Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images
DOI:
https://doi.org/10.61220/scientist.v1i2.20233Keywords:
Data Security, Base64, Encryption, DecryptionAbstract
Data is often the target of irresponsible people for misuse. The theft is done is to benefit from the person who has the data. In addition to theft of work files, theft is also carried out on image files. The purpose of this file theft is to find out what the image contains. Someone has a private image that cannot be known by others. Misuse of image files will be fatal for the owner of the image. Cryptographic techniques are needed in securing images and one of the methods used to secure these images is using the base64 algorithm. The Caesar Cipher algorithm can help users secure the image file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store on a storage medium. By applying the Base64 algorithm to image files, the security and confidentiality of these files will protect data from irresponsible people.
Downloads
References
H. Agusta, “Keamanan dan Akses Data Pribadi Penerima Pinjaman Dalam Peer to Peer Lending di Indonesia,” vol. 15, no. 1, pp. 11–38, 2021.
B. Untuk and M. Email, “Penerapan algoritma kriptografi tea dan base64 untuk mengamankan email,” vol. 2, no. 1, pp. 34–41, 2018.
R. W. Abdullah, S. Wulandari, and F. P. Nugroho, “Keamanan Basis Data pada Perancangan Sistem Kepakaran Prestasi SMAN dikota Surakarta,” vol. 12, no. 1, pp. 13–21, 1978.
R. R. Rachmawati, “Smart Farming 4.0 Untuk Mewujudkan Pertanian Indonesia Maju, Mandiri, Dan Modern,” Forum Penelit. Agro Ekon., vol. 38, no. 2, p. 137, 2021, doi: 10.21082/fae.v38n2.2020.137-154.
R. I. Adam, “Skema Penyembunyian Data pada Gambar Berbasis Interpolasi Kubik B-Spline Menggunakan Metode Least Significant Bit ( LSB ),” vol. 5, no. 3, pp. 255–260, 2019.
C. Lika et al., “Jurnal Computer Science and Information Technology ( CoSciTech ),” vol. 4, no. 1, pp. 200–206, 2023.
N. I. Putri, R. Komalasari, and Z. Munawar, “Pentingnya Keamanan Data Dalam Intelijen Bisnis,” J. Sist. Inf., vol. 1, no. 2, pp. 41–49, 2020.
H. P. Yuwinanto, “Privasi online dan keamanan data,” no. 031.
S.- Sallu and Q. Qammaddin, “Keamanan Data Pembelajaran Online Jaringan Komputer Di Perguruan Tinggi,” Instruksional, vol. 2, no. 1, p. 35, 2020, doi: 10.24853/instruksional.2.1.35-40.
D. A. Wp, “Peningkatan Keamanan Data dengan Metode Cropping Selection Pseudorandom,” vol. 4, no. 3, pp. 132–138, 2016.
Downloads
Published
Citation
Issue
Section
License
Copyright (c) 2023 Fadhlirrahman Baso (Author)
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.