SlideShare a Scribd company logo
A short introduction to Multimedia
Forensics: the science
discovering the history of
multimedia contents
Sebastiano Battiato
Dipartimento di Matematica e Informatica,
Università di Catania
Image Processing LAB – http://iplab.dmi.unict.it
battiato@dmi.unict.it
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Forensic science (often shortened to forensics) is the practical
application of science to matters of the law. Use of scientific
methods for gaining probative facts (from physical/analog or
digital evidences )
History of Digital Forensics
• Earliest notion of digital forensics came when the Federal
Rules (US) of evidence first started to discuss digital
evidence in the 1970s
• Real digital forensics investigations started in the mid-to late
1980s when federal agents had to start figuring out ways to
search computers for digital evidence
• This “home-grown”, bottom-up approach continued until the
late 1990s when security researchers at universities and
labs started to figure out that this problem was big enough to
warrant investigation.
• First research groups started around 2000 or 2001.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
The first Digital Forensics Research
Workshop (DFRWS) was held in Utica, NY in
August 2001.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia
Forensics
- Source identification
- Integrity verification/tampering detection
Techniques from multimedia forensics merely provide a way to
test for the authenticity and source of digital sensor data. In this
sense is not about analyzing the semantics of digital or
digitized media objects.
Multimedia Forensics (in academic
literature)
• The terms appeared in early 2000
• K. J. Ray Liu, on “Multimedia Forensics: Where
Sherlock Holmes Meets Signal Processing” Invited
talk @ ICME 2006
• Multimedia Forensics is not Computer Forensics
(2009, Bohem et al.)
• Recent Surveys on the field (Stamm 2013, Piva 2013)
• WIFS, TIFS, Dedicated workshop at major conference
(ACM MM, ICME, ICIAP), Special issues on Int. Journal
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Forensics (in practice)
• Source Identification
• Integrity/Authenticity
• Enhancement/Restoration
• Interpretation and Content Analysis
– Plate Recognition
– Dynamic Reconstruction (car crashes, etc.)
– Antropomethric issues
– …
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
“Forensics Image (Video) analysis is
the application of IMAGE SCIENCE
and DOMAIN EXPERTISE to interpret
the content of an image or the image
itself in legal matters” (SWGIT –
www.fbi.gov)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Recent documents:
• 2015-09-29 SWGDE Best Practices for Photographic Comparison for All
Disciplines
• 2015-09-29 SWGDE Image Processing Guidelines
• 2015-09-29 SWGDE Proposed Techniques for Advanced Data Recovery
from Security Digital Video Recorders v1-1
• 2015-09-29 SWGDE Training Guidelines for Video Analysis, Image
Analysis and Photography V1-1
https://www.swgde.org/
Fantasy/Fiction
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
CSI
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Reality
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
I Need That Plate! No Way...
Fantasy
• We cannot introduce new information
(there is no data..)
• But we can enhance and extract only
something already present
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
• What is the minimum quality for video? “Minimum quality”
doesn’t exist.
• The success of the enhancement depends on several
factors:
Main goal (video captured with an HD camera but the
license plate we need to extract is too far away)
Technical related details: Resolution of the area of
interest, Level of compression, Presence of blur /
focus, Number of available frames, Noise / brightness
and contrast
• It’s important to understand which defects are
present in order to apply the proper tools.
Understand When It’s Possible To Get
Something
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Perspective Correction
Geometrical transformation
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Forensics is based on the idea
that inherent traces (like digital fingerprints)
are left behind in a digital media during both
the creation phase and any other
successively process.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
• Example:
• Forensic analysis of a smartphone: which pictures have been generated
on the device and which ones have been generated by other devices
and sent by messaging application or saved from the internet
• We can identify:
• Type of device
• Maker and model
• Specific exemplar
Camera Ballistics
Which Device Has Created This Picture?
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Source Identification Noise Based
Sensor output carries not only pure signal
but also various noise components. Sensor
noise model could be used as a
representative feature for cameras.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Sensor Identification Using
Pattern Noise
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Sensor Identification Using
Pattern Noise
This method provide good results, and is
quite reliable also using:
–images with different level of JPEG
compression (low, medium and high)
–images processed using point-wise operator
such as brightness/contrast adjustment or
gamma correction.
–images acquired by two cameras of the same
brand and model.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Integrity: What is a Forgery?
• “Forgery” is a
subjective word.
• An image can
become a forgery
based upon the
context in which
it is used.
• An image altered for fun or someone who has taken an bad
photo, but has been altered to improve its appearance
cannot be considered a forgery even though it has been
altered from its original capture.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
What is a Forgery?
• The other side of forgery are those who perpetuate a
forgery for gain and prestige
• They create an image in which to dupe the recipient into
believing the image is real and from this be able to gain
payment and fame
• Three type of forgery can be identified:
•An image that is created using graphical software
•An image where the content has been altered
•An image where the context has been altered
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
The content has been altered
Duping the recipient into believing that the objects in an
image are something else from what they really are!
November 1997: After 58 tourists were killed in a terrorist attack at the
temple of Hatshepsut in Luxor Egypt, the Swiss tabloid Blick digitally altered
a puddle of water to appear as blood flowing from the temple.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
The context has been altered
• Objects are be removed or added,
for example, a person can be
added or removed
• The easiest way is to cut an
object from one image and insert
it into another image – image
editing software makes this a
simple task
• An example is this altered image
which could be used to influence
events in foreign countries which
are not aware of manipulation.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Altering Images
The concepts have moved
into the digital world by
virtue of digital cameras
and the availability of
digital image editing
software
The ease of use of digital image editing software, which does
not require any special skills, makes image manipulation easy
to achieve.
circa 1860: This nearly iconic portrait of U.S. President
Abraham Lincoln is a composite of Lincoln's head and the
Southern politician John Calhoun's body.
27
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Off-side (February 2011)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Barcelona – Athletico Bilbao
Sydney conman
who photoshopped
pictures of himself
with famous people
gets 12 years’jail
http://www.smh.com.au
31
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
More (and more) examples
Photo Tampering through History
http://www.fourandsix.com/photo-tampering-history/
Photoshopdisaster
http://www.photoshopdisasters.com/
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
http://petapixel.com/2013/05/08/how-photographers-photoshopped-their-pictures-back-in-1946/
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Image Editing (2)
 Malicious image editing alters the image semantic
content, mainly:
 Adding information
 Removing information
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Piva 2013
Image Editing (2)
• Splicing (two images)
– Also called cut and paste, compositing
– Used to add information
• Cloning (single image)
– Also called copy and paste, copy move, region duplication
– Used to add or remove information
– Can be exact, or the clone can be resized, rotated…)
• Inpainting (kind of intelligent clone)
– Seam carving, content aware resize, content aware fill, content dependent crop
– Used to remove information
• Retouch (local editing)
– Dodge and burn, healing tool…
• Image enhancement/filtering
– Histogram equalization, contrast enhancement, median filtering, denoise, smooth…
• Image editing (geometric transformation)
– Resize, crop, zoom, shear
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Analog Vs. Digital
• Analogue evidence (audio, photo, video)
– Has always an original (negative or positive)
– Copies are never an exact replica of the original
– Copies of copies will be further deteriorated
• Digital evidence
– Only a finite sequence of number
– Exact copies can be made
– No loss of information between generations
– Every copy of a digital data can be considered the original,
unless is tagged in order to be distinguished by copies
Best evidence clause (Federal Rules of Evidence 1003): if data is stored
in a computer or similar device, any printout readable by sight, shown to
reflect the data accurately, is an “original”.
36
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Original File: Special Cases
• Recapture: create a fake and then take a
picture with the camera we want to
pretend the picture was taken with
• Staging: the image file is authentic, but
the content has been staged
In these cases an authentic file does not
imply an authentic content.
37
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
How To Authenticate An Image?
• Visual Inspection
• File Analysis
File Format and Structures
Metadata (EXIF)
Compression Parameters (Quantization
Tables)
• Global Analysis
Pixel and compressed data statistics
• Local Analysis
Finding inconsistencies of pixel statistics
across the image
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Image Forensics Methods
Active Methods: Hiding a mark or a
message in a picture when it is created:
WATERMARKING
Drawbacks:
• limitate to specially equipped
(=expensive) digital cameras;
• not so robust.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Image Forensics Methods
Passive Methods: Using the alterations of
the underlying statistics produced by digital
forgeries on an image:
PHYSICS BASED
CAMERA BASED
PIXEL BASED
GEOMETRIC BASED
FORMAT BASED
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
INTERPOLATION
LENS CFA SENSOR
POST
PROCESSINGDIGITAL IMAGESTORAGE
Processing and
Storage
ORIGINAL
IMAGE
Acquisition
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Types Of Analysis: Scene Level
• Use features of the scene, not of the image pixels and could work well also
on scanned photos
• Difficult to spoof
– Most forgeries contains slight errors not visible by human eye but detectable by
proper analysis
• Difficult to automatize the analysis
– Requires a lot of experience
• Better results on splicing, less successful on forgeries which are hiding
something
• Physics based:
– Lighting
• Geometry and perspective inconsistencies
– Principal point analysis
– Shadows
– Photogrammetry
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Types Of Analysis: Signal Level
Based on statistical features of pixel values; need good quality image
• Clone detection
– Cloned image blocks
– Similar couples of key points
• Resampling detection
– For resize, rotate, but also when splicing or cloning
• Enhancement Detection
– Specific for algorithms (median, histogram equalization, color
adjustment)
• Seam carving detection
• General intrinsic footprints
• Inconsistencies from acquisition and coding fingerprints
– CFA, PRNU, DCT, ELA…
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Format-Based
JPEG compression engine
(for both luminance and chrominance channels):
the input image is
partitioned into 8x8
non-overlapping blocks
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
A JPEG image (luminance component only)
Format-Based
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Format-Based
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Format-Based
JPEG compression engine
(for both luminance and chrominance channels):
the input image
is partitioned
into 8x8 non-
overlapping
blocks
a DCT transform
is applied to each
block
Format-Based
JPEG forgery engine
THE TYPICAL PIPELINE
FOR A COPY-PASTE
OPERATION
+
=
original image
QF(1) = q1
resulting image
QF(3) = q3
2nd image
QF(2) = q2
duplicating
resizing
Order of quantization
Top row: single quantized with steps 2 (left) and 3 (right).
Bottom row: double quantized with steps 3 followed by 2 (left), and 2
followed by 3 (right)
F. Galvan, G. Puglisi, A. R. Bruna, S. Battiato, First Quantization Matrix Estimation from Double Compressed JPEG
Images, IEEE Transactions on Information Forensics and Security, 2014.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Current Trends And
Challenges
Current Trends: Point&Shoot
and Share…
Social MF on Facebook
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Preliminar studies involving:
- Different devices
- Dataset of images:
- Different Scene (outdoor artificial,
outdoor natural, indoor)
- Different Quality (resolution and
compression)
- Different upload setting
has proven that some invariance could be
guaranteed.
Some specific editing could be then traced
and used to retrieve useful info about
image before uploading.
Moltisanti, Paratore, Battiato, Saravo - Image Manipulation on Facebook for Forensics
Evidence – ICIAP 2015, LNCS 2015;
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Social (Multimedia) Forensics
• Image and Video Phylogeny
ReVeal project
Video Fingerprint
• Photo DNA
(http://www.microsoftphotodna.com/ )
• VideoGenome
(http://v-nome.org/ )
• Videntifier
(http://www.eff2.net/ )
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
73
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
PRNU on Video (online)
Each video is re-encoded (compressed) after it is uploaded. This
compression is needed to reduce the bandwidth usage by reducing the file
size and thus increasing streaming speeds.
By re-encoding the video, the video is altered which makes it harder to
identify the source.
Related performances depends on the brand of the camera, the resolution
and the amount of compression.
The reliability of the PRNU pattern decreases exponentially if the
compression becomes higher.
Challenges:
- Video obtained by some post processing (e.g., transition effects, fusion of
more than one source, …)
- No reference available
- Various Encoders
Who Cares?
media
Who Cares?
geopolitics
…
…and political propaganda
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Advertisement
WorldPhotoPress 2012: faked?
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
When is an image fake, and when
is it merely enhanced?
WPP Report:The integrity of the
Image (Nov. 2014)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Current practices and accepted
standards relating to the
manipulation of still images in
photojournalism and documentary
photography.
Media organizations
prohibit the alteration of
images beyond
traditional darkroom
techniques.
It means – as first – that the
alteration of images – where
alteration means the digital
addition or subtraction of
elements is forbidden
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Data Manipulation on Science: Images
Gilbert, N. “Science Journals Crack down on Image Manipulation.” Nature (2009):
doi:10.1038/news.2009.991.
Source: Office For Research Integrity (ORI)
Forgery on Biomedical Images
Corriere della Sera – Ottobre 2013
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Plagiarized paper:
Fabrication of
Monodisperse Magnetic
Fe3O4-SiO2
Nanocomposites with Core-
Shell Structures Hua Fang,*
Chun-yang Ma, Tai-li Wan,
Mei Zhang, and Wei-hai Shi
J. Phys. Chem C 2007, 111,
1065-1070
Original Paper
Oriented Assembly of
Fe3O4 Nanoparticles into
Monodisperse Hollow
Single-Crystal Microspheres
Yu et al, J. Phys. Chem. B
2006, 110, 21667-21671
(Figure 3)
M. Rossner and K. M. Yamada, “What’s in a picture? The temptation of image manipulation.,”
J. Cell Biol., vol. 166, no. 1, pp. 11–5, Jul. 2004.
Forgery on Science
Forgery on Science
“What’s in a picture? The temptation of image manipulation.,” J. Cell Biol., vol. 166, no. 1, pp.
11–5, Jul. 2004.
Body-Worn camera
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Image Manipulation: Case “Mozzarella Blu”
Multimedia Truthfulness
Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness
Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness
Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Evidence on the web
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
http://revealproject.eu/
http://www.rewindproject.eu/
http://maven-project.eu/#_=_
https://s-five.eu/
The first public draft of the FIVE Best
Practice Manual is publically available
from Oct. 9, 2015 ("October/DIWG2015
version"): DRAFT_BPM_FIVE_20151009
Future of Imaging
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Nikon
Sharing
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Conclusions
• Multimedia Forensics is now a
consolidated field but new intriguing
challenges emerge every day.
• The various involved actors are expected:
– To disseminate «basic knowledge»
– To share «best practices» and results
– To identify new challenges
– ..
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Survey
• Matthew C. Stamm, Min Wu and K. J. Ray Liu,
Information Forensics: An Overview of the First
Decade (2013), in: IEEE Access, 1(167-200)
• Alessandro Piva, An Overview on Image Forensics
(2013), in: ISRN Signal Processing, 2013 (Article ID
496701, 22 pages)
- C. Baron - Adobe Photoshop Forensics – Sleuths,
Thruts, and Fauxtography – Thomson Course
Tehcnology - 2009
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
On line Resources
Tutorial by Prof. Hany Farid - Digital Image Forensics:
lecture notes, exercises, and matlab code for a survey
course in digital image and video
forensics. http://www.cs.dartmouth.edu/farid/downloads/tutor
ials/digitalimageforensics.pdf
Special Issue on Multimedia in Forensics, Security and
Intelligence - IEEE Multimedia Magazine Vol. 19, Issue 1,
pp. 17-19, 2012
SOFTWARE: Amped5, Authenticate, Adroit, Four&Six, Izitru,
Ghiro, …
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Credits
• Amped (www.amped.it)
• Undergraduate course: Computer
Forensics – University of Catania
(http://www.dmi.unict.it/~battiato/CF.html)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Prof. Sebastiano Battiato
Dipartimento di Matematica e Informatica
University of Catania, Italy
Image Processing LAB – http://iplab.dmi.unict.it
battiato@dmi.unict.it
Main Contacts
Further Info
Image Processing Lab
Università di Catania
www.dmi.unict.it/~iplab
Email
battiato@dmi.unict.it
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015

More Related Content

What's hot

E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
edwardbel
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
Online
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
Alexandru Dorobantu
 
Forensic science modern_methods_of_solving_crime
Forensic science modern_methods_of_solving_crimeForensic science modern_methods_of_solving_crime
Forensic science modern_methods_of_solving_crimePriscila Ribeiro
 
Forensic report (rajat mishra)
Forensic report (rajat mishra)Forensic report (rajat mishra)
Forensic report (rajat mishra)
Mishra Rajat
 
Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstruction
nitin Pandey
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
urjarathi
 
Bloodstain pattern analysis
Bloodstain pattern analysisBloodstain pattern analysis
Bloodstain pattern analysis
chaitra pradeep
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptx
kiran yadav
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDAmb Steve Mbugua
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
kiran malik
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
Faimin Khan
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
Megha Sahu
 
conventional methods of fingerprint development
 conventional methods of fingerprint development conventional methods of fingerprint development
conventional methods of fingerprint development
faraharooj
 
Police and Detective Training Schools
Police and Detective Training SchoolsPolice and Detective Training Schools
Police and Detective Training Schools
Applied Forensic Research Sciences
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
DINESH KAMBLE
 
forensic report.pptx
forensic report.pptxforensic report.pptx
forensic report.pptx
AARTI534988
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
John J. Carney, Esq.
 
Development of Latent Fingerprints
Development of Latent FingerprintsDevelopment of Latent Fingerprints
Development of Latent Fingerprints
Hamza Mohammad
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
rakesh mishra
 

What's hot (20)

E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Palmprint recognition presentation
Palmprint recognition presentationPalmprint recognition presentation
Palmprint recognition presentation
 
Forensic science modern_methods_of_solving_crime
Forensic science modern_methods_of_solving_crimeForensic science modern_methods_of_solving_crime
Forensic science modern_methods_of_solving_crime
 
Forensic report (rajat mishra)
Forensic report (rajat mishra)Forensic report (rajat mishra)
Forensic report (rajat mishra)
 
Crime scene reconstruction
Crime scene reconstructionCrime scene reconstruction
Crime scene reconstruction
 
Search & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus TechnologiesSearch & Seizure of Electronic Evidence by Pelorus Technologies
Search & Seizure of Electronic Evidence by Pelorus Technologies
 
Bloodstain pattern analysis
Bloodstain pattern analysisBloodstain pattern analysis
Bloodstain pattern analysis
 
crime scene.pptx
crime scene.pptxcrime scene.pptx
crime scene.pptx
 
CRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILEDCRIME SCENE MANAGEMENT COMPILED
CRIME SCENE MANAGEMENT COMPILED
 
forensic questioned document examination
forensic questioned document examinationforensic questioned document examination
forensic questioned document examination
 
Biometric Signature Recognization
 Biometric Signature Recognization Biometric Signature Recognization
Biometric Signature Recognization
 
Encase Forensic
Encase ForensicEncase Forensic
Encase Forensic
 
conventional methods of fingerprint development
 conventional methods of fingerprint development conventional methods of fingerprint development
conventional methods of fingerprint development
 
Police and Detective Training Schools
Police and Detective Training SchoolsPolice and Detective Training Schools
Police and Detective Training Schools
 
Forensic imaging
Forensic imagingForensic imaging
Forensic imaging
 
forensic report.pptx
forensic report.pptxforensic report.pptx
forensic report.pptx
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Development of Latent Fingerprints
Development of Latent FingerprintsDevelopment of Latent Fingerprints
Development of Latent Fingerprints
 
Analysis of digital evidence
Analysis of digital evidenceAnalysis of digital evidence
Analysis of digital evidence
 

Viewers also liked

Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Low power project_presentation
Low power project_presentationLow power project_presentation
Low power project_presentation
Richu Jose Cyriac
 
Cryptoppt
CryptopptCryptoppt
Multimedia introduction
Multimedia introductionMultimedia introduction
Multimedia introduction
John Ospina
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
Tharindu Rusira
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
Amirul Wiramuda
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentationdegarden
 
History of Multimedia
History of MultimediaHistory of Multimedia
History of MultimediaDaron Magsino
 
Multimedia and all about it.
Multimedia and all about it.Multimedia and all about it.
Multimedia and all about it.
Sujan Kafle
 

Viewers also liked (10)

Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Low power project_presentation
Low power project_presentationLow power project_presentation
Low power project_presentation
 
Cryptoppt
CryptopptCryptoppt
Cryptoppt
 
Multimedia introduction
Multimedia introductionMultimedia introduction
Multimedia introduction
 
Video Forgery Detection: Literature review
Video Forgery Detection: Literature reviewVideo Forgery Detection: Literature review
Video Forgery Detection: Literature review
 
Block Cipher vs. Stream Cipher
Block Cipher vs. Stream CipherBlock Cipher vs. Stream Cipher
Block Cipher vs. Stream Cipher
 
Stream ciphers presentation
Stream ciphers presentationStream ciphers presentation
Stream ciphers presentation
 
History of Multimedia
History of MultimediaHistory of Multimedia
History of Multimedia
 
Multimedia and all about it.
Multimedia and all about it.Multimedia and all about it.
Multimedia and all about it.
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Similar to A short introduction to multimedia forensics the science discovering the history of multimedia contents

Intro to new and digital media
Intro to new and digital mediaIntro to new and digital media
Intro to new and digital media
CHSGmedia
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
Marc Vael
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
Symeon Papadopoulos
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
CSIRO National AI Centre
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET Journal
 
Image Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel BrochureImage Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel Brochuremonicamckenzie
 
Mastering Digital Media Literacy: Navigating Information in the Digital Age
Mastering Digital Media Literacy: Navigating Information in the Digital AgeMastering Digital Media Literacy: Navigating Information in the Digital Age
Mastering Digital Media Literacy: Navigating Information in the Digital Age
Selcen Ozturkcan
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
360mnbsu
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the Browser
InVID Project
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing Systems
Jason Hong
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
Atifa Aqueel
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
Simon Aderinlola
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
jaspreetkaur908049
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)OliverGibbs505
 
Vision about Social Networks Content Exploitation (EC Concertation meeting)
Vision about Social Networks Content Exploitation (EC Concertation meeting)Vision about Social Networks Content Exploitation (EC Concertation meeting)
Vision about Social Networks Content Exploitation (EC Concertation meeting)
Yiannis Kompatsiaris
 
Presentation (3)
Presentation (3)Presentation (3)
Presentation (3)
ranjithakambli
 
SocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of ThingsSocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of Things
DunavNET
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
Darren Kuropatwa
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
VasileiosMezaris
 
Thesis Intro Presentation
Thesis Intro PresentationThesis Intro Presentation
Thesis Intro Presentation
Audubon McKeown D.
 

Similar to A short introduction to multimedia forensics the science discovering the history of multimedia contents (20)

Intro to new and digital media
Intro to new and digital mediaIntro to new and digital media
Intro to new and digital media
 
Social media risks and controls
Social media risks and controlsSocial media risks and controls
Social media risks and controls
 
Multimedia Privacy
Multimedia PrivacyMultimedia Privacy
Multimedia Privacy
 
Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...Dissecting the dangers of deepfakes and their impact on reputation Generative...
Dissecting the dangers of deepfakes and their impact on reputation Generative...
 
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing ToolsIRJET - Deepfake Video Detection using Image Processing and Hashing Tools
IRJET - Deepfake Video Detection using Image Processing and Hashing Tools
 
Image Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel BrochureImage Fusion -Multi Sensor Intel Brochure
Image Fusion -Multi Sensor Intel Brochure
 
Mastering Digital Media Literacy: Navigating Information in the Digital Age
Mastering Digital Media Literacy: Navigating Information in the Digital AgeMastering Digital Media Literacy: Navigating Information in the Digital Age
Mastering Digital Media Literacy: Navigating Information in the Digital Age
 
George konstantakis iot and product design
George konstantakis iot and product designGeorge konstantakis iot and product design
George konstantakis iot and product design
 
The InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the BrowserThe InVID Plug-in: Web Video Verification on the Browser
The InVID Plug-in: Web Video Verification on the Browser
 
Privacy for Mobile Sensing Systems
Privacy for Mobile Sensing SystemsPrivacy for Mobile Sensing Systems
Privacy for Mobile Sensing Systems
 
Latest trends in information technology
Latest trends in information technologyLatest trends in information technology
Latest trends in information technology
 
The internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal systemThe internet of things..perspectives for the Nigerian legal system
The internet of things..perspectives for the Nigerian legal system
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 
Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)Pecha kucha on_surveillance (1)
Pecha kucha on_surveillance (1)
 
Vision about Social Networks Content Exploitation (EC Concertation meeting)
Vision about Social Networks Content Exploitation (EC Concertation meeting)Vision about Social Networks Content Exploitation (EC Concertation meeting)
Vision about Social Networks Content Exploitation (EC Concertation meeting)
 
Presentation (3)
Presentation (3)Presentation (3)
Presentation (3)
 
SocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of ThingsSocIoTal: Creating a Citizen - Centric Internet of Things
SocIoTal: Creating a Citizen - Centric Internet of Things
 
HSD Digital Citizenship Framework
HSD Digital Citizenship FrameworkHSD Digital Citizenship Framework
HSD Digital Citizenship Framework
 
Video & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulationsVideo & AI: capabilities and limitations of AI in detecting video manipulations
Video & AI: capabilities and limitations of AI in detecting video manipulations
 
Thesis Intro Presentation
Thesis Intro PresentationThesis Intro Presentation
Thesis Intro Presentation
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

A short introduction to multimedia forensics the science discovering the history of multimedia contents

  • 1. A short introduction to Multimedia Forensics: the science discovering the history of multimedia contents Sebastiano Battiato Dipartimento di Matematica e Informatica, Università di Catania Image Processing LAB – http://iplab.dmi.unict.it battiato@dmi.unict.it
  • 2. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Forensic science (often shortened to forensics) is the practical application of science to matters of the law. Use of scientific methods for gaining probative facts (from physical/analog or digital evidences )
  • 3. History of Digital Forensics • Earliest notion of digital forensics came when the Federal Rules (US) of evidence first started to discuss digital evidence in the 1970s • Real digital forensics investigations started in the mid-to late 1980s when federal agents had to start figuring out ways to search computers for digital evidence • This “home-grown”, bottom-up approach continued until the late 1990s when security researchers at universities and labs started to figure out that this problem was big enough to warrant investigation. • First research groups started around 2000 or 2001. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 4. The first Digital Forensics Research Workshop (DFRWS) was held in Utica, NY in August 2001. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 5. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Multimedia Forensics - Source identification - Integrity verification/tampering detection Techniques from multimedia forensics merely provide a way to test for the authenticity and source of digital sensor data. In this sense is not about analyzing the semantics of digital or digitized media objects.
  • 6. Multimedia Forensics (in academic literature) • The terms appeared in early 2000 • K. J. Ray Liu, on “Multimedia Forensics: Where Sherlock Holmes Meets Signal Processing” Invited talk @ ICME 2006 • Multimedia Forensics is not Computer Forensics (2009, Bohem et al.) • Recent Surveys on the field (Stamm 2013, Piva 2013) • WIFS, TIFS, Dedicated workshop at major conference (ACM MM, ICME, ICIAP), Special issues on Int. Journal Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 7. Multimedia Forensics (in practice) • Source Identification • Integrity/Authenticity • Enhancement/Restoration • Interpretation and Content Analysis – Plate Recognition – Dynamic Reconstruction (car crashes, etc.) – Antropomethric issues – … Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 8. “Forensics Image (Video) analysis is the application of IMAGE SCIENCE and DOMAIN EXPERTISE to interpret the content of an image or the image itself in legal matters” (SWGIT – www.fbi.gov) Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 9. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Recent documents: • 2015-09-29 SWGDE Best Practices for Photographic Comparison for All Disciplines • 2015-09-29 SWGDE Image Processing Guidelines • 2015-09-29 SWGDE Proposed Techniques for Advanced Data Recovery from Security Digital Video Recorders v1-1 • 2015-09-29 SWGDE Training Guidelines for Video Analysis, Image Analysis and Photography V1-1 https://www.swgde.org/
  • 10. Fantasy/Fiction Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 11. CSI Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 12. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 13. Reality Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 14. I Need That Plate! No Way...
  • 15. Fantasy • We cannot introduce new information (there is no data..) • But we can enhance and extract only something already present Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 16. • What is the minimum quality for video? “Minimum quality” doesn’t exist. • The success of the enhancement depends on several factors: Main goal (video captured with an HD camera but the license plate we need to extract is too far away) Technical related details: Resolution of the area of interest, Level of compression, Presence of blur / focus, Number of available frames, Noise / brightness and contrast • It’s important to understand which defects are present in order to apply the proper tools. Understand When It’s Possible To Get Something Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 17. Perspective Correction Geometrical transformation Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 18. Multimedia Forensics is based on the idea that inherent traces (like digital fingerprints) are left behind in a digital media during both the creation phase and any other successively process. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 19. • Example: • Forensic analysis of a smartphone: which pictures have been generated on the device and which ones have been generated by other devices and sent by messaging application or saved from the internet • We can identify: • Type of device • Maker and model • Specific exemplar Camera Ballistics Which Device Has Created This Picture? Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 20. Source Identification Noise Based Sensor output carries not only pure signal but also various noise components. Sensor noise model could be used as a representative feature for cameras. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 21. Sensor Identification Using Pattern Noise Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 22. Sensor Identification Using Pattern Noise This method provide good results, and is quite reliable also using: –images with different level of JPEG compression (low, medium and high) –images processed using point-wise operator such as brightness/contrast adjustment or gamma correction. –images acquired by two cameras of the same brand and model. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 23. Integrity: What is a Forgery? • “Forgery” is a subjective word. • An image can become a forgery based upon the context in which it is used. • An image altered for fun or someone who has taken an bad photo, but has been altered to improve its appearance cannot be considered a forgery even though it has been altered from its original capture. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 24. What is a Forgery? • The other side of forgery are those who perpetuate a forgery for gain and prestige • They create an image in which to dupe the recipient into believing the image is real and from this be able to gain payment and fame • Three type of forgery can be identified: •An image that is created using graphical software •An image where the content has been altered •An image where the context has been altered Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 25. The content has been altered Duping the recipient into believing that the objects in an image are something else from what they really are! November 1997: After 58 tourists were killed in a terrorist attack at the temple of Hatshepsut in Luxor Egypt, the Swiss tabloid Blick digitally altered a puddle of water to appear as blood flowing from the temple. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 26. The context has been altered • Objects are be removed or added, for example, a person can be added or removed • The easiest way is to cut an object from one image and insert it into another image – image editing software makes this a simple task • An example is this altered image which could be used to influence events in foreign countries which are not aware of manipulation. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 27. Altering Images The concepts have moved into the digital world by virtue of digital cameras and the availability of digital image editing software The ease of use of digital image editing software, which does not require any special skills, makes image manipulation easy to achieve. circa 1860: This nearly iconic portrait of U.S. President Abraham Lincoln is a composite of Lincoln's head and the Southern politician John Calhoun's body. 27 Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 28. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 29. Off-side (February 2011) Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Barcelona – Athletico Bilbao
  • 30. Sydney conman who photoshopped pictures of himself with famous people gets 12 years’jail http://www.smh.com.au 31 Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 31. More (and more) examples Photo Tampering through History http://www.fourandsix.com/photo-tampering-history/ Photoshopdisaster http://www.photoshopdisasters.com/ Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 33. Image Editing (2)  Malicious image editing alters the image semantic content, mainly:  Adding information  Removing information Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Piva 2013
  • 34. Image Editing (2) • Splicing (two images) – Also called cut and paste, compositing – Used to add information • Cloning (single image) – Also called copy and paste, copy move, region duplication – Used to add or remove information – Can be exact, or the clone can be resized, rotated…) • Inpainting (kind of intelligent clone) – Seam carving, content aware resize, content aware fill, content dependent crop – Used to remove information • Retouch (local editing) – Dodge and burn, healing tool… • Image enhancement/filtering – Histogram equalization, contrast enhancement, median filtering, denoise, smooth… • Image editing (geometric transformation) – Resize, crop, zoom, shear Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 35. Analog Vs. Digital • Analogue evidence (audio, photo, video) – Has always an original (negative or positive) – Copies are never an exact replica of the original – Copies of copies will be further deteriorated • Digital evidence – Only a finite sequence of number – Exact copies can be made – No loss of information between generations – Every copy of a digital data can be considered the original, unless is tagged in order to be distinguished by copies Best evidence clause (Federal Rules of Evidence 1003): if data is stored in a computer or similar device, any printout readable by sight, shown to reflect the data accurately, is an “original”. 36 Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 36. Original File: Special Cases • Recapture: create a fake and then take a picture with the camera we want to pretend the picture was taken with • Staging: the image file is authentic, but the content has been staged In these cases an authentic file does not imply an authentic content. 37 Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 37. How To Authenticate An Image? • Visual Inspection • File Analysis File Format and Structures Metadata (EXIF) Compression Parameters (Quantization Tables) • Global Analysis Pixel and compressed data statistics • Local Analysis Finding inconsistencies of pixel statistics across the image Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 38. Image Forensics Methods Active Methods: Hiding a mark or a message in a picture when it is created: WATERMARKING Drawbacks: • limitate to specially equipped (=expensive) digital cameras; • not so robust. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 39. Image Forensics Methods Passive Methods: Using the alterations of the underlying statistics produced by digital forgeries on an image: PHYSICS BASED CAMERA BASED PIXEL BASED GEOMETRIC BASED FORMAT BASED Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 40. INTERPOLATION LENS CFA SENSOR POST PROCESSINGDIGITAL IMAGESTORAGE Processing and Storage ORIGINAL IMAGE Acquisition Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 41. Types Of Analysis: Scene Level • Use features of the scene, not of the image pixels and could work well also on scanned photos • Difficult to spoof – Most forgeries contains slight errors not visible by human eye but detectable by proper analysis • Difficult to automatize the analysis – Requires a lot of experience • Better results on splicing, less successful on forgeries which are hiding something • Physics based: – Lighting • Geometry and perspective inconsistencies – Principal point analysis – Shadows – Photogrammetry Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 42. Types Of Analysis: Signal Level Based on statistical features of pixel values; need good quality image • Clone detection – Cloned image blocks – Similar couples of key points • Resampling detection – For resize, rotate, but also when splicing or cloning • Enhancement Detection – Specific for algorithms (median, histogram equalization, color adjustment) • Seam carving detection • General intrinsic footprints • Inconsistencies from acquisition and coding fingerprints – CFA, PRNU, DCT, ELA… Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 43. Format-Based JPEG compression engine (for both luminance and chrominance channels): the input image is partitioned into 8x8 non-overlapping blocks Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 44. A JPEG image (luminance component only) Format-Based Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 45. Format-Based Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 46. Format-Based JPEG compression engine (for both luminance and chrominance channels): the input image is partitioned into 8x8 non- overlapping blocks a DCT transform is applied to each block
  • 48. THE TYPICAL PIPELINE FOR A COPY-PASTE OPERATION + = original image QF(1) = q1 resulting image QF(3) = q3 2nd image QF(2) = q2 duplicating resizing
  • 49. Order of quantization Top row: single quantized with steps 2 (left) and 3 (right). Bottom row: double quantized with steps 3 followed by 2 (left), and 2 followed by 3 (right)
  • 50. F. Galvan, G. Puglisi, A. R. Bruna, S. Battiato, First Quantization Matrix Estimation from Double Compressed JPEG Images, IEEE Transactions on Information Forensics and Security, 2014. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 51. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Current Trends And Challenges
  • 53. Social MF on Facebook Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Preliminar studies involving: - Different devices - Dataset of images: - Different Scene (outdoor artificial, outdoor natural, indoor) - Different Quality (resolution and compression) - Different upload setting has proven that some invariance could be guaranteed. Some specific editing could be then traced and used to retrieve useful info about image before uploading. Moltisanti, Paratore, Battiato, Saravo - Image Manipulation on Facebook for Forensics Evidence – ICIAP 2015, LNCS 2015;
  • 54. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Social (Multimedia) Forensics • Image and Video Phylogeny ReVeal project
  • 55. Video Fingerprint • Photo DNA (http://www.microsoftphotodna.com/ ) • VideoGenome (http://v-nome.org/ ) • Videntifier (http://www.eff2.net/ ) Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 73
  • 56. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 PRNU on Video (online) Each video is re-encoded (compressed) after it is uploaded. This compression is needed to reduce the bandwidth usage by reducing the file size and thus increasing streaming speeds. By re-encoding the video, the video is altered which makes it harder to identify the source. Related performances depends on the brand of the camera, the resolution and the amount of compression. The reliability of the PRNU pattern decreases exponentially if the compression becomes higher. Challenges: - Video obtained by some post processing (e.g., transition effects, fusion of more than one source, …) - No reference available - Various Encoders
  • 59. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Advertisement
  • 60. WorldPhotoPress 2012: faked? Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 61. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 When is an image fake, and when is it merely enhanced?
  • 62. WPP Report:The integrity of the Image (Nov. 2014) Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Current practices and accepted standards relating to the manipulation of still images in photojournalism and documentary photography. Media organizations prohibit the alteration of images beyond traditional darkroom techniques. It means – as first – that the alteration of images – where alteration means the digital addition or subtraction of elements is forbidden
  • 63. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 64. Data Manipulation on Science: Images Gilbert, N. “Science Journals Crack down on Image Manipulation.” Nature (2009): doi:10.1038/news.2009.991. Source: Office For Research Integrity (ORI)
  • 65. Forgery on Biomedical Images Corriere della Sera – Ottobre 2013 Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 66. Plagiarized paper: Fabrication of Monodisperse Magnetic Fe3O4-SiO2 Nanocomposites with Core- Shell Structures Hua Fang,* Chun-yang Ma, Tai-li Wan, Mei Zhang, and Wei-hai Shi J. Phys. Chem C 2007, 111, 1065-1070 Original Paper Oriented Assembly of Fe3O4 Nanoparticles into Monodisperse Hollow Single-Crystal Microspheres Yu et al, J. Phys. Chem. B 2006, 110, 21667-21671 (Figure 3) M. Rossner and K. M. Yamada, “What’s in a picture? The temptation of image manipulation.,” J. Cell Biol., vol. 166, no. 1, pp. 11–5, Jul. 2004. Forgery on Science
  • 67. Forgery on Science “What’s in a picture? The temptation of image manipulation.,” J. Cell Biol., vol. 166, no. 1, pp. 11–5, Jul. 2004.
  • 69. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 70. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 71. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 72. Image Manipulation: Case “Mozzarella Blu” Multimedia Truthfulness Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 73. Multimedia Truthfulness Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 74. Multimedia Truthfulness Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 75. Evidence on the web Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 76. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 http://revealproject.eu/ http://www.rewindproject.eu/ http://maven-project.eu/#_=_ https://s-five.eu/ The first public draft of the FIVE Best Practice Manual is publically available from Oct. 9, 2015 ("October/DIWG2015 version"): DRAFT_BPM_FIVE_20151009
  • 77. Future of Imaging Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015 Nikon
  • 78. Sharing Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 79. Conclusions • Multimedia Forensics is now a consolidated field but new intriguing challenges emerge every day. • The various involved actors are expected: – To disseminate «basic knowledge» – To share «best practices» and results – To identify new challenges – .. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 80. Survey • Matthew C. Stamm, Min Wu and K. J. Ray Liu, Information Forensics: An Overview of the First Decade (2013), in: IEEE Access, 1(167-200) • Alessandro Piva, An Overview on Image Forensics (2013), in: ISRN Signal Processing, 2013 (Article ID 496701, 22 pages) - C. Baron - Adobe Photoshop Forensics – Sleuths, Thruts, and Fauxtography – Thomson Course Tehcnology - 2009 Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 81. On line Resources Tutorial by Prof. Hany Farid - Digital Image Forensics: lecture notes, exercises, and matlab code for a survey course in digital image and video forensics. http://www.cs.dartmouth.edu/farid/downloads/tutor ials/digitalimageforensics.pdf Special Issue on Multimedia in Forensics, Security and Intelligence - IEEE Multimedia Magazine Vol. 19, Issue 1, pp. 17-19, 2012 SOFTWARE: Amped5, Authenticate, Adroit, Four&Six, Izitru, Ghiro, … Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 82. Credits • Amped (www.amped.it) • Undergraduate course: Computer Forensics – University of Catania (http://www.dmi.unict.it/~battiato/CF.html) Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
  • 83. Prof. Sebastiano Battiato Dipartimento di Matematica e Informatica University of Catania, Italy Image Processing LAB – http://iplab.dmi.unict.it battiato@dmi.unict.it
  • 84. Main Contacts Further Info Image Processing Lab Università di Catania www.dmi.unict.it/~iplab Email battiato@dmi.unict.it Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015