Published: 2025-10-01
Teknik Forensika Digital untuk Investigasi Pesan Sekali Lihat (View Once) pada Aplikasi Instant Messenger
DOI: 10.35870/jtik.v9i4.4223
Gilang Ramadhan, Yudi Prayudi
- Gilang Ramadhan: Universitas Islam Indonesia , Indonesia
- Yudi Prayudi: Universitas Islam Indonesia
Article Metrics
- Views 0
- Downloads 0
- Scopus Citations
- Google Scholar
- Crossref Citations
- Semantic Scholar
- DataCite Metrics
-
If the link doesn't work, copy the DOI or article title for manual search (API Maintenance).
Abstract
The popularity of Instant Messaging apps encourages developers to improve features and security, especially data privacy. However, these improvements also potentially bring risks to users. One of the most popular new features is ‘one-look messages’ to maintain sender privacy. This feature allows messages to disappear once viewed, irrevocably and has been implemented on apps such as Snapchat, Instagram, and WhatsApp. The purpose of this research is to provide a reference on the reliability of digital forensic Tools in uncovering cybercrime. Thus, it is expected that the digital evidence obtained has strong integrity, reliability and legality to be used in the legal process. This research adopts the framework of the National Institute of Standards and Technology (NIST) and analyzes a cybercrime scenario in the form of sending files using the one-look message feature, utilizing the Magnet Axiom digital forensics tool. This research also uses a smartphone with root conditions that have Snapchat, Instagram and WhatsApp applications installed. The results of this study show that with a root smartphone, the use of Axiom magnet forensic Tools is able to acquire and analyze files sent using the one-look feature and obtain 13 digital evidence from 18 scenarios created. There is not much research that discusses the latest features of Instant Messaging applications, with this paper it can provide a little description of the Sekalin see feature and can be developed in the next paper.
Keywords
Instant Messenger ; View Once ; Anti Forensic ; Digital Forensik ; Mobile Forensik ; NIST
Article Metadata
Peer Review Process
This article has undergone a double-blind peer review process to ensure quality and impartiality.
Indexing Information
Discover where this journal is indexed at our indexing page to understand its reach and credibility.
Open Science Badges
This journal supports transparency in research and encourages authors to meet criteria for Open Science Badges by sharing data, materials, or preregistered studies.
How to Cite
Article Information
This article has been peer-reviewed and published in the Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi). The content is available under the terms of the Creative Commons Attribution 4.0 International License.
-
Issue: Vol. 9 No. 4 (2025)
-
Section: Computer & Communication Science
-
Published: %750 %e, %2025
-
License: CC BY 4.0
-
Copyright: © 2025 Authors
-
DOI: 10.35870/jtik.v9i4.4223
AI Research Hub
This article is indexed and available through various AI-powered research tools and citation platforms. Our AI Research Hub ensures that scholarly work is discoverable, accessible, and easily integrated into the global research ecosystem. By leveraging artificial intelligence for indexing, recommendation, and citation analysis, we enhance the visibility and impact of published research.
Gilang Ramadhan
Program Studi Informatika, Program Magister, Fakultas Teknik Industri, Universitas Islam Indonesia, Kabupaten Sleman, Daerah Istimewa Yogyakarta, Indonesia.
-
Arsyad, J. H. (2022). Perlindungan hukum korban kekerasan berbasis gender online (KBGO) dalam hukum positif Indonesia. Jurnal Cakrawala Informasi, 2(2), 26–41. https://doi.org/10.54066/jci.v2i2.241.
-
-
Aziz, M. A., Sulistyo, W. Y., & Astari, S. R. (2021). Komparatif anti forensik aplikasi instant messaging berbasis web menggunakan metode Association of Chief Police Officers (ACPO). JURISTIK (Jurnal Riset Teknologi Informasi dan Komputer), 1(01), 8–15. https://doi.org/10.53863/juristik.v1i01.341.
-
Harahap, D. P. (2023). Implementasi digital forensik aplikasi dompet digital dan pesan instan pada Android dengan menggunakan metode NIST. KOMIK (Konferensi Nasional Teknologi Informasi dan Komputer), 6(1), 533–541. https://doi.org/10.30865/komik.v6i1.5715.
-
Kustian, M. A. (2023). Analisis forensik penggunaan fungsi hash dalam menentukan keaslian video, metadata image dan magic number file. Jurnal Sains, Nalar, dan Aplikasi Teknologi Informasi, 2(2), 10–16. https://doi.org/10.20885/snati.v2i2.21.
-
Majalista, R., & Sutabri, T. (2023). Analisis Pencarian Data Smartphone Menggunakan Nist untuk Penyelidikan Digital Forensik. Jurnal Informatika Teknologi dan Sains (Jinteks), 5(1), 81-85. https://doi.org/10.51401/jinteks.v5i1.2200.
-
-
-
Plianda, I. A., & Indrayani, R. (2022). Analisa dan perbandingan performa tools forensik digital pada smartphone Android menggunakan Instant Messaging WhatsApp. Jurnal Media Informatika Budidarma, 6(1), 500. https://doi.org/10.30865/mib.v6i1.3487.
-
Putra, G. A. A. P., Sukerti, N. K., & Putri, N. M. D. K. (2024, October). Simulasi Investigasi pada FlashDisk dalam Mengungkap Pesan pada Kasus Perdagangan Narkoba Menggunakan Metode Steganografi. In Seminar Hasil Penelitian Informatika dan Komputer (SPINTER)| Institut Teknologi dan Bisnis STIKOM Bali (Vol. 1, No. 3, pp. 340-345).
-
Qibriya, M. R. D., Ambarwati, A., & Susilo, K. E. (2021). Analisis forensik digital pada aplikasi instant messaging di smartphone berbasis Android untuk bukti digital. Jurnal Teknologi Informasi, 5(2), 114–121. https://doi.org/10.36294/jurti.v5i2.2200.
-
Rafiq, I. A., Riadi, I., & Herman. (2022). Perbandingan forensic tools pada Instagram menggunakan metode NIST. JISKA (Jurnal Informatika Sunan Kalijaga), 7(2), 134–142. https://doi.org/10.14421/jiska.2022.7.2.134-142.
-
-
Wirara, A., Hardiawan, B., & Salman, M. (2020). Identifikasi Bukti Digital pada Akuisisi Perangkat Mobile dari Aplikasi Pesan Instan “WhatsApp”. Teknoin, 26(1), 66-74. https://doi.org/10.20885/teknoin.vol26.iss1.art7.
-
Yel, M. B., & Nasution, M. K. M. (2022). Keamanan informasi data pribadi pada media sosial. Jurnal Informatika Kaputama, 6(1), 92–101. https://doi.org/10.59697/jik.v6i1.144.

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
1. Copyright Retention and Open Access License
Authors retain copyright of their work and grant the journal non-exclusive right of first publication under the Creative Commons Attribution 4.0 International License (CC BY 4.0).
This license allows unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
2. Rights Granted Under CC BY 4.0
Under this license, readers are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, including commercial use
- No additional restrictions — the licensor cannot revoke these freedoms as long as license terms are followed
3. Attribution Requirements
All uses must include:
- Proper citation of the original work
- Link to the Creative Commons license
- Indication if changes were made to the original work
- No suggestion that the licensor endorses the user or their use
4. Additional Distribution Rights
Authors may:
- Deposit the published version in institutional repositories
- Share through academic social networks
- Include in books, monographs, or other publications
- Post on personal or institutional websites
Requirement: All additional distributions must maintain the CC BY 4.0 license and proper attribution.
5. Self-Archiving and Pre-Print Sharing
Authors are encouraged to:
- Share pre-prints and post-prints online
- Deposit in subject-specific repositories (e.g., arXiv, bioRxiv)
- Engage in scholarly communication throughout the publication process
6. Open Access Commitment
This journal provides immediate open access to all content, supporting the global exchange of knowledge without financial, legal, or technical barriers.