The partnership between Amped Software and Griffeye keeps growing and so does the integration between Griffeye Analyze DI Pro and Amped Authenticate. Analyze DI Pro is a media investigation software for handling large volumes of images and videos, filter irrelevant digital files, prioritize, correlate and identify the most pertinent material in investigations. It will let you scan and import data from a device or from a folder on your workstation. Once the import is complete, you can easily browse and intelligently sort/filter media.
In this post, we’ll take a look at what Griffeye Analyze DI Pro enables you to do when linked with the Amped Authenticate plugins. Let’s create a case and import a folder containing a few JPEG files.
Analyze DI Pro lets you look at image metadata, and Amped Authenticate users know how interesting they are, but, we also know that a single image may contain hundreds of Exif metadata, and reading all of them is quite a boring job. Luckily, from the very same panel above we can call in Amped Authenticate File Format Analysis to automatically spot suspicious metadata. Once you installed Authenticate and the corresponding plugin in Analyze DI Pro, this is just as simple as right-clicking on one or all the images and then hit the “Plugin” voice and select “Amped Authenticate – File Format Analysis” from the pop-up list as shown below.
David Spreadborough here, the International Trainer at Amped Software. It’s great to be back writing a blog post. The past few months have been very busy at Amped and our image authentication software, Amped Authenticate, has become the ‘go-to’ tool for many requiring an image’s history or to identify signs of manipulation. Helped maybe by the huge amounts of press detailing fake stories and images.
In this crazy world of multimedia forensics, we cannot stand still. The tech wizards at Amped HQ have been hard at work integrating new filters and tools to assist you further. So, let’s dive in and take a look!
Social Media Identification Filter
Under the File Analysis category, you will find this new filter.
Its purpose is to detect traces in the file formats left on images by social media platforms. As most of you probably already know, it is very easy to save other people’s images from sharing sites. With a simple right-click, you can save the displayed image to your computer.
An image from someone’s Facebook timeline
This filter now enables you to identify if the images you are examining originate from a Social Media Platform.
Cases of fraud within published scientific research are on the rise, with several recent cases involving the falsification of images.
Scientists are subjected to exactly the same pressures and temptations that drive people to commit fraud in all manner of environments and for various reasons. Sometimes the motivation is commercial; perhaps to obtain a research grant or to enhance the profile of the institution and attract more applications. In others it might be professional; to get published in a prestigious Journal or simply to save face after an experiment has failed to deliver the desired
Regardless of the justification, when these actions have legal consequences it is important to have the tools to detect when such fraud occurs. And more importantly to have the ability
to scientifically prove this in a court of law.
Multimedia forensics is invaluable within cases of research fraud, both for presenting a case or defending the accused. However, it’s not good enough to simply bring in an expert witness and have them confidently present their case. Tools exist to carry out the analysis in line with the scientific methodology, giving the judge and in some cases the jury, a basis upon which to evaluate the full weight of the evidence. Consider it ironic, but if the right software is adopted within the legal system then the scientific method may just prove to be the answer to the current crisis facing scientific integrity.
Read the full article published in The Barrister.
In a past post, we presented several improvements we did to Amped Authenticate’s Camera Identification filter based on PRNU analysis. Those improvements propagated also to the PRNU Tampering filter so that Amped Authenticate also features an improved algorithm for forgery localization. Improvements mainly include:
Peak-to-Correlation Energy-based (PCE) analysis
During block-based analysis, the PCE is computed and the point yielding the maximum PCE value (peak) is considered. If the peak is in the expected position, the block is considered authentic; if the peak is in a different position, then the PCE value is compared with a threshold to decide the authenticity of the block.
Support for multi-core processing
If your CPU features multiple logical cores, block-based analysis will run in parallel, thus reducing the computation time.
Faster, easier training
Thanks to PCE robustness, there is no need to train a separate model for forgery detection: you can use the same .crp file created for Camera Identification.
Forgery localization for cropped images
If the image is cropped and/or rotated before or after manipulation, the PRNU Tampering filter will detect cropping, compensate for it and run the forgery localization algorithm. The same applies to resizing and/or rotation. Combination of resizing and cropping is not supported yet.
Alert for unreliable regions
PRNU-based forgery localization is not reliable in saturated areas (i.e., totally white or black regions of the image). Indeed, for those pixels, it is impossible to discriminate between the image content and the actual sensor noise. The new version of PRNU-based forgery localization enables highlighting of white and black saturated pixels (marked in yellow and blue, respectively), in order to help the analyst rule out false alarms. Continue reading
Digital images are frequently used to provide supporting evidence within papers and reports, yet are not routinely submitted to any scientific process of authentication. In a world in which the tools to digitally manipulate an image are freely available, it’s no longer acceptable to simply take these images at face value.
The past 12 months has seen the scientific community rocked by a series of scandals relating to the use of manipulated images within published scientific research.
Researchers’ ambition to gain scientific exposure, to achieve career advancement or to secure funding, can drive them to embellish their results in order to attain their goals in the increasingly competitive world of scientific discovery. Equally, the pressure to publish can see them stumbled across doctored images and incorporate them by mistake. In these cases, not only is the individual’s reputation at risk, but also their colleagues’ who are oblivious to the altered nature of the images. The impact of these images is extensive and far-reaching: they threaten to endanger the name of the organization for which the researcher is working, as well as calling into question the integrity of the scientific community at large. This is a critical issue in the current technological day and age, yet very little is being done to address it. Bearing in mind the damage that doctored images can do, scientific publishers and research institutes ought to be more rigorous when setting out the requirements for images that are used in papers.
If some basic screening were applied more extensively to scientific publications, with minimal effort we would be in a much better position to guarantee, or dispute, the authenticity of images within scientific papers for the benefit of science and its wider community.
Working to detect image manipulation in the world of science is a long-term battle, just as it is in photojournalism, forensics, and in any other field where image manipulation is a growing threat to the veracity of images.
Read the full article published in Laboratory News.
As technology has enabled mainstream, widespread image manipulation, it is not surprising that there has been a huge increase in the number of tampered images which find their way into a wide spectrum of industries and sectors. Incidents of doctored images frequently appear in mainstream media where they incite cries of “fake news”.
For example, a photo at the G20 summit this year featured a photoshopped president Putin, giving the impression that he was colluding with president Donald Trump. The photo proceeded to spread like wildfire across the internet, instigating huge political ramifications from a digital fabrication which would have taken a few minutes to create on a laptop. Last August also showed our vulnerability to tampered photos, with the circulation of a photoshopped image of a shark swimming up the freeway during hurricane Harvey indicating a larger problem with major international news outlets spreading the image as genuine.
Equally there is significant evidence of doctored images being used to support fraudulent scientific research internationally. Doctored experiment results and images continue to rock the research industry with every new fraudulent revelation. A prominent cancer research scientist in Italy has been under investigation for using a photography studio to manipulate images pivotal to the crux of the “ground breaking” research. Indeed, the journal Nature has suggested that up to 1 in 5 scientific papers contain evidence of some sort of manipulation.
It is clear therefore, that when the stakes are high enough, people will manipulate the truth, and unfortunately given our tendency to trust photographic images, it seems that it is currently worth their while to do so. When the stakes are as high as imprisonment, it is easy to see how tempting it may be to manipulate an image to support an alibi or a particular version of events.
Unfortunately, security investigations are by no means immune to this phenomenon either. In fact, given the increase in the sources of digital images, the integrity of evidence in such investigations is at its all-time most vulnerable. Body worn cameras, smart phones and increasingly sophisticated CCTV surveillance means that investigators are now dealing with a fast-growing pile of unverified evidence.
Read the full article published in The Intersec Journal of International Security.
This article, published in Evidence Technology Magazine, takes a look at two cases involving the authentication of digital images and the importance of the questions asked of the analyst during those investigations. It looks at how authentication software, such as Amped Authenticate has been designed with a structured workflow, to locate the puzzle pieces required to assist in answering those questions.
Read the full article here.
With the rise of the digital age can experts trust that photographic evidence is legitimate?
Sophie Garrod, from Police Oracle, writes about how a growing number of forensic and counter-terrorism units are getting on board with pioneering image authentication software.
Approximately a third of UK forces have invested in Amped Software products – including Amped Authenticate, an all in one computer programme which can detect doctored images.
Forensic image departments, counter-terrorism units, and government departments say they are saving time and money by sending detectives on a short training course in the software.
Read the full article here to learn more.
It’s beginning to look a lot like Christmas!
Christmas is coming! To celebrate that Christmas is almost here we will share a daily tip and trick on how to authenticate your digital photo evidence with Amped Authenticate.
Follow us daily on our social networks in the month of December as we open the 24 doors of our Authenticate Advent Calendar. The countdown starts now!
Follow us on Twitter, Facebook, LinkedIn, Google Plus, YouTube
You can also visit our website daily as we open the doors of our Advent Calendar here.
Martino Jerian, Amped CEO and Founder, examines context, content, and format of images. From the images and the context in which they are used we can obtain a lot of information that is not visible with the naked eye, and for what is visible with the naked eye, can we trust it? The process of authenticating an image is a mix of technical and investigative elements. This article looks at how to perform a complete image analysis.
Read the article published in the Digital Forensics magazine.