Audio Forensics on Smartphone with Digital Forensics Research Workshop (DFRWS) Method

Authors

DOI:

https://doi.org/10.21512/commit.v15i1.6739

Keywords:

Audio Forensics, Smartphone, Digital Forensics Research Workshop (DFRWS)

Abstract

Audio is one of the digital items that can reveal a happened case. However, audio evidence can also be manipulated and changed to hide information. Forensics audio is a technique to identify the sound’s owner from the audio using pitch, formant, and spectrogram parameters. The conducted research examines the similarity of the original sound with the manipulated voice to determine the owner of the sound. It analyzes the level of similarity or identical sound using spectrogram analysis with the Digital Forensics Research Workshop (DFRWS) Method. The research objects are original and manipulated files. Both files are in mp3 format, which is encoded to WAV format. Then, the live forensics method is used by picking up the data on a smartphone. Several applications are also used. The results show that the research successfully gets digital evidence on a smartphone with the Oxygen Forensic application. It extracts digital evidence in the form of two audio files and two video files. Then, by the hashing process, the four obtained files are proven to be authentic. Around 90% of the data are identical to the original voice recording. Only 10% of the data are not identical.

Dimensions

Plum Analytics

Author Biographies

Sunardi Sunardi, Universitas Ahmad Dahlan

Department of Electrical Engineering

Imam Riadi, Universitas Ahmad Dahlan

Department of Information System

Rusydi Umar, Universitas Ahmad Dahlan

Department of Informatics

Muhammad Fauzan Gustafi, Ahmad Dahlan University

Department of Informatics

References

A. P. U. Siahaan, “Pelanggaran cybercrime dan kekuatan yurisdiksi di Indonesia,” Jurnal Teknik dan Informatika, vol. 5, no. 1, pp. 6–9, 2018.

N. Alsaidi, M. Alshareef, A. Alsulami, M. Alsafri, and A. Aljahdali, “Digital steganography in computer forensics,” International Journal of Computer Science and Information Security (IJCSIS), vol. 18, no. 5, pp. 54–61, 2020.

A. Wicaksono, S. Adinandra, and Y. Prayudi, “Penggabungan metode Itakura Saito Distance dan Backpropagation Neural Network untuk peningkatan akurasi suara pada audio forensik,”JUITA: Jurnal Informatika, vol. 8, no. 2, pp. 225–233, 2020.

H. Wu, Y. Wang, and J. Huang, “Identification of electronic disguised voices,” IEEE Transactions on Information Forensics and Security, vol. 9, no. 3, pp. 489–500, 2014.

V. A. Hadoltikar, V. R. Ratnaparkhe, and R. Kumar, “Optimization of MFCC parameters for mobile phone recognition from audio recordings,” in 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). Coimbatore, India: IEEE, June 12–14, 2019, pp. 777–780.

R. B¨ohme, F. C. Freiling, T. Gloe, and M. Kirchner, “Multimedia forensics is not computer forensics,”in International Workshop on Computational Forensics. Springer, 2009, pp. 90–103.

A. C. K. Wardana, R. Pedrason, and T. B. Prasetyo, “Implementasi digital forensik Brunei Darussalam dalam membangun keamanan siber,”Peperangan Asimetrik, vol. 4, no. 1, pp. 1–22, 2018.

I. O. Ademu, C. O. Imafidon, and D. S. Preston, “A new approach of digital forensic model for digital forensic investigation,” (IJACSA) International Journal of Advanced Computer Science and Applications, vol. 2, no. 12, pp. 175–178, 2011.

I. Zuhriyanto, A. Yudhana, and I. Riadi, “Analisis perbandingan tools forensic pada aplikasi Twitter menggunakan metode Digital Forensics Research Workshop,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 5, pp. 829–836, 2020.

I. Riadi, R. Umar, and A. Firdonsyah, “Forensic tools performance analysis on Android-based Blackberry Messenger using NIST measurements,”International Journal of Electrical and Computer Engineering, vol. 8, no. 5, pp. 3991–4003, 2018.

A. Al-Sabaawi and E. Foo, “A comparison study of Android mobile forensics for retrieving files system,” International Journal of Computer Science and Security (IJCSS), vol. 13, no. 4, pp. 148–166, 2019.

A. Wirara, B. Hardiawan, and M. Salman, “Identifikasi bukti digital pada akuisisi perangkat mobile dari aplikasi pesan instan “WhatsApp”,”Teknoin, vol. 26, no. 1, pp. 66–74, 2020.

R. Umar, A. Yudhana, and M. N. Faiz, “Experimental analysis of web browser sessions using live forensics method,” International Journal of Electrical and Computer Engineering (IJECE), vol. 8, no. 5, pp. 2951–2958, 2018.

W. Jansen and R. Ayers, “Guidelines on cell phone forensics,” NIST Special Publication, vol. 800, no. 101, pp. 1–104, 2007.

I. Riadi, Sunardi, and P. Widiandana, “Investigasi cyberbullying pada Whatsapp menggunakan Digital Forensics Research Workshop,”RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 4, no. 4, pp. 730–735, 2020.

R. R. Huizen, N. K. D. A. Jayanti, and D. P. Hostiadi, “Model evaluasi rekaman percakapan di 46 audio forensik,” Jurnal Sistem dan Informatika (JSI), vol. 11, no. 2, pp. 133–140, 2017.

A. G. Boyarov and I. S. Siparov, “Forensic investigation of MP3 audio recordings,” Theory and Practice of Forensic Science, vol. 14, no. 4, pp. 125–136, 2019.

E. N. Gural and M. Pazarci, “A supporting method to detect manipulated zones in digitally edited audio files,” Medicine Science, vol. 7, no. 2, pp. 1–4, 2017.

V. R. C. Putri and Sunarno, “Analisis rekaman suara menggunakan teknik audio forensik untuk keperluan barang bukti digital,” Unnes Physics Journal, vol. 3, no. 1, pp. 50–59, 2014.

S. Camacho, D. M. Ballesteros, and D. Renza, “A cloud-oriented integrity verification system for audio forensics,” Computers & Electrical Engineering, vol. 73, pp. 259–267, 2019.

A. Subki, B. Sugiantoro, and Y. Prayudi, “Membandingkan tingkat kemiripan rekaman voice changer menggunakan analisis pitch, formant dan spectogram,” Jurnal Teknologi Informasi dan Ilmu Komputer (JTIIK), vol. 5, no. 1, pp. 17–22, 2018.

M. N. Al-Azhar, Audio forensic: Theory and analysis. Pusat Laboratorium Forensik Polri Bidang Fisika dan Komputer Forensik, 2011.

P. Rose, Forensic speaker identification. CRC Press, 2002.

A. L. Suryana, R. El Akbar, and N. Widiyasono, “Investigasi email spoofing dengan metode digital forensics research workshop (dfrws),” Jurnal Edukasi dan Penelitian Informatika (JEPIN), vol. 2, no. 2, pp. 111–117, 2016.

Downloads

Published

2021-03-20
Abstract 1002  .
PDF downloaded 969  .