Mobile and Forensics http://journal2.uad.ac.id/index.php/mf <div id="content"> <div id="group"> <div id="content"> <div id="group"> <div class="member"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div id="journalDescription"> <div> <p><strong>Mobile and Forensics (MF)</strong>, ISSN: <a href="https://portal.issn.org/resource/ISSN/2656-6257" target="_blank" rel="noopener">2656-6257</a> E-ISSN:<a href="https://portal.issn.org/resource/ISSN/2714-6685" target="_blank" rel="noopener">2714-6685</a> ,is a international peer-reviewed open access journal organized by the Department of Magister Informatika, Universitas Ahmad Dahlan. It is a <strong>semi-annual journal</strong> published in <strong>March and September.</strong> The main objective of the publication is to create a platform to publish original articles, researches results, case studies, and book reviews related to the field of Mobile Technology and Digital Forensics. The editorial board welcomes original contributions of the author in English which never been published or under consideration for publication in any other publication. All publications are available in full text and are free to download.</p> </div> </div> </div> <table class="m_1585562839703316051image_block" style="width: 100%;" border="0" cellspacing="0" cellpadding="10"> <tbody> <tr> <td> <div style="line-height: 10px;" align="center"><img style="height: auto; display: block; border: 0; max-width: 225px; width: 50%;" src="http://journal2.uad.ac.id/public/site/images/aazhari/cover-mf.jpg" alt="" width="225" /></div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="text-align: center; width: 100%; padding: 0 10px 5px 10px;"> <h2 style="margin: 0; color: #555; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 21px; font-weight: bold; letter-spacing: normal; line-height: 120%; text-align: left; margin-top: 0; margin-bottom: 0;">Mobile and Forensics</h2> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 5px 10px;"> <div style="color: #101112; direction: ltr; font-family: Arial,Helvetica,sans-serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 120%; text-align: left;"> <p style="margin: 0;"><em>Open Access <img src="https://cfp.iaesprime.com/BEEI/open.png" alt="" /> </em></p> </div> </td> </tr> </tbody> </table> <table style="word-break: break-word; width: 100%;" border="0" cellspacing="0" cellpadding="0"> <tbody> <tr> <td style="padding: 0 10px 0 10px;"> <div style="color: #101112; direction: ltr; font-family: Georgia,Times,'Times New Roman',serif; font-size: 16px; font-weight: 400; letter-spacing: 0; line-height: 140%; text-align: left;"> <p style="margin: 0;">Publisher:Universitas Ahmad Dahlan (UAD)<br />ISSN: 2656-6257 E-ISSN:2714-6685<br />Subject area:</p> </div> </td> </tr> </tbody> </table> <table style="width: 100%;" border="0" cellspacing="0" cellpadding="5"> <tbody> <tr> <td> <div align="left"> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Computer Science: Cybersecurity and Computer forensics</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Networks and Communications</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Artificial intelligence</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 11px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word; line-height: 0p;">Computer Science: Image Processing &amp; computer vision</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Internet of Things</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Computer Science: Computer Science (miscellaneous)</span></span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"><span style="word-break: break-word;">Engineering: Software Engineering</span> </span></div> <div style="text-decoration: none; display: inline-block; color: #000; background-color: transparent; border-radius: 15px; width: auto; font-weight: 400; padding-top: 0; padding-bottom: 0; font-family: Arial,Helvetica,sans-serif; font-size: 10px; text-align: center; word-break: keep-all; border: 1px solid #257633;"><span style="padding-left: 5px; padding-right: 5px; font-size: 10px; display: inline-block; letter-spacing: normal;"> <span style="word-break: break-word;">Engineering: Electronics Engineering</span></span></div> </div> </td> </tr> </tbody> </table> <table style="border-collapse: collapse; width: 100%;" border="0"> <tbody> <tr> <td style="width: 24%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="http://journal2.uad.ac.id/index.php/mf/submission/wizard" target="_blank" rel="noopener" data-saferedirecturl="http://journal2.uad.ac.id/index.php/mf/submission/wizard"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/submit.png" alt="" width="135" /> </a></td> <td style="width: 76%; padding-left: 10px; padding-top: 15px;"><a style="outline: 0;" href="https://docs.google.com/document/d/1Fz_SHzAGe4RrB1wFwSawENCSFCwGSU73/edit?usp=sharing&amp;ouid=104327450475612404767&amp;rtpof=true&amp;sd=true" target="_blank" rel="noopener" data-saferedirecturl="https://iaescore.com/gfa/beei.docx"> <img style="height: auto; display: block; border: 0; max-width: 135px; width: 100%;" src="https://cfp.iaesprime.com/BEEI/docx.png" alt="" width="135" /> </a></td> </tr> </tbody> </table> <div id="additionalHomeContent"> <p> </p> </div> <div id="additionalHomeContent"> <p><strong>Mobile Forensics has been cited by <a href="https://www.scopus.com/results/results.uri?src=dm&amp;sort=plf-f&amp;st1=%22Mobile+and+Forensics%22&amp;st2=%22Mob.+Forensics%22&amp;sid=0bc95bcb81b6dd3473c4963df21dafee&amp;sot=b&amp;sdt=b&amp;sl=54&amp;s=%28REF%28%22Mobile+and+Forensics%22%29+OR+REF%28%22Mob.+Forensics%22%29%29&amp;cl=t&amp;ss=plf-f&amp;ws=r-f&amp;ps=r-f&amp;cs=r-f&amp;origin=resultslist&amp;zone=queryBar&amp;sessionSearchId=0bc95bcb81b6dd3473c4963df21dafee&amp;limit=10" target="_blank" rel="noopener">SCOPUS Journal (Need Login)</a>: </strong></p> <ul> <li><strong>Emerging Science Journal (Q1)</strong></li> <li><strong>Clinical Practice and Epidemiology in Mental Health (Q2)</strong></li> <li><strong>Journal of Robotics and Control (Q3)</strong></li> <li><strong>Applied Computer Science (Q3)</strong></li> <li><strong>International Journal on Smart Sensing and Intelligent Systems (Q3)</strong></li> <li><strong>International Journal of Sustainable Development and Planning (Q3)</strong></li> <li><strong>International Journal of Safety and Security Engineering (Q3)</strong></li> <li><strong>Advances in Intelligent Systems and Computing (Q4)</strong></li> <li><strong>Journal of Applied Data Sciences</strong></li> <li><strong>AIP Conference Proceedings</strong></li> <li><strong>ACM International Conference Proceeding Series</strong></li> <li><strong>International Conference on Engineering, Science and Advanced Technology, ICESAT </strong></li> <li><strong>International Conference on Artificial Intelligence in Information and Communication, ICAIIC </strong></li> <li><strong>International Conference on Cybernetics and Intelligent Systems, ICORIS</strong></li> <li><strong>International Conference on Science in Information Technology, ICSITech</strong></li> </ul> <p><iframe style="border: 0px #ffffff none;" src="https://author.my.id/widget/statistik.php?sinta=8108&amp;gs=NDzfOxEAAAAJ&amp;sc=13" name="statistik" width="800px" height="115px" frameborder="0" marginwidth="0px" marginheight="0px" scrolling="no"></iframe></p> <p><iframe id="datawrapper-chart-XCjD9" style="width: 0; min-width: 100% !important; border: none;" title="Mobile and Forensics Author's Diversity" src="https://datawrapper.dwcdn.net/XCjD9/1/" height="367" frameborder="0" scrolling="no" aria-label="Map" data-external="1"></iframe></p> </div> </div> </div> </div> </div> </div> </div> </div> Universitas Ahmad Dahlan en-US Mobile and Forensics 2656-6257 <p><strong>Start from 2019 issues, authors who publish with JURNAL MOBILE AND FORENSICS agree to the following terms:</strong></p> <ol start="1"> <li>Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" target="_blank" rel="noopener">Creative Commons Attribution License (CC BY-SA 4.0)</a> that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.</li> <li>Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.</li> <li>Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.</li> </ol> <p> </p> <p><a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license"><img src="https://i.creativecommons.org/l/by-sa/4.0/88x31.png" alt="Creative Commons License" /></a><br />This work is licensed under a <a href="http://creativecommons.org/licenses/by-sa/4.0/" rel="license">Creative Commons Attribution-ShareAlike 4.0 International License</a>.</p> Image Forensics Using Error Level Analysis and Block Matching Methods http://journal2.uad.ac.id/index.php/mf/article/view/5719 <p>The development of image editing tools today makes everyone able to manipulate images easily so that many images are doubtful of their authenticity. The current image can be used as evidence in a legal case in court. The authenticity of the image is a topic that many have tried to solve various studies. This study discusses the authenticity of the image using the Error Level Analysis (ELA) method to determine the authenticity of the image, especially in the JPEG image. Block Matching is used in the process of dividing an image into several square or block parts. The ELA method has been successfully implemented with 95% image compression resulting in MSE and PSNR values ​​in distinguishing the edited image. The average MSE is 23.8 dB and the average PSNR is 34.47 dB. Block Matching results as a whole show that the pixel value for x values ​​that reach 30 there are 9 images, x values ​​that reach 24 there are 9 images, x values ​​that reach 23 there are 1 image, and for x values ​​that reach 19 there is 1 image. The result of pixel (y) of all images exceeds the value of 12 which in pixel (y) undergoes many changes marked by the presence of white spots.</p> Iis Sudianto Nuril Anwar Copyright (c) 2024 Iis Sudianto, Nuril Anwar https://creativecommons.org/licenses/by-sa/4.0 2024-08-08 2024-08-08 6 2 51 60 10.12928/mf.v6i2.5719 Identification of Plasmodium Vivax in Blood Smear Images Using Otsu Thresholding Algorithm http://journal2.uad.ac.id/index.php/mf/article/view/11261 <div class="page" title="Page 1"> <div class="layoutArea"> <div class="column"> <p>In this research, we explore the efficacy of Convolutional Neural Networks (CNN) and Support Vector Machines (SVM) in identifying Plasmodium vivax from blood smear images. We utilized a dataset comprising images of Plasmodium vivax and non-infected cells, applying CNN for deep feature extraction and SVM with otsu’s thresholding for segmentation. The dataset was preprocessed and augmented to enhance model performance. The CNN architecture, consisting of multiple convolutional and dense layers, achieved an accuracy of 98.46% on the validation set. For comparison, features extracted using Otsu’s Thresholding were fed into an SVM classifier, yielding an accuracy of 82%. Confusion matrix was generated to evaluate the classification performance of both models. The CNN model demonstrated superior accuracy and robustness in classification tasks compared to the SVM model. This research shows how deep learning frameworks can be used to analyse medical images and how important it is to have methods for extracting and choosing features to make machine learning models work better.</p> </div> </div> </div> Nurul Huda Latifathul Aulia Maulany Citra Pandini Copyright (c) 2024 Nurul Huda, Aulia, Citra https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 6 2 61 73 10.12928/mf.v6i1.11261 National Institute of Standard Technology Approach for Steganography Detection on WhatsApp Audio Files http://journal2.uad.ac.id/index.php/mf/article/view/11287 <p><em>Audio steganography in instant messaging applications such as WhatsApp poses new challenges in the field of digital security, especially due to the ability to hide data in frequently used formats. This research examines the effectiveness of steganography detection on WhatsApp audio files by applying a method developed by the National Institute of Standards and Technology (NIST). This approach was chosen due to its reputation in security testing standards, but its use in the context of audio steganography on instant messaging platforms has not been widely explored. The novelty of this research lies in the adaptation of the NIST method specifically for audio steganography analysis in WhatsApp, which includes testing against various compression and end-to-end encryption scenarios. The main findings of this research show that the NIST method successfully improves the accuracy of hidden message detection compared to conventional steganalysis techniques, especially under the condition of compressed audio files. In addition, this research also found that the integration of the NIST method enables more effective detection of steganographic data in encrypted audio files. These results confirm that the NIST method can be successfully adapted for instant messaging applications such as WhatsApp, making a significant contribution in the improvement of digital security. This research not only identifies weaknesses in existing steganography techniques, but also introduces a new framework for more accurate and efficient detection in encrypted environments.</em></p> Abdul Haris Muhammad Gamaria Mandar Copyright (c) 2024 Abdul Haris Muhammad, Gamaria Mandar https://creativecommons.org/licenses/by-sa/4.0 2024-09-18 2024-09-18 6 2 74 82 10.12928/mf.v6i2.11287 Rediscover Story Of Muhammadiyah Through 3D Game By Applying Game Development Life Cycle http://journal2.uad.ac.id/index.php/mf/article/view/11388 <p>Though specifically in Indonesia, Muhammadiyah is already well known but there are still some who do not know their history. This makes people that do not know about Muhammadiyah and the history behind it to make unfounded assumptions about the Islamic refined organization. The purpose is to make an educational game based on Muhammadiyah Museum to further increase the wisdom of players about Muhammadiyah’s history and also to remember and know the history behind each artifact is visualized in form of a game to increase the player’s knowledge. The game development for players will be developed using the Game Development Life Cycle (GDLC) methodology and mostly the modelling technique that will be used is mesh modelling technique in Blender. Each step of this methodology is fitting for the game development and the step might be skipped or swapped according to the needs of research. There are 2 black box tests conducted, the first black box test that has 15 functions result is 47% in accordance with several bugs found which was fixed in the second black box test that resulted 87% in accordance, 13% not in accordance because of the feature was not yet implemented but listed in the main menu. The second test conducted which results and practicality of this educational game using the System Usability Scale (SUS) which consists of 10 instrument statements were scored 85.3 which means that this educational game was declared excellent and acceptable.</p> Achmad Nur Hafizh Ahmad Azhari Copyright (c) 2024 Achmad Nur Hafizh, Ahmad Azhari https://creativecommons.org/licenses/by-sa/4.0 2024-09-20 2024-09-20 6 2 34 51 10.12928/mf.v6i2.11388 Hybrid ABC–K Means for Optimal Cluster Number Determination in Unlabeled Data http://journal2.uad.ac.id/index.php/mf/article/view/11529 <p><em>This study presents the ABC K Means GenData algorithm, an enhancement over traditional K Means clustering that integrates the Artificial Bee Colony (ABC) optimization approach. The ABC K Means GenData algorithm addresses the issue of local optima commonly encountered in standard K Means algorithms, offering improved exploration and exploitation strategies. By utilizing the dynamic roles of employed, onlooker, and scout bees, this approach effectively navigates the clustering space for categorical data. Performance evaluations across several datasets demonstrate the algorithm's superiority. For the Zoo dataset, ABC K Means GenData achieved high Accuracy (0.8399), Precision (0.8089), and Recall (0.7286), with consistent performance compared to K Means and Fuzzy K Means. Similar results were observed for the Breast Cancer dataset, where it matched the Accuracy and Precision of K Means and surpassed Fuzzy K Means in Precision and Recall. In the Soybean dataset, the algorithm also performed excellently, showing top scores in Accuracy, Precision, Recall, and Rand Index (RI), outperforming both K Means and Fuzzy K Means.. The comprehensive results indicate that ABC K Means GenData excels in clustering categorical data, providing robust and reliable performance. Future research will explore its application to mixed data types and social media datasets, aiming to further optimize clustering techniques.</em></p> <p><em>.</em></p> Harunur Rosyid Muhammad Modi bin Lakulu Ramlah bt. Mailok Copyright (c) 2024 harunur rosyid, Muhammad Modi bin Lakulu, Ramlah bt. Mailok https://creativecommons.org/licenses/by-sa/4.0 2024-09-30 2024-09-30 6 2 52 65 10.12928/mf.v6i2.11529 Design Job Vacancy Website Using The Laravel Framework http://journal2.uad.ac.id/index.php/mf/article/view/5644 <p><em>Job vacancies are the most sought after during the current COVID-19 pandemic—the number of layoffs by companies experiencing problems in their business. Many people become unemployed, and income levels decrease while their needs must still be met. This has an impact on the number of people looking for job vacancies. Often found job seekers and job seekers seeking information still through mass media, banners, posters, billboards, and word of mouth. This search and recruitment model will not be efficient and will not be right on target. The solution offered to overcome these problems is to create a website for job vacancies, recruitment, and job applications. The research method used is Rapid Application Development (RAD) to find out the website creation process carried out in a short and influential period. The research flow is looking for references, determining project needs by making UI design and database design, making prototypes, testing, refining, developing features, feedback questionnaires, and project implementation. This research resulted in a job vacancy website called "AntiNggur". This website is expected to facilitate the dissemination of information on job vacancies, the job search process, and the process of recruiting new workers that are more effective and more targeted.</em></p> Moch Farid Fauzi Govin Yudian Pradipta Deny Setiyawan Muhammad Nur Ichsan Dzaki Ahsana Reyhandhipa Copyright (c) 2024 Moch Farid Fauzi, Govin Yudian Pradipta, Deny Setiyawan, Muhammad Nur Ichsan, Dzaki Ahsana Reyhandhipa https://creativecommons.org/licenses/by-sa/4.0 2024-10-26 2024-10-26 6 2 66 74