Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Security, Computer, Information, Embedded, Network and Intelligence System

Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images Baso, Fadhlirrahman
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20233

Abstract

Data is often the target of irresponsible people for misuse. The theft is done is to benefit from the person who has the data. In addition to theft of work files, theft is also carried out on image files. The purpose of this file theft is to find out what the image contains. Someone has a private image that cannot be known by others. Misuse of image files will be fatal for the owner of the image. Cryptographic techniques are needed in securing images and one of the methods used to secure these images is using the base64 algorithm. The Caesar Cipher algorithm can help users secure the image file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store on a storage medium. By applying the Base64 algorithm to image files, the security and confidentiality of these files will protect data from irresponsible people.
Performance Analysis of The Last Significant Bit (LSB) Method in Steganography for Data Hiding in Image Data Baso, Fadhlirrahman
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20234

Abstract

Technology as a means of conveying information can have significant implications for the security and confidentiality of data and information content. When a sender wishes to convey a message to someone and does not want the message to be easily visible, the concealment of this message becomes crucial for the sender. One commonly used method for data concealment is the Least Significant Bit (LSB) method in steganography. The LSB method is preferred for its simplicity, fast process, and greater capacity. Messages are embedded by replacing the least significant bit in the host image with the message bits, with the rule that the number of message bits does not exceed the number of bits in the host image. Based on research findings, the results of steganography are difficult to distinguish from the original content through visual observation. Therefore, it can be concluded that the steganography method is highly effective for concealing a message.
Co-Authors Abdal, Nurul Mukhlisah Adiba, Fhatiah Akmal Hidayat Al Faruq, Ahmad Faris Albar, Muh. Alfiani Alfiani, Alfiani Alkhalil, Ibrahim Aminuddin Bakry Amukune, Stephen Andi Akram Nur Risal Andika Isma Anriani L, Natalia Aqhsa, Ismail Aqsha, Ismail Ardiansyah, Sulfan Arifin, Afrisal Arifiyanti, Fitria Ashadi, Ninik Rahayu Ayu Hasnining Dary Mochamad Rifqie Della Fadhilatunisa Dewi Fatmarani Surianto Dewi, Shabrina Synta Dillah, Salsa Edi Suhardi Rahman Edy, Marwan Ramdhany Fadil, A. Fathahillah Fathahillah Fathahillah Febriansyah Ramadhan, Haekal Fitriani Dzulfadhilah Hanifa A, Nurul Hatima, Husnul Hidayat M, Wahyu Husnah, Asmaul Ibrani, Juan Veron Idil, Nur Inayah Imansyah, Dian Arishandy Imran, Al Irfan, Muh. Nur Jamaluddin Jannah, Devi Miftahul Johar Amir Jumadi Mabe Parenreng Kurnia Prima Putra Kurnia Wahyu Prima M. Miftach Fakhri M. Syahid Nur Wahid Mappangara, Surianto Muhammad Fajar B Muhlis, Fadillah Muhqisar, Iqvhan Mukhtar, Nur Aisyah Muliadi Nida Rifqi, Ainun Nirmala S., Aprilianti Nur, Putri Auralia Ariesti Nurani, Auralia Putri Nurdin Nurdin Nurfauziah Nurfauziah, Nurfauziah Nurjannah, Elma Nurul Fadhilah Oskar, Inong Putri Azzahra, Andi Shelma Putri, Ekha Mustika Rahmadani Rahmadani Rais, Nurul Aulia Ramadan, Muhammad Rahmat Ramadani, A. Novia Ramadhan, Haekal Febriansyah Rauf, Annajmi Rezky Anisar, Muh. Alief Ridwan Daud Mahande S, Aprilianti Nirmala S, Nurul Fadhillah Setialaksana, Wirawan - Sri Wahyuni Sulaiman, Dwi Rezky Anandari Surianto, Dewi Fatmawati Syafdwi, Wilda Inaya Syahid Nur Wahid, M. Syahrul Veronika Asri Tandirerung WAHYUDI Wardah, Siti Syarifah Wafiqah Wardani, Ayu Tri