Implementation and Use of Base64 Algorithm in Video File Security

Authors

  • Muhammad Efendi Universitas Labuhan Batu
  • Volvo Sihombing Universitas Labuhanbatu
  • Sahat Parulian Universitas Labuhanbatu

DOI:

10.33395/sinkron.v7i1.11256

Keywords:

Security, Base64, Encrypt, Decrypt, ASCII

Abstract

Personal data is often the target of irresponsible people to misuse. The theft is carried out to profit from the person who has the data. In addition to the theft of work files, theft is also carried out on video files. The theft of this file aims to find out what the contents of the video are. Someone has a private video recording that should not be known by others. Misuse of video files will be fatal for the owner of the video. Cryptographic techniques are needed in video security. Caesar Cipher algorithm can help users in securing the video file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store in a storage media. This algorithm will make the file structure simpler so that it can be displayed and saved. By applying the Base64 algorithm and Caesar Cipher on video files, the security and confidentiality of the files will be guaranteed

GS Cited Analysis

Downloads

Download data is not yet available.

References

Adi, P. D. P., Kitagawa, A., Sihombing, V., Silaen, G. J., Mustamu, N. E., Siregar, V. M. M., Sianturi, F. A., & Purba, W. (2021). A Study of Programmable System on Chip (PSoC) Technology for Engineering Education. Journal of Physics: Conference Series, 1899(1). https://doi.org/10.1088/1742-6596/1899/1/012163

Adi, P. D. P., Sihombing, V., Siregar, V. M. M., Yanris, G. J., Sianturi, F. A., Purba, W., Tamba, S. P., Simatupang, J., Arifuddin, R., Subairi, & Prasetya, D. A. (2021). A Performance Evaluation of ZigBee Mesh Communication on the Internet of Things (IoT). 3rd 2021 East Indonesia Conference on Computer and Information Technology, EIConCIT 2021. https://doi.org/10.1109/EIConCIT50028.2021.9431875

Fricles Ariwisanto Sianturi. (2013). Perancangan Aplikasi Pengamanan Data Dengan Kriptografi Advanced Encryption Standard ( AES). Pelita Informatika Budi Darma, 4(1), 42–46. http://ejurnal.stmik-budidarma.ac.id/index.php/pelita/article/view/208

Fricles Ariwisanto Sianturi, M. S. (2018). ANALISA PENGARUH LOG TRANSAKSI PADA SISTEM KOMPUTER. Mantik Penusa, 2(2), 67–70. http://e-jurnal.pelitanusantara.ac.id/index.php/mantik/article/view/422

Irawan, C., Winarno, A., Studi, P., Informasi, S., Komputer, F. I., & Nuswantoro, U. D. (2020). Kombinasi Algoritma Kriptogarafi Aes Dan Des Untuk Enkripsi. Proceeding SENDIU, 28–35.

Novianto, D., & Setiawan, Y. (2019). Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES). Jurnal Ilmiah Informatika Global, 9(2), 83–89. https://doi.org/10.36982/jig.v9i2.561

Simarmata, J., Limbong, T., Tambunan, A. R. S., Simanjuntak, M. P., Limbong, R., Purnomo, A., Kumalasari, R. D., Anam, F., Khoifulloh, K., Nisa, K., Aryni, Y., Purba, O. N., Sianturi, F. A., Tarigan, P., & Napitupulu, E. (2018). Multimedia of number recognition for early childhood using image object. International Journal of Engineering and Technology(UAE), 7(3.2 Special Issue 2).

Sitompul, J. N. (2019). Implementasi Metode Kriptografi Advanced Encryption Standard ( AES ) untuk Proteksi Pesan Audio. 4(1), 37–45.

Suhandinata, S., Rizal, R. A., Wijaya, D. O., Warren, P., & Srinjiwi, S. (2019). Analisis Performa Kriptografi Hybrid Algoritma Blowfish Dan Algoritma Rsa. JURTEKSI (Jurnal Teknologi Dan Sistem Informasi), 6(1), 1–10. https://doi.org/10.33330/jurteksi.v6i1.395

Utama, A., & Siahaan, R. F. (2021). Penerapan Kriptografi untuk Pengamanan Data Transaksi Deposito pada Easy Tronik dengan Metode RC-5. Jurnal Ilmu Komputer Dan Sistem …, 3(3), 29–39. http://ejournal.sisfokomtek.org/index.php/jikom/article/view/86

Downloads


Crossmark Updates

How to Cite

Efendi, M., Volvo Sihombing, & Parulian, S. (2022). Implementation and Use of Base64 Algorithm in Video File Security. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 6(1), 243-247. https://doi.org/10.33395/sinkron.v7i1.11256