UNIVERSITY OF PRISHTINA
Faculty of Electrical and Computer Engineering
Image Forensics
Abstract
Nowadays digital media is one of the main means for information sharing and communication. Considering a large number of different photo-editing software applications and the advent of high resolution cameras the counterfeiting and the manipulation of images has become quite easy, thus we can say that the photography was manipulated a long time ago. Image forensics is a field that has an aim to validate the authencity of images through their history information.
…show more content…
The digital era has made the fogery very simple and fast, therefore with today’s technology we can produce fakes on the go. This has made it a very difficult to find legitimacy of the photo because sometimes the real legitim photo appears to be fake and vice-versa, therefore to restore the credibility and authenticity of the real images we need more sophisticated methods.
3 Digital Image Forensics
Digital image forensics is a fairly new research field that mainly aims to gather the information about the history of the image, knowing that any tampering of the image leaves some kidn of a trace that will reveal if the image has been tampered. As a part of challenges that Digital Image Forensics inherits are the Steganography and Digital Watermarking. Both of these methods conceal information to protect the authencity and integrity as well as to protect wrightful owner.
The role of Digital Image Forensics is to prove the authenticity of the image for which we don’t have any previous reference or protection settings for integrity. These methods are usyally called the passive methods or blind methods.
Steganography and Digital Watermarking are not part of the main discussion in this document, thus we will try to describe both just briefly because they are closely connected with Digital Image
…show more content…
Steganography has been also categorized as cryptography by many authors because hiding a message is considered as somekind of secret writing. The main types of steganography are Technical Steganography and Linguistic Steganography. We will not go deeper in describing these types since as mentioned Steganography is not the main theme of the discussion in this document.
3.2 Digital Watermarking
Digital watermark also known as forensic watermark is a peace of code embedded into an image document or video and it can be visible or invisible. Main aim of digital watermark is to protect the authenticity of a document and its author
A case study includes analysis of a particular criminal case or event that took place and is significant due to a number of reasons. A case study helps us learn about a particular type of case and how such a case is to be approached , how the results of the case are obtained and what it’s final outcome in terms of legal decisions is. A case study helps us form a more practical idea of theoretical things by giving us an example of a real life scenario. The following is a case study to make us understand about the importance of DNA sequencing to solve a crime case. THE CASE OF ANDREWS ( ANDREWS v. STATE OF FLORIDA, 1988) Case Details:
CO4507 Digital Forensic Investigation Introduction Nowadays digital devices are everywhere in our life’s helping peoples in many sectors and providing possibilities to them. By pronounce the term “digital devices” the majority of the peoples thinking the computers, smart phones, tablets and the cloud applications. Now the digital devices are important not only in our work environment, or for entertainment and educational reasons, but are important because we can use them as digital evidence. Any kind of technology that processes information can be used in a criminal way vise versa can be used as digital evidence in the court.
“The special properties and technical complexity of digital evidence often makes it even more challenging, as courts find it difficult to understand the true nature and value of that evidence (Boddington, 2015)”. It’s not uncommon for innocents to be convicted and guilty people acquitted because of digital evidence (Boddington, 2015). However, other factors can also affect the validity of the evidence, including: failure of the prosecution or a plaintiff to report exculpatory data; evidence taken out of context and misinterpreted; failure to identify relevant evidence; system and application processing errors; and so forth (Boddington, 2015). “There is a perception, largely undeserved, that digital evidence somehow alters the true nature of the original evidence and is therefore unreliable. Presented properly, digital evidence is capable of being of tremendous assistance to the courts (Hak,
With the introduction of new technology in recent years, the government can discreetly capture evidence from electronic files,
Can an image tell us everything we want to know about what happened? Why or why not? An image can not tell us everything we want to know about what happened. The images can be changed or altered by a editor during and after a person is having an interview for example or even a picture with photoshop.
The Richard Ramirez "Night Stalker" case was one of the first major cases to use automated fingerprinting technology (Frese, 2011). Today, the fingerprinting database gives various probable identifications, then a trained fingerprint expert must compare the prints to find a likely identification. Considering that Ramirez's prints were found on the mirror of a stolen vehicle we can conclude that his fingerprints were two-dimensional, therefore the prints are termed as latent or residue prints. The authorities at the crime scene power-dusted his prints considering that is the best physical method for collecting fingerprints. Once analyzed using the ACE-V (analysis, comparison, evaluation and verification) method, the fingerprint expert was able to identify them as belonging to Ramirez.
How Digital Forensics Helped Hunt Down ‘The Craigslist Killer’ The case of The Craigslist Killer may not have made news all over the world, but it certainly made shocking headlines in the US, particularly in Quincy, Massachusetts. Philip Markoff was charged with murder, armed robbery, kidnapping and unlawful possession of a firearm. While his crimes drew a lot of attention, what was happening behind the scenes was actually the most interesting part.
Fingerprinting is method based on the uniqueness of the skin pattern - that is, each person has a completely individual pattern of papillary lines. These patterns do not change throughout life and have the property of recovering from damage to the skin in its previous form. On the one hand, this method almost completely eliminates the mistake, and on the other hand it is very cheap and easy to use (in contrast the method of identification of a person by DNA). Fingerprinting allows: 1) to identify the person who left the prints, according to the general and particular features of the papillary pattern displayed on them; 2) to exclude individual from among those who have touched the object; 3) to narrow the group of individuals suspected of the particular crime (for instance, provided that the imprint shows traces of a scar, a burn, a wart or some other distinctive feature).
Student Name: Keshab Rawal Student ID: 77171807 Word Count: Title: The rise of anti-forensics: The rise of anti-forensics: Tables of contents: • Overview • Introduction • History • Categories/Tools of anti-forensics • Conclusion • Future Work Overview: Computer forensics is an active topic of research, with areas of study including wireless forensics, network security and cyber investigations. The goal of the computer forensics is to provide information about how the crime happened, why and who is involved in the crime in any legal proceeding by using the computer forensic tools.
With two clicks of a button, the picture is instantly duplicated onto a new file. And there 's really no way to determine whether the image is a duplicated forgery because stolen digital art can be completely identical to the original, right down to the individual pixels. Artists can add a watermark to their work and display their name to gain recognition for their art. These watermarks can vary from small signatures in the corner, to large copyright notices stamped right in the middle of the image.
D Assessment DNA technology Forensic testing 24.11.2014 Marius Martinsen 10D Introduction: I have chosen to investigate Forensic testing, it is also known as DNA profiling or genetic fingerprinting. During this essay I will discuss what the disadvantages and what the advantages of forensic testing are. I will also talk about how forensic testing is carried out. Forensic testing is used to identify an individual by using the DNA sequences of that person.
Face recognition technology [1] is the least intrusive and fastest biometric technology. It works with the most obvious individual identifier – the human face. Instead of requiring people to place their hand on a reader (a process not acceptable in some cultures as well as being a source of illness transfer) or precisely position their eye in front of a scanner, face recognition systems unobtrusively take pictures of people 's faces as they enter a defined area. There is no intrusion or delay, and in most cases the subjects are entirely unaware of the process. They do not feel "under surveillance" or that their privacy has been invaded.
Crime scene photography, sometimes referred to as forensic photography or forensic imaging, is the art of producing an accurate representation of an accident or crime scene. Crime scene photography is an important asset in the collection of evidence at the crime scene, documents the appearance and location of victims, shell casings, footprints, bloodstain patterns, and other physical evidence. In order for photographs to be admissible in a court of law, the standard for photographs of crime scenes and evidence must be of sufficient quality. Photography has a vital role in the decision made in court because the pictures are to represent the scene as it was exactly. Digital SLR single reflex camera is the most often used camera in crime scene investigations.
The following section will consider advantages and limitation of the first two mentioned types of digital forensics: Traditional (dead) and Live computer forensics. TRADITIONAL (DEAD) VS LIVE DIGITAL FORENSICS Traditional (Dead) Forensics In order forensic acquisition to be more reliable it must be performed on computers that have been powered off. This type of forensics is known as ‘traditional’ or 'dead ' forensic acquisition. The whole process of dead acquisition, including search and seizure flowchart and acquisition of digital evidence flowchart is shown on Figure 2 and Figure 3 respectively.
2.1 Definition of Computer Forensics Computer forensics is the general term used to describe the acquisition, preservation, analysis and presentation of digital evidence(s). Computer Forensics is “the science that is concerned with the relation and application of computers and legal issues” (Kuchta 2000). This definition attempts to show the link between forensic science and law or legality.