Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework

  • Sunardi
  • Imam Riadi
  • Muh. Hajar Akbar
N/ACitations
Citations of this article
27Readers
Mendeley users who have this article in their library.

Abstract

Steganography is one of the anti-forensic techniques that allow criminals to hide information in other messages so that during the investigation, the investigator will experience problems and difficulty in getting evidence of original information on the crime. Therefore an investigator is required to have the ability to be able to find and extract (decoding) using the right tools when opening messages that have been inserted by steganography techniques. The purpose of this study is to analyze digital evidence using the static forensics method by applying the six stages to the Digital Forensics Research Workshop (DFRWS) framework and extracting steganography on files that have been compromised based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results of extraction of 9 out of 10 files that were scanned by steganography files had 90% success and 10% of steganography files were not found, so it can be concluded that the extraction files in steganographic messages can be used as legal digital proofs according to law.

Cite

CITATION STYLE

APA

Sunardi, Imam Riadi, & Muh. Hajar Akbar. (2020). Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 4(3), 576–583. https://doi.org/10.29207/resti.v4i3.1906

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free