OPTIMALISASI PENYUSUTAN EXIF METADATA DENGAN TEKNIK SUBSTITUSI NULL VALUE PADA KASUS KEAMANAN CITRA DIGITAL

Hendro Wijayanto, Iwan Ady Prabowo, Paulus Harsadi

Abstract


Data and information security technique is a way to keep an object confidential. eXchangable Image File Format (EXIF) Metadata is data information about digital image. In the digital forensic investigation, this is very useful for copyright security or safeguarding digital evidence. Steganography and cryptography techniques have been widely used to overcome these problem. However, from the research that has been done in terms of security EXIF of metadata digital image photography, there are still some weaknesses. Among them is the depreciation of the digital image size after decryption. Since the standard EXIF metadata treatmens released by JEIDA and CIPA have different characteristic with JFIF metadata. A null value will be deemed to be the content with a value of 1 in EXIF standard. While in JFIF metadata model, the value of null is considered to be worth 0 (zero). This is make the EXIF metadata security process is shrinking of -25,15% from the original size. With the optimizing null value before encryption, the same metadata will be obtained between original image and after decryption. The null value will be replaced with an empty string (it’s worth 1) before encryption. Results from the model obtained an average of -1,51% depreciation of the original digital image size.Therefore, this technique can optimize the digital image copyright protection.


Keywords


substitution; EXIF; optimization; metadata; security; image forensic

Full Text:

PDF

References


Casey, E. (2011). Digital Evidance And Computer Crime. Computer.

CIPA (Camera & Imaging Product Association). (2012). CIPA DC- 008 - Translation - 2012.

Huang, H. C., & Fang, W. C. (2010). Metadata-based image watermarking for copyright protection. Simulation Modelling Practice and Theory, 18(4), 436–445. https://doi.org/10.1016/j.simpat.2009.09.004

JEIDA (Japan Electronic Industries Development Association). (2012). Metadata reference tables Standard Exif Tags.

Ltd, N. 2000. (2000). Data Masking : What You Need to Know. A Net 2000 Ltd. White Paper, 25.

McMicken, B. (2014). Using EXIF Metadata. International Crime Scene Investigators Association, 1–20.

Raghavan, S., & Raghavan, S. V. (2014). Eliciting file relationships using metadata based associations for digital forensics. CSI Transactions on ICT, 2(1), 49–64. https://doi.org/10.1007/s40012-014-0046-4

Sencar, H. T., & Memon, N. (2009). Identification and recovery of JPEG files with missing fragments. Digital Investigation, 6(SUPPL.), 88–98. https://doi.org/10.1016/j.diin.2009.06.007

Wijayanto, H., Riadi, I., & Prayudi, Y. (2016). Encryption EXIF Metadata for Protection Photographic Image of Copyright Piracy. International Journal of Research in Computer and Communication Technology, 5(5), 237–242.

Zhou, H., Shen, Y., Zhu, X., Liu, B., Fu, Z., & Fan, N. (2016). Digital image modification detection using color information and its histograms. Forensic Science International, 266, 379–388. https://doi.org/10.1016/j.forsciint.2016.06.005




DOI: http://dx.doi.org/10.30646/sinus.v16i1.327

Refbacks

  • There are currently no refbacks.


 


STMIK Sinar Nusantara

KH Samanhudi 84 - 86 Street, Laweyan Surakarta, Central Java, Indonesia
Postal Code: 57142, Phone & Fax: +62 271 716 500 

Email: ejurnal @ sinus.ac.id | https://p3m.sinus.ac.id/jurnal/e-jurnal_SINUS/

ISSN: 1693-1173 (print) | 2548-4028 (online)


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.

View My Stats