INVESTIGASI STEGO FILE MENGGUNAKAN FRAMEWORK NATIONAL INSTITUTE OF JUSTICE
DOI:
https://doi.org/10.31294/conten.v4i1.3527Keywords:
Anti forensik, steganografi, NIJ, HidermanAbstract
Steganografi merupakan salah satu teknik anti-forensik yang memungkinkan pelaku kejahatan untuk menyembunyikan informasi ke dalam pesan lain, sehingga investigator akan menghadapi kesulitan dalam mendapatkan bukti informasi asli pada kejahatan tersebut. Oleh karena itu, seorang investigator dituntut untuk memiliki kemampuan menemukan serta melakukan ekstraksi dengan menggunakan alat yang tepat saat membuka pesan yang telah disisipi teknik steganografi. Penelitian ini menganalisis bukti digital menggunakan metode static forensics dengan menerapkan lima tahapan pada framework National Institute of Justice (NIJ) serta melakukan ekstraksi steganografi pada file yang telah disusupi berdasarkan skenario kasus yang melibatkan kejahatan digital. Alat yang digunakan meliputi FTK Imager, Autopsy, WinHex, Hiderman, dan StegSpy. Hasil ekstraksi menunjukkan bahwa dari 10 file yang diskenariokan telah disusupi steganografi, 9 file berhasil diekstraksi dengan tingkat keberhasilan 90%, sedangkan 10% lainnya tidak ditemukan file steganografi. Dapat disimpulkan bahwa file hasil ekstraksi dari pesan steganografi dapat dijadikan bukti digital yang sah menurut hukum.
References
Fediro, B., & Tata Sutabri. (2023). RANCANG BANGUN SISTEM PELAPORAN INSIDEN KEJAHATAN SIBER. Jurnal Informatika Teknologi Dan Sains (Jinteks), 5(1), 38-43. https://doi.org/10.51401/jinteks.v5i1.2210 Geiger, M. A. and S. M. Ogilby. 2000. The First Course in Accounting: Students Perceptions and their Effect on the Decision to Major in Accounting. Journal of Accounting Education, 18, 63-78.
Alghamdi, M. (2021). digital forensics in cyber security—recent trends, threats, and opportunities.. https://doi.org/10.5772/intechopen.94452
Baskoro, A., Cahyani, N., & Putrada, A. (2020). Analysis of voice changes in anti forensic activities case study: voice changer with telephone effect. International Journal on Information and Communication Technology (Ijoict), 6(2), 64-77. https://doi.org/10.21108/ijoict.v6i2.508
Akbar, M. and Riadi, I. (2020). Analysis of steganographic on digital evidence using general computer forensic investigation model framework. International Journal of Advanced Computer Science and Applications, 11(11). https://doi.org/10.14569/ijacsa.2020.0111141
Azizan, N. (2022). File hiding web application (fhwa) using image steganography.. https://doi.org/10.15405/epms.2022.10.56
Pevnev, V. and Voikov, Y. (2020). Research and prototyping methods of steganography using mosaic. Advanced Information Systems, 4(2), 137-141. https://doi.org/10.20998/2522-9052.2020.2.20
Sulong, G. and Wimmer, M. (2023). Image hiding by using spatial domain steganography. Wasit Journal of Computer and Mathematics Science, 2(1), 25-29. https://doi.org/10.31185/wjcm.110
Fateh, M., Rezvani, M., & Irani, Y. (2021). A new method of coding for steganography based on lsb matching revisited. Security and Communication Networks, 2021, 1-15. https://doi.org/10.1155/2021/6610678
Lwowski, J., Corley, I., & Hoffman, J. (2020). Neural steganalysis with spatial rich models for image steganography detection.. https://doi.org/10.36227/techrxiv.11949762
Lokman, S., Ismail, A., & Din, R. (2020). Analysis review on linguistic steganalysis. Indonesian Journal of Electrical Engineering and Computer Science, 17(2), 950. https://doi.org/10.11591/ijeecs.v17.i2.pp950-956
Hidayasari, N., Riadi, I., & Prayudi, Y. (2020). steganalysis using yedrodj-net net's convolutional neural networks (cnn) method on steganography tools. Proceeding International Conference on Science and Engineering, 3, 207-211. https://doi.org/10.14421/icse.v3.499
Bunzel, N., Steinebach, M., & Liu, H. (2021). Cover-aware steganalysis. Journal of Cyber Security and Mobility. https://doi.org/10.13052/jcsm2245-1439.1011
Shi, H., Sun, T., Jiang, X., Dong, Y., & Xu, K. (2021). A hevc video steganalysis against dct/dst-based steganography. International Journal of Digital crime and Forensics, 13(3), 19-33. https://doi.org/10.4018/ijdcf.20210501.oa2
Badillah, R. (2023). Digital forensic evidence analysis in revealing defamation on social media (twitter) using the static forensics method. Ceddi Journal of Information System and Technology (Jst), 2(2), 22-33. https://doi.org/10.56134/jst.v2i2.45
Mualfah, D. and Ramadhan, R. (2020). Analisis forensik metadata kamera cctv sebagai alat bukti digital. digital Zone Jurnal Teknologi Informasi Dan Komunikasi, 11(2), 257-267. https://doi.org/10.31849/digitalzone.v11i2.5174
Anshori, I., Putri, K., & Ghoni, U. (2020). Analisis barang bukti digital aplikasi facebook messenger pada smartphone android menggunakan metode nij. It Journal Research and Development, 5(2), 118-134. https://doi.org/10.25299/itjrd.2021.vol5(2).4664
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Hajar, Hermansa, Ilcham
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.