Analisis Digital Forensik Keaslian Video Rekaman CCTV Menggunakan Metode Localization Tampering

  • Desti Mualfah
  • Yoze Rizki Universitas Muhammadiyah Riau
  • Meiriladiwis Gea Universitas Muhammadiyah Riau

Abstract

Video is one the valid evidence if the handling process is in accordance with digital forensic procedures. Closed circuit television is a video sourse that is often used as authentic evidence in court. The authenticity of the video is something that is often doubted by certain parties. For this reason, this discusses how to detect the authenticity of video as digital evidence by comparing the original video files and tampering video files resulting from attack frame addition and attack frame delection. The media info tool is used to analyze the metadata and the localization tampering method is used to detect the frame where manipulation occurs. Localization tampering analyzes frame by frame, calculates as histogram and displays a histogram graph. Based on the results of the metadata analysis of the original video file and the video file tampering, it displays different information, which means that the video has been manipulated. Next, analyze the video with the localization tampering method to display the location on the video frame where manipulation has occurred. From the analysis results provide different information both from the calculation of the RGB value and the histogram graph.

Downloads

Download data is not yet available.

References

D. Mualfah and R. A. Ramadhan, “Analisis Forensik Metadata Kamera CCTV Sebagai Alat Bukti Digital,” Digit. Zo. J. Teknol. Inf. dan Komun., vol. 11, no. 2, pp. 257–267, 2020, doi: 10.31849/digitalzone.v11i2.5174.[2]N. Irman, “Tinjauan Yuridis Terhadap Putusan Perkara Nomor: 85/PID.B/2012/PN.PWT),” Pembuktian Alat Bukti Inf. Dan Transaksi Elektron. Dalam Pembobolan Atm, p. 105, 2013.[3]D. Mualfah and R. A. Ramadhan, “Analisis Digital Forensik Rekaman Kamera CCTV Menggunakan Metode NIST (National Instituteof Standards Technology),” IT J. Res. Dev., vol. 5, no. 2, pp. 171–182, 2020, doi: 10.25299/itjrd.2021.vol5(2).5731.[4]A. Putra Justicia, “Analysis of Forensic Video in Storage Data Using Tampering Method,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 3, pp. 328–335, 2018, doi: 10.17781/p002471.

Sudyana, D., Putra, R. T., & Soni, S. (2019). Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014. Sinkron, 3(2), 67–72. https://doi.org/10.33395/sinkron.v3i2.10029

M. N. O. Sadiku, A. E. Shadare, and S. M. Musa, “Digital Chain of Custody,” Int. J. Adv. Res. Comput. Sci. Softw. Eng., vol. 7, no. 7, p. 117, 2017, doi: 10.23956/ijarcsse.v7i7.109.[6]D. Y. Sari, “Deteksi Keaslian Video Pada Handycam Dengan Metode Localization Tampering,” J. Online Inform., vol. 2, no. 1, p. 10, 2017, doi: 10.15575/join.v2i1.85.[7]D. M. Suratno, I. Riadi, and Y. Prayudi, “First Respond Framework Untuk Forensik CCTV,” Hacking Digit.Forensics Expo., pp. 13–20, 2018.[8]Sari, D. Y. (2020). Algoritma K-Means Untuk Mendeteksi Frame Pada Video Alsi dan Video Tampering. Teknokom, 3(1), 17-21. [9] Sholihin, R. A., & Purwoto, B. H. (2015). Perbaikan Citra Dengan Menggunakan Median FilterDan Metode Histogram Equalization. Jurnal Emitor, 14(2), 1411–8890. [10]Sinambela, J. M. (2016). Digital Forensik Dan Barang Bukti Rekaman CCTV Kasus Jessica. Retrieved August 9, 2020, from infosec.id website: https://infosec.id/2016/10/digital-forensik-dan-barang-bukti-rekaman-cctv-ka sus-jessica/

S, S., Hafid, A., & Sudyana, D. (2019). Analysis of Security Awareness in using Technology and Social Media at Muhammadiyah University of Riau. International Journal of Computer Applications, 177(18), 20–25. https://doi.org/10.5120/ijca2019919631

Soni, Prayudi, Y., & Sugiantoro, B. (2017). Teknik Akuisisi Virtualisasi Server Menggunakan Metode Live Forensic. Teknomatika, 9(2).

Soni, Prayudi, Y., Sugiantoro, B., Sudyana, D., & Mukhtar, H. (2019). Server Virtualization Acquisition Using Live Forensics Method. 190, 18–23. https://doi.org/10.2991/iccelst-st-19.2019.4

Published
2022-06-01
Abstract views: 141 , PDF (Bahasa Indonesia) downloads: 142