Analisis Forensik Pemalsuan Dokumen PDF Menggunakan Metode National Institute of Justice (NIJ)

Authors

  • Marcel Afandi Universitas Amikom Purwokerto
  • Rifki Amrulloh Universitas Amikom Purwokerto
  • Khairunnisak Nur Isnaini Universitas AMIKOM Purwokerto
  • Didit Suhartono Universitas Amikom Purwokerto

DOI:

https://doi.org/10.31598/jurnalresistor.v7i3.1460

Keywords:

digital forensik, NIJ, Exiftools, PCA, forgery

Abstract

With the rapid growth of information and communication technology, the need for a sophisticated digital forensic approach to security has become more urgent. The problem that needs to be resolved using digital forensic steps is the indication of alteration and falsification of documents with the .pdf extension. By involving various forensic analysis methods, such as metadata examination, physical observation, hash value, analysis using Principal Component Analysis (PCA), and the use of forensic tools such as Adobe Acrobat Reader, Exiftools, imageforensic.org and HashMyFile, it is expected to address existing crime cases. This research aims to study the challenges posed by digital documents, emphasizing the need for innovative approaches to uncover hidden information, detect alterations, and authenticate the integrity of PDF files. The combination of the NIJ method and Analysis using PCA produces an accurate and precise analysis as seen from the dimensionality reduction capability of PCA. The results show that the NIJ method and PCA analysis can be used to prove the authenticity of a PDF document by finding changes in the PDF document. In addition, this research also provides recommendations for the development of forensic techniques in supporting the reliability and security of digital documents. It is hoped that this research can make a valuable contribution to the development of forensic techniques.

Downloads

Download data is not yet available.

References

M. Badri, “Analisis Forensik Originalitas Gambar Menggunakan Autopsy Dan Opencv,” J. Satya Inform., vol. 8, no. 01, pp. 43–49, 2023, doi: 10.59134/jsk.v8i01.236.

I. Irwansyah and H. Yudiastuti, “Analisis Digital Forensik Rekayasa Image Menggunakan Jpegsnoop Dan Forensically Beta,” J. Ilm. Matrik, vol. 21, no. 1, pp. 54–63, 2019, doi: 10.33557/jurnalmatrik.v21i1.518.

K. N. Isnaini, H. Ashari, and A. P. Kuncoro, “Analisis Forensik untuk Mendeteksi Keaslian Citra Digital Menggunakan Metode NIST,” J. Resist., vol. 3, no. 2, pp. 72–81, 2020, doi: https://doi.org/10.31598.

I. Faisal, A. Budiman, and E. I. Fitiria, “Penerapan Digital Forensics Research Workshop Dalam Akuisisi Evidence Forensik Aplikasi Snack Video,” vol. 2, no. 2, pp. 390–399.

Ben Liu, “Apa Arti Format PDF,” KOFAX. p. 1, 2021. [Online]. Available: https://www.kofax.com/learn/blog/what-does-pdf-format-mean

N. Perdana, “11 perangkat lunak markup PDF gratis terbaik di pasaran pada tahun 2023,” FILESTAGE. p. 1, 2023. [Online]. Available: https://filestage.io/blog/free-pdf-markup-software/

P. B. Polri., “Rata-rata, Tujuh Kasus Pemalsuan Surat Ditangani Polri,” Pusiknas Bareskrim Polri. p. 1, 2022. [Online]. Available: https://pusiknas.polri.go.id/detail_artikel/rata-rata,_tujuh_kasus_pemalsuan_surat_ditangani_polri

R. M, “Forensic Document Forgery Analysis – A Landmark Approach To Curb Identity Fraud,” ShuftiPro. p. 1, 2022. [Online]. Available: https://shuftipro.com/blog/forensic-document-forgery-analysis-a-landmark-approach-to-curb-identity-fraud/

C. Khairunnisa and Zulfan, “Manfaat Ilmu Forensik dalam Hukum Pidana,” CENDEKIA J. Hukum, Sos. Hum., vol. 1, no. 1, pp. 1–12, 2023.

W. Astuti and A. Adiwijaya, “Principal Component Analysis Sebagai Ekstraksi Fitur Data Microarray Untuk Deteksi Kanker Berbasis Linear Discriminant Analysis,” J. Media Inform. Budidarma, vol. 3, no. 2, p. 72, 2019, doi: 10.30865/mib.v3i2.1161.

D. A. Nugraha and A. S. Wiguna, “Seleksi Fitur Warna Citra Digital Biji Kopi Menggunakan Metode Principal Component Analysis,” Res. Comput. Inf. Syst. Technol. Manag., vol. 3, no. 1, p. 24, 2020, doi: 10.25273/research.v3i1.5352.

F. Badri and S. U. R. Sari, “Penerapan Metode Principal Component Analysis (PCA) Untuk Identifikasi Faktor-Faktor yang Mempengaruhi Sikap Mahasiswa Memilih Melanjutkan Studi ke Kota Malang,” Build. Informatics, Technol. Sci., vol. 3, no. 3, pp. 426–431, 2021, doi: 10.47065/bits.v3i3.1139.

F. Harahap, “Deteksi Foto Manipulasi Dengan Tools Forensicallybeta dan Imageforensic . org Dengan Metode Error Level Analysis ( ELA ),” TIN Terap. Inform. Nusant., vol. 2, no. 3, pp. 159–164, 2021, [Online]. Available: https://ejurnal.seminar-id.com/index.php/tin/article/view/859

androideity, “ExifTool adalah editor metadata sumber terbuka dan lintas platform,” androideity. p. 1, 2020. [Online]. Available: https://id.androideity.com/select-random-file-windows-explorer

D. Mualfah, A. Viransa, and H. F. Amran, “Akuisisi Bukti Digital Pada Aplikasi Tamtam Messenger Menggunakan Metode National Institute of Justice,” J. Softw. Eng. Inf. Syst., vol. 3, no. 1, 2021, doi: 10.37859/seis.v3i1.4548.

D. T. Yuwono, A. Fadlil, and S. Sunardi, “Performance Comparison of Forensic Software for Carving Files using NIST Method,” J. Teknol. dan Sist. Komput., vol. 7, no. 3, pp. 89–92, 2019, doi: 10.14710/jtsiskom.7.3.2019.89-92.

E. P. Purwandari, A. Erlansari, A. Wijanarko, and E. A. Adrian, “Face sketch recognition using principal component analysis for forensics application,” J. Teknol. dan Sist. Komput., vol. 8, no. 3, pp. 178–184, 2020, doi: 10.14710/jtsiskom.2020.13422.

S. Mamis, I. N. A. S. Putra, and I. M. M. Yusa, Dasar-dasar Desain Komunikasi Visual. 2023.

M. A. Kustian, M. Informatika, and U. I. Indonesia, “Hash Dalam Menentukan Keaslian Video , Metadata Image Dan Magic,” vol. 2, pp. 10–16, 2023.

S. Marcellino, H. B. Seta, and I. W. Widi, “Analisis Forensik Digital Recovery Data Smartphone pada Kasus Penghapusan Berkas Menggunakan Metode National Institute of Justice (NIJ),” Inform. J. Ilmu Komput., vol. 19, no. 2, pp. 141–156, 2023, doi: 10.52958/iftk.v19i2.4676.

Y. Arif, E. I. Alwi, and M. A. Asis, “Analisis Bukti Digital Direct Message Pada Twitter Menggunakan Metode National Institute Of Justice ( NIJ ),” vol. 8, no. 2, pp. 165–174, 2023.

S. Soni, Y. Fatma, and R. Anwar, “Akuisisi Bukti Digital Aplikasi Pesan Instan ‘Bip’Menggunakan Metode National Institute Of Justice (NIJ),” J. CoSciTech (Computer Sci. Inf. Technol., vol. 3, no. 1, pp. 34–42, 2022, doi: 10.37859/coscitech.v3i1.3694.

I. Gunawan, “Analisis Keamanan Aplikasi Android Non Playstore Dengan Metode Digital Forensik Pendekatan Statis Dan Dinamis,” Simetris, vol. 15, no. 2, pp. 29–34, 2021, doi: 10.51901/simetris.v15i2.225.

I. Riadi, J. Triyanto, and J. L. P. Soepomo, “Analisis Forensik Layanan Signal Private Messenger pada Smartwatch Menggunakan,” J. Edukasi dan Penelit. Inform., vol. 7, no. 3, pp. 305–313, 2021.

S. Sunardi, I. Riadi, and J. Triyanto, “Forensics Mobile Layanan WhatsApp pada Smartwatch Menggunakan Metode National Institute of Justice,” JOINTECS (Journal Inf. Technol. Comput. Sci., vol. 6, no. 2, p. 63, 2021, doi: 10.31328/jointecs.v6i2.2315.

M. Syahrir and F. Fatimatuzzahra, “Association Rule Integrasi Pendekatan Metode Custom Hashing dan Data Partitioning untuk Mempercepat Proses Pencarian Frekuensi Item-set pada Algoritma Apriori,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 20, no. 1, pp. 149–158, 2020, doi: 10.30812/matrik.v20i1.833.

Downloads

Published

2024-12-31

How to Cite

Afandi, M. ., Amrulloh, R. ., Isnaini, K. N. ., & Suhartono, D. . (2024). Analisis Forensik Pemalsuan Dokumen PDF Menggunakan Metode National Institute of Justice (NIJ). Jurnal RESISTOR (Rekayasa Sistem Komputer), 7(3), 162–170. https://doi.org/10.31598/jurnalresistor.v7i3.1460