Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method
DOI:
https://doi.org/10.21512/commit.v15i1.6739Keywords:
Audio Forensics, Smartphone, Digital Forensics Research Workshop (DFRWS)Abstract
Audio is one of the digital items that can reveal a happened case. However, audio evidence can also be manipulated and changed to hide information. Forensics audio is a technique to identify the sound’s owner from the audio using pitch, formant, and spectrogram parameters. The conducted research examines the similarity of the original sound with the manipulated voice to determine the owner of the sound. It analyzes the level of similarity or identical sound using spectrogram analysis with the Digital Forensics Research Workshop (DFRWS) Method. The research objects are original and manipulated files. Both files are in mp3 format, which is encoded to WAV format. Then, the live forensics method is used by picking up the data on a smartphone. Several applications are also used. The results show that the research successfully gets digital evidence on a smartphone with the Oxygen Forensic application. It extracts digital evidence in the form of two audio files and two video files. Then, by the hashing process, the four obtained files are proven to be authentic. Around 90% of the data are identical to the original voice recording. Only 10% of the data are not identical.
Plum Analytics
References
A. P. U. Siahaan, “Pelanggaran cybercrime dan kekuatan yurisdiksi di Indonesia,” Jurnal Teknik dan Informatika, vol. 5, no. 1, pp. 6–9, 2018.
N. Alsaidi, M. Alshareef, A. Alsulami, M. Alsafri, and A. Aljahdali, “Digital steganography in computer forensics,” International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 5, pp. 54–61, 2020.
A. Wicaksono, S. Adinandra, and Y. Prayudi, “Penggabungan metode Itakura Saito Distance dan Backpropagation Neural Network untuk peningkatan akurasi suara pada audio forensik,”JUITA: Jurnal Informatika, vol. 8, no. 2, pp. 225–233, 2020.
H. Wu, Y. Wang, and J. Huang, “Identification of electronic disguised voices,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 489–500, 2014.
V. A. Hadoltikar, V. R. Ratnaparkhe, and R. Kumar, “Optimization of MFCC parameters for mobile phone recognition from audio recordings,” in 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). Coimbatore, India: IEEE, June 12–14, 2019, pp. 777–780.
R. B¨ohme, F. C. Freiling, T. Gloe, and M. Kirchner, “Multimedia forensics is not computer forensics,”in International Workshop on Computational Forensics. Springer, 2009, pp. 90–103.
A. C. K. Wardana, R. Pedrason, and T. B. Prasetyo, “Implementasi digital forensik Brunei Darussalam dalam membangun keamanan siber,”Peperangan Asimetrik, vol. 4, no. 1, pp. 1–22, 2018.
I. O. Ademu, C. O. Imafidon, and D. S. Preston, “A new approach of digital forensic model for digital forensic investigation,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 2, no. 12, pp. 175–178, 2011.
I. Zuhriyanto, A. Yudhana, and I. Riadi, “Analisis perbandingan tools forensic pada aplikasi Twitter menggunakan metode Digital Forensics Research Workshop,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 5, pp. 829–836, 2020.
I. Riadi, R. Umar, and A. Firdonsyah, “Forensic tools performance analysis on Android-based Blackberry Messenger using NIST measurements,”International Journal of Electrical and Computer Engineering, vol. 8, no. 5, pp. 3991–4003, 2018.
A. Al-Sabaawi and E. Foo, “A comparison study of Android mobile forensics for retrieving files system,” International Journal of Computer Science and Security (IJCSS), vol. 13, no. 4, pp. 148–166, 2019.
A. Wirara, B. Hardiawan, and M. Salman, “Identifikasi bukti digital pada akuisisi perangkat mobile dari aplikasi pesan instan “WhatsApp”,”Teknoin, vol. 26, no. 1, pp. 66–74, 2020.
R. Umar, A. Yudhana, and M. N. Faiz, “Experimental analysis of web browser sessions using live forensics method,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 2951–2958, 2018.
W. Jansen and R. Ayers, “Guidelines on cell phone forensics,” NIST Special Publication, vol. 800, no. 101, pp. 1–104, 2007.
I. Riadi, Sunardi, and P. Widiandana, “Investigasi cyberbullying pada Whatsapp menggunakan Digital Forensics Research Workshop,”RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 4, pp. 730–735, 2020.
R. R. Huizen, N. K. D. A. Jayanti, and D. P. Hostiadi, “Model evaluasi rekaman percakapan di 46 audio forensik,” Jurnal Sistem dan Informatika (JSI), vol. 11, no. 2, pp. 133–140, 2017.
A. G. Boyarov and I. S. Siparov, “Forensic investigation of MP3 audio recordings,” Theory and Practice of Forensic Science, vol. 14, no. 4, pp. 125–136, 2019.
E. N. Gural and M. Pazarci, “A supporting method to detect manipulated zones in digitally edited audio files,” Medicine Science, vol. 7, no. 2, pp. 1–4, 2017.
V. R. C. Putri and Sunarno, “Analisis rekaman suara menggunakan teknik audio forensik untuk keperluan barang bukti digital,” Unnes Physics Journal, vol. 3, no. 1, pp. 50–59, 2014.
S. Camacho, D. M. Ballesteros, and D. Renza, “A cloud-oriented integrity verification system for audio forensics,” Computers & Electrical Engineering, vol. 73, pp. 259–267, 2019.
A. Subki, B. Sugiantoro, and Y. Prayudi, “Membandingkan tingkat kemiripan rekaman voice changer menggunakan analisis pitch, formant dan spectogram,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 5, no. 1, pp. 17–22, 2018.
M. N. Al-Azhar, Audio forensic: Theory and analysis. Pusat Laboratorium Forensik Polri Bidang Fisika dan Komputer Forensik, 2011.
P. Rose, Forensic speaker identification. CRC Press, 2002.
A. L. Suryana, R. El Akbar, and N. Widiyasono, “Investigasi email spoofing dengan metode digital forensics research workshop (dfrws),” Jurnal Edukasi dan Penelitian Informatika (JEPIN), vol. 2, no. 2, pp. 111–117, 2016.
Downloads
Published
Issue
Section
License
Copyright (c) 2021 Sunardi Sunardi, Imam Riadi, Rusydi Umar, Muhammad Fauzan Gustafi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Authors who publish with this journal agree to the following terms:
a. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License - Share Alike that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
b. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
c. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.
USER RIGHTS
All articles published Open Access will be immediately and permanently free for everyone to read and download. We are continuously working with our author communities to select the best choice of license options, currently being defined for this journal as follows: Creative Commons Attribution-Share Alike (CC BY-SA)