Eko Hari Rachmawanto

Eko Hari Rachmawanto
Universitas Dian Nuswantoro Semarang · Faculty Informatic Engineering

Master of Science

About

152
Publications
66,398
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,313
Citations
Citations since 2016
151 Research Items
1308 Citations
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250
2016201720182019202020212022050100150200250

Publications

Publications (152)
Article
Full-text available
Noni fruit is a fruit that is quite famous for its properties as a medicine that can cure diseases. The level of maturity of the noni fruit also affects the effectiveness of the fruit as a medicine. With the current technological developments, research on the classification of noni fruit maturity was carried out. It is intended that the selection o...
Article
Javanese script (Hanacaraka) is one of the cultures owned by Indonesia. Javanese script is found in temples, inscriptions, cultural and prehistoric sites, ancient Javanese manuscripts, Gulden series banknotes, street signage, and palace documents. Javanese script has a form with an article, and the use of reading above the script is a factor that a...
Article
The corona virus (2019-nCoV), commonly known as COVID-19 has been officially designated as a global pandemic by the WHO. Twitter, is one of the social media used by many people and is popular among internet users in expressing opinions. One of the problems related to Covid-19 and causing a stir is the procurement of the Covid-19 vaccine. The procur...
Article
A tourist target is anything that attracts a visitor or tourist to come to visit a place or area. Tourism goods play an important role in a country or region, becoming a source of national foreign exchange, increasing human resources, and improving the economy of surrounding communities. The problem posed in this study is how to implement a decisio...
Article
Full-text available
Penggunaannya yang kian massif dan banyakya data dan informasi yang tersebar di internet yang mungkin saja terdapat data yang bersifat rahasia, menjadikan data tersebut rawan untuk disalahgunakan dari tindakan illegal oleh pihak yang tidak bertanggung jawab. Faktor keamanan menjadi hal yang sangat penting agar data tersebut tetap aman dan terjamin...
Article
Image encryption is an interesting research topic, especially in medical images. This is due to the importance of security when storing and transmitting digital images. This study proposes an image encryption procedure that combines several methods such as chaotic-hash scrambling to perform the confusion process, join hash functions, block-based su...
Article
Full-text available
Green Chili Quality Classification has been done manually through direct visual observation. However, manual classification is highly influenced by operator subjectivity so that under certain conditions, the classification process is inconsistent. The development of information technology allows identification of the quality level of green chilies...
Article
Full-text available
Saat ini kehadiran COVID-19 berdampak disebagian besar sektor dibidang perekonomian secara signifikan. Berbagai perusahaan hampir terancam mulai bangkrut dan sangat terpaksa merumahkan para pekerjanya bahkan ada yang diberhentikan, kegiatan anak-anak sekolah ikut diliburkan, toko-toko penyedia bahan pokok dan tempat-tempat rekreasi dan Gedung perte...
Chapter
Recent research in digital forensic attempts to classify image clusters into JPEG or non-JPEG clusters before recovering JPEG image files. This issue might improve the recovering JPEG image accuracy and reduce the processing time. In this work, three content-based feature extraction methods are used. The Rate of Change (RoC) is used for tracking re...
Article
Full-text available
Orchid flower as ornamental plants with a variety of types where one type of orchid has various characteristics in the form of different shapes and colors. Here, we chosen support vector machine (SVM), Naïve Bayes, and k-nearest neighbor algorithm which generates text input. This system aims to assist the community in recognizing orchid plants base...
Article
Full-text available
This study proposes the hybrid substitution cryptography method followed by chaotic methods to improve the security of digital image transactions on the internet. The substitution method used is a hybrid of the modification of the Vigenèreand Beaufort cipher algorithm. To do a hybrid, two random keys are used. The first random key is a matrix with...
Article
Full-text available
Saat ini produk UMKM yang dihasilkan oleh kelompok usaha atau industry rumah tangga belum dikenal oleh calon pembeli atau pelanggan yang ada di luar daerahnya dikarenakan promosi yang dilakukan hanya dari cerita orang ke orang lain. Beberapa pelaku sudah menggunakan grup-grup di apalikasi chating, media sosial dan jejaring sosial akan tetapi hanya...
Article
Full-text available
Saat ini pedesaan adalah salah satu sektor yang diperhatikan pemerintah dengan diberikan anggaran desa 10% dari APBN. Implementasi pemberian dana di desa Provinsi Jawa Tengah mencapai 1 Milyar tiap desa, hal ini akan menimbulkan kerawanan untuk diselewengkan sehingga membutuhkan transparansi salah satunya dengan memberikan informasi yang up to date...
Article
Full-text available
Batik as one of Indonesia's cultural heritages has various types, motifs and colors. A batik may have almost the same motif with a different color or vice versa, therefore it requires a classification of batik motifs. In this study, a printed batik was used with various coastal batik motifs in Central Java. The algorithm for classification is selec...
Article
Full-text available
Salah satu algoritma yang sering digunakan untuk melakukan deteksi pada wajah yaitu Viola-Jones. Metode ini merupakan gabungan dari 3 buah fitur yaitu integral image, adaboost dan cascade classifier. Masing-masing fitur mempunyai fungsi tersendiri dan saling melengkapi. Integral image digunakan dalam penentuan ada dan tidaknya gambar, adaboost untu...
Conference Paper
Full-text available
This research proposes a method of classification of shallots based on quality using the Naïve Bayes Classifier. The Naïve Bayes classifier is a classifier based on statistics and simple probabilities that are widely used in many sophisticated learning methods today. Shallots are classified into three classes, namely good, medium, and poor quality....
Article
Full-text available
There is a variety of important and personal information stored in an image that is often shared via the internet. Cryptography is one way to protect these image files, so that private information cannot be read by malicious third parties. The DNA and Chaos methods are one of the cryptographic methods that are widely proposed and combined. Some pre...
Article
Full-text available
Beaufort and Vigenere are fast and strong substitution encryption methods against brute force attacks if they have good key quality. But both of these methods by default can not produce a good avalanche effect. Avalanche effect is a measuring tool that can determine the strength of encryption from differential attacks. This research proposes hybrid...
Article
Full-text available
Pada makalah ini, telah dipaparkan mengenai cara pemebelajaran bagi anak usia dini. Terdpaat du acara pembelajaran dalam ranah visual, yaitu pembelajaran visual statis dan dinamis. Mitra pengabdian, dalam hal ini Guru TK PGRI 08 Purowyoso dan siswa anak usia 4-6 tahun sejumlah 45 orang, telah diobservasi dan terbukti bahwa hasil permbelajaran mengg...
Article
Full-text available
One popular image security technique is image encryption. This research proposes an image encryption technique that consists of three encryption layers, i.e. bit-shift encryption, chaos-based encryption, and stream encryption. The chaos algorithm used is Arnold's chaotic map, while the stream cipher algorithm used is RC4. Each layer has different c...
Article
Many irresponsible people who download other people's artwork then modify and redistribute the work of someone without permission by not including the owner's name. Based on that problem an attempt was made to provide an invisible watermark so as not to be easy to do the watermark removal process on the artwork, using a 2-level DWT and SVD combinat...
Article
Full-text available
Imperceptibility is one of the most important aspects of the steganography method. Specifically, for steganography in images, embedded messages must not be felt by the human visual system. Humans have a higher sensitivity in color images compared to grayscale images, therefore the method that is still being tested on grayscale images needs to be re...
Article
Full-text available
This research proposes a watermarking method that combines Integer Haar Wavelet Transform (IHWT) and Chinese Remainder Theorem (CRT) algorithms on RGB images that are converted to YCbCr color space. The goal is to get a watermarking method that is robust, imperceptible and secure. Robust because with IHWT done on component Y as a place to insert a...
Article
Full-text available
Parijoto fruit is a typical fruit that grows around Mount Muria, Kudus Regency and Mount Merapi in Yogyakarta, Indonesia. This fruit has many health benefits, especially for pregnant women. This fruit production is not much because of its limited growth around Mount Muria. So parijoto fruit is made into powder drink products and syrup, so that it c...
Conference Paper
Full-text available
Color images have more information and more storage space than gray images. The process of computing color images is also more complex compared to gray images. Nevertheless, human vision is more sensitive to color images compared to gray images, so color image processing is so important. Image watermarking is a method of copyright protection by emb...
Article
Full-text available
Perkembangan Information and Communication Technology (ICT) atau Teknologi Informasi dan Komunikasi (TIK) dalam beberapa dekade terakhir berjalan sangat cepat sejalan dengan perkembangan teknologi telekomunikasi, termasuk jaringan komputer. Berbagai kendala dialami guru dalam pembelajara di tingkat SD yang siswanya tergolong generasi Z yang sudah m...
Article
Full-text available
Saat ini pemasaran dan penjualan hasil produk UMKM masih dilakukan dengan mengikuti berbagai macam pameran produk UMKM yang diadakan oleh pemerintah maupun perusahaan yang memberikan fasilitas pameran, melalui broadcast pesan dan menunggu pengunjung datang ke toko. Metode ini belum optimal dalam penyampaian informasi karena promosi yang dilakukan t...
Conference Paper
Full-text available
Keamanan dari pengiriman informasi menjadi sebuah masalah penting yang perlu di tindak lanjuti, khususnya penyembunyian pesan dalam media tertentu. File MP3 adalah salah satu media yang sangat populer digunakan, namun ternyata jarang dimanfaatkan dalam steganografi. Algoritma Inverse Bit dapat meningkatkan MSE dan PSNR dari cover. LSB adalah algori...
Conference Paper
Full-text available
Watermarking is a powerful technique to protect copyright from cyber-crime. This study proposes a random spread technique based on the Discrete Cosine Transform (DCT) to improve image watermarking performance. The use of the random spread technique is proven to be able to improve the output quality of the watermarked image, where the watermark imag...
Article
Full-text available
Bank Pembangunan Daerah Jawa Tengah merupakan Bank milik Pemerintah Provinsi Jawa Tengah bersama-sama dengan Pemerintah Kota/Kabupaten Se-Jawa Tengah. Seiring dengan kemajuan teknologi pengarsipan di Bank Pembangunan Daerah Jawa Tengah memerlukan digitalisasi dalam hal pengarsipan data. Pengarsipan data adalah proses memindahkan data yang tidak akt...
Article
Full-text available
Information security is very important and has been widely implemented. Cryptography and steganography are two common methods that can be implemented to secure and conceal the information. In this research, the proposed AES algorithm for cryptography and DWT for steganography. However, in case of implementing DWT as steganography, there is a weakne...