PHOTO ANALYSIS SOFTWARE

Similar documents
PHOTO ANALYSIS SOFTWARE

Guide to Computer Forensics and Investigations Third Edition. Chapter 10 Chapter 10 Recovering Graphics Files

Resizing images for the web using. Version 1.3. WrightWay. Design.

Factors to Consider When Choosing a File Type

IPACO expert report IFO. Fake. Antoine COUSYN. July 05, February 08, July 18, 2010, 16:49 23 Local time. Photos. Last update.

Sun City Summerlin Computer Club Seminar. Managing Your Photos. Tom Burt July 26, 2018

AFFILIATE ROCKET YOUR QUICK-START GUIDE TO AFFILIATE MARKETING

2016 Photography Department

Using the Tax Research Center

UFO over Sao Bernardo do Campo SP Brazil Observations in red by Amanda Joseph Sept 29 th 2016

Scientific Working Group on Digital Evidence

Lightroom Classic CC and Lightroom CC Updates

The Pimpr Strategy Cheat Sheet

NXPowerLite Technology

Recovery of Digital Evidence from Social Networking Sites

Social Issues. spam espionage cheating forgery access to your data years from today destroying old records/ data

Blab Gallery Uploads: How to Reduce and/or Rotate Your Photo Last edited 11/20/2016

White Hat Blogging Techniques

National Travel Associates. Destination Weddings & Group Packages National Travel Associates TheDestinationExperts.com

Comparison ibeacon VS Smart Antenna

Resizing Images By Laurence Fenn

WORDPRESS FOR ABSOLUTE BEGINNERS. By Kyle M. Brown

BEST PRACTICES FOR SCANNING DOCUMENTS. By Frank Harrell

How G7 Makes Inkjet Color Management Better. Jim Raffel Some slides have been adapted from and are used with permission of SGIA and MeasureColor.

All files must be in the srgb colour space This will be the default for most programs. Elements, Photoshop & Lightroom info slides 71-73

WordPress Users Group Manchester, NH July 13, Preparing Images for the Web. Daryl Johnson SvenGrafik

TIPS AND TRICKS FOR GETTING MORE CLICKS TO YOUR YOUTUBE VIDEO AND MAKING MORE MONEY FROM YOUR VISITORS

PaperCut PaperCut Payment Gateway Module - CASHNet emarket Checkout - Quick Start Guide

Inside The Amazing 57 Days

Overview... 3 Starting the Software... 3 Adding Your Profile... 3 Updating your Profile... 4

Recitation 2 Introduction to Photoshop

Pixel v POTUS. 1

Social Issues. CS Concepts. How does a printed document differ from a digital document? WYSI(not)WYG. What s in the model?

Digital Media. Lecture 4: Bitmapped images: Compression & Convolution Georgia Gwinnett College School of Science and Technology Dr.

Contents of these pages including all images are copyright Larry Berman and Chris Maher.

GPS Business Academy 90 Day QuickStart Program

The Billy Scaife Guide to ICT Exam 2015

THE ULTIMATE PRODUCTIVITY TOOL

Sharktopus Crossing Quilted Sign Pattern free from TheBoredZombie.com. Supplies. Assumptions. Design process and other fun tidbits. Contact Me!

UNDERSTANDING LAYER MASKS IN PHOTOSHOP

ADOBE 9A Adobe(R) Photoshop CS4 ACE. Download Full Version :

Create a CaFE Account (for those who do not have one) In order to submit entries for the FWS Annual Exhibition and/or the Online Show, you need to:

4. ENTRY REQUIREMENTS.

Photoshop Master Class Tutorials for PC and Mac

Forensic Framework. Attributing and Authenticating Evidence. Forensic Framework. Attribution. Forensic source identification

Begin with a Blog. Your Online Journey Begins Here! by Tal Gur

BBO Infinite Profits

WIN YOUR CANADIAN FAMILY ADVENTURE WITH THE LAUGHING COW CONTEST

From Camera to MLS. Class Outline: Transferring Photos to the Computer. Using a Card Reader

Learning Outcomes In this lesson, you will learn about the file formats in Adobe Photoshop. By familiarizing

Fiver Arbitrage Learn How To Make A Fortune From Fiverr Imran Naseem

How to Blog to the Vanguard Website

Adobe Photoshop CC 2018 Tutorial

DATA PROTECTION POLICY

A Review of Image Forgery Techniques

Scanning. Records Management Factsheet 06. Introduction. Contents. Version 3.0 August 2017

Watermarking-based Image Authentication with Recovery Capability using Halftoning and IWT

BACK IN THE GOOD OLD DAYS...

1. Limited Warranty. 2. Limited Remedies

The Ultimate DIY Guide to Getting Great Press


Creating Digital Artwork

ISO. In this unit we learn about the sensitiveness of the sensor, its good points as well as its bad points. We also learn about ASA and ISO.

CRAWLING THE INTERNET FOR EXIF DATA AND CONTEXTUAL MISMATCHES

Digital Evidence from Social Networking Sites by using Metadata

Appendix A ACE exam objectives map

Nikon Photo Contest International

Free Report. How to Make at Least $100 a Day With Graphics Design Gig on Fiverr

Making Your Work Flow

Creating Accurate Footprints in Eagle

Digital photo sizes and file formats

Learning Macromedia Fireworks Essentials and Digital Image Editing

Claiming compensation after an accident at work. A guide to help you and your family get the most from your claim

Photoshop and Lightroom for Photographers

Introduction to HDR Photography with Brian McPhee

The Key to It All: YOUR PERSONAL MONEY MAP NUMBERS

STANDARDS? We don t need no stinkin standards! David Ski Witzke Vice President, Program Management FORAY Technologies

Annotation in Digital Image Files

Detection of Steganography using Metadata in Jpeg Files

University of Amsterdam System & Network Engineering. Research Project 1. Ranking of manipulated images in a large set using Error Level Analysis

General Workflow Instructions for capturing 360 images using Theta V, editing in Photoshop, and publishing to Google StreetView

Negotiating Essentials

Amazon Kindle Product Special: Drag-n-Drop Illustrator. James J. Jones

WSNTG Online Entry Form User Manual for Registered Co-ordinators

Scientific Working Group on Digital Evidence

Photoshop CC 2018 Essential Skills

Image Editor. Opening Image Editor. Click here to expand Table of Contents...

Storyboarding CHAPTER 1

Scanning Guide for Adobe Photoshop

FORENSIC ANALYSIS OF DIGITAL IMAGE TAMPERING

Wavelet-based Image Splicing Forgery Detection

ADDING A RAINBOW TO A PHOTOGRAPH

The Basics. Introducing PaintShop Pro X4 CHAPTER 1. What s Covered in this Chapter

Centre: Artwork. General tips for designing your artwork

AUSTRALIAN ANTARCTIC FESTIVAL PHOTOGRAPHY COMPETITION 2018

4/9/2015. Simple Graphics and Image Processing. Simple Graphics. Overview of Turtle Graphics (continued) Overview of Turtle Graphics

Warning a client of risks 1/2

How to Apply? An online interface is provided for applicant s interaction with the CLAT office. With this interface, an applicant can

Hi there. Welcome. This PDF was designed to help you prepare some examples of your work as part of your application for entry to the Diploma course.

Each week set yourself business goals of what you want to achieve. It is one of the crucial problems associated with network marketing and can really

Transcription:

Is seeing believing? Every day, public agencies process thousands of images in support of investigations or other types of claims. Until now, there hasn t been a fast and effective way to determine if the images are authentic. Meet Axon Detect. Axon Detect is an image analysis program for tamper detection. It goes beyond image-matching to offer you a robust suite of authentication tools to certify evidence in-house. This reduces the need for external consultants, shortens turnaround time, and lets you use evidence captured by the public. To illustrate the power of Axon Detect, let s work a case together. In this case, an image has been submitted to a typical traffic court to support a vehicle owner s assertion that the impounding of their car wasn t justified. If the court rules in the owner s favor, the city will have to refund hundreds of dollars in towing and impound fees. At issue is the reason for the impound. The city had the vehicle towed because it was parked in front of a fire hydrant. The vehicle s owner asserts that there is no fire hydrant at the location. The picture that was submitted to the traffic court clearly shows that there is no fire hydrant at the location. But, can you trust the image? Search the internet and you will find countless ways to create image forgeries. All one need do is download a free photo editor and photoshop out parts of an image. People can get very creative in trying to cheat the system. You can fool the eye fairly easily. But, there are a lot of things to account for when creating a good forgery. Axon Detect has over 20 filters that can be utilized to test an image. There are two basic types of exams, a blind test (tell me if it s authentic) and a test of a specific allegation (tell me if an item has been removed/added). Within the interface, red text means that there s a problem. Something s wrong. Something requires further inspection.

Back to the investigation... The image that you see on your monitor is a graphical representation of the fundamental binary data that constitutes a computer file. The standard numerical format for representing binary data is called hexidecimal, or HEX for short. It s in this HEX view that all sorts of valuable information is hiding; like the fact that the image in question was edited by Photoshop on a Windows computer. Reading HEX can be a chore. With Axon Detect, you don t have to. Axon Detect sifts through the HEX data to find plain English words; words like Photoshop, GIMP, and Picasa to name a few. There are other types of information hidden in the file. This information has to do with the file s container and data about the file itself. This information can be found with the EXIF Viewer. Programs like Adobe s Photoshop add a ton of EXIF metadata to files. With the EXIF Viewer, you can see each of these entries. Now ask yourself, would a image taken directly from a mobile phone s camera and sent to a Traffic Court have an entry indicating that it had been processed with Adobe Photoshop on a PC? But, there are programs out there that can strip all of these fields clean. EXIF metadata is not permanent. It s designed to be altered. Thus, a better solution is needed. One that looks at the underlying structure and math that makes up the image. This is where the true power of Axon Detect is demonstrated.

Every time an image is saved, there s a ton of math involved in the process. Math, thankfully, has rules. When the rules are obeyed, there s no problem to detect. When the rules are broken, it becomes visually evident in many of the filters found in Axon Detect. When an image is saved, changed, and saved again, there are multiple and different compression levels present in the image. Error Level Analysis can be used to test against an allegation of cut/paste or deletion forgery. In this case, you can clearly see in the ELA filter view the fire hydrant has been removed. Ordinarily, at this point, the image would be declared to be a forgery and appropriate measures taken. But, let s take a look at some of the other quick and easy ways of illustrating the forgery present in this image. By mapping the Discrete Cosign Transform, the user can see the discontinuities in the compression of the image. Here, the DCT Map view clearly illustrates the changes to the image - the removal of the fire hydrant and the changes to the sidewalk to account for the missing item. To make this change easier to detect, the ADJPEG (Aligned Double JPEG) Filter clearly shows the area that has been changed.

At this point in the investigation, the image is clearly not authentic... Introducing false evidence into a proceeding is a felony in most jurisdictions. Once identified as a forgery, the agency will want to request the source of the image; in this case it s a mobile phone. Once the image is removed from the device, it can be loaded into Axon Detect as the Reference Image. Remember, red text means that there s a mismatch between the Evidence Image and the Reference Image. A mismatch means, unequivocably that the Evidence Image is not authentic - a forgery. In this one case, the ability to determine that the submitted image was a forgery saved the agency and it s host city over a thousand dollars. When you consider the amount of images that agencies receive each day, it becomes easy to see how quickly Axon Detect will pay for itself. If you re in a state with an evidence code that requires each image be scientifically authenticated prior to admission in trial, you absolutely need Axon Detect. It works great on single images. It also works on large volumes of images. Other tools include searching the web for similar images (great for social media investigations), showing the image s location on Google Maps (where was the image taken), and searching for images from the same camera model. But, don t take our word for it. We re happy to share a fully-functional trial version with you. See for yourself how fast it is. Test it against images in your system. Create your own forgeries and see if Axon Detect can spot them. Contact your Axon salesperson today, or visit our web site.