Simulation Signature-Based Carving Raster Image Using Finite State Automata
Main Article Content
Abstract
Automata is used as the first stage of describing an idea or example to develop a model, be it software or hardware. Theoretically the concept of automata can be used to simulate the signature-based carving process for identification/recovery of raster type image file PNG and GIF. The research and data collection method used is based on a literature study by explaining the Finite State Automata (FSA) concept in simulating the carving process on an image file. This simulation is a simple example of implementing the automata concept. Even though it is only an abstract machine, automata can be used to simulate various other things that will be solved by computation.
Downloads
Article Details
[2] Widyasari, “Telaah Teoritis Finite State Automata Dengan Pengujian Hasil Pada Mesin Otomata,” Sisfotenika, vol. 1, no. 1, pp. 59–67, 2011, [Online]. Available: https://media.neliti.com/media/publications/.
[3] N. Alherbawi, Z. Shukur, and R. Sulaiman, “Systematic Literature Review on Data Carving in Digital Forensic,” Procedia Technol., vol. 11, no. Iceei, pp. 86–92, 2013, doi: 10.1016/j.protcy.2013.12.165.
[4] R. R. Ali, K. M. Mohamad, S. Jamel, and S. K. A. Khalid, “A review of digital forensics methods for JPEG file carving,” J. Theor. Appl. Inf. Technol., vol. 96, no. 17, pp. 5841–5856, 2018.
[5] L. K. Tan, “Image file formats,” Biomed. Imaging Interv. J., vol. 2, no. 1, pp. 1–7, 2006, doi: 10.2349/biij.2.1.e6.
[6] A. Languages, “Theory of computation, automata and languages,” Ife J. Sci., vol. 10, no. 1, pp. 199-206–206, 2008.
[7] “https://www.jflap.org/.” .
[8] M. Zed, Metode Penelitian Kepustakaan. Yayasan Pustaka Obor Indonesia, 2014.
[9] A. Adil, Pengantar Teori Bahasa Formal, Otomata dan Komputasi. DEEPUBLISH, 2018.
[10] A. Ardiansyah, N. Hardi, and W. Gata, “Identifikasi dan Recovery File JPEG dengan Metode Signature-Based Carving dalam Model Automata,” Komputika J. Sist. Komput., vol. 9, no. 1, pp. 75–83, 2020, doi: 10.34010/komputika.v9i1.2733.
[11] D. Povar and V. K. Bhadran, “Forensic Data Carving,” 2011.
[12] E. Alshammary and A. Hadi, “Reviewing and evaluating existing file carving techniques for JPEG files,” Proc. - 2016 Cybersecurity Cyberforensics Conf. CCC 2016, no. October 2017, pp. 55–59, 2016, doi: 10.1109/CCC.2016.21.
[13] B. Schildendorfer, “Carving fragmented JPEG images,” vol. 2012, no. 2742, 2012.

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.