Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images

Authors

  • Fadhlirrahman Baso Universitas Negeri Makassar Author

DOI:

https://doi.org/10.61220/scientist.v1i2.20233

Keywords:

Data Security, Base64, Encryption, Decryption

Abstract

Data is often the target of irresponsible people for misuse. The theft is done is to benefit from the person who has the data. In addition to theft of work files, theft is also carried out on image files. The purpose of this file theft is to find out what the image contains. Someone has a private image that cannot be known by others. Misuse of image files will be fatal for the owner of the image. Cryptographic techniques are needed in securing images and one of the methods used to secure these images is using the base64 algorithm. The Caesar Cipher algorithm can help users secure the image file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store on a storage medium. By applying the Base64 algorithm to image files, the security and confidentiality of these files will protect data from irresponsible people.

Downloads

Download data is not yet available.

References

H. Agusta, “Keamanan dan Akses Data Pribadi Penerima Pinjaman Dalam Peer to Peer Lending di Indonesia,” vol. 15, no. 1, pp. 11–38, 2021.

B. Untuk and M. Email, “Penerapan algoritma kriptografi tea dan base64 untuk mengamankan email,” vol. 2, no. 1, pp. 34–41, 2018.

R. W. Abdullah, S. Wulandari, and F. P. Nugroho, “Keamanan Basis Data pada Perancangan Sistem Kepakaran Prestasi SMAN dikota Surakarta,” vol. 12, no. 1, pp. 13–21, 1978.

R. R. Rachmawati, “Smart Farming 4.0 Untuk Mewujudkan Pertanian Indonesia Maju, Mandiri, Dan Modern,” Forum Penelit. Agro Ekon., vol. 38, no. 2, p. 137, 2021, doi: 10.21082/fae.v38n2.2020.137-154.

R. I. Adam, “Skema Penyembunyian Data pada Gambar Berbasis Interpolasi Kubik B-Spline Menggunakan Metode Least Significant Bit ( LSB ),” vol. 5, no. 3, pp. 255–260, 2019.

C. Lika et al., “Jurnal Computer Science and Information Technology ( CoSciTech ),” vol. 4, no. 1, pp. 200–206, 2023.

N. I. Putri, R. Komalasari, and Z. Munawar, “Pentingnya Keamanan Data Dalam Intelijen Bisnis,” J. Sist. Inf., vol. 1, no. 2, pp. 41–49, 2020.

H. P. Yuwinanto, “Privasi online dan keamanan data,” no. 031.

S.- Sallu and Q. Qammaddin, “Keamanan Data Pembelajaran Online Jaringan Komputer Di Perguruan Tinggi,” Instruksional, vol. 2, no. 1, p. 35, 2020, doi: 10.24853/instruksional.2.1.35-40.

D. A. Wp, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,” vol. 4, no. 3, pp. 132–138, 2016.

Downloads

Published

2023-12-09

Citation

Issue

Section

Articles

How to Cite

Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images. (2023). Journal of Security, Computer, Information, Embedded, Network, and Intelligence System, 1(2), 52-57. https://doi.org/10.61220/scientist.v1i2.20233

Similar Articles

1-10 of 11

You may also start an advanced similarity search for this article.