Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images

ABSTRACT


I. INTRODUCTION
The development of data and information and communication technology is currently an important part of everyday human life.As time goes by, human need for information is increasing.security is a state of being free from danger [1].Security can be implemented into various things, including data and information.Data is an important asset in the survival of companies, government agencies, educational institutions and even individuals.Security issues are one important aspect of an information system.One of the important things in communication using computers to ensure the security of messages, data or information is encryption.Here encryption can be interpreted as a code or chipper [2].
A website is a means used to disseminate information via the Internet, in the form of text, images, sound or video.As the use of websites becomes more widespread, it can lead to various kinds of crimes such as theft, manipulation of important information data from a website by irresponsible people [3].
Encryption is a process where information or data to be sent is changed into a form that is almost unrecognizable as the original information using certain algorithms [4].Furthermore, in carrying out web-based image security, a coding system uses a table or dictionary that has been defined for the word information or which is part of the message, data or information sent [5].Then the chipper uses an algorithm that can encode all data streams (streams) of bits from an original message (plaintext) into an incomprehensible cryptogram [6].Because the chipper system is a system that is ready to be automated, this technique is used in web-based system security.One of the data that is often manipulated and misused is digital images.Manipulated images can damage someone's good name [7].This of course violates everyone's right to privacy.Thus, efforts to secure digital data become very important and very urgent.
The goal is to explain in detail how the Base64 algorithm works, including the encryption and decryption process.Focuses on how Base64 converts binary data to text so that it can be integrated in the context of image security.Understanding the Importance of Data and Information Security.Highlighting how important data and information security is in this modern technological era to protect vital assets, both for companies, government institutions, educational institutions and individuals.The Role of Encryption in Protecting Data and Information [8].Explores the role of encryption techniques, including algorithms such as Caesar Cipher and Base64, in protecting messages, data, and information sent via digital communications.Focus on how encryption can maintain the confidentiality and integrity of information.

A. Research Flow
In this research, the method used is experimental, meaning that the research is carried out to carry out trials on certain problems using certain theories so that appropriate test results are obtained between the problems taken and the theory used.Theories that can be used for test results include: 1. Needs Analysis, In the context of using the Base64 algorithm on web-based images, the need must consider whether the Base64 algorithm will be used to encrypt images or only used to reduce image size [9].It will then consider the type of image data used and the types of security attacks that may occur on the image, such as XSS (Cross-Site Scripting) attacks or SQL injection attacks.By considering these factors, the next step is to help develop appropriate solutions for web-based image security using the Base64 algorithm [10].
2. Building the System, In this stage, a design of the system architecture that will be used is created.The system architecture should include Base64 Encryption and Decryption algorithms to secure images and features to ensure data security.
3. Product Testing: The system must be tested to ensure that the system works well and is safe.The testing phase includes system testing using various test cases and simulations.After successful testing, the system must be maintained periodically to ensure that the system remains secure and functions properly.

B. System Design
This system consists of two main components: image encryption using the Base64 algorithm, and image decryption using the Base64 algorithm.The process design used by the system that has been designed to carry out the encryption and decryption process using the Base64 algorithm is as follows.
In this flowchart there are two processes, namely Encryption and Decryption, where in the Encryption process section enters a document or image data that has not been previously encrypted.The image that is input is an image that matches the previously determined format.Then in processing, if the image does not match the format, it will return to the data input section, but if the data format is appropriate, it will produce encrypted text.In the description section, the user will enter the text resulting from the encryption, if it matches the text, it will produce data that can be understood by humans, if it is not appropriate, it will return to the text input section.

C. System Architecture
The following is the architecture of a web-based image security system using the base 64 algorithm as follows: Fig. 2. System Architecture

1) Encryption
§ User accesses it § Then input the image based on the image type that has been determined § Next it will be processed by the algorithm that we have determined, namely Base64, and § The image encryption results will be displayed on the PC in text form that is difficult for humans to understand.
2) Decryption § User accesses it.§ Then input the encryption result text based on what has been determined.§ Next, it will be processed by the system to restore the original image, and § The image decryption results will be displayed on the PC in the form of an image that humans can understand.

D. Base64 Algorithm
In this system, the Base64 algorithm will be applied which will be used to secure image files.The psoudecode used in this system is based on the base64 algorithm in encrypting images as follows: The code provided uses the PHP programming language to upload images and perform base64 encryption on the image files.Here is a brief explanation of the code: § First, define an array containing valid image file extensions (jpg, jpeg, png, gif, bmp).§ Then, check whether the submit button has been pressed and the image file size is more than 0. § If the check is successful, extract the image file extension using the explode () function to separate the file name from the extension, then the strtolower () function is used to change the extension to lower case.§ Next, check whether the extracted image extensions are contained in the valid extension array that has been previously defined using the in_array () function.If the extension is valid, then the next step is to move the uploaded image file to the "images" directory by using the move_uploaded_file() function.
After that, base64 encryption is carried out on the uploaded image files using the base64_encode() function and the file_get_contents() function.The encryption results are stored in the $encryption variable.

E. System Interface
Design a user interface that allows users to upload images to encrypt or encrypted images to decrypt.In this display is the Image Upload Form.This section contains a form that allows users to select and upload image files that will be encrypted.By using the <input type="file"> element for this.Submit Button: This button is used to submit the form and start the image encryption process.This display is a simple display that displays a form for uploading images and a submit button.Once the user selects and uploads an image, the encryption process will begin.1.This display is the Encrypted Image Upload Form: This section contains possible forms.
2. The user selects and uploads the encrypted image file to be decrypted.You can use the <input type="file"> element for this.
3. Submit button: This button is used to submit the form and start the image decryption process.This display is a simple display that displays a form for uploading an encrypted image and a submit button.Once the user selects and uploads an encrypted image, the decryption process will begin.
4. This display is the Encrypted Image Upload Form: This section contains a form that allows users to select and upload an encrypted image file that will be decrypted.You can use the <input type="file"> element for this.
5. Submit button: This button is used to submit the form and start the image decryption process.This display is a simple display that displays a form for uploading an encrypted image and a submit button.Once the user selects and uploads an encrypted image, the decryption process will begin.

A. System Needs
Chrome is a popular choice for web application testing due to its ability to perform automated testing, support for a wide range of devices and resolutions, and good integration with web development tools.By using the Chrome Testing Environment, developers can improve the quality and reliability of their web applications through comprehensive and efficient testing.Here is software and hardware specification: § Windows 10 pro64-bit § Laptop § Intel® Core™ i3-500U CPU@2.00GHz(4CPUs)-2.0GHz§ 4096MB GB of RAM

B. Determine the Image
The process for selecting an image file that will be converted into a text representation in base64 form.The following is an explanation of how to determine which images will be encrypted: Input from user: You can allow users to upload images and use files uploaded by users as images to be encrypted.Generally, this involves using the <input type="file"> element in an HTML form that allows users to select an image file from their device.Once an image is uploaded by a user, you can access the file via the $_FILES variable in PHP.The $_FILES variable stores information about the uploaded file, including the temporary path on the server where

P
-ISSN : 3024-8701 E-ISSN : 3024-8329 https://journal.lontaradigitech.com/SCIENTISTInclude a form where users can select an image file and a button to start the encryption or decryption process.Show an error message if a problem occurs during the encryption or decryption process.