Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Journal of Security, Computer, Information, Embedded, Network and Intelligence System

Analysis and Utilization of the Base64 Algorithm for Image Encryption and Decryption Security in Web-Based Images Baso, Fadhlirrahman
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20233

Abstract

Data is often the target of irresponsible people for misuse. The theft is done is to benefit from the person who has the data. In addition to theft of work files, theft is also carried out on image files. The purpose of this file theft is to find out what the image contains. Someone has a private image that cannot be known by others. Misuse of image files will be fatal for the owner of the image. Cryptographic techniques are needed in securing images and one of the methods used to secure these images is using the base64 algorithm. The Caesar Cipher algorithm can help users secure the image file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store on a storage medium. By applying the Base64 algorithm to image files, the security and confidentiality of these files will protect data from irresponsible people.
Performance Analysis of The Last Significant Bit (LSB) Method in Steganography for Data Hiding in Image Data Baso, Fadhlirrahman
Journal of Security, Computer, Information, Embedded, Network, and Intelligence System Vol. 1, No. 2 (Desember 2023)
Publisher : PT. Lontara Digitech Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.61220/scientist.v1i2.20234

Abstract

Technology as a means of conveying information can have significant implications for the security and confidentiality of data and information content. When a sender wishes to convey a message to someone and does not want the message to be easily visible, the concealment of this message becomes crucial for the sender. One commonly used method for data concealment is the Least Significant Bit (LSB) method in steganography. The LSB method is preferred for its simplicity, fast process, and greater capacity. Messages are embedded by replacing the least significant bit in the host image with the message bits, with the rule that the number of message bits does not exceed the number of bits in the host image. Based on research findings, the results of steganography are difficult to distinguish from the original content through visual observation. Therefore, it can be concluded that the steganography method is highly effective for concealing a message.