Implemetasi Algoritma Base64 dan Algoritma Discrete Consine Transform Dalam Penyisipan Gambar Terenkripsi Pada Audio Digital
Abstract
Types of multimedia that are developed and known by all groups, namely photos, videos, images, moving to images can be inserted into audio and so forth. Piracy of information or data in the type of multimedia that is confidential is often revealed to the public and known to the public. Based on these problems, it is necessary to secure information in the form of images using Cryptography. Cryptography is knowledge or skill that observes and examines how to encrypt images that are in the owner's secret to remain safe and cannot be duplicated which is guaranteed and confidentiality is maintained. Based on these problems we need a base 64 algorithm that has an encryption process to be able to help secure an image or information that is confidential. DCT algorithm is able to liken an image or information with very strong security
Downloads
References
Ariyus,Dony, “KRIPTOGRAFI Keamanan Data Dan Komunikasi”, 2006, Graha Ilmu, Yogyakarta.
A. P. Nugraha, E. Gunadhi, J. Algoritma, S. Tinggi, and T. Garut, “PENERAPAN KRIPTOGRAFI BASE 64 UNTUK KEAMANAN URL ( UNIFORM RESOURCE LOCATOR ) WEBSITE DARI SERANGAN SQL INJECTION,” pp. 491–498, 2004.
R. Syahputra, “KOMPRESI FILE VIDEO MP4 DENGAN MENGGUNAKAN METODE,” pp. 52–57, 2016.
P. Kombinasi, A. Base, D. A. N. Rot, P. M. Ildrem, P. T. Informatika, and F. Teknik, “Penerapan kombinasi algoritma base64 dan rot47 untuk enkripsi database pasien rumah sakit jiwa prof. dr. muhammad ildrem,” pp. 146–151.
Arsyad, azhar. 2013. Media Pembelajaran.Jakarta: PT Raja Grafindo Persada 2003. Pemanfaatan Media Audio dan Radio Untuk Pendidikan, Pusat Teknologi Komunikasi Pendidikan dan Kebudayaan, Jakarta.
Hondro, R. K., & Nurcahyo, G. W. (2018). Analisis dan Perancangan Sistem yang Menerapkan Algoritma Triangle Chain Cipher (TCC) untuk Enkripsi Record Tabel Database.
Zebua, T., Hondro, R. K., & Ndruru, E. Message Security on Chat App based on Massey Omura Algorithm. IJISTECH (International Journal Of Information System & Technology), 1(2), 16-23.
Hondro, R. K. Aplikasi Enkripsi dan Dekripsi SMS dengan Algoritma Zig Zag Cipher pada Mobile Phone Berbasis Android. Pelita Informatika: Informasi dan Informatika, 10(3).
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Implemetasi Algoritma Base64 dan Algoritma Discrete Consine Transform Dalam Penyisipan Gambar Terenkripsi Pada Audio Digital
Pages: 147-154
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).






















