Category Archives: Announcements

Come Meet Us in Florence and Bern!

We are on the road again next week to go meet customers, partners, and friends. Come see us in Bern, Switzerland at the IT Forensic Investigator Conference, and in Florence, Italy at the DFRWS EU Conference. We also have a workshop at each event, so don’t miss those! Read below for details on each event.

IT Forensic Investigator Conference

When: March 21, 2018

Where: Stade de Suisse, Papiermühlestrasse 71,3014 Bern, Switzerland

Why: This event is organized by the Swiss Federal Police and Arina AG for all government IT-Forensic Investigators in Switzerland.


The Proper Use of Images and Videos as Evidence

Presenter: Stefano Bianchi

March 21, 14:15 – 15:00, Raum 3 Sky Lounge vorne (4. OG)

Photos and videos have always been valuable sources of evidence. Images from CCTV, body-worn cameras, dash cams and mobile devices can now be easily acquired and enhanced, but also manipulated. This can lead to breaks in the chain of custody or questions surrounding the admissibility. Relying on tools that follow a scientific methodology ensures the integrity of the digital evidence through the use of forensic workflows starting from the acquisition, to the restoration, enhancement, and the writing of the report for use in the courtroom. During this workshop, you will learn about some of these workflows, using Amped FIVE, a software for forensic image and video enhancement, identifying their compatibility within the image and video forensic community.

 DFRWS EU 2018

When: March 21-23, 2018

Where: Convito Della Calza – Oltrarno Meeting Center, Florence, Italy

Why: Amped Software is a proud sponsor of this event that fosters transdisciplinary approaches to address emerging challenges in digital forensics by bringing together innovative researchers, developers, and practitioners from around the globe.


Image and Video Forensics: Enhancement and Analysis

Presenter: Martino Jerian (Amped Software) and Sebastiano Battiato (University of Catania)

March 21, 21:30 – 12:30, Room B

Video analysis is one of the most fascinating fields of digital and media forensics, but there’s much more to it than simply enhancing a picture. This workshop will introduce the attendees to the field of forensic image and video analysis and will provide a summary of all the steps needed to get evidence out of the source (typically a digital video recorder or a digital camera), extract parts of interest, properly enhance them, take measurements, and prepare the results for presentation in the courtroom. The attendees of the workshop will learn how to enhance and analyze images with the software Amped FIVE, using it on some practical cases. The argument of image authenticity will be briefly introduced at the end of the session with a few practical examples with the software Amped Authenticate. Requirements: Attendees of the workshop must bring their own computers for the hands-on practical exercises. A Windows system, either native or virtualized, must be available. The instructors will provide fully functional versions of the software and casework examples on USB drives.

Digital images – trust must be earned

The science behind forensic image analysis is growing fast and constantly evolving. Even within the last 5 years, the ability to take a photo, manipulate it to tell a different story, and circulate the misinformation online has become infinitely easier. The advent of smartphones, convenient digital image manipulation software and easy dissemination of information are throwing up new challenges that investigators and forensic technicians must adapt to.

Unfortunately, it is too risky to simply take digital images at face value. Instead, we must ask and have the tools to query, such as “Where did the image or video originate from?”; “Who provided it and is there any reason they might have modified it?”; “Is it a camera-original?”; and “Do I believe this is a true and accurate representation of events?”

To give a practical example, back in the summer of 2017, two images featured prominently in the initial reporting of Hurricane Harvey. The first was of a shark swimming along the Houston freeway. The second showed several aeroplanes virtually underwater at what was claimed to be Houston airport. These iconic images were circulated widely on Twitter and were featured on mainstream national media such as Fox News. There was just one small problem. Neither situation had actually occurred!

If this behaviour is widespread on social and traditional media, then why shouldn’t we believe it is also impacting police and legal investigations? After all, if members of the public are prepared to manipulate images for the sake of a few likes and retweets, what will they be prepared to resort to when the stakes are much higher?

Read the full article published in eForensics Magazine.


Amped Authenticate & Griffeye Analyze DI Pro: a synergy that empowers forensic analysts!

The partnership between Amped Software and Griffeye keeps growing and so does the integration between Griffeye Analyze DI Pro and Amped Authenticate. Analyze DI Pro is a media investigation software for handling large volumes of images and videos, filter irrelevant digital files, prioritize, correlate and identify the most pertinent material in investigations. It will let you scan and import data from a device or from a folder on your workstation. Once the import is complete, you can easily browse and intelligently sort/filter media.

In this post, we’ll take a look at what Griffeye Analyze DI Pro enables you to do when linked with the Amped Authenticate plugins. Let’s create a case and import a folder containing a few JPEG files.

Analyze DI Pro lets you look at image metadata, and Amped Authenticate users know how interesting they are, but, we also know that a single image may contain hundreds of Exif metadata, and reading all of them is quite a boring job. Luckily, from the very same panel above we can call in Amped Authenticate File Format Analysis to automatically spot suspicious metadata. Once you installed Authenticate and the corresponding plugin in Analyze DI Pro, this is just as simple as right-clicking on one or all the images and then hit the “Plugin” voice and select “Amped Authenticate – File Format Analysis” from the pop-up list as shown below.

Continue reading

Come Meet Us in the UK!

The Amped team will be in the UK next week at these events. Come meet us at the Amped Software booth for a personal demo of our industry-leading products or contact us to set up a one-to-one meeting.

Forensics Europe Expo, Olympia, London

March 6-7

This event provides a definitive source of education, best practice, training, and networking. Essential for any forensics professional, Forensics Europe Expo is the must-attend event to learn about the very latest technology and connect with leading suppliers.

Come see us at Booth 1-D21 and attend our workshops presented by David Spreadborough, our Forensic Expert and International Trainer.

Workshop Schedule:

How to Save Time, Money and Effort when Dealing with the Complex Evidence of Videos and Images

March 6, 15:20 – 15:45, Seminar Theatre

The software that redefined forensic image restoration has evolved into the single, most powerful, application in a Forensic Video Analyst’s toolbox.

From a single image taken on a smartphone, to proprietary video from surveillance systems, Amped FIVE is there to manage, analyse, interpret, restore, enhance, present, disclose and report your visual evidence.

With the new ‘Assistant’ module, teams can create their own dedicated workflows to support and aid tasks, ensuring total compliance with ISO Standard Operating Procedures.

David will lead you through several cases, highlighting how Amped FIVE will save you time, money and effort when dealing with the complex evidence of videos and images.

Trust in an Image Goes Beyond Reading the Metadata

March 7, 14:10 – 14:35, Seminar Theatre

Amped Authenticate is the only application available that integrates every aspect of image authentication into a single, easy to use package.

Trust in an image now goes beyond reading the metadata. To rely on an image in court, the question of authenticity must be asked. Does the data compare with the story being told? Was the image taken by that device? Was it taken at a specific location? Has it been ‘photoshopped’?

The once dark art of image authenticity analysis is unravelled during a walkthrough of the software, highlighting how thousands of images can be analysed, sorted, and then compared to identify inconsistencies, before examining individual images for signs of manipulation.

With the functionality of automated scanning and reporting, you will quickly see why Amped Authenticate is becoming a must-have addition to Forensic Image Units worldwide.

For more info:

Security & Policing, Farnborough

March 6-8

This official Government event is a world-class opportunity to meet, network and discuss the latest advances in delivering national security and resilience with UK suppliers, colleagues, and government officials. The event brings together visitors who have specific operational needs with exhibitors who have the relevant solutions, all within a secure environment. The unique three-day event also incorporates live demonstrations and immersive experiences providing the ideal setting for testing and collaborative showcasing.

Come see us at Booth D22 and have a chat with our CEO and Founder, Martino Jerian.

For more info:

We look forward to seeing you soon!

Amped Authenticate Update 10641: Social Media Identification, Griffeye Integration & Many New Filter Options

Hi everyone!

David Spreadborough here, the International Trainer at Amped Software. It’s great to be back writing a blog post. The past few months have been very busy at Amped and our image authentication software, Amped Authenticate, has become the ‘go-to’ tool for many requiring an image’s history or to identify signs of manipulation. Helped maybe by the huge amounts of press detailing fake stories and images.

In this crazy world of multimedia forensics, we cannot stand still. The tech wizards at Amped HQ have been hard at work integrating new filters and tools to assist you further. So, let’s dive in and take a look!

Social Media Identification Filter

Under the File Analysis category, you will find this new filter.

Its purpose is to detect traces in the file formats left on images by social media platforms. As most of you probably already know, it is very easy to save other people’s images from sharing sites. With a simple right-click, you can save the displayed image to your computer.

An image from someone’s Facebook timeline

This filter now enables you to identify if the images you are examining originate from a Social Media Platform.

Continue reading

Fraud in Science: the Bigger Picture

Cases of fraud within published scientific research are on the rise, with several recent cases involving the falsification of images.

Scientists are subjected to exactly the same pressures and temptations that drive people to commit fraud in all manner of environments and for various reasons. Sometimes the motivation is commercial; perhaps to obtain a research grant or to enhance the profile of the institution and attract more applications. In others it might be professional; to get published in a prestigious Journal or simply to save face after an experiment has failed to deliver the desired

Regardless of the justification, when these actions have legal consequences it is important to have the tools to detect when such fraud occurs. And more importantly to have the ability
to scientifically prove this in a court of law.

Multimedia forensics is invaluable within cases of research fraud, both for presenting a case or defending the accused. However, it’s not good enough to simply bring in an expert witness and have them confidently present their case. Tools exist to carry out the analysis in line with the scientific methodology, giving the judge and in some cases the jury, a basis upon which to evaluate the full weight of the evidence. Consider it ironic, but if the right software is adopted within the legal system then the scientific method may just prove to be the answer to the current crisis facing scientific integrity.

Read the full article published in The Barrister.

Experience Amped products at Marine West 2018

Marine West is co-sponsored by and held at Marine Corps Base, Camp Pendleton. Marine commands throughout Southern California send delegations to visit this annual exposition. Marine West showcases the latest technology and prototypes aimed at preparing today’s Marines for the opportunities and challenges of the 21st century.  Amped Software supports the mission of the Marines and other NATO forces.

When: February 7-8, 2018

Where: Marine Corps Base, Camp Pendleton, Area 22.  View map

Visit Amped Software at Booth #510 to learn more about us and our innovative products for forensics, ISR, UAS post-mission analysis, and SSE. Continue reading

Improved PRNU-Based Forgery Localization

In a past post, we presented several improvements we did to Amped Authenticate’s Camera Identification filter based on PRNU analysis. Those improvements propagated also to the PRNU Tampering filter so that Amped Authenticate also features an improved algorithm for forgery localization. Improvements mainly include:

Peak-to-Correlation Energy-based (PCE) analysis
During block-based analysis, the PCE is computed and the point yielding the maximum PCE value (peak) is considered. If the peak is in the expected position, the block is considered authentic; if the peak is in a different position, then the PCE value is compared with a threshold to decide the authenticity of the block.

Support for multi-core processing
If your CPU features multiple logical cores, block-based analysis will run in parallel, thus reducing the computation time.

Faster, easier training
Thanks to PCE robustness, there is no need to train a separate model for forgery detection: you can use the same .crp file created for Camera Identification.

Forgery localization for cropped images
If the image is cropped and/or rotated before or after manipulation, the PRNU Tampering filter will detect cropping, compensate for it and run the forgery localization algorithm. The same applies to resizing and/or rotation. Combination of resizing and cropping is not supported yet.

Alert for unreliable regions
PRNU-based forgery localization is not reliable in saturated areas (i.e., totally white or black regions of the image). Indeed, for those pixels, it is impossible to discriminate between the image content and the actual sensor noise. The new version of PRNU-based forgery localization enables highlighting of white and black saturated pixels (marked in yellow and blue, respectively), in order to help the analyst rule out false alarms. Continue reading

All is not as it seems

Digital images are frequently used to provide supporting evidence within papers and reports, yet are not routinely submitted to any scientific process of authentication. In a world in which the tools to digitally manipulate an image are freely available, it’s no longer acceptable to simply take these images at face value.

The past 12 months has seen the scientific community rocked by a series of scandals relating to the use of manipulated images within published scientific research.

Researchers’ ambition to gain scientific exposure, to achieve career advancement or to secure funding, can drive them to embellish their results in order to attain their goals in the increasingly competitive world of scientific discovery. Equally, the pressure to publish can see them stumbled across doctored images and incorporate them by mistake. In these cases, not only is the individual’s reputation at risk, but also their colleagues’ who are oblivious to the altered nature of the images. The impact of these images is extensive and far-reaching: they threaten to endanger the name of the organization for which the researcher is working, as well as calling into question the integrity of the scientific community at large. This is a critical issue in the current technological day and age, yet very little is being done to address it. Bearing in mind the damage that doctored images can do, scientific publishers and research institutes ought to be more rigorous when setting out the requirements for images that are used in papers.

If some basic screening were applied more extensively to scientific publications, with minimal effort we would be in a much better position to guarantee, or dispute, the authenticity of images within scientific papers for the benefit of science and its wider community.

Working to detect image manipulation in the world of science is a long-term battle, just as it is in photojournalism, forensics, and in any other field where image manipulation is a growing threat to the veracity of images.

Read the full article published in Laboratory News.

Image And Video Forensics In Court: Forensic Science Is Not Forensic Fiction

Images and videos are some of the most compelling forms of evidence that can be presented in a courtroom. Yet it is important that the steps we take when preparing them stand up to scrutiny.

Within the field of forensic image and video analysis one of the biggest issues we face is the CSI effect: the phenomenon whereby representations of forensic science on popular TV shows gives a distorted perception of what is possible; from endless zooming from satellite imagery to enhancing the reflection of a reflection of a reflection. We very often have to explain, even to “the experts”, what is science and what is fiction.

Enhancing images for forensic use is not just about trying a few sliders and combining filters until you see something better. Are you confident the images you present within a legal investigation would stand up to scrutiny? And do you have the procedures in place to challenge digital evidence introduced by other parties?

Read the full article published in Lawyer Monthly.