0% found this document useful (0 votes)
131 views6 pages

Digital Image Forensics

This document reviews modern tools for enhancing the visibility and detecting tampering in digital image forensics. It discusses four prominent tools for image enhancement: Amped FIVE, Cognitech Tri-Suite, and ClearID. These tools can help forensic experts and investigators process digital images and videos to clarify poor quality images, reduce processing time, and unlock latent evidence. The document also explores various image tampering detection tools in section 3. It aims to inform researchers, scholars, and technology specialists of reliable digital image forensics tools.

Uploaded by

MUSA SAVAŞKAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
131 views6 pages

Digital Image Forensics

This document reviews modern tools for enhancing the visibility and detecting tampering in digital image forensics. It discusses four prominent tools for image enhancement: Amped FIVE, Cognitech Tri-Suite, and ClearID. These tools can help forensic experts and investigators process digital images and videos to clarify poor quality images, reduce processing time, and unlock latent evidence. The document also explores various image tampering detection tools in section 3. It aims to inform researchers, scholars, and technology specialists of reliable digital image forensics tools.

Uploaded by

MUSA SAVAŞKAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/314079132

Modern Visibility Enhancement and Tampering Detection Tools of Digital


Image Forensics: A Laconic Review

Article  in  TECHART Journal of Arts and Imaging Science · February 2017


DOI: 10.15323/techart.2017.2.4.1.32

CITATIONS READS

0 2,358

2 authors, including:

Zohair Al-Ameen
University of Mosul
51 PUBLICATIONS   496 CITATIONS   

SEE PROFILE

All content following this page was uploaded by Zohair Al-Ameen on 26 February 2017.

The user has requested enhancement of the downloaded file.


Z. Al-Ameen et al.: Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: 32
A Laconic Review

Modern Visibility Enhancement and Tampering Detection


Tools of Digital Image Forensics: A Laconic Review
Zohair Al-Ameen*,1, Chiai Al-Atroshi2
1
Department of Computer Science, College of Computer Science and Mathematics, University of Mosul/ Mosul, Iraq
2
Department of Psychology, College of Basic Education, University of Duhok/ Kurdistan Region, Iraq
*Corresponding author ([email protected])

Abstract: Currently, digital images are considered as one of the primary sources of evidence. Recently, the
reliability of such has been questioned, owing to the existence of image degradation and ease in forging both its
content and origin. Digital image forensics (DIF) is a contemporary research field that aims at improving the
visible quality and validating the authenticity of digital images. Thanks to the promising results achieved by
previous studies and ever-growing number of tools, DIF remains an attractive research domain for various
scholars. Hence, this study is intended for researchers, scholars, and technology specialists approaching this
field by reviewing the modern visibility enhancement and tampering detection tools of DIF.

Keywords: Computer crimes, Computer forensics, Digital evidence, Digital forensics, Forensic tools.

Received Jul. 18, 2016; accepted for publication Feb. 9, 2017; published online Feb. 28, 2017. DOI:
10.15323/techart.2017.2.4.1.32 / ISSN: 2288-9248.

investigators could use them on a daily basis in their


1. Introduction analysis laboratory, and people interested in uncovering
secrets hidden in images [7]. Thanks to the promising
Computer forensics is a highly important branch of results achieved by previous studies and ever-growing
computer science in relation to computers and their number of tools, DIF remains an attractive research
associated crimes [1]. In the past, computers were merely domain for various scholars. This study is intended for
employed to generate data. However, the computing researchers, scholars, and technology specialists
technology has now extended to all devices connected to approaching this field by reviewing the modern reliable
digital data [2]. The aim of computer forensics is to tools of DIF. This article is arranged as follows: In Section
conduct crime investigations by utilizing evidence from 2, many popular image visible quality enhancement tools
digital data to determine the responsible party for a are discussed. In Section 3, various image tampering
specific offence [3]. For an ameliorated investigation and detection tools are explored. Finally, a concise conclusion
research process, various computer forensic tools have is given in Section 4.
been created by savvy developers [4]. Hence, investigation
agencies and police departments are choosing the proper 2. Image Visibility Enhancement Tools
computer forensic tools based on different aspects,
including price and availability of experts [5]. Computer Forensic image experts are often asked to help
forensic investigators periodically need to process digital investigators clear up poor-quality images to allow them to
images as evidence. Recently, the reliability of such has see better details. Using proper image enhancement tools,
been questioned, owing to the existence of image this job can be easily accomplished. In this section, four
degradation and the ease in forging both its content and prominent forensic tools for image enhancement are
origin. Digital image forensics (DIF) is a contemporary elucidated with a full discussion of every essential aspect.
research field that aims at improving the visible quality
and validating the authenticity of digital images [6]. Many A. Amped FIVE
tools exist to achieve such tasks, varying from simple to Amped FIVE is a leading image processing tool that is
complex. Without such tools, it is difficult to deal with specifically built for investigative uses, including security
forensic analysis, especially when many images are and forensics applications. Its primary purpose is to
involved. It is tedious work to manually extract all the support forensic specialists with plentiful solutions to
information from digital images. For this, DIF tools are investigate and process video data and digital images,
highly desirable for extracting such information from the accurately and expeditiously. Amped FIVE is trusted by
provided images and displaying them in a well-organized forensic investigators because it employs an evident
report. Great searching capabilities and lucid reports allow sequence of work to introduce evidence that endures in the
the investigator to find a needle in a haystack. DIF tools court of law. By virtue of its advanced technology, this
allow every team in the forensic laboratory to work with tool permits forensic specialists to unravel various
their own cases with separation of privileges. In addition, problems, which can be easily overlooked. Moreover, this
DIF tools can be used in many situations: forensic
33 TechArt: Journal of Arts and Imaging Science, Vol. 4, No. 1, February 2017

tool can provide great assistance in reducing the required video investigations and researching new methods in the
processing time for forensic data, and ameliorating the field of image/video processing. Compared to Photoshop
success ratio of handled cases. Many forensic cases can be and MATLAB, only the Cognitech Tri-Suite provides
solved with this tool, varying from fingerprint examination researchers with high-tech video processing procedures
to the recovery of low quality CCTV images. The main that can streamline the application of various complex
viewpoint in designing this tool is that processing digital forensic image processing algorithms [9]. Fig. 2 displays
images and videos can be achieved by applying a sample results obtained by this tool (tomshardware.com).
specialized filter, which means it does not manipulate or
modify the original evidence [8]. Fig. 1 shows a sample C. ClearID
result obtained by an Amped FIVE tool (www.matek.net). ClearID was developed with the intention of unlocking
latent evidence in digital images, irrespective of where
they originated. Moreover, this tool specializes in
processing digital images and videos. Likewise, it can
work on many types of digital data, varying from CCTV
videos to scanned images. This tool provides a labeled
workflow interface that guides the operator through the
process of image filtering, while supporting a specialized
function that applies a hashing technique to the filtered
Fig. 1. A sample result obtained by the Amped FIVE tool. images. In addition, this tool provides a wide variety of
B. Cognitech Tri-Suite image clarification filters that are easy to utilize, potent,
and non-damaging to the original files. To determine the
The Cognitech Tri-Suite tool-set is comprised of best settings for filtering the digital images, this tool
primarily three real-time patented video forensic provides a window for color preview and simple slide bars.
applications: AutoMeasure, VideoActive, and Video For forensic purposes, this tool has built-in functions that
Investigator. This forensic tool is one of the most advanced record all the settings utilized and produce an electronic
tools in its field because it contains various patented report. Thus, once the operator completes the investigation
algorithms. The AutoMeasure application is the only of the digital evidence, the operator can easily produce an
existing automatic photogrammetry software that permits electronic report in a formal document. This document is
the operator to conduct precise bio-metric measurements then attached to the evidence, review, or presentation in
of vehicles and persons in the evidence video for the court of law. Finally, although this tool is relatively
identification purposes. In addition, it can precisely simple for novice users, it becomes more powerful for
compute 3D scene measurements from still images and forensic experts [10]. Fig. 3 illustrates a sample result
digital videos of any crime scene, obtain measurements of obtained by this tool (www.oceansystems.com).
unreachable remote crime scenes, and generate a full 3D or
360-degree view of crime scenes. On the other hand, the
VideoActive application is the leading real-time forensic
software for video processing with a novel video capture
and encoding technology, automatic demultiplexing
technique, and ability to conduct a GPS localization of
persons in the evidence video.

Fig. 3. A sample result obtained by the ClearID tool.

D. Ikena
Ikena was developed as an innovative solution for
surveillance applications and video forensics. With the
ability of running from any laptop or desktop computer
with the Windows operating system, its greatly improved
Fig. 2. Sample results obtained by the Cognitech Tri-Suite tool. technology can expeditiously obtain information from
deficient video sources, including cell phones, surveillance
Conversely, the Video Investigator application offers an cameras, and YouTube videos. This tool can efficiently
advanced interface with various types of filters for video detect faces, enhance objects, read license plates, and so
analysis and filtering, allowing the operator to determine forth. Moreover, this tool requires minimal computer
the best processing parameters in a simple interactive training, performs well on low-cost laptops, and runs
manner. This tool-set is adequate for performing forensic rapidly on high-spec desktops. This tool specializes more
Z. Al-Ameen et al.: Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: 34
A Laconic Review

in processing digital videos than still images. It has many Current forensic software products typically address a
video processing abilities, such as the extraction of useful small number of related technical tools. However, Amped
information from multiple video frames, recovery of Authenticate places the strength of manifold assessments,
invisible details in the original video, output of multiple processes, and reporting in one platform to ameliorate the
results. Not like the standard video processing algorithms, ability of the operator in identifying original or doctored
the algorithms of this tool can track complex motion, and images. It is not easy to distinguish an original image from
thus, improve the visible quality of various objects in a an edited version. Worldwide, there are only a few experts
video. Finally, this tool has proper algorithms for noise who can, with certainty, determine whether a digital file is
attenuation, regardless of its type [11]. Fig. 4 shows a original or edited. This is usually accomplished using
sample result obtained by this tool (www.motiondsp.com). homemade tools and advanced scientific methods. Because
both courts and lawyers are realizing the ease at which a
digital photo can be manipulated, this small group of
specialists is increasingly being called upon. Thus, the use
of Amped Authenticate is very important in the forensic
field owing to the existence of many cases that require the
detection of original or edited images [12]. Fig. 5 exhibits
a sample result obtained by this tool (satech-co.com).

B. Verifeyed
Verifeyed is a high-tech image analysis tool that can be
Fig. 4. A sample result obtained by the Ikena tool. easily used to detect digitally tampered images, and
estimate the area of alteration in a processed image.
3. Image Tampering Detection Tools Moreover, this tool can determine edits of PDF and video
files. In addition, this tool has the ability to recognize the
Contemporary software has made image tampering device that created the image, which can be a camcorder,
easier to achieve and harder to expose. However, advanced cell phone, or digital camera. Further, it can highlight
computer forensic technology has provided new tools for doubtful (altered) areas in videos and images. The
detecting doctored images. In this section, four renowned innovative technology of this tool was attained as a result
tools for image tampering detection are highlighted, with of a huge effort from forensic experts, and other related
full discussion of every important aspect. specialists, to enable users to employ advanced algorithms
to easily analyze digital images or videos. As a final point,
A. Amped Authenticate this tool is utilized by prominent forensics agencies,
Amped Authenticate was developed as a forensic tool companies, business-oriented services, and has received
for alteration detection and digital image authentication. numerous awards from renowned research and industrial
This tool provides a variety of applications that can organizations [13]. Fig. 6 reveals sample results obtained
determine whether an image is an original created by a by this tool (verifeyed.com).
particular device, an unmodified original, or the outcome
of an alteration with an image processing tool, which is not
admissible as evidence.

Fig. 6. Sample results obtained by the Verifeyed tool.

C. Belkasoft
Belkasoft provides an automated authentication analysis
for evidence images. Moreover, it can produce an
estimation of the authenticity of an image, and measure
such on a simple scale of 1 to 100. Its expert forgery
Fig. 5. A sample result obtained by the Amped Authenticate tool. detection function can consistently identify doctored and
forged images, among many files in a given device.
Likewise, this function uses advanced technology that
relies on the examination of quantization and compression
35 TechArt: Journal of Arts and Imaging Science, Vol. 4, No. 1, February 2017

artifacts in a given image. This can detect manipulations, Fig. 8. A sample result obtained by the Fotoforensics tool.
edits, or modifications, for digital videos and still images.
Furthermore, this tool has the option of detecting double 4. Conclusion
compression artifacts, which overtly represent the
evidence image being modified. Moreover, this tool can The tools that are investigated in this study are deemed
check for different bits of information that usually exist in significant. Many tools have been developed to investigate
digital images when they are captured by a specific camera, image sources, detect image tampering, authenticate
including EXIF data and camera tags. Such bits of acquisition devices, or improve the visible quality of the
information are frequently released by an image editing obtained images. Among them, tampering detection tools
application. Finally, an inclusive database of camera and image visible quality improvement tools are the most
information comes with this tool, which contains data frequently used. Despite major achievements, various
regarding thousands of various well-known models of challenges still exist regarding DIF tools, wherein the
digital cameras [14]. Fig. 7 exemplifies a sample result robustness of such tools remains a primary concern. Many
obtained by this tool (belkasoft.com). research studies have been introduced to compare the
processing ability of various reliable DIF tools. However,
as yet, no study has been introduced that provides an
inclusive comparison between the different contemporary
tools. Hence, it is reasonable to say that new comparative
studies will soon appear that make important information
available for many DIF tools. Such an event is necessary
for enhancing communications between researchers and
improving research studies to provide more robust DIF
Fig. 7. A sample result obtained by the Belkasoft tool.
tools, making such a domain attractive for new scholars.

D. Fotoforensics Acknowledgment
Fotoforensics is a free online forensic tool that can be
The authors would like to thank the esteemed reviewers
utilized by anyone to determine whether a given image is
for their constructive comments.
digitally altered by identifying its altered parts. Images can
be uploaded from any electronic device with a web
browser. In addition, this tool allows the examination of References
metadata information and original details of the given
image. Likewise, this tool generates electronic forensic [1] H. Guo, B. Jin, and D. Huang. "Research and review
reports for the checked images. This forensic tool utilizes on computer forensics." In Forensics in
sophisticated algorithms to detect edits in digital images. Telecommunications, Information, and Multimedia,
pp. 224-233. Springer Berlin Heidelberg, 2010.
Further, it employs a method called error level analysis to
recognize regions inside an image that have dissimilar [2] T. Bass, "Intrusion detection systems and multisensor
levels of compression. With image types that support data fusion." Communications of the ACM, vol. 43,
compression, such as JPEG, all the regions inside the no. 4, pp. 99-105, 2000.
image should have similar levels of error. If a major [3] M Taylor, J. Haggerty, D. Gresty, and D. Lamb,
difference in the levels of error is detected, it is a clear "Forensic investigation of cloud computing
indication that a digital alteration was made to that image. systems", Network Security, vol. 2011, no. 3, pp. 4-10,
Using this tool, it is possible to see the level of alteration, 2011.
vital image information, which software altered the
checked image, and so forth [15]. Fig. 8 represents a [4] W. Allen, "Computer forensics", IEEE Security &
sample result obtained by this tool (fotoforensics.com). Privacy, vol. 3, no. 4, pp. 59-62, 2005.
[5] S. Garfinkel, "Digital forensics research: The next 10
years", Digital Investigation, vol. 7, pp. S64-S73,
2010.
[6] J. Redi, W. Taktak, and J. Dugelay, "Digital image
forensics: a booklet for beginners", Multimedia Tools
and Applications, vol. 51, no. 1, pp. 133-162, 2010.
[7] L. Moriarty, Criminal justice technology in the 21st
century. Charles C Thomas Publisher, 2005.
Z. Al-Ameen et al.: Modern Visibility Enhancement and Tampering Detection Tools of Digital Image Forensics: 36
A Laconic Review

[8] M. Jahanirad, A. Wahab, and N. Anuar, "An in Computer Science from the University of Agra, India in 2013. His
research interests include computer database, computer networks,
evolution of image source camera attribution
education information technology, educational techniques, e-learning,
approaches", Forensic Science International, vol. 262, multimedia technology, and research methodology. Currently, he is a full-
pp. 242-275, 2016. time lecturer at the Department of Psychology, University of Duhok.

[9] Shahraki, H. Sayyadi, M. Amri, and M. Nikmaram,


"Survey: video forensic tools", Journal of Theoretical
and Applied Information Technology, vol. 47, no. 1,
pp. 98-107, 2013.
[10] G. Reis, “Photoshop CS3 for forensics professionals:
a complete digital imaging course for investigators”.
John Wiley & Sons, 2007.
[11] N. Bozinovic, "Practicing super-resolution: what
have we learned?", In Super-Resolution Imaging, P.
Milanfar ed. CRC Press, New York, USA, pp. 413-
448, 2010.
[12] P. Lokhande and B. Meshram, "Digital Forensics
Analysis for Data Theft", The International Journal
of Forensic Computer Science, vol. 10, no. 1, pp. 29-
51, 2015.
[13] B. Mahdian and S. Saic, "Image tampering detection
using methods based on JPEG compression artifacts:
a real-life experiment." In Proceedings of the 4th
International Symposium on Applied Sciences in
Biomedical and Communication Technologies.
October 26-29, Barcelona, Spain; no. 176, pp. 1-5,
2011.
[14] J. Kamenicky, M. Bartos, J. Flusser, B. Mahdian, J.
Kotera, A. Novozamsky, S. Saic, Filip Sroubeka, M.
Sorel, A. Zita, B. Zitova, Z. Sima, P. Svarc, and J.
Horinek, "PIZZARO: Forensic analysis and
restoration of image and video data", Forensic
Science International, vol. 264, pp. 153-166, 2016.
[15] M. Arun-Anoop, "Image forgery and its detection: A
survey", In IEEE International Conference on
Innovations in Information, Embedded and
Communication Systems. 19-20 March, Coimbatore,
India; pp. 1-9, 2015.

Biographies
Zohair Al-Ameen was born in 1985. He received his
BSc degree in Computer Science from the University
of Mosul in 2008. Then, he received his MSc and PhD
degrees in Computer Science from the Technological
University of Malaysia in 2011 and 2015, respectively.
He was awarded the best student award owing to the
outstanding performance in his PhD studies. His
research interests include algorithms design, artificial
intelligence, computer forensics, computer vision, digital image
processing, information technology, and research methodologies.
Currently, he is a full-time lecturer at the Department of Computer
Science, University of Mosul. He has authored many articles which are
published in international journals of high repute.

Chiai Al-Atroshi was born in 1984. He received his


BSc degree in Computer Science from the University
of Mosul in 2005. Then, he received his MSc degree

View publication stats

You might also like