Ferda Ernawan
YOU?
Author Swipe
View article: A tamper detection scheme based on integer wavelet transform for authenticating image
A tamper detection scheme based on integer wavelet transform for authenticating image Open
Advanced technology allows users to alter image and distribute the tampered image to social media. This research proposes a set level of tamper detection for identifying the integrity of image. The image is transformed by using integer wav…
View article: Optimizing Imperceptibility and Robustness Using Selective DCT Coefficients for Image Copyright Protection
Optimizing Imperceptibility and Robustness Using Selective DCT Coefficients for Image Copyright Protection Open
This paper presents an invisible watermarking technique for image copyright protection based on the Discrete Cosine Transform (DCT). The proposed method balances imperceptibility and robustness against various image manipulations, such as …
View article: Generative Adversarial Networks In Object Detection: A Systematic Literature Review
Generative Adversarial Networks In Object Detection: A Systematic Literature Review Open
The intersection of Generative Adversarial Networks (GANs) and object detection represents one of the most promising developments in modern computer vision, offering innovative solutions to longstanding challenges in visual recognition sys…
View article: Exploring Blockchain and AI in Digital Banking: A Literature Review on Transactions Enhancement, Fraud Detection, and Financial Inclusion
Exploring Blockchain and AI in Digital Banking: A Literature Review on Transactions Enhancement, Fraud Detection, and Financial Inclusion Open
This paper explores the integration of Blockchain and Artificial Intelligence (AI) in the realm of digital banking, focusing on enhancing transaction efficiency, preventing fraud, and promoting financial inclusion. Utilizing a literature r…
View article: Prediction of Alzheimer's Dementia Using Soft Voting Ensemble Learning with Machine Learning
Prediction of Alzheimer's Dementia Using Soft Voting Ensemble Learning with Machine Learning Open
Alzheimer's dementia (AD) is a degenerative brain disease characterized by a decline in cognitive function and memory. Predicting AD is crucial for preventing the disease from becoming more severe. Machine learning algorithms can aid in th…
View article: TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform
TDSF: Two-phase tamper detection in semi-fragile watermarking using two-level integer wavelet transform Open
Image watermarking is one of techniques that can be used to protect and recover from the altered images. Tamper detection in semi-fragile still does not achieve high accuracy for tamper localization, especially in malicious attacks. This s…
View article: A set of embedding rules in IWT for watermark embedding in image watermarking
A set of embedding rules in IWT for watermark embedding in image watermarking Open
The development of new technologies has made image watermarking crucial in the digital era to preserve and protect illegal distribution of images against unauthorized users. This paper presents a robust image watermarking technique that em…
View article: TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking
TCBR and TCBD: Evaluation metrics for tamper coincidence problem in fragile image watermarking Open
This paper proposed two evaluation metrics of the tamper coincidence in a block map design for image watermarking. These evaluation metrics are called Tamper Coincidence Block Ratio (TCBR) and Tamper Coincidence Block Density (TCBD). A tam…
View article: Dual image watermarking based on NSST-LWT-DCT for color image
Dual image watermarking based on NSST-LWT-DCT for color image Open
Advanced internet technology allows unauthorized individuals to modify and distribute digital images. Image watermarking is a popular solution for copyright protection and ensuring digital security. This research presents an embedding sche…
View article: Robust Image Watermarking Based on LiftingWavelet Transfrom-Hessenberg Decomposition for Copyright Protection
Robust Image Watermarking Based on LiftingWavelet Transfrom-Hessenberg Decomposition for Copyright Protection Open
The modern internet technology enables unauthorized individuals to alter the content of digital images. This work introduces a method for enhancing the robustness of an embedded watermark in images using Lifting Wavelet Transform (LWT) and…
View article: A blind recovery technique with integer wavelet transforms in image watermarking
A blind recovery technique with integer wavelet transforms in image watermarking Open
The development of internet technology has simplified the sharing and modification of digital image information. The aim of this study is to propose a new blind recovery technique based on integer wavelets transform (BRIWT) by utilizing th…
View article: Fragile watermarking for image authentication using dyadic walsh ordering
Fragile watermarking for image authentication using dyadic walsh ordering Open
A digital image is subjected to the most manipulation. This is driven by the easy manipulating process through image editing software which is growing rapidly. These problems can be solved through the watermarking model as an active authen…
View article: AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem
AuSR3: A new block mapping technique for image authentication and self-recovery to avoid the tamper coincidence problem Open
This paper proposes a new block mapping technique for image authentication and self-recovery designed to avoid the tamper coincidence problem called the AuSR3. The tamper coincidence problem can arise when modifications to an image affect …
View article: The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution
The Relevance of Bibliometric Analysis to Discover the Area’s Research Efforts: Root Exploit Evolution Open
Malware steals, encrypts, and damages data of the targeted machines for private, money, or fame purposes. The types of malware are root exploit, cryptojacking, Trojan, worms, viruses, spyware, ransomware, and adware. Among these types, roo…
View article: Fast image watermarking based on signum of cosine matrix
Fast image watermarking based on signum of cosine matrix Open
In the field of image watermarking, the singular value decomposition has good imperceptibility and robustness, but it has high complexity. It divides a host image into matrices of U, S, and V. Singular matrix S has been widely used for emb…
View article: Light Gradient Boosting with Hyper Parameter Tuning Optimization for COVID-19 Prediction
Light Gradient Boosting with Hyper Parameter Tuning Optimization for COVID-19 Prediction Open
The 2019 coronavirus disease (COVID-19) caused pandemic and a huge number of deaths in the world. COVID-19 screening is needed to identify suspected positive COVID-19 or not and it can reduce the spread of COVID-19. The polymerase chain re…
View article: Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images
Three Layer Authentications with a Spiral Block Mapping to Prove Authenticity in Medical Images Open
Digital medical image has a potential to be manipulated by unauthorized persons due to advanced communication technology. Verifying integrity and authenticity have become important issues on the medical image. This paper proposed a self-em…
View article: IoT Enabled Ventilator Monitoring System for Covid-19 Patients
IoT Enabled Ventilator Monitoring System for Covid-19 Patients Open
The use of the IoT protocol on medical equipment is expected to provide protection for medical personnel in dealing with Covid-19 patients, especially when medical personnel are monitoring and setting up an equipment. This study aims to (1…
View article: Video scene change detection based on histogram analysis for hiding message
Video scene change detection based on histogram analysis for hiding message Open
The rapid growth of internet technology has greatly increased the opportunity for secrecy communication. Most of communications implemented compression method in digital applications due to fast transferring data in the limited bandwidth. …
View article: Handwritten character recognition using convolutional neural network
Handwritten character recognition using convolutional neural network Open
Handwritten character recognition (HCR) is the detection of characters from images, documents and other sources and changes them in machine-readable shape for further processing. The accurate recognition of intricate-shaped compound handwr…
View article: Face Recognition Using the Convolutional Neural Network for Barrier Gate System
Face Recognition Using the Convolutional Neural Network for Barrier Gate System Open
The implementation of face recognition technique using CCTV is able to prevent unauthorized person enter the gate. Face recognition can be used for authentication, which can be implemented for preventing of criminal incidents. This re-sear…