Enter your keyword

Rinaldi

Rinaldi

STEI

Energy Engineering and Power Technology • Biomedical Engineering • Electrical and Electronic Engineering • Computer Vision and Pattern Recognition • Software • Social Sciences (miscellaneous) • Instrumentation • Artificial Intelligence • Computational Theory and Mathematics • Education • Information Systems • Water Science and Technology • Computer Science Applications • Control and Optimization • Human-Computer Interaction • Computer Networks and Communications • Decision Sciences (miscellaneous) • Information Systems and Management • Management Information Systems • Control and Systems Engineering • Computer Science (miscellaneous) • Signal Processing • Computer Graphics and Computer-Aided Design • Theoretical Computer Science • Industrial and Manufacturing Engineering • Health Informatics • Communication • Hardware and Architecture • Media Technology • Engineering (all) • Physics and Astronomy (all) • Computer Science (all)

Comparison of secret color image sharing based on XOR operation in RGB and YCbCr color model
Rinaldi Munir
Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017 vol:2017-November, issue:ICEEI.2017.8312445, page:1-6



Video Encryption by Using Visual Cryptography Based on Wang’s Scheme
Rinaldi Munir,None Harlili
2018 4th International Conference on Electrical, Electronics and System Engineering, ICEESE 2018 vol:, issue:ICEESE.2018.8703567, page:1-22



A chaos-based fragile watermarking method in spatial domain for image authentication
Rinaldi Munir
2015 International Seminar on Intelligent Technology and Its Applications, ISITIA 2015 – Proceeding vol:, issue:ISITIA.2015.7219983, page:1-231



A block-based image encryption algorithm in frequency domain using chaotic permutation
Rinaldi Munir
Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014 vol:, issue:TSSA.2014.7065906, page:1-



A Secure Fragile Video Watermarking Algorithm for Content Authentication Based on Arnold Cat Map
Rinaldi Munir,None Harlili
Proceedings of 2019 4th International Conference on Information Technology: Encompassing Intelligent Technology and Innovation Towards the New Era of Human Life, InCIT 2019 vol:, issue:INCIT.2019.8912074, page:1-37



Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach
Rinaldi Munir,Bambang Riyanto Tan,Sarwono Sutikno,Wiseto P. Agung
Proceedings of the 2009 International Conference on Electrical Engineering and Informatics, ICEEI 2009 vol:1, issue:ICEEI.2009.5254778, page:1-268



Chaos-based modified “ezStego” algorithm for improving security of message hiding in GIF image
Rinaldi Munir
Proceeding – 2015 International Conference on Computer, Control, Informatics and Its Applications: Emerging Trends in the Era of Internet of Things, IC3INA 2015 vol:, issue:IC3INA.2015.7377750, page:1-84



Derivation of Barni Algorithm into its asymmetric watermarking technique using statistical approach
Rinaldi Munir,T. Bambang Riyanto,Sarwono Sutikno,Wiseto P. Agung
International Journal on Electrical Engineering and Informatics vol:1, issue:ijeei.2009.1.2.4, page:1-136



A fragile watermarking scheme for authentication of GIF images
Rinaldi Munir
International Journal on Electrical Engineering and Informatics vol:9, issue:ijeei.2017.9.2.7, page:1-312



Visual Cryptography of Animated GIF Image Based on XOR Operation
Rinaldi Munir
Proceedings – 2017 International Conference on Advanced Computing and Applications, ACOMP 2017 vol:, issue:ACOMP.2017.14, page:1-121



Application of the modified EzStego algorithm for hiding secret messages in the animated GIF images
Rinaldi Munir
Proceeding – 2016 2nd International Conference on Science in Information Technology, ICSITech 2016: Information Science for Green Society and Environment vol:, issue:ICSITech.2016.7852608, page:1-62



Security analysis of selective image encryption algorithm based on chaos and CBC-like mode
Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366039, page:1-146



Blind steganalysis for digital images using support vector machine method
Marcelinus Henry Menori,Rinaldi Munir
2016 International Symposium on Electronics and Smart Devices, ISESD 2016 vol:, issue:ISESD.2016.7886706, page:1-136



Traffic Congestion Model: Challenges and Opportunities
M.D. Enjat Munajat,Rinaldi Munir,Dwi H. Widyantoro
Journal of Physics: Conference Series vol:801, issue:012048, page:1-



Text and file encryption application for blackberry using cipher feedback 8-bit mode
Matthew Wangsadiredja,Rinaldi Munir
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021761, page:1-



Image Graph Matching Based on Region Adjacency Graph
None Akmal,Rinaldi Munir,Judhi Santoso
Proceeding – 2019 5th International Conference on Science in Information Technology: Embracing Industry 4.0: Towards Innovation in Cyber Physical System, ICSITech 2019 vol:, issue:ICSITech46713.2019.8987480, page:1-181



Steganographic-algorithm and length estimation classification on MP3 steganalysis with convolutional neural network
Muhammad Rizki Duwinanto,Rinaldi Munir
2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2019 vol:, issue:ICITISEE48480.2019.9004022, page:1-215



Secure E-payment method based on visual cryptography
Trihastuti Yuniati,Rinaldi Munir
Proceedings – 2018 3rd International Conference on Information Technology, Information Systems and Electrical Engineering, ICITISEE 2018 vol:, issue:ICITISEE.2018.8720999, page:1-135



Dynamic background video forgery detection using Gaussian mixture model
Nugroho Satriyanto,Rinaldi Munir,None Harlili
Proceeding – 2019 International Conference of Artificial Intelligence and Information Technology, ICAIIT 2019 vol:, issue:ICAIIT.2019.8834463, page:1-383



Full-Text Search on data with access control using generalized suffix tree
Ahmad Zaky,Rinaldi Munir
Proceedings of 2016 International Conference on Data and Software Engineering, ICoDSE 2016 vol:, issue:ICODSE.2016.7936112, page:1-



Community and important actors analysis with different keywords in social network
Nanang Cahyana,Rinaldi Munir
Proceeding – 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education, Industry and Society in Big Data Era, ICSITech 2017 vol:2018-January, issue:ICSITech.2017.8257163, page:1-502



Mobile Application of Video Watermarking Using Discrete Cosine Transform on Android Platform
Moch Ginanjar Busiri,Rinaldi Munir
Proceedings of 2017 5th International Conference on Instrumentation, Communications, Information Technology, and Biomedical Engineering, ICICI-BME 2017 vol:, issue:ICICI-BME.2017.8537779, page:1-212



Intrusion detection against unauthorized file modification by integrity checking and recovery with HW/SW platforms using programmable system-on-chip (SoC)
S Mochamad Julianto,Rinaldi Munir
2018 International Conference on Information and Communications Technology, ICOIACT 2018 vol:2018-January, issue:ICOIACT.2018.8350742, page:1-179



Implementation of fuzzy inference system in children skin disease diagnosis application
Aditya Agung Putra,Rinaldi Munir
Proceedings – 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 vol:, issue:ICEEI.2015.7352528, page:1-370



A new string matching algorithm based on logical indexing
Daniar Heri Kurniawan,Rinaldi Munir
Proceedings – 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 vol:, issue:ICEEI.2015.7352533, page:1-399



Message hiding in animated GIF using multibit assignment method
Mario Tressa Juzar,Rinaldi Munir
2016 International Symposium on Electronics and Smart Devices, ISESD 2016 vol:, issue:ISESD.2016.7886723, page:1-229



Secured video streaming development on smartphones with Android platform
Danang Tri Massandy,Ir. Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366079, page:1-344



Selective encryption algorithm implementation for video call on Skype client
Alwi Alfiansyah Ramdan,Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366035, page:1-124



Double Chaining Algorithm: A secure symmetric-key encryption algorithm
Daniar Heri Kurniawan,Rinaldi Munir
4th IGNITE Conference and 2016 International Conference on Advanced Informatics: Concepts, Theory and Application, ICAICTA 2016 vol:, issue:ICAICTA.2016.7803097, page:1-



SAML single sign-on protocol development using combination of speech and speaker recognition
Patrick Telnoni,Rinaldi Munir,Yusep Rosmansyah
Proceedings – 2014 International Conference on Advanced Informatics: Concept, Theory and Application, ICAICTA 2014 vol:, issue:ICAICTA.2014.7005958, page:1-304



Arithmetic coding modification to compress SMS
Ario Yudo Husodo,Rinaldi Munir
Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011 vol:, issue:ICEEI.2011.6021688, page:1-



Interaction between fluid and solid body surfaces in fluid simulation using material-point method
Dody Dharma,Rinaldi Munir,Tito D. Kesumo Siregar
2018 International Conference on Information and Communications Technology, ICOIACT 2018 vol:2018-January, issue:ICOIACT.2018.8350797, page:1-714



Graph Steganography Based on Multimedia Cover to Improve Security and Capacity
Ilham Firman Ashari,Rinaldi Munir
Proceedings of ICAITI 2018 – 1st International Conference on Applied Information Technology and Innovation: Toward A New Paradigm for the Design of Assistive Technology in Smart Home Care vol:, issue:ICAITI.2018.8686741, page:1-201



Email client application with rabbit algorithm for Android smart phone
Muhammad Anwari Leksono,Rinaldi Munir
2012 7th International Conference on Telecommunication Systems, Services, and Applications, TSSA 2012 vol:, issue:TSSA.2012.6366037, page:1-135



A Comparative Study of Deepfake Video Detection Method
Kurniawan Nur Ramadhani,Rinaldi Munir
2020 3rd International Conference on Information and Communications Technology, ICOIACT 2020 vol:, issue:ICOIACT50329.2020.9331963, page:1-399



Vehicle detection and tracking based on corner and lines adjacent detection features
M.D. Enjat Munajat,Dwi H. Widyantoro,Rinaldi Munir
Proceeding – 2016 2nd International Conference on Science in Information Technology, ICSITech 2016: Information Science for Green Society and Environment vol:, issue:ICSITech.2016.7852641, page:1-249



Security system for surveillance radar network communication using chaos algorithm
Nova Hadi Lestriandoko,Tutun Juhana,Rinaldi Munir
Proceedings of 2014 8th International Conference on Telecommunication Systems Services and Applications, TSSA 2014 vol:, issue:TSSA.2014.7065947, page:1-



IntelligEnSia based electricity consumption prediction analytics using regression method
Angreine Kewo,Aditya Kalua Lapu,Rinaldi Munir
Proceedings – 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015 vol:, issue:ICEEI.2015.7352556, page:1-528



Generic animation method for multi-objects in IFS fractal form
Tedjo Darmanto,Iping Supriana,Rinaldi Munir
Journal of ICT Research and Applications vol:10, issue:itbj.ict.res.appl.2016.10.3.1, page:1-208



E-Learning Application of Tarsier with Virtual Reality using Android Platform
H.N. Oroh,D. Paseru,R. Munir
Journal of Physics: Conference Series vol:801, issue:012007, page:1-



Hybrid animation model of multi-object in fractal form based on metamorphic interpolation and partitioned-random iteration algorithms
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
International Journal on Electrical Engineering and Informatics vol:5, issue:ijeei.2013.5.3.4, page:1-296



Hybrid rotational and revolving simulation of propeller in aircraft with two propellers by fractal animation model: Based on shifting centroid method in double mode from a fixed point
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
Proceeding – 2014 International Conference on Computer, Control, Informatics and Its Applications: “New Challenges and Opportunities in Big Data”, IC3INA 2014 vol:, issue:IC3INA.2014.7042621, page:1-171



Animation simulation of shooting aircraft events by combination of metamorphic animation on multi-object and on object of IFS fractal model: Based on cloning and collision detection techniques
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
Proceeding – 2014 International Conference on Computer, Control, Informatics and Its Applications: “New Challenges and Opportunities in Big Data”, IC3INA 2014 vol:, issue:IC3INA.2014.7042619, page:1-159



Road detection system based on RGB histogram filterization and boundary classifier
M. D. Enjat Munajat,Dwi H. Widyantoro,Rinaldi Munir
ICACSIS 2015 – 2015 International Conference on Advanced Computer Science and Information Systems, Proceedings vol:, issue:ICACSIS.2015.7415163, page:1-200



Metamorphic animation of 3D fern-like fractal images based on a family of transitional 3D IFS code approach
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
2013 International Conference of Information and Communication Technology, ICoICT 2013 vol:, issue:ICoICT.2013.6574586, page:1-276



A Novel Approach to Make Presentation Using PowerPoint Without Projector in Local Area Network
Daniel Silli Bataona,Jemsrado Sine,Rinaldi Munir,Tutun Juhana,Gloria Christiana Manulangga
International Conference on Ubiquitous and Future Networks, ICUFN vol:2018-July, issue:ICUFN.2018.8436832, page:1-474



A survey on multisperm tracking for sperm motility measurement
Priyanto Hidayatullah,Tati L.E.R. Mengko,Rinaldi Munir
International Journal of Machine Learning and Computing vol:7, issue:ijmlc.2017.7.5.637, page:1-151



A new method for analyzing congestion levels based on road density and vehicle speed
M. D. Enjat Munajat,Dwi H. Widyantoro,Rinaldi Munir
Journal of Theoretical and Applied Information Technology vol:95, issue:, page:1-6471



Weaving effects in metamorphic animation of treelike fractal based on a family of multi-transitional iterated function system code
Tedjo Darmanto,Iping S. Suwardi,Rinaldi Munir
Proceeding – 2013 International Conference on Computer, Control, Informatics and Its Applications: “Recent Challenges in Computer, Control and Informatics”, IC3INA 2013 vol:, issue:IC3INA.2013.6819150, page:1-70



Cyclical metamorphic animation of fractal images based on a family of multi-transitional IFS code approach
Tedjo Darmanto,Iping Supriana Suwardi,Rinaldi Munir
Proceedings of 2012 IEEE Conference on Control, Systems and Industrial Informatics, ICCSII 2012 vol:, issue:CCSII.2012.6470506, page:1-234



Fan temperature detection using microcontroller
Cindi Rori,Debby Paseru,Rinaldi Munir,Pinrolinvic Manembu
Proceeding of 2015 1st International Conference on Wireless and Telematics, ICWT 2015 vol:, issue:ICWT.2015.7449223, page:1-



A Semiautomatic Sperm Cell Data Annotator for Convolutional Neural Network
Priyanto Hidayatullah,Tati Erawati Rajab Mengko,Rinaldi Munir,Anggraini Barlian
Proceeding – 2019 5th International Conference on Science in Information Technology: Embracing Industry 4.0: Towards Innovation in Cyber Physical System, ICSITech 2019 vol:, issue:ICSITech46713.2019.8987471, page:1-216



Scenes categorization based on appears objects probability
None Marzuki,Egi Muhamad Hidayat,Rinaldi Munir,P Ary Setijadi,Carmadi Machbub
Proceedings of the 2016 6th International Conference on System Engineering and Technology, ICSET 2016 vol:, issue:FIT.2016.7857552, page:1-136



Powerplan: The alternative software for presentations at local area network using VirtualTreeViewand omnithread
Daniel Silli Bataona,Gloria Christiana Manulangga,Jemsrado Sine,Rinaldi Munir,Tutun Juhana
International Journal of Electrical and Computer Engineering vol:10, issue:ijece.v10i1.pp947-961, page:1-961



Tracking online fraud using regular expression
Fiftin Noviyanto,Dewi Soyusiawaty,Nur Rochmah,Dyah Puji Astuti,Rinaldi Munir,Masayu Leylia Khodra
Proceeding – 2017 3rd International Conference on Science in Information Technology: Theory and Application of IT for Education, Industry and Society in Big Data Era, ICSITech 2017 vol:2018-January, issue:ICSITech.2017.8257202, page:1-700