Development of National Digital Evidence Metadata
DOI:
https://doi.org/10.15575/join.v4i1.292Keywords:
The industrial era 4.0, Metadata and digital evidenceAbstract
References
A. Kadir, Pengenalan Sistem Informasi. Andi, 2003.
A. Abugharsa, A. S. Basari, and Hamida Almangush, “A New Image Encryption Approach using Block-Based on Shifted Algorithm,” vol. 11, Jan. 2012.
APJII, “Hasil survey,” 2018. [Online]. Available: [https://www.apjii.or.id/survei2017](https://www.apjii.or.id/survei2017).
P. Alvarez, “Using Extended File Information (EXIF) File Headers in Digital Evidence Analysis,” IJDE, vol. 2, no. 3, 2004.
A. Argawal, “Tools for Managing EXIF Data of your Images,” 2014. [Online]. Available: [http://www.labnol.org/software/EXIF-data-editors/14210/](http://www.labnol.org/software/EXIF-data-editors/14210/).
F. Alanazi and A. Jones, “The Value of Metadata in Digital Forensics,” in 2015 European Intelligence and Security Informatics Conference, 2015.
S. Raghavan and S. V. Raghavan, “AssocGEN: Engine for analyzing metadata based associations in digital evidence,” in 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2013.
S. Raghavan and S. V. Raghavan, “Eliciting file relationships using metadata based associations for digital forensics,” CSI Trans. ICT, vol. 2, no. 1, pp. 49–64, Mar. 2014.
S. Raghavan and S. V. Raghavan, “A study of forensic and analysis tools,” in 2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE), 2013.
L. Woolcott, “Understanding Metadata: What is Metadata, and What is it For?,” Cat. Classif. Q., vol. 55, no. 7–8, pp. 669–670, Sep. 2017.
D. Ratnasari, “Membangun Model Informasi Metadata Untuk Mendukung Chain of Custody Bukti Digital,” UII, 2018.
H. Wijayanto, “Peningkatan Keamanan Citra Digital Menggunakan Teknik Enkripsi EXIF Metadata dengan Extended Tiny Encyption Algorithm,” UII, 2016.
I. Sebestyen, “JPEG: Still image data compression standard,” Comput. Stand. Interfaces, vol. 15, no. 4, pp. 365–366, Sep. 1993.
B. Sugiantoro and Y. Prayudi, “Metadata Forensik Untuk Analisis Korelasi Bukti Digital,” vol. 10, no. 1, pp. 85–89, 2018.
E. Casey, Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet, 3rd ed. Orlando, FL, USA: Academic Press, Inc., 2011.
S. Bajpai and K. Saxena, “Techniques of steganography for securing information: A survey,” Int. J. Emerg. Technol., vol. 3, no. 1, pp. 48–54, 2012.
G. K. Birajdar and V. H. Mankar, “Digital image forgery detection using passive techniques: A survey,” Digit. Investig., vol. 10, no. 3, pp. 226–245, Oct. 2013.
A. Cheddad, J. Condell, K. Curran, and P. M. Kevitt, “Digital image steganography: Survey and analysis of current methods,” Signal Processing, vol. 90, no. 3, pp. 727–752, Mar. 2010.
P. Clark, “Digital Forensics Tool Testing – Image Metadata in the Cloud,” Dep. Comput. Sci. Media Technol., pp. 1–54, 2011.
R. Crossley, E. Asimakopoulou, S. Sotiriadis, and N. Bessis, “A Study on Metadata Tagging for Tracking Original File Information within the Cloud,” in 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 2013.
L. Drive, M. Hall, C. Hill, K. Woods, A. Chassanoff, and C. A. Lee, “Managing and Transforming Digital Forensics Metadata for Digital Collections,” 10th Int. Conf. Preserv. Digit. Objects, no. November, pp. 203–208, 2013.
L. Febriasyah and I. Riadi, “Analisis Keterlibatan Cyberterorism Menggunakan Metode Analitycal Hierarchy Process (AHP),” UII, 2018.
F. Maruf, I. Riadi, and Y. Prayudi, “Merging of Vigenére Cipher with XTEA Block Cipher to Encryption Digital Documents,” Int. J. Comput. Appl., vol. 132, no. 1, pp. 27–33, Dec. 2015.
N. Garnasih and B. Erfianto, “Analisis Perbandingan Performasi Algoritma Kriptografi TEA(Tiny Encryption Algorithm), XTEA, dan XXTEA Untuk Proses Enkripsi dan Dekripsi Data,” Universitas Telkom, 2010.
G. Hanchinamani and L. Kulakarni, “A New Approach for Image Encryption Based on Cyclic Rotations and Multiple Blockwise Diffusions Using Pomeau-Manneville and Sin Maps,” J. Comput. Sci. Eng., vol. 8, no. 4, pp. 187–198, Dec. 2014.
C. K. Huang et al., “High security image encryption by two-stage process,” in 2009 7th International Conference on Information, Communications and Signal Processing (ICICS), 2009.
M. Zhang, “The Importance of Cameras in the Smartphone War,” 2015.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2019 Jurnal Online Informatika

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
-
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
-
NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
-
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
- You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation.
- No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License