M Mesran, Dahlan Abdullah, Dedy Hartama, R Roslina, Ankush Asri, Robbi Rahim, Ansari Saleh Ahmar,
... and for secure every form data an algorithm Base64 are needed, Base64 algorithm is used as data format to transmit data due to the result of base64 itself, but Base64 algorithm is not safe enough because it is ... and compresses plaintext, so the encoding result from Base64 is re-secured and compressed using HAVAL algorithm ... not take many bytes of data compared with Base64 algorithm
Tópico(s): Cloud Computing and Resource Management
2018 - IOP Publishing | Journal of Physics Conference Series
... documents, we first encode them as text using base64. Standard base64 encoding uses 64~ASCII characters: both lower and ... We show how we can encode and decode base64 data at nearly the speed of a memory ... several times fewer instructions than previous SIMD-accelerated base64 codecs. It is also more versatile, as it can be adapted---even at runtime---to any base64 variant by only changing constants.
Tópico(s): Algorithms and Data Compression
2019 - Wiley | Software Practice and Experience
Web developers use base64 formats to include images, fonts, sounds, and other resources directly inside HTML, JavaScript, JSON, and XML files. We estimate that billions of base64 messages are decoded every day. We are motivated to improve the efficiency of base64 encoding and decoding. Compared to state-of-the- ... reports errors when encountering characters outside of the base64 set. It is available online as free software ...
Tópico(s): Cellular Automata and Applications
2018 - Association for Computing Machinery | ACM Transactions on the Web
Imam Riadi, Abdul Fadlil, Fahmi Auliya Tsani,
... by first converting a digital image into a base64 encoding format so that the encryption process can ... containing the radix-64 letter arrangement used for base64 encoding. Conversely, the decryption process is carried out ... so we get the image file in the base64 encoding format. Then, the image with the base64 encoding format is decoded into the original file. ...
Tópico(s): Decision Support System Applications
2022 - Pusat Layanan Difabel | JISKA (Jurnal Informatika Sunan Kalijaga)
Robbi Rahim, Heri Nurdiyanto, Rahmat Hidayat, Ansari Saleh Ahmar, Dodi Siregar, Andysah Putera Utama Siahaan, Ilham Faisal, Sayuti Rahman, Diana Suita, Ahmad Zamsuri, Dahlan Abdullah, Darmawan Napitupulu, Muhammad Ikhsan Setiawan, S Sriadhi,
... data. The main objective of the use of base64 method is to convert any file in order ... paper discusses a steganography and encoding method using base64, which is a set of encoding schemes that ... is used to embed encoding text performed by Base64. As an example, for the mechanisms a file ...
Tópico(s): Digital Media Forensic Detection
2018 - IOP Publishing | Journal of Physics Conference Series
Yi Zhang, Linlin Kong, Fei Wang, Bo Li, Chao Ma, Dong Chen, Kai Liu, Chunhai Fan, Hongjie Zhang,
... a major challenge. To address this, an optimized Base64 method is developed and accordingly we realized a ... a DNA single strand. In this strategy, by Base64 encoding, code reshaping and balancing, and data mapping, ...
Tópico(s): Quantum-Dot Cellular Automata
2020 - Elsevier BV | Nano Today
Heri Nurdiyanto, Robbi Rahim, Ansari Saleh Ahmar, Muhammad Syahril, Muhammad Dahria, Herlina Ahmad,
... bits, the use of cryptographic algorithms such as Base64 and Word Auto Key Encryption can be a solution that produces a secure ciphertext, base64 algorithm which can encode all objects such as ...
Tópico(s): Multimedia Learning Systems
2018 - IOP Publishing | Journal of Physics Conference Series
Azizi Abas, Yuhanis Yusof, Farzana Kabir Ahmad,
... on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data ... compression algorithm after the data was encoded with base64 encoder/decoder.
Tópico(s): QR Code Applications and Technologies
2017 - Universiti Teknikal Malaysia Melaka | Journal of Telecommunication Electronic and Computer Engineering (JTEC)
Ajeet Ram Pathak, Sarita D. Deshpande, Mudra Panchal,
... types of file formats using AES (Rijndael) and Base64 encoding, which will be later stored on MySQL ... encoding and encryption. The critical aspect of using Base64 is for encoding binary data into ASCII text ...
Tópico(s): Advanced Steganography and Watermarking Techniques
2019 - Springer International Publishing | Lecture notes in networks and systems
Robbi Rahim, Sumarno Sumarno, Mochammad Tanzil Multazam, Suyono Thamrin, Siswo Hadi Sumantri,
... text while non-text data requires special algorithms. Base64 is an encoding algorithm that can convert non- ... as the GOST algorithm. The combination of the BASE64 and GOST algorithms is expected to be able ... third parties. The results of the combination of Base64 and GOST algorithms are expected to be able ...
Tópico(s): Advanced Malware Detection Techniques
2019 - IOP Publishing | Journal of Physics Conference Series
... in entropy. Therefore, if the attacker applies a base64 encoding algorithm to the encrypted files, files infected ... measurement method by applying various encoding algorithms including base64 and various file formats. To this end, we ...
Tópico(s): Information and Cyber Security
2022 - Multidisciplinary Digital Publishing Institute | Entropy
Heri Nurdiyanto, Robbi Rahim, Nur Wulan,
... which developed from Transposition Cipher and also use Base64 algorithm for encryption ending process, and from experiment ...
Tópico(s): Coding theory and cryptography
2017 - IOP Publishing | Journal of Physics Conference Series
Abdul Aziz Alimul Hidayat, Pristiwanto Pristiwanto,
... people who are not entitled to access them. Base64 algorithm is one of the algorithms for encoding ... the QR Code login wifi network using the base64 algorithm makes using wifi can be overcome and ...
Tópico(s): Mobile and Web Applications
2020 - | Jurnal Sistem Komputer dan Informatika (JSON)
A MD5-Base64 based hybrid encryption algorithm was introduced,which encrypted plain text to 32-bit hexadecimal cipher text by MD5 ... encrypted the 128-bit binary array by using Base64 algorithm.This algorithm can avoid getting user's ...
Tópico(s): Embedded Systems and FPGA Design
2012 - Science Press | Journal of Computer Applications
Robbi Rahim, R Ratnadewi, Deddy Prayama, Ervan Asri, Davis Belmiro Satria,
... it easily implemented in any media, combination of Base64 algorithm and One Time Pad as encoding and ...
Tópico(s): User Authentication and Security Systems
2018 - IOP Publishing | IOP Conference Series Materials Science and Engineering
... Standard 128 (AES-128) algorithm combined with Token-Base64.AES-128 algorithm is used in the encryption ... description of name and parameter values, then Token-Base64 for encoding and decoding processes with Token at ... that the combination of AES-128 and Token-Base64 algorithms can prevent SQL Injection attacks with a ...
Tópico(s): Advanced Malware Detection Techniques
2020 - The World Academy of Research in Science and Engineering | International Journal of Advanced Trends in Computer Science and Engineering
P. Mathivanan, A. Balaji Ganesh,
Tópico(s): Brain Tumor Detection and Classification
2022 - Springer Science+Business Media | Multimedia Tools and Applications
Yubin Ren, Yi Zhang, Yawei Liu, Qinglin Wu, Juanjuan Su, Fan Wang, Dong Chen, Chunhai Fan, Kai Liu, Hongjie Zhang,
... RaptorQ-Arithmetic-LZW-RS (RALR) and RaptorQ-Arithmetic-Base64-RS (RABR) systems, are developed. The two concatenated ...
Tópico(s): DNA and Nucleic Acid Chemistry
2022 - Wiley | Small Methods
Jasleen Kaur, Alka Agrawal, Raees Ahmad Khan,
... approaches. The data obfuscation approach is compared to Base64, Base32, Hexadecimal and MONcrypt while the location obfuscation ...
Tópico(s): Privacy-Preserving Technologies in Data
2022 - Elsevier BV | Journal of King Saud University - Computer and Information Sciences
Yubin Ren, Yi Zhang, Yawei Liu, Qinglin Wu, Honggang Hu, Jinɡjinɡ Li, Chunhai Fan, Dong Chen, Kai Liu, Hongjie Zhang,
... highly efficient encoding systems, i.e. RaptorQ-Arithmetic-Base64-Shuffle-RS (RABSR) and RaptorQ-Arithmetic-Huffman-Rotary- ...
Tópico(s): Advanced biosensing and bioanalysis techniques
2021 - Elsevier BV | Fundamental Research
Marco Botta, Davide Cavagnino,
Printable string encodings are widely used in several applications that cannot deal with binary data, the most known example being the mail system. In this paper, we investigate the potential of some of the proposed encodings to hide and carry extra information. We describe a framework for reversibly embedding data in printable string encodings, like Base45. The method leverages the characteristic of some encodings that are not surjective by using illegal configurations to embed one bit of information. ...
Tópico(s): DNA and Biological Computing
2021 - Multidisciplinary Digital Publishing Institute | Applied Sciences
... application of the SHA-512 hashing algorithm with Base64 encoding to generate URL-safe identifiers. This convention, ...
Tópico(s): Gene expression and cancer classification
2020 - Public Library of Science | PLoS ONE
Muhammad Asim, Muhammad Faisal Amjad, Waseem Iqbal, Hammad Afzal, Haider Abbas, Yin Zhang⋆,
... Downloads, Cookies, Bookmarks, Chrome stored user credentials, decode base64 encoded images, Tabs information etc. Finally, a comparative ...
Tópico(s): Digital Media Forensic Detection
2018 - Elsevier BV | Future Generation Computer Systems
<img src="data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAA9QAAACZCAYAAADO+nKrAAAAAXNSR0IArs4c6QAAAARnQU1BAACxjwv8YQUAAAAJcEhZcwAADsMAAA7DAcdvqGQAAP+lSURBVHhe7N0HuHVHWfbxbddPsIJ0CFWkCRFEpCNSRUoERGpAIJTQa6RD6CAqRQwiJIAkVKlCQEAp0qQjHem2r/e6v/WbvP/jZHHeQkKqua9rn7X3WjPPPH2embXO3t+zXbDZBf/v//2/zf/9v/938/3f//2b7/me7xmfv/d7v3fP1b0DOe3/83/+z5uzn/3sm//23/7b5gd+ ...
Tópico(s): Postcolonial and Cultural Literary Studies
2018 - | Scriptura
Loris D’Antoni, Margus Veanes,
... to prove the correctness of complex implementations of BASE64 and UTF encoders, and to expose data parallelism ...
Tópico(s): Software Testing and Debugging Techniques
2017 - Springer Science+Business Media | Lecture notes in computer science
Seshagiri Prabhu, Anu Vazhayil, Padmamala Sriram,
... usually obfuscated, often with encodings like hexadecimal, unicode, base64, escaped characters and rarely with substitution ciphers like ...
Tópico(s): Network Security and Intrusion Detection
2016 - Elsevier BV | Procedia Computer Science
... MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better ...
Tópico(s): Cryptography and Data Security
2015 - Indian Society for Education and Environment | Indian Journal of Science and Technology
... MONcrypt compares with existing obfuscation techniques like Base32, Base64 and Hexadecimal Encoding. The proposed technique provides better ...
Tópico(s): Privacy-Preserving Technologies in Data
2015 - Indian Society for Education and Environment | Indian Journal of Science and Technology
Ekhiotz Jon Vergara, Simin Nadjm‐Tehrani, Mihails Prihodko,
... with two different data exchange formats (JSON and Base64). The illustrative use case helped to identify the ...
Tópico(s): Caching and Content Delivery
2014 - Elsevier BV | Sustainable Computing Informatics and Systems
Nicole Beebe, Laurence A. Maddox, Lishu Liu, Minghe Sun,
... past (Microsoft Office 2010 files, file system data, base64, base85, URL encoding, flash video, M4A, MP4, WMV, ...
Tópico(s): Network Security and Intrusion Detection
2013 - Institute of Electrical and Electronics Engineers | IEEE Transactions on Information Forensics and Security