Implementasi dan Penggunaan Algoritma Base64 dalam Pengamanan File Video
DOI:
https://doi.org/10.30865/mib.v4i2.2042Keywords:
Security, Base64, Encryption, Decryption, ASCIIAbstract
Personal data is often the target of people who are not responsible for being misused. Theft is done is to benefit from people who have the data. In addition to theft of work files, theft is also carried out on video files. Theft of this file aims to find out what the contents of the video. Someone has a private recorded video that cannot be known by others. Misuse of video files will be fatal for the owner of the video. Cryptographic techniques are needed in video security. Caesar Cipher's algorithm can help users secure the video file. The Base64 algorithm can be used to change the ASCII 256 format to Base64 so that it is easy to send or store in a storage medium. This algorithm will make the file structure simpler so that it can be displayed and saved. By applying the Base64 and Caesar Cipher algorithms to video files, the security and confidentiality of these files will be guaranteedReferences
R. Rahim, Mesran, M. Syahrizal, and A. P. U. Siahaan, “Data Security with International Data Encryption Algorithm,†Journal Online Jaringan COT POLIPD (JOJAPS), vol. 8, no. 1. pp. 63–68, 2017.
U. R. S. Lubis, Mesran, and T. Zebua, “Implementasi algoritma chua chaotic noise pada enkripsi citra rgb,†KOMIK (Konferensi Nas. Teknol. Inf. dan Komputer), vol. I, no. 1, pp. 220–224, 2017.
Supiyandi and B. Fachri, “Aplikasi Pengolahan Citra Perbaikan Kualitas Image Citra Digital Menggunakan Metode Harmonic Mean Filter,†J. Tek. dan Inform., vol. 5, no. 1, pp. 58–62, 2018.
P. Wilson and M. Garcia, “A Modified Version of the Vigenère Algorithm,†Int. J. Comput. Sci. Netw. Secur., vol. 6, no. 3, pp. 140–143, 2006.
S. D. Nasution, G. L. Ginting, M. Syahrizal, and R. Rahim, “Data Security Using Vigenere Cipher and Goldbach Codes Algorithm,†Int. J. Eng. Res. Technol., vol. 6, no. 01, pp. 360–363, 2017.
S. D. Nasution, “Penerapan Metode Linier Kongruendan Algoritma,†Pelita Inform. Budi Darma, vol. IV, no. 1, pp. 94–102, 2013.
R. Rahim et al., “Combination Base64 Algorithm and EOF Technique for Steganography,†J. Phys. Conf. Ser., vol. 1007, no. 1, 2018.
O. K. Sulaiman, M. Ihwani, and S. F. Rizki, “MODEL KEAMANAN INFORMASI BERBASIS TANDA TANGAN DIGITAL DENGAN DATA ENCRYPTION STANDARD (DES) ALGORITHM,†InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 1, no. 1, pp. 14–19, 2016.
E. Gunadhi and A. P. Nugraha, “Penerapan Kriptografi Base64 Untuk Keamanan URL (Uniform Resource Locator) Website Dari Serangan SQL Injection,†J. Algoritm., vol. 13, no. 2, pp. 391–398, 2017.
A. Y. Nugroho1, “Pembuatan aplikasi kriptografi algoritma base 64 menggunakan php untuk mengamankan data text,†Semin. Nas. Inform., vol. 1, no. 1, pp. 134–139, 2015.
R. Aulia, A. Zakir, and D. A. Purwanto, “Penerapan Kombinasi Algoritma Base64 Dan Rot47 Untuk Enkripsi Database Pasien Rumah Sakit Jiwa Prof. Dr. Muhammad Ildrem,†InfoTekJar (Jurnal Nas. Inform. dan Teknol. Jaringan), vol. 2, no. 2, pp. 146–151, 2018.
A. Rahmawati and A. Rahman, “Sistem Pengamanan Keaslian Ijasah Menggunakan Q R - Code dan Algoritma,†JUSi, vol. 1, no. 2, pp. 105–112, 2011.
R. Minarni, “Implementasi Algoritma Base64 untuk Mengamakan SMS p ada Smartphone,†Build. Informatics, Technol. Sci., vol. 1, no. 1, pp. 28–33, 2019.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).