Digital Image Forensics
Digital Image Forensics
net/publication/314079132
CITATIONS READS
0 2,358
2 authors, including:
Zohair Al-Ameen
University of Mosul
51 PUBLICATIONS 496 CITATIONS
SEE PROFILE
All content following this page was uploaded by Zohair Al-Ameen on 26 February 2017.
Abstract: Currently, digital images are considered as one of the primary sources of evidence. Recently, the
reliability of such has been questioned, owing to the existence of image degradation and ease in forging both its
content and origin. Digital image forensics (DIF) is a contemporary research field that aims at improving the
visible quality and validating the authenticity of digital images. Thanks to the promising results achieved by
previous studies and ever-growing number of tools, DIF remains an attractive research domain for various
scholars. Hence, this study is intended for researchers, scholars, and technology specialists approaching this
field by reviewing the modern visibility enhancement and tampering detection tools of DIF.
Keywords: Computer crimes, Computer forensics, Digital evidence, Digital forensics, Forensic tools.
Received Jul. 18, 2016; accepted for publication Feb. 9, 2017; published online Feb. 28, 2017. DOI:
10.15323/techart.2017.2.4.1.32 / ISSN: 2288-9248.
tool can provide great assistance in reducing the required video investigations and researching new methods in the
processing time for forensic data, and ameliorating the field of image/video processing. Compared to Photoshop
success ratio of handled cases. Many forensic cases can be and MATLAB, only the Cognitech Tri-Suite provides
solved with this tool, varying from fingerprint examination researchers with high-tech video processing procedures
to the recovery of low quality CCTV images. The main that can streamline the application of various complex
viewpoint in designing this tool is that processing digital forensic image processing algorithms [9]. Fig. 2 displays
images and videos can be achieved by applying a sample results obtained by this tool (tomshardware.com).
specialized filter, which means it does not manipulate or
modify the original evidence [8]. Fig. 1 shows a sample C. ClearID
result obtained by an Amped FIVE tool (www.matek.net). ClearID was developed with the intention of unlocking
latent evidence in digital images, irrespective of where
they originated. Moreover, this tool specializes in
processing digital images and videos. Likewise, it can
work on many types of digital data, varying from CCTV
videos to scanned images. This tool provides a labeled
workflow interface that guides the operator through the
process of image filtering, while supporting a specialized
function that applies a hashing technique to the filtered
Fig. 1. A sample result obtained by the Amped FIVE tool. images. In addition, this tool provides a wide variety of
B. Cognitech Tri-Suite image clarification filters that are easy to utilize, potent,
and non-damaging to the original files. To determine the
The Cognitech Tri-Suite tool-set is comprised of best settings for filtering the digital images, this tool
primarily three real-time patented video forensic provides a window for color preview and simple slide bars.
applications: AutoMeasure, VideoActive, and Video For forensic purposes, this tool has built-in functions that
Investigator. This forensic tool is one of the most advanced record all the settings utilized and produce an electronic
tools in its field because it contains various patented report. Thus, once the operator completes the investigation
algorithms. The AutoMeasure application is the only of the digital evidence, the operator can easily produce an
existing automatic photogrammetry software that permits electronic report in a formal document. This document is
the operator to conduct precise bio-metric measurements then attached to the evidence, review, or presentation in
of vehicles and persons in the evidence video for the court of law. Finally, although this tool is relatively
identification purposes. In addition, it can precisely simple for novice users, it becomes more powerful for
compute 3D scene measurements from still images and forensic experts [10]. Fig. 3 illustrates a sample result
digital videos of any crime scene, obtain measurements of obtained by this tool (www.oceansystems.com).
unreachable remote crime scenes, and generate a full 3D or
360-degree view of crime scenes. On the other hand, the
VideoActive application is the leading real-time forensic
software for video processing with a novel video capture
and encoding technology, automatic demultiplexing
technique, and ability to conduct a GPS localization of
persons in the evidence video.
D. Ikena
Ikena was developed as an innovative solution for
surveillance applications and video forensics. With the
ability of running from any laptop or desktop computer
with the Windows operating system, its greatly improved
Fig. 2. Sample results obtained by the Cognitech Tri-Suite tool. technology can expeditiously obtain information from
deficient video sources, including cell phones, surveillance
Conversely, the Video Investigator application offers an cameras, and YouTube videos. This tool can efficiently
advanced interface with various types of filters for video detect faces, enhance objects, read license plates, and so
analysis and filtering, allowing the operator to determine forth. Moreover, this tool requires minimal computer
the best processing parameters in a simple interactive training, performs well on low-cost laptops, and runs
manner. This tool-set is adequate for performing forensic rapidly on high-spec desktops. This tool specializes more
Z. Al-Ameen et al.: Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: 34
A Laconic Review
in processing digital videos than still images. It has many Current forensic software products typically address a
video processing abilities, such as the extraction of useful small number of related technical tools. However, Amped
information from multiple video frames, recovery of Authenticate places the strength of manifold assessments,
invisible details in the original video, output of multiple processes, and reporting in one platform to ameliorate the
results. Not like the standard video processing algorithms, ability of the operator in identifying original or doctored
the algorithms of this tool can track complex motion, and images. It is not easy to distinguish an original image from
thus, improve the visible quality of various objects in a an edited version. Worldwide, there are only a few experts
video. Finally, this tool has proper algorithms for noise who can, with certainty, determine whether a digital file is
attenuation, regardless of its type [11]. Fig. 4 shows a original or edited. This is usually accomplished using
sample result obtained by this tool (www.motiondsp.com). homemade tools and advanced scientific methods. Because
both courts and lawyers are realizing the ease at which a
digital photo can be manipulated, this small group of
specialists is increasingly being called upon. Thus, the use
of Amped Authenticate is very important in the forensic
field owing to the existence of many cases that require the
detection of original or edited images [12]. Fig. 5 exhibits
a sample result obtained by this tool (satech-co.com).
B. Verifeyed
Verifeyed is a high-tech image analysis tool that can be
Fig. 4. A sample result obtained by the Ikena tool. easily used to detect digitally tampered images, and
estimate the area of alteration in a processed image.
3. Image Tampering Detection Tools Moreover, this tool can determine edits of PDF and video
files. In addition, this tool has the ability to recognize the
Contemporary software has made image tampering device that created the image, which can be a camcorder,
easier to achieve and harder to expose. However, advanced cell phone, or digital camera. Further, it can highlight
computer forensic technology has provided new tools for doubtful (altered) areas in videos and images. The
detecting doctored images. In this section, four renowned innovative technology of this tool was attained as a result
tools for image tampering detection are highlighted, with of a huge effort from forensic experts, and other related
full discussion of every important aspect. specialists, to enable users to employ advanced algorithms
to easily analyze digital images or videos. As a final point,
A. Amped Authenticate this tool is utilized by prominent forensics agencies,
Amped Authenticate was developed as a forensic tool companies, business-oriented services, and has received
for alteration detection and digital image authentication. numerous awards from renowned research and industrial
This tool provides a variety of applications that can organizations [13]. Fig. 6 reveals sample results obtained
determine whether an image is an original created by a by this tool (verifeyed.com).
particular device, an unmodified original, or the outcome
of an alteration with an image processing tool, which is not
admissible as evidence.
C. Belkasoft
Belkasoft provides an automated authentication analysis
for evidence images. Moreover, it can produce an
estimation of the authenticity of an image, and measure
such on a simple scale of 1 to 100. Its expert forgery
Fig. 5. A sample result obtained by the Amped Authenticate tool. detection function can consistently identify doctored and
forged images, among many files in a given device.
Likewise, this function uses advanced technology that
relies on the examination of quantization and compression
35 TechArt: Journal of Arts and Imaging Science, Vol. 4, No. 1, February 2017
artifacts in a given image. This can detect manipulations, Fig. 8. A sample result obtained by the Fotoforensics tool.
edits, or modifications, for digital videos and still images.
Furthermore, this tool has the option of detecting double 4. Conclusion
compression artifacts, which overtly represent the
evidence image being modified. Moreover, this tool can The tools that are investigated in this study are deemed
check for different bits of information that usually exist in significant. Many tools have been developed to investigate
digital images when they are captured by a specific camera, image sources, detect image tampering, authenticate
including EXIF data and camera tags. Such bits of acquisition devices, or improve the visible quality of the
information are frequently released by an image editing obtained images. Among them, tampering detection tools
application. Finally, an inclusive database of camera and image visible quality improvement tools are the most
information comes with this tool, which contains data frequently used. Despite major achievements, various
regarding thousands of various well-known models of challenges still exist regarding DIF tools, wherein the
digital cameras [14]. Fig. 7 exemplifies a sample result robustness of such tools remains a primary concern. Many
obtained by this tool (belkasoft.com). research studies have been introduced to compare the
processing ability of various reliable DIF tools. However,
as yet, no study has been introduced that provides an
inclusive comparison between the different contemporary
tools. Hence, it is reasonable to say that new comparative
studies will soon appear that make important information
available for many DIF tools. Such an event is necessary
for enhancing communications between researchers and
improving research studies to provide more robust DIF
Fig. 7. A sample result obtained by the Belkasoft tool.
tools, making such a domain attractive for new scholars.
D. Fotoforensics Acknowledgment
Fotoforensics is a free online forensic tool that can be
The authors would like to thank the esteemed reviewers
utilized by anyone to determine whether a given image is
for their constructive comments.
digitally altered by identifying its altered parts. Images can
be uploaded from any electronic device with a web
browser. In addition, this tool allows the examination of References
metadata information and original details of the given
image. Likewise, this tool generates electronic forensic [1] H. Guo, B. Jin, and D. Huang. "Research and review
reports for the checked images. This forensic tool utilizes on computer forensics." In Forensics in
sophisticated algorithms to detect edits in digital images. Telecommunications, Information, and Multimedia,
pp. 224-233. Springer Berlin Heidelberg, 2010.
Further, it employs a method called error level analysis to
recognize regions inside an image that have dissimilar [2] T. Bass, "Intrusion detection systems and multisensor
levels of compression. With image types that support data fusion." Communications of the ACM, vol. 43,
compression, such as JPEG, all the regions inside the no. 4, pp. 99-105, 2000.
image should have similar levels of error. If a major [3] M Taylor, J. Haggerty, D. Gresty, and D. Lamb,
difference in the levels of error is detected, it is a clear "Forensic investigation of cloud computing
indication that a digital alteration was made to that image. systems", Network Security, vol. 2011, no. 3, pp. 4-10,
Using this tool, it is possible to see the level of alteration, 2011.
vital image information, which software altered the
checked image, and so forth [15]. Fig. 8 represents a [4] W. Allen, "Computer forensics", IEEE Security &
sample result obtained by this tool (fotoforensics.com). Privacy, vol. 3, no. 4, pp. 59-62, 2005.
[5] S. Garfinkel, "Digital forensics research: The next 10
years", Digital Investigation, vol. 7, pp. S64-S73,
2010.
[6] J. Redi, W. Taktak, and J. Dugelay, "Digital image
forensics: a booklet for beginners", Multimedia Tools
and Applications, vol. 51, no. 1, pp. 133-162, 2010.
[7] L. Moriarty, Criminal justice technology in the 21st
century. Charles C Thomas Publisher, 2005.
Z. Al-Ameen et al.: Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: 36
A Laconic Review
[8] M. Jahanirad, A. Wahab, and N. Anuar, "An in Computer Science from the University of Agra, India in 2013. His
research interests include computer database, computer networks,
evolution of image source camera attribution
education information technology, educational techniques, e-learning,
approaches", Forensic Science International, vol. 262, multimedia technology, and research methodology. Currently, he is a full-
pp. 242-275, 2016. time lecturer at the Department of Psychology, University of Duhok.
Biographies
Zohair Al-Ameen was born in 1985. He received his
BSc degree in Computer Science from the University
of Mosul in 2008. Then, he received his MSc and PhD
degrees in Computer Science from the Technological
University of Malaysia in 2011 and 2015, respectively.
He was awarded the best student award owing to the
outstanding performance in his PhD studies. His
research interests include algorithms design, artificial
intelligence, computer forensics, computer vision, digital image
processing, information technology, and research methodologies.
Currently, he is a full-time lecturer at the Department of Computer
Science, University of Mosul. He has authored many articles which are
published in international journals of high repute.