease the security strength. To overcome t...
Conference Paper
The basic idea of our protocol is establishing a conference key based on oblivious transfer which can be used in either asymmetric or symmetric cryptography, such that we can reduce the number of decryptions for the key confirmation without sacrificing the level of security. In our proposed method, we break the conference key into several individua...
Conference Paper
This paper describes how n parties can jointly generate the parameters for the RSA encryption system while being robust to prevent attacks from cheaters and malicious parties. The proposed protocol generates a public modulus number, without the parties knowing the factorization of that number. Our proposed protocol is similar to that of Boneh-Frank...
Conference Paper
This paper describes how two parties can jointly generate the parameters for the RSA encryption system. The proposed protocol generates a public modulus number, without the parties knowing the factorization of that number. Although the encryption exponent is publicly known, each party holds only a part of the exponent for decrypting the received me...
Conference Paper
The augmented encrypted key exchange (A-EKE) uses a shared secret key for encryption. The A-EKE uses the hash of sender's password as the shared secret key. By using Simmon's attack the sender's password can be broken. If this is accomplished, the attacker is able to know the communicating parties session key used after authentication as well as in...

Network

Cited By