Implementation and Use of Base64 Algorithm in Video File Security
DOI:
10.33395/sinkron.v7i1.11256Keywords:
Security, Base64, Encrypt, Decrypt, ASCIIAbstract
Personal data is often the target of irresponsible people to misuse. The theft is carried out to profit from the person who has the data. In addition to the theft of work files, theft is also carried out on video files. The theft of this file aims to find out what the contents of the video are. Someone has a private video recording that should not be known by others. Misuse of video files will be fatal for the owner of the video. Cryptographic techniques are needed in video security. Caesar Cipher algorithm can help users in securing the video file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store in a storage media. This algorithm will make the file structure simpler so that it can be displayed and saved. By applying the Base64 algorithm and Caesar Cipher on video files, the security and confidentiality of the files will be guaranteed
Downloads
References
Adi, P. D. P., Kitagawa, A., Sihombing, V., Silaen, G. J., Mustamu, N. E., Siregar, V. M. M., Sianturi, F. A., & Purba, W. (2021). A Study of Programmable System on Chip (PSoC) Technology for Engineering Education. Journal of Physics: Conference Series, 1899(1). https://doi.org/10.1088/1742-6596/1899/1/012163
Adi, P. D. P., Sihombing, V., Siregar, V. M. M., Yanris, G. J., Sianturi, F. A., Purba, W., Tamba, S. P., Simatupang, J., Arifuddin, R., Subairi, & Prasetya, D. A. (2021). A Performance Evaluation of ZigBee Mesh Communication on the Internet of Things (IoT). 3rd 2021 East Indonesia Conference on Computer and Information Technology, EIConCIT 2021. https://doi.org/10.1109/EIConCIT50028.2021.9431875
Fricles Ariwisanto Sianturi. (2013). Perancangan Aplikasi Pengamanan Data Dengan Kriptografi Advanced Encryption Standard ( AES). Pelita Informatika Budi Darma, 4(1), 42–46. http://ejurnal.stmik-budidarma.ac.id/index.php/pelita/article/view/208
Fricles Ariwisanto Sianturi, M. S. (2018). ANALISA PENGARUH LOG TRANSAKSI PADA SISTEM KOMPUTER. Mantik Penusa, 2(2), 67–70. http://e-jurnal.pelitanusantara.ac.id/index.php/mantik/article/view/422
Irawan, C., Winarno, A., Studi, P., Informasi, S., Komputer, F. I., & Nuswantoro, U. D. (2020). Kombinasi Algoritma Kriptogarafi Aes Dan Des Untuk Enkripsi. Proceeding SENDIU, 28–35.
Novianto, D., & Setiawan, Y. (2019). Aplikasi Pengamanan Informasi Menggunakan Metode Least Significant Bit (Lsb) dan Algoritma Kriptografi Advanced Encryption Standard (AES). Jurnal Ilmiah Informatika Global, 9(2), 83–89. https://doi.org/10.36982/jig.v9i2.561
Simarmata, J., Limbong, T., Tambunan, A. R. S., Simanjuntak, M. P., Limbong, R., Purnomo, A., Kumalasari, R. D., Anam, F., Khoifulloh, K., Nisa, K., Aryni, Y., Purba, O. N., Sianturi, F. A., Tarigan, P., & Napitupulu, E. (2018). Multimedia of number recognition for early childhood using image object. International Journal of Engineering and Technology(UAE), 7(3.2 Special Issue 2).
Sitompul, J. N. (2019). Implementasi Metode Kriptografi Advanced Encryption Standard ( AES ) untuk Proteksi Pesan Audio. 4(1), 37–45.
Suhandinata, S., Rizal, R. A., Wijaya, D. O., Warren, P., & Srinjiwi, S. (2019). Analisis Performa Kriptografi Hybrid Algoritma Blowfish Dan Algoritma Rsa. JURTEKSI (Jurnal Teknologi Dan Sistem Informasi), 6(1), 1–10. https://doi.org/10.33330/jurteksi.v6i1.395
Utama, A., & Siahaan, R. F. (2021). Penerapan Kriptografi untuk Pengamanan Data Transaksi Deposito pada Easy Tronik dengan Metode RC-5. Jurnal Ilmu Komputer Dan Sistem …, 3(3), 29–39. http://ejournal.sisfokomtek.org/index.php/jikom/article/view/86
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2022 Muhammad Efendi, Volvo Sihombing, Sahat Parulian

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.