Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM

Authors

  • Muh Hajar Akbar Ahmad Dahlan University
  • Sunardi Sunardi Ahmad Dahlan University
  • Imam Riadi Ahmad Dahlan University

DOI:

https://doi.org/10.14421/jiska.2020.52-04

Abstract

Steganography is an anti-forensic technique that allows a criminal to hide information in other messages, so that during an examination it will be difficult to obtain evidence of the crime information. Therefore we need a technique to detect hidden messages in the data. This technique is known as steganalysis. Steganalysis is an anti-steganography science whose main purpose is to study the hiding characteristics of data on digital media and detect the existence of secret messages that are hidden using steganography techniques. The purpose of this study is to apply steganalysis techniques to detect the presence of messages that are hidden in other messages by using the forensic method, namely Generic Computer Forensic Investigation Model (GCFIM). In this study, the process of inserting steganographic messages using the Hiderman application, while the steganalysis process uses the StegSpy application. The results obtained in this study were the process of steganalysis using the help of the StegSpy application proved to be successful in detecting the presence of hidden messages in the five files that were scanned by steganographic messages.

References

Anwar, N., & Riadi, I. (2017). Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web. Jurnal Ilmiah Teknik Elektro Komputer Dan Informatika, 3(1), 1. https://doi.org/10.26555/jiteki.v3i1.6643

Ardiyasa, I. W. (2018). Implementasi Teknik Data Hidding Untuk Pengamanan Pesan Rahasia Pada Media Digital. Seminar Nasional Sistem Informasi Dan Teknologi Informasi 2018, 601–605.

Fauzan, A., Riadi, I., & Fadlil, A. (2017). Analisis Forensik Digital Pada Line Messenger Untuk Penanganan Cybercrime. Annual Research Seminar (ARS), 2(1), 159–163. http://seminar.ilkom.unsri.ac.id/index.php/ars/article/view/832/752

Olson, E., Carter, L., & Liu, Q. (2017). A Comparison Study Using StegExpose for Steganalysis. International Journal of Knowledge Engineering, 3(1), 8–12. https://doi.org/10.18178/ijke.2017.3.1.079

Palmer, G. (2001). A road map for digital forensic research. Proceedings of the Digital Forensic Research Conference, DFRWS 2001 USA, iii–42.

patrolisiber. (2019). Statistik Jumlah Laporan Polisi yang dibuat masyarakat. Patrolisiber.Id. https://patrolisiber.id/statistic

Rosalina, V., Herli, D., Informasi, F. T., Raya, U. S., Informasi, F. T., Raya, U. S., Forensik, D., Model, P., Framework, Z., & Clark, J. G. (2015). Pengembangan Model Tahapan Digital Forensic Untuk Mendukung. 0–5.

Saputra, A. P., Mubarok, H., & Widiyasono, N. (2017). Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba). Jurnal Teknik Informatika Dan Sistem Informasi, 3(1), 179–190. https://doi.org/10.28932/jutisi.v3i1.594

Shrivastava, G. (2012). Forensic Computing Models: Technical Overview. 207–216. https://doi.org/10.5121/csit.2012.2222

Utomo, Y. B., & Erwanto, D. (2019). Analisa Teknik Steganografi dan Steganalysis Pada File Multimedia Menggunakan Net Tools dan Hex Editor. Generation Journal, 3(1), 16–22. https://doi.org/10.29407/gj.v3i1.12698

Yusoff, Y., Ismail, R., & Hassan, Z. (2011). Common Phases of Computer Forensics Investigation Models. International Journal of Computer Science and Information Technology, 3(3), 17–31. https://doi.org/10.5121/ijcsit.2011.3302

Downloads

Published

2020-09-10

How to Cite

Akbar, M. H., Sunardi, S., & Riadi, I. (2020). Steganalysis Bukti Digital pada Media Storage Menggunakan Metode GCFIM. JISKA (Jurnal Informatika Sunan Kalijaga), 5(2), 96–106. https://doi.org/10.14421/jiska.2020.52-04