IMAGE FORENSIC PADA TWITTER MENGGUNAKAN METODE DIGITAL RESEARCH WORKSHOP (DFRWS)

  • Septia Ayu Pratiwi Universitas Siber Muhammadiyah
  • Wicaksono Yuli Sulistyo Universitas Siber Muhammadiyah
Keywords: Digital Forensics, Image Forensics, Mobile Forensics, Image Forgery, DFRWS

Abstract

Developments in the information technology era are increasing both positively and negatively. One of the negative impacts is the uncontrolled attitude of the people in using the applications they have, thus creating crime in cyberspace (cybercrime), an example of the most widely used social media application is the Facebook, Twitter and Instagram applications. the case of cybercrime that is common on social media is uploading photos that have been used to bully someone or provide information, fraud and defamation. Changes to photos can be easily created or edited, so that they can change information that is conveyed differently and is vulnerable to use for crime. This is the basis of this research for experiments in the detection of digital photo forgery. This study uses a Forensic method stage called Digital Forensic Research Workshop (DFRWS). The results obtained from this research were that FotoForensic obtained the metadata contents of the photos obtained, where the second photo was an edited photo because there were indications that it had been edited using Adobe Photoshop CC 2017.

Downloads

Download data is not yet available.

References

[1] W. Y. Sulistyo, I. Riadi, and A. Yudhana, “Analisis Deteksi Keaslian Citra Menggunakan Teknik Level Error Analysis Dengan ForensicallyBeta,” vol. 2018, no. November, pp. 154–159, 2018.
[2] A. Fadlil, I. Riadi, and T. Sari, “Image Forensic for detecting Splicing Image with Distance Function,” vol. 169, no. 5, pp. 6–10, 2017.
[3] Rosidin, “Analisis Pendeteksi Kecocokan Objek Pada Citra Digital Menggunakan Matlab Dengan Metode Algoritma SIFT,” Universitas Islam Indonesia, 2018.
[4] W. A. Mukti, S. U. Masruroh, and D. Khairani, “Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android,” J. Tek. Inform., vol. 10, no. 1, pp. 73–84, 2018, doi: 10.15408/jti.v10i1.6820.
[5] A. P. Saputra and N. Widiyasono, “Analisis Digital Forensik pada File Steganography (Studi kasus : Peredaran Narkoba),” J. Tek. Inform. dan Sist. Inf., vol. 3, no. 1, pp. 179–190, 2017, doi: 10.28932/jutisi.v3i1.594.
[6] P. E. Kresnha, E. Susilowati, and Y. Adharani, “Pendeteksian Manipulasi Citra Berbasis Copy-move Forgery Menggunakan Euclidean DIstance dengan Single Value Decomposition,” Semin. Nas. Teknol. Inf. dan Multimed. 2016, pp. 6–7, 2016.
[7] A. Y. Wijaya, S. Al Musayyab, and H. Studiawan, “Pengembangan Metode Block Matching Untuk Deteksi Copy-Move Pada Pemalsuan Citra,” JUTI J. Ilm. Teknol. Inf., vol. 15, no. 1, p. 84, 2017, doi: 10.12962/j24068535.v15i1.a638.
[8] V. A. Silalahi and I. Sembiring, “Analisis Digital Forensics Investigation Pada Bukti Digital Steganography,” Universitas Kristen Satya Wacana, 2017.
[9] A. Febriyanto and I. Sembiring, “Uji Perbandingan Tools Mobile Forensic Pada Platform Java, Blackberry dan Android,” Universitas Kristen Satya Wacana, 2016.
[10] Ruci Meiyanti and Ismaniah, “Perkembangan Digital Forensik,” J. Kaji. Ilmial UBJ, vol. 15, no. September 2015, 2015.
[11] A. A. Agus and Riskawati, “Penanganan Kasus Cyber Crime di Kota Makassar (Studi Pada Kantor Kepolisian Resort Kota Besar Makassar),” J. Supremasi, vol. 11, no. 1, pp. 20–29, 2016.
[12] C. Sahera, “Forensik Gambar dan Video,” pp. 1–26, 2016, [Online]. Available: http://budi.rahardjo.id/files/courses/2016/EL6115-2016-23214314-Report.pdf
[13] F. Mahardika, A. D. Khatulistian, and A. P. Kuncoro, “Review Foto Forensic.com dengan Teknik Error Level Analysis dan JPEG untuk mengetahui Citra Asli,” J. Inform. J. Pengemb. IT Poltek Tegal, vol. 03, no. 01, pp. 71–75, 2018.
[14] Zulfan, F. Arnia, and R. Muharar, “Deteksi Pemalsuan Citra dengan Teknik Copy-Move Menggunakan Metode Ordinal Measure dari Koefisien Discrete Cosine Transform,” J. Nas. Tek. Elektro, vol. 5, no. 2, p. 165, 2018, doi: 10.25077/jnte.v5n2.230.2016.
[15] D. A. Febrianda, D. Andreswari, and E. P. Wulandari, “Sistem Autentifikasi Citra Digital Terintegrasi Dengan Error Level Analysis ( Ela ) Dan Color Filter Array ( Cfa ) Berbasis Web,” vol. 4, no. March 2016, pp. 45–56, 2018.
[16] W. R. Tresnaningsih, Endina Putri Purwandari, and Desi Andreswari, “Deteksi Pemalsuan Citra Copy Move Menggunakan Dyadic Wavelet Dan Scale Invariant Feature Transform,” J. Pseudocode, vol. 4, no. 1, 2017.
[17] A. L. Suryana, R. El Akbar, and N. Widiyasono, “Investigasi Email Spoofing dengan Metode Digital Forensics Research Workshop (DFRWS),” J. Edukasi dan Penelit. Inform., vol. 2, no. 2, pp. 111–117, 2016, doi: 10.26418/jp.v2i2.16821.
Published
2025-01-30
How to Cite
[1]
S. Pratiwi and W. Sulistyo, “IMAGE FORENSIC PADA TWITTER MENGGUNAKAN METODE DIGITAL RESEARCH WORKSHOP (DFRWS)”, IDEALIS, vol. 8, no. 1, pp. 10-20, Jan. 2025.