p-Index From 2020 - 2025
8.762
P-Index
This Author published in this journals
All Journal International Journal of Electrical and Computer Engineering TEKNIK INFORMATIKA Media Informatika Seminar Nasional Aplikasi Teknologi Informasi (SNATI) Jurnal Teknik Jurnal Teknologi dan Manajemen Informatika Jurnal Buana Informatika Jurnal Teknologi Informasi dan Ilmu Komputer Jurnal Edukasi dan Penelitian Informatika (JEPIN) JUITA : Jurnal Informatika AJIE (Asian Journal of Innovation and Entrepreneurship) Register: Jurnal Ilmiah Teknologi Sistem Informasi JOIN (Jurnal Online Informatika) Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) SemanTIK : Teknik Informasi JURNAL MEDIA INFORMATIKA BUDIDARMA Network Engineering Research Operation [NERO] Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control IT JOURNAL RESEARCH AND DEVELOPMENT Seminar Nasional Teknologi Informasi Komunikasi dan Industri JRST (Jurnal Riset Sains dan Teknologi) JURNAL ILMIAH INFORMATIKA JURNAL TEKNIK INFORMATIKA DAN SISTEM INFORMASI JURNAL INSTEK (Informatika Sains dan Teknologi) ILKOM Jurnal Ilmiah Jiko (Jurnal Informatika dan komputer) MATRIK : Jurnal Manajemen, Teknik Informatika, dan Rekayasa Komputer J-SAKTI (Jurnal Sains Komputer dan Informatika) JUMANJI (Jurnal Masyarakat Informatika Unjani) Indonesian Journal of Applied Informatics Jurnal Ilmiah Sinus EDUMATIC: Jurnal Pendidikan Informatika JISKa (Jurnal Informatika Sunan Kalijaga) Technologia: Jurnal Ilmiah Infotekmesin Dinasti International Journal of Education Management and Social Science Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) JUSTINDO (Jurnal Sistem dan Teknologi Informasi Indonesia) Cyber Security dan Forensik Digital (CSFD) JATI (Jurnal Mahasiswa Teknik Informatika) JIIP (Jurnal Ilmiah Ilmu Pendidikan) JITU : Journal Informatic Technology And Communication Automata Journal of Education Informatic Technology and Science Just TI (Jurnal Sains Terapan Teknologi Informasi) JURNAL PENDIDIKAN, SAINS DAN TEKNOLOGI Jurnal Teknik Informatika (JUTIF) Phasti: Jurnal Teknik Informatika Politeknik Hasnur J-SAKTI (Jurnal Sains Komputer dan Informatika) Jurnal Abdi Masyarakat Indonesia Indonesian Journal of Networking and Security - IJNS SPEED - Sentra Penelitian Engineering dan Edukasi Reformasi Hukum Jurnal Indonesia Sosial Teknologi Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : AJIE (Asian Journal of Innovation and Entrepreneurship)

Implementasi Steganografi Dengan Menggunakan Metode Masking And Filtering Untuk Menyisipkan Pesan Ke Dalam Spectrogram Audio: Indonesia Kusuma, Permadi; Prayudi, Yudi
Asian Journal of Innovation and Entrepreneurship Volume 09, Issue 01, January 2025
Publisher : UII

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/ajie.vol9.iss1.art1

Abstract

When sending a message to a specific party and do not want the message to be known by other parties, it is important to avoid information leakage. However, the problem identified is that there is a lack of knowledge to detect audio Ste-ganography which requires technical methods that can read and view secret messages. One method that can be used in steganography is Masking and Filtering. Masking as a media marker on audio that can insert messages. Filtering gives value to the parts that have been given a mark.  This method is one that is often used because it is simple, fast in the data insertion process, and has a large enough storage capacity. The Masking and Filtering method is able to hide messages by inserting them into the audio Spectrogram as a storage medium. The filter is used to ensure that the hidden message is within the previously analyzed frequency range, thus making humans unable to clearly hear the additional audio that has been inserted which is the hidden message.  After the insertion is complete, the audio file is saved, and tests are performed to ensure that the audio quality is not compromised, and the hidden message remains undetected such as making modifications to the stego file to test the robustness and security of the hidden message. Based on research, steganography is difficult to detect by the naked eye, to retrieve messages that have been hidden, it can be done by displaying an audio Spectrogram that contains a secret message. How to see the hidden message using the Audacity application that can see sound waves. The result is that the message embedded in the audio is not damaged even though compression, cutting, and some of the processes carried out in the audio have been carried out.
Perbandingan Hasil Recovery File terhadap Penghapusan File menggunakan Perintah Sdelete dan Shift+Delete: indonesia Rosi Rahmadi Syahputra; Prayudi, Yudi
Asian Journal of Innovation and Entrepreneurship Volume 09, Issue 02, May 2025
Publisher : UII

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20885/ajie.vol9.iss2.art5

Abstract

The recovery of deleted data is an important aspect of forensic digital investigations, especially in identifying relevant evidence. However, deletion techniques such as the Sdelete command implement the Department of Defense (DoD) 5220.22-M standard which can permanently delete so that the process of recovering digital evidence from storage media will be difficult, while deletion using Shift+Delete only removes file references without overwriting the data, thus allowing data recovery with file carving techniques. This study uses a static forensic method, where the data in the flash drive has been deleted and acquired using FTK Imager so as to produce an imaging file to maintain the integrity of the evidence. After that, the imaging file is processed using file carving tools. This study aims to compare the results of deleted recovery using the Sdelete command and the Shift + Delete key combination and assess based on the highest percentage of the results of three file carving tools, namely Autopsy, Axiom Magnet, and Photore. The results of the study show that files deleted using Sdelete cannot be recovered by the three tools, both in terms of artifact findings and the suitability of hash values, according to Microsoft's claims. In contrast, files that have been deleted using the Shift + Delete key combination can still be recovered with varying success. PhotoRec has the highest recovery rate (90%), followed by Autopsy (88%) and Axiom Magnet (60%). In terms of hash value suitability, PhotoRec reaches 80%, while Autopsy 76% and Axiom Magnet 50%. These findings confirm that Sdelete is effective in permanently deleting data, while the Shift + Delete combination still allows for recovery with varying success rates. The author hopes that this research can be a new knowledge for digital forensic investigators in terms of selecting the most suitable file carving tools for digital evidence recovery.
Co-Authors - Bambang Sugiantoro, Bambang Sugiantoro - MTI UII Yogyakarta, Zaenudin - UIN Sunan Kalijaga Yogyakarta, Bambang Sugiantoro Abdul Muis Abdul Rohman Supriyono Abdul Rohman Supriyono Achmad Syauqi Adhitya Wishnu Wardhana Adi Fajaryanto Adristi, Fikri Irfan Agung Firmansyah, Rico Agus Wijayanto Agus Wijayanto, Agus Ahmad Luthfi Ahmad Luthfi Ahmad Luthfi Ahmad Luthfie Ahmad Muhariya Ahmad Ridha Kelrey Ahmad Rois Syujak Ahmad Subki - STMIK Mataram Ahmad, Muhammad Sabri Akhmad Muzakka Al Jum'ah, Muhammad Na'im Aloysius Wisnubroto Andrian Sah Ardy Wicaksono Arif Surya Putra Arrochman, Ibnu Fajar Astria Adhi Wijaya azis catur laksono Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro Bambang Sugiantoro - Bambang Sugiantoro CITRA ARFANUDIN Danar Cahyo Prakoso Dedy Frianto Dhomas Hatta Fudholi Dimas Pamilih Epin Andrian Dinda Shafira Gita Islami Dirgahayu, Raden Teduh Dirman Dirman Dita Rahayu Berliana Dodi Prakoso Wibowo Dwi Kurnia Wibowo Erika Ramadhani Erika Ramadhani Ermadi Satriya Wijaya Fajaryanto, Adi Fauzan Natsir Fetyata Yudha Fietyata Yudha Firdaus, Jasmine Erina Fitriyanti S Fudholi, Dhomas Hatta Giffary, Farhan Wildan Helmi Rachman Ibnu Fajar Arrochman Idham Halik Ilman Pradhana Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Imam Riadi Isriade Putra Ivany Hikmatunnisa' Iwan Aprizal Jidan Dj. Tamu, Zulhair Kharisma Mahesa Koes Wiyatmoko Kun Saidi Kusuma, Permadi Lilik Widyawati Madi, Permadi Kusuma Mahmud, Rifqi Mardlatillah, Hanifah Merisa Kurniasari Fadilla Moch Bagoes Pakarti Moh Fadly Panende Muh. Ditra Pamungkas Muhamad Maulana Muhammad Khairul Faridi Muhammad Naufal Bahreisy Muhammad Nur Adhar Muhammad Zulfadhilah Muzammilatul Wachidah Nafila, Feryan Lutfie NANNY, NANNY Nora Lizarti Nukman Nukman Nurhayati Jiatmiko Nurmi Hidayasari Nuryasin, Ilyas Pahrul Irfan Pomalingo, Suwito Prakoso, Danar Cahyo Putry Wahyu Setyaningsih R, Zulihsan Rachman, Helmi Raharjo, Toto Rahmat Inggi Ramadhan, Arya Danuarta Ramadhani, Erika Ramansyah Ramansyah Ridho Rahmadi Rio Pradana Aji Ririn Anggraini Rosi Rahmadi Syahputra Rosidin Al Caruban Ruuhwan Ruuhwan Setiawan, Mukhammad Andri Sisdarmanto Adinandra, Sisdarmanto Siti Kartika Munawarah Subki, Ahmad Sudinugraha, Tri Supriyono, Abdul Rohman Syarif Hidayat Teduh Dirgahayu Tino Feri Efendi Triawan Adi Cahyanto Verry Noval Kristanto Virjayanti Lazinu Wachidah, Muzammilatul Wafi, Muhammad Syafiq Wisnu Pranoto Wisnu Pranoto Wisnu Sanjaya Yasir Muin