Workflow Model Handling Digital Evidence For Multimedia Data

  • Dirman Dirman Universitas Islam Indonesia
  • Yudi Prayudi Universitas Islam Indonesia
  • Erika Ramadhani Universitas Islam Indonesia
Keywords: Workflow, Multimedia Forensics, Design Thinking, BPMN, Multimedia Evidence


Multimedia crime through digital platforms and transmission is a severe and detrimental condition. Nowadays, digital multimedia cases have received much attention, especially in handling multimedia evidence that can be used as an instrument to determine scientific truth in court. In addition, multimedia digital evidence is straightforward to modify using applications that can be used freely so that the authenticity of digital data can be damaged or lost. The challenge faced by investigators in handling multimedia digital evidence is the variable demands for the investigation's validity, handling, documentation, and reporting processes. Like handling procedures in general, digital multimedia case investigations require a workflow so that the investigation stages can be well controlled. This study examines the framework, standard operating procedures, and workflows for handling digital evidence. The results of the mapping and study are used as a workflow model for handling digital evidence for multimedia data by using the design thinking method with the Business Process Model and Notation (BPMN) approach in getting the relationship between actors, digital evidence, and workflows.


[1] Baryamureeba, V., & Tushabe, F. (2004). The enhanced digital investigation process model. Proceedings of the Digital Forensic Research Conference, DFRWS 2004 USA, 1–9.

[2] Wongso, K., Media, D. I., Www, O., Com, K., Wr, U., Dgyhuwlvlqj, L., Iurp, U., Qhzv, W. K. H., Wklv, R. I., Friihh, F. D., & Dqg, V. F. (n.d.). Media ´ By: 4(2).

[3] Patroli Siber. (2020). Https://Patrolisiber.Id/Statistic.

[4] Sunde, N., & Marie, I. (2017). Non-technical Sources of Errors When Handling Digital Evidence within a Criminal Investigation. Department of Information Security and Communication Technology, Master (June 2017), 152.

[5] Kohn, M., & Eloff, J. H. P. (2015). Framework for a Digital Forensic Investigation. January 2006.

[6] Sari, P. L. (2018). Bentuk Kebijakan Amerika Serikat Terhadap Ancaman Cyber Crime China Sebagai Bentuk Upaya Proteksianisme Terhadap Keamanan Nasional.

[7] Caldelli, R., Amerini, I., Picchioni, F., & Innocenti, M. (2010). Fast image clustering of unknown source images. 2010 IEEE International Workshop on Information Forensics and Security, WIFS 2010, 1, 1–5.

[8] Braid, M. (2001). Australian Computer Emergency Response Team Collecting Electronic Evidence After a System Compromise Why Collect Electronic Evidence? 1–13.

[9] Bradlley, S. (2007). Digital Evidence: Representation and Assurance. Thesis, 1–198.

[10] Cohen, F. (2009). Two models of digital forensic examination. 4th International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2009, 1(3), 42–53.

[11] Rogers, M., Goldman, J., Mislan, R., Wedge, T., & Debrota, S. (2006). Computer Forensics Field Triage Process Model. The Journal of Digital Forensics, Security and Law, 1(2), 19–38.

[12] Korolev, S. V., & Kuchanov, S. I. (1982). A Road Map for Digital Forensic Research. Polymer Science U.S.S.R., 24(3), 709–719. 3950(82)90064-8

[13] Perumal, S., & Norwawi, N. (2010). Integrated computer forensic investigation model based on Malaysian standards. International Journal of Electronic Security and Digital Forensics, 3(2), 108–119.

[14] Kent, K., & Souppaya, M. (2006). Guide to Computer Security Log Management. Nist Special Publication.

[15] Lizarti, N., Sugiantoro, B., & Prayudi, Y. (2017). Penerapan Composite Logic Dalam Mengkolaborasikan Framework Terkait Multimedia Forensik. JISKa, 2(1), 26–33.


[17] Nuh Al-Azhar, M. (2012). digital forensics. 302.

[18] SWGDE. (2010). SWGDE-Minimum Requirements for Quality Assurance in the Processing of Digital and Multimedia Evidence, 1, 1–15.
[19] AlShaikh, A., & Sedky, M. (2016). Post Incident Analysis Framework for Automated Video Forensic Investigation. International Journal of Computer Applications, 135(12), 1–7.

[20] Cosic. (2012). Chain of Custody and Life Cycle of Digital Evidence. Computer Technology and Application, 3(2012), 126–129.

[21] Subektiningsih. (2017). Pendekatan BPMN Untuk Pengembangan Digital Forensic Workflow Model Menggunakan Design Science Research Methodology. 169.

[22] Dam, R. F., & Siang, T. Y. (2020). How to Select the Best Idea by the end of an Ideation
Session. Retrieved from.