New Command Line Interface (CLI) for Amped Authenticate

Reading time: 4 min

The quick just got quicker!

In the latest release of Amped Authenticate, 7644, one of the stand-out new features was the implementation of the Command Line Interface.

Utilizing the command line is a great way to automate tasks. I use it a lot to create batch files in order to complete some required and regular processes.

Amped Authenticate has a number of automation tools and methods to quickly analyze large amounts of files. These speed up the process of analyzing, sorting and listing evidential images. However, starting these processes requires user interaction. This means that you would have to open Authenticate and then run the required operations yourself.

Manually performing Batch operations within Authenticate
Manually performing Batch operations within Authenticate

Not anymore!

The new CLI gives you much more power, with the ability to call the program and run a number of common analysis tasks. When completed, you will be left with the sorted images and any reports requested.

The syntax itself is very easy to understand:

Usage: ath [/i <str>] [/s <str>] [/w <str>] [/k <str>] [/o <str>] [/b] [/c] [/x]
/i, –input-path=<str>                 Path of the image file or the folder to analyze
/s, –settings-file=<str>              Path of .aas file containing settings and filter to load
/w, –warning-path=<str>          If set, the path where the files will be moved into after the analysis, if the files contain an issue or a warning (only if batch_format_analysis is enabled)

/k, –ok-path=<str>                     If set, the path where the files will be moved into after the analysis, if the files do not contain an issue or a warning (only if batch_format_analysis is enabled)
/o, –output-path=<str>            Output filename of the result of the file format analysis (only if –batch-format-analysis is enabled)
/b, –batch-format-analysis      Analyze only the file format
/m, –minimal-output                Minimal output format (valid only for file format analysis)
/x, –exit-on-finish                      Exit the program after the execution

Let’s look at an example…

You may have a program that is able to script certain functions and can call other external programs. This may be a piece of software that extracts images from raw data or drives. You then need to analyze these images with Authenticate.

Remember that running a full analysis on each image may not be necessary and this is a great example of when creating your own analysis settings file can save you a lot of time. I wrote about this in a previous article.

By placing the following command into your script, the Authentication side of your required process is fully automated.

authenticate.exe /i "C:\inputfolder " /o “C:\outputfolder\report.tsv” /b /x

What have we automated?

We have called Authenticate, we have set the input folder (/i), and we have set the output location (/o). The process is run in batch mode (/b), and when completed, Authenticate has closed (/x).

There are many other examples in the Program Reference Manual, located under HELP within the software.

Authenticate users with the latest version can try this now in the command line. Navigate to your Authenticate Folder within Program Files. You need to be in either the bin32 or bin 64 folder. In the address bar type cmd, then press enter.

Image 001

You are now running the Windows command prompt from within this folder.

Image 002

Use the command I used earlier as a test. Remember to add in your own input and output folder locations.

You are now free to automate some of the tasks required.

Another example to highlight how this can help would be using a batch file.

@echo off
TITLE Spreadys Authenticate Batch
color 0a
echo ****************************************
echo Authenticate Batch Drag and Drop
echo ****************************************
echo You may need to edit this .bat file 
echo before the first run, in order to set
echo your Authenticate.exe location
echo ****************************************

cd "%1\..\"
md Authenticate_Result

REM Set Authenticate Folder
cd "c:\Program Files (x86)\Amped Authenticate\bin32"

REM script for selecting all files and batch processing
authenticate.exe /i "%1" /k "%1\..\Authenticate_Result\OK" /w "%1\..\Authenticate_Result\Warning" /b /o "%1\..\Authenticate_Result\Report.tsv" /x

REM script for analyzing all files in Warning Folder
authenticate.exe /i "%1\..\Authenticate_Result\Warning" /o "%1\..\Authenticate_Result\Analysis.html" /x


This .bat file sits on my desktop. When I drop a folder of images onto it, the files are analyzed in batch mode and automatically sorted. All files that appear ‘Camera Original’ get placed into a folder called OK. All files that have irregularities get placed into a folder called Warning. A full batch report is compiled that lists all the files and their data.

Image 003

Authenticate will automatically close and reopen. This time, all the files that had Warnings are fully analyzed and a html report is compiled.

With a single drag and drop I can scan, sort and analyze a directory full of images.

If you wish to copy the batch text and place it into a notepad file, remember to save it as a .bat

Update Now!

If you have an active support plan you can update to the latest version of Amped Authenticate by going into the menu “Help” > “Check for Updates Online”.

Image 007

If you need to renew your SMS plan please contact us or one of our authorized partners.

Table of Contents

Share on

Subscribe to our Blog

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Subscribe to our Blog

Related posts

Enhanced Reflections

Insights from the Amped User Days 2024 Survey

Reading time: 7 min Let’s discover our users’ opinions on AI, accreditations and certifications, deepfakes, digital media authentication, and DEMS. Some of the results are pretty unexpected!

Read More »