Development of National Digital Evidence Metadata

Authors

  • Bambang Sugiantoro UIN Sunan Kalijaga Yogyakarta, Indonesia

DOI:

https://doi.org/10.15575/join.v4i1.292

Keywords:

The industrial era 4.0, Metadata and digital evidence

Abstract

The industrial era 4.0 has caused tremendous disruption in many sectors of life. The rapid development of information and communication technology has made the global industrial world undergo a revolution. The act of cyber-crime in Indonesia that utilizes computer equipment, mobile phones are increasingly increasing. The information in a file whose contents are explained about files is called metadata. The evidence items for cyber cases are divided into two types, namely physical evidence, and digital evidence. Physical evidence and digital evidence have different characteristics, the concept will very likely cause problems when applied to digital evidence. The management of national digital evidence that is associated with continued metadata is mostly carried out by researchers. Considering the importance of national digital evidence management solutions in the cyber-crime investigation process the research focused on identifying and modeling correlations with the digital image metadata security approach. Correlation analysis reads metadata characteristics, namely document files, sounds and digital evidence correlation analysis using standard file maker parameters, size, file type and time combined with digital image metadata. nationally designed the highest level of security is needed. Security-enhancing solutions can be encrypted against digital image metadata (EXIF). Read EXIF Metadata in the original digital image based on the EXIF 2.3 Standard ID Tag, then encrypt and insert it into the last line. The description process will return EXIF decryption results in the header image. This can secure EXIF Metadata information without changing the image quality

References

A. Kadir, Pengenalan Sistem Informasi. Andi, 2003.

A. Abugharsa, A. S. Basari, and Hamida Almangush, “A New Image Encryption Approach using Block-Based on Shifted Algorithm,” vol. 11, Jan. 2012.

APJII, “Hasil survey,” 2018. [Online]. Available: [https://www.apjii.or.id/survei2017](https://www.apjii.or.id/survei2017).

P. Alvarez, “Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis,” IJDE, vol. 2, no. 3, 2004.

A. Argawal, “Tools for Managing EXIF Data of your Images,” 2014. [Online]. Available: [http://www.labnol.org/software/EXIF-data-editors/14210/](http://www.labnol.org/software/EXIF-data-editors/14210/).

F. Alanazi and A. Jones, “The Value of Metadata in Digital Forensics,” in 2015 European Intelligence and Security Informatics Conference, 2015.

S. Raghavan and S. V. Raghavan, “AssocGEN: Engine for analyzing metadata based associations in digital evidence,” in 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2013.

S. Raghavan and S. V. Raghavan, “Eliciting file relationships using metadata based associations for digital forensics,” CSI Trans. ICT, vol. 2, no. 1, pp. 49–64, Mar. 2014.

S. Raghavan and S. V. Raghavan, “A study of forensic and analysis tools,” in 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2013.

L. Woolcott, “Understanding Metadata: What is Metadata, and What is it For?,” Cat. Classif. Q., vol. 55, no. 7–8, pp. 669–670, Sep. 2017.

D. Ratnasari, “Membangun Model Informasi Metadata Untuk Mendukung Chain of Custody Bukti Digital,” UII, 2018.

H. Wijayanto, “Peningkatan Keamanan Citra Digital Menggunakan Teknik Enkripsi EXIF Metadata dengan Extended Tiny Encyption Algorithm,” UII, 2016.

I. Sebestyen, “JPEG: Still image data compression standard,” Comput. Stand. Interfaces, vol. 15, no. 4, pp. 365–366, Sep. 1993.

B. Sugiantoro and Y. Prayudi, “Metadata Forensik Untuk Analisis Korelasi Bukti Digital,” vol. 10, no. 1, pp. 85–89, 2018.

E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 3rd ed. Orlando, FL, USA: Academic Press, Inc., 2011.

S. Bajpai and K. Saxena, “Techniques of steganography for securing information: A survey,” Int. J. Emerg. Technol., vol. 3, no. 1, pp. 48–54, 2012.

G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A survey,” Digit. Investig., vol. 10, no. 3, pp. 226–245, Oct. 2013.

A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.

P. Clark, “Digital Forensics Tool Testing – Image Metadata in the Cloud,” Dep. Comput. Sci. Media Technol., pp. 1–54, 2011.

R. Crossley, E. Asimakopoulou, S. Sotiriadis, and N. Bessis, “A Study on Metadata Tagging for Tracking Original File Information within the Cloud,” in 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013.

L. Drive, M. Hall, C. Hill, K. Woods, A. Chassanoff, and C. A. Lee, “Managing and Transforming Digital Forensics Metadata for Digital Collections,” 10th Int. Conf. Preserv. Digit. Objects, no. November, pp. 203–208, 2013.

L. Febriasyah and I. Riadi, “Analisis Keterlibatan Cyberterorism Menggunakan Metode Analitycal Hierarchy Process (AHP),” UII, 2018.

F. Maruf, I. Riadi, and Y. Prayudi, “Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents,” Int. J. Comput. Appl., vol. 132, no. 1, pp. 27–33, Dec. 2015.

N. Garnasih and B. Erfianto, “Analisis Perbandingan Performasi Algoritma Kriptografi TEA(Tiny Encryption Algorithm), XTEA, dan XXTEA Untuk Proses Enkripsi dan Dekripsi Data,” Universitas Telkom, 2010.

G. Hanchinamani and L. Kulakarni, “A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps,” J. Comput. Sci. Eng., vol. 8, no. 4, pp. 187–198, Dec. 2014.

C. K. Huang et al., “High security image encryption by two-stage process,” in 2009 7th International Conference on Information, Communications and Signal Processing (ICICS), 2009.

M. Zhang, “The Importance of Cameras in the Smartphone War,” 2015.

Downloads

Published

2019-09-06

Issue

Section

Article

Citation Check

Similar Articles

1 2 3 4 > >> 

You may also start an advanced similarity search for this article.