Investigating Image Authenticity

Table of Contents

Reading time: < 1 min
investigating image authenticity

This article, published in Evidence Technology Magazine, takes a look at two cases involving the authentication of digital images and the importance of the questions asked of the analyst during those investigations. It looks at how authentication software, such as Amped Authenticate has been designed with a structured workflow, to locate the puzzle pieces required to assist in answering those questions.

Table of Contents

Share on

Subscribe to our Blog

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Subscribe to our Blog

Related posts