Thematic Meeting on MULTIMEDIA TRUTHFULNESS VERIFICATION IN LEGAL ENVIRONMENT AND SOCIAL MEDIA
Co-located with WIFS 2015, Roma - Italy, 16 November 2015
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
The task of speaker identification is to determine the identity of a speaker by machine. To recognize the voice, the voices must be familiar in the case of human beings as well as machines.
The objective of speaker identification is to determine the identity of a speaker by machine on the basis of his/her voice. No identity is claimed by the user.
GitHub Link:https://github.com/TrilokiDA/Speaker-Identification-from-Voice
“Mobile Forensic Van” (MFV) (Big/Small) is being launched by Gujarat
Forensic Sciences University (GFSU) and Helik Advisory Ltd which helps
in reaching the crime scene at the earliest to assist the Investigating
Officers (IOs) in identifying and collecting relevant forensic evidence
from crime scene, victims & from suspects which are the primary
sources of forensic evidence. The Mobile Forensic Team assists the
Investigating Officer in linking the crime with the perpetrator through
the forensic evidence, collected from the crime scene, victims and
suspects.
What is digital evidence? , sources of digital evidence, types of digital evidence, the procedure for collecting digital evidence, records, digital vs physical evidence, controlling contamination.
The task of speaker identification is to determine the identity of a speaker by machine. To recognize the voice, the voices must be familiar in the case of human beings as well as machines.
The objective of speaker identification is to determine the identity of a speaker by machine on the basis of his/her voice. No identity is claimed by the user.
GitHub Link:https://github.com/TrilokiDA/Speaker-Identification-from-Voice
“Mobile Forensic Van” (MFV) (Big/Small) is being launched by Gujarat
Forensic Sciences University (GFSU) and Helik Advisory Ltd which helps
in reaching the crime scene at the earliest to assist the Investigating
Officers (IOs) in identifying and collecting relevant forensic evidence
from crime scene, victims & from suspects which are the primary
sources of forensic evidence. The Mobile Forensic Team assists the
Investigating Officer in linking the crime with the perpetrator through
the forensic evidence, collected from the crime scene, victims and
suspects.
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
Pelorus shares a presentation on search & seizure of electronic evidence Digital evidence is any digital information which is received from computers, audio files, video recordings, digital images etc. The evidence obtained is essential in computer and cyber crimes. For more information on search & seizure of electronic evidence visit our website.
It is the beginning point for obtaining evidence which will be used by the crime scene investigator and the forensic expert
A thorough investigation of the crime scene must be completed
Crime scene is basically a scene of occurrence of crime. It is a place where a particular crime has been committed.
It is starting point for the investigator.
forensic questioned document examinationkiran malik
Power point presentation basically related to document examination in forensic science laboratories, related various facilities and was related to expert evidences.
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
process of report writing and submission to the court
This ppt will help forensic students
A forensic report means a report prepared in the course of an investigation into an alleged offense by a person with specialized knowledge or training, setting out the results of a forensic examination in the form of facts or opinions or a combination of both e.g. an autopsy report.
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
Search & Seizure of Electronic Evidence by Pelorus Technologiesurjarathi
Pelorus shares a presentation on search & seizure of electronic evidence Digital evidence is any digital information which is received from computers, audio files, video recordings, digital images etc. The evidence obtained is essential in computer and cyber crimes. For more information on search & seizure of electronic evidence visit our website.
It is the beginning point for obtaining evidence which will be used by the crime scene investigator and the forensic expert
A thorough investigation of the crime scene must be completed
Crime scene is basically a scene of occurrence of crime. It is a place where a particular crime has been committed.
It is starting point for the investigator.
forensic questioned document examinationkiran malik
Power point presentation basically related to document examination in forensic science laboratories, related various facilities and was related to expert evidences.
INTRO:
Nowadays, person identification (recognition) and verification is very important in security and resource access control.
Biometrics is the science of automatic recognition of individual depending on their physiological and behavioral attributes.
For centuries, handwritten signatures have been an integral part of validating business transaction contracts and agreements.
Among the different forms of biometric recognition systems such as
fingerprint, iris, face, voice, palm etc., signature will be most widely used.
SIGNATURE RECOGNITION
Signature Recognition is the procedure of determining to whom a particular signature belongs to.
Depending on acquiring of signature images, there are two types of signature recognition systems:
Online Signature Recognition
Offline Signature Recognition
STEPS
IMAGE ACQUSITION
Collection of signatures from 50 persons on blank paper.
The collected signatures are scanned to get images in JPG format to create database.
PREPROCESSING
Image pre-processing is a technique to enhance raw images received from cameras/sensors placed on satellites, space probes and aircrafts or pictures taken in normal day-to-day life for various applications.
The techniques for preprocessing used are
RGB to Gray Scale Conversion
Binarization
Thinning
Bounding Box
FEATURE EXTRACTION
Features are the characters to be extracted from the processed image.
It has used two feature techniques
Global Features
Grid Features
DWT
After applying DWT to all 9 blocks, each block is divided into horizontal, vertical and diagonal components. From each components two features mainly horizontal and vertical projection positions are extracted. Total 54 (9 x 3 x 2) features are extracted.
Grid features extracted from each block are
Horizontal Projection Position
Vertical Projection Position
Algorithm for Training phase
Description: Retrieval of a signature image from a database
Input: Training sample images.
Output: Construction of Back Propagation Neural Network.
Begin
Read the training samples images
Step1: Pre-processing
Convert the image into gray scale image.
Convert the gray scale image into binary image.
Apply thinning process.
Apply bounding box.
Step 2: Features Extracted.
Step 3: Back propagation neural network training.
end // end of proposed algorithm
process of report writing and submission to the court
This ppt will help forensic students
A forensic report means a report prepared in the course of an investigation into an alleged offense by a person with specialized knowledge or training, setting out the results of a forensic examination in the form of facts or opinions or a combination of both e.g. an autopsy report.
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
Power dissipation is a challenging problem for today's system-on-chip design and test. This paper presents a novel architecture which generates the test patterns with reduced switching activities; it has the advantage of low test power and low hardware overhead. The proposed LP-TPG (test pattern generator) structure consists of modified low power linear feedback shift register (LP-LFSR), m-bit counter, gray counter, NOR-gate structure and XOR-array. The seed generated from LP-LFSR is EXCLUSIVE-OR ed with the data generated from gray code generator. The XOR result of the sequence is single input changing (SIC) sequence, in turn reduces the switching activity and so power dissipation will be very less. The proposed architecture is simulated using Modelsim and synthesized using Xilinx ISE9.2.The Xilinx chip scope tool will be used to test the logic running on FPGA.
This is a simple presentation on multimedia. This is simple and easy to do presentation for a presentation class. Students with multimedia projects can also use it.
Tutorial for ACM Multimedia 2016, given together with Gerald Friedland, with contributions from Julia Bernd and Yiannis Kompatsiaris. The presentation covered an introduction to the problem of disclosing personal information through multimedia sharing, the associated security risks, methods for conducting multimodla inferences and technical frameworks that could help alleviate such risks.
Dissecting the dangers of deepfakes and their impact on reputation Generative...CSIRO National AI Centre
At the recent Generative AI Conference - This talk defined deepfakes and the widespread damage misinformation can cause. In order to build awareness of the ethical implications of deepfakes. At the
National AI Centre, Responsible AI and Responsible AI Network
allows us to action a way to use AI that is aligned to Australia's AI ethics principles.
Mastering Digital Media Literacy: Navigating Information in the Digital AgeSelcen Ozturkcan
- Critically evaluate digital media: Identify trustworthy sources and detect bias and (mis/dis)misinformation.
- Consume digital media ethically: Engage responsibly online and understand media's societal impact.
- Utilize digital media literacy tools: Use fact-checking websites and frameworks to verify information.
George konstantakis iot and product design360mnbsu
The Internet of Things (IoT) may be at the core of the next Industrial Revolution! The socioeconomic implications of IoT, in general, are astounding. As with all disruptive technology, there are threats and opportunities that must be understood by business leaders. How do these implications relate to the needs of manufacturing businesses and the human resources that are intertwined with them? How can Product Design address those needs? This closing session will explore these questions and offer solutions.
The InVID Plug-in: Web Video Verification on the BrowserInVID Project
Presentation of the paper "The InVID Plug-in: Web Video
Verification on the Browser" at the 1st Int. Workshop on Multimedia Verification (MuVer) that was hosted at the ACM Multimedia Conference, October 23 - 27, 2017 Mountain View, CA, USA.
CHIuXiD (Indonesia) keynote about privacy and security. Includes why care about privacy, design challenges, design opportunities, and brief discussion of some of my team's research on mobile sensing.
Latest trends in information technologyAtifa Aqueel
This ppt includes the latest trends in information technology such as big data analytics, cloud computing, virtual reality, 5G wireless technology etc.
The internet of things..perspectives for the Nigerian legal systemSimon Aderinlola
The ability for everyday devices to connect with each other and with people is a hot topic.
The Nigerian Communications Commission identified a need for the Nigerian legal system to be aware of present and future possibilities, grey areas and learnings from other countries that have taken proactive steps to prepare for this inevitable future.
Learnings from the EU, USA, China etc are considered. It is comforting to know that no country claims to have its legislation ahead of the tech innovations curve, but the catchup game needs to be at a pace that dragnets the present effectively and constantly repositions for the unknown future.
Regulation should also be smart. Rather than get bogged down regulating aluminium weight for car use, fuel grades for combustion, rather regulate speed (protect lives) and drive regulation by principles that outlive wherever tech wants to go next.
The session was eye-opening for a good number of the aged and candid judges, but it was gladdening to see the mindset: mobile tech is not "that thing", it has to be used, understood and admitted as evidence.
The nerds and more tech savvy should help these 'learned ones' to better embrace tech and help them do their work better for joint good!
Attendee/delegate feedback was candid and NCC hopes to build on this in the coming years.
SocIoTal: Creating a Citizen - Centric Internet of ThingsDunavNET
Contrary to the general approach of creating Internet of Things
(IoT) services from a business perspective, the project addresses the design of citizen centered IoT solution.
Slides to facilitate a conversation with school leaders & administrators around emerging issues related to Digital Citizenship. Both to raise awareness of the multifaceted nature of the subject and identify action items for schools moving forward.
The material here is taken from Mike Ribble's "Nine Elements of Digital Citizenship".
http://digitalcitizenship.net
Video & AI: capabilities and limitations of AI in detecting video manipulationsVasileiosMezaris
Invited presentation given by Dr. Vasileios Mezaris during the Greek Media Literacy Week 2019; specifically, presented in the international conference on "Disinformation in Cyberspace: Media literacy meets Artificial Intelligence" that was organized as part of the Media Literacy Week 2019 in Athens, Greece, on November 15, 2019.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
A short introduction to multimedia forensics the science discovering the history of multimedia contents
1. A short introduction to Multimedia
Forensics: the science
discovering the history of
multimedia contents
Sebastiano Battiato
Dipartimento di Matematica e Informatica,
Università di Catania
Image Processing LAB – http://iplab.dmi.unict.it
battiato@dmi.unict.it
2. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Forensic science (often shortened to forensics) is the practical
application of science to matters of the law. Use of scientific
methods for gaining probative facts (from physical/analog or
digital evidences )
3. History of Digital Forensics
• Earliest notion of digital forensics came when the Federal
Rules (US) of evidence first started to discuss digital
evidence in the 1970s
• Real digital forensics investigations started in the mid-to late
1980s when federal agents had to start figuring out ways to
search computers for digital evidence
• This “home-grown”, bottom-up approach continued until the
late 1990s when security researchers at universities and
labs started to figure out that this problem was big enough to
warrant investigation.
• First research groups started around 2000 or 2001.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
4. The first Digital Forensics Research
Workshop (DFRWS) was held in Utica, NY in
August 2001.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
5. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Multimedia
Forensics
- Source identification
- Integrity verification/tampering detection
Techniques from multimedia forensics merely provide a way to
test for the authenticity and source of digital sensor data. In this
sense is not about analyzing the semantics of digital or
digitized media objects.
6. Multimedia Forensics (in academic
literature)
• The terms appeared in early 2000
• K. J. Ray Liu, on “Multimedia Forensics: Where
Sherlock Holmes Meets Signal Processing” Invited
talk @ ICME 2006
• Multimedia Forensics is not Computer Forensics
(2009, Bohem et al.)
• Recent Surveys on the field (Stamm 2013, Piva 2013)
• WIFS, TIFS, Dedicated workshop at major conference
(ACM MM, ICME, ICIAP), Special issues on Int. Journal
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
7. Multimedia Forensics (in practice)
• Source Identification
• Integrity/Authenticity
• Enhancement/Restoration
• Interpretation and Content Analysis
– Plate Recognition
– Dynamic Reconstruction (car crashes, etc.)
– Antropomethric issues
– …
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
8. “Forensics Image (Video) analysis is
the application of IMAGE SCIENCE
and DOMAIN EXPERTISE to interpret
the content of an image or the image
itself in legal matters” (SWGIT –
www.fbi.gov)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
9. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Recent documents:
• 2015-09-29 SWGDE Best Practices for Photographic Comparison for All
Disciplines
• 2015-09-29 SWGDE Image Processing Guidelines
• 2015-09-29 SWGDE Proposed Techniques for Advanced Data Recovery
from Security Digital Video Recorders v1-1
• 2015-09-29 SWGDE Training Guidelines for Video Analysis, Image
Analysis and Photography V1-1
https://www.swgde.org/
15. Fantasy
• We cannot introduce new information
(there is no data..)
• But we can enhance and extract only
something already present
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
16. • What is the minimum quality for video? “Minimum quality”
doesn’t exist.
• The success of the enhancement depends on several
factors:
Main goal (video captured with an HD camera but the
license plate we need to extract is too far away)
Technical related details: Resolution of the area of
interest, Level of compression, Presence of blur /
focus, Number of available frames, Noise / brightness
and contrast
• It’s important to understand which defects are
present in order to apply the proper tools.
Understand When It’s Possible To Get
Something
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
18. Multimedia Forensics is based on the idea
that inherent traces (like digital fingerprints)
are left behind in a digital media during both
the creation phase and any other
successively process.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
19. • Example:
• Forensic analysis of a smartphone: which pictures have been generated
on the device and which ones have been generated by other devices
and sent by messaging application or saved from the internet
• We can identify:
• Type of device
• Maker and model
• Specific exemplar
Camera Ballistics
Which Device Has Created This Picture?
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
20. Source Identification Noise Based
Sensor output carries not only pure signal
but also various noise components. Sensor
noise model could be used as a
representative feature for cameras.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
22. Sensor Identification Using
Pattern Noise
This method provide good results, and is
quite reliable also using:
–images with different level of JPEG
compression (low, medium and high)
–images processed using point-wise operator
such as brightness/contrast adjustment or
gamma correction.
–images acquired by two cameras of the same
brand and model.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
23. Integrity: What is a Forgery?
• “Forgery” is a
subjective word.
• An image can
become a forgery
based upon the
context in which
it is used.
• An image altered for fun or someone who has taken an bad
photo, but has been altered to improve its appearance
cannot be considered a forgery even though it has been
altered from its original capture.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
24. What is a Forgery?
• The other side of forgery are those who perpetuate a
forgery for gain and prestige
• They create an image in which to dupe the recipient into
believing the image is real and from this be able to gain
payment and fame
• Three type of forgery can be identified:
•An image that is created using graphical software
•An image where the content has been altered
•An image where the context has been altered
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
25. The content has been altered
Duping the recipient into believing that the objects in an
image are something else from what they really are!
November 1997: After 58 tourists were killed in a terrorist attack at the
temple of Hatshepsut in Luxor Egypt, the Swiss tabloid Blick digitally altered
a puddle of water to appear as blood flowing from the temple.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
26. The context has been altered
• Objects are be removed or added,
for example, a person can be
added or removed
• The easiest way is to cut an
object from one image and insert
it into another image – image
editing software makes this a
simple task
• An example is this altered image
which could be used to influence
events in foreign countries which
are not aware of manipulation.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
27. Altering Images
The concepts have moved
into the digital world by
virtue of digital cameras
and the availability of
digital image editing
software
The ease of use of digital image editing software, which does
not require any special skills, makes image manipulation easy
to achieve.
circa 1860: This nearly iconic portrait of U.S. President
Abraham Lincoln is a composite of Lincoln's head and the
Southern politician John Calhoun's body.
27
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
29. Off-side (February 2011)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Barcelona – Athletico Bilbao
30. Sydney conman
who photoshopped
pictures of himself
with famous people
gets 12 years’jail
http://www.smh.com.au
31
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
31. More (and more) examples
Photo Tampering through History
http://www.fourandsix.com/photo-tampering-history/
Photoshopdisaster
http://www.photoshopdisasters.com/
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
33. Image Editing (2)
Malicious image editing alters the image semantic
content, mainly:
Adding information
Removing information
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Piva 2013
34. Image Editing (2)
• Splicing (two images)
– Also called cut and paste, compositing
– Used to add information
• Cloning (single image)
– Also called copy and paste, copy move, region duplication
– Used to add or remove information
– Can be exact, or the clone can be resized, rotated…)
• Inpainting (kind of intelligent clone)
– Seam carving, content aware resize, content aware fill, content dependent crop
– Used to remove information
• Retouch (local editing)
– Dodge and burn, healing tool…
• Image enhancement/filtering
– Histogram equalization, contrast enhancement, median filtering, denoise, smooth…
• Image editing (geometric transformation)
– Resize, crop, zoom, shear
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
35. Analog Vs. Digital
• Analogue evidence (audio, photo, video)
– Has always an original (negative or positive)
– Copies are never an exact replica of the original
– Copies of copies will be further deteriorated
• Digital evidence
– Only a finite sequence of number
– Exact copies can be made
– No loss of information between generations
– Every copy of a digital data can be considered the original,
unless is tagged in order to be distinguished by copies
Best evidence clause (Federal Rules of Evidence 1003): if data is stored
in a computer or similar device, any printout readable by sight, shown to
reflect the data accurately, is an “original”.
36
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
36. Original File: Special Cases
• Recapture: create a fake and then take a
picture with the camera we want to
pretend the picture was taken with
• Staging: the image file is authentic, but
the content has been staged
In these cases an authentic file does not
imply an authentic content.
37
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
37. How To Authenticate An Image?
• Visual Inspection
• File Analysis
File Format and Structures
Metadata (EXIF)
Compression Parameters (Quantization
Tables)
• Global Analysis
Pixel and compressed data statistics
• Local Analysis
Finding inconsistencies of pixel statistics
across the image
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
38. Image Forensics Methods
Active Methods: Hiding a mark or a
message in a picture when it is created:
WATERMARKING
Drawbacks:
• limitate to specially equipped
(=expensive) digital cameras;
• not so robust.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
39. Image Forensics Methods
Passive Methods: Using the alterations of
the underlying statistics produced by digital
forgeries on an image:
PHYSICS BASED
CAMERA BASED
PIXEL BASED
GEOMETRIC BASED
FORMAT BASED
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
41. Types Of Analysis: Scene Level
• Use features of the scene, not of the image pixels and could work well also
on scanned photos
• Difficult to spoof
– Most forgeries contains slight errors not visible by human eye but detectable by
proper analysis
• Difficult to automatize the analysis
– Requires a lot of experience
• Better results on splicing, less successful on forgeries which are hiding
something
• Physics based:
– Lighting
• Geometry and perspective inconsistencies
– Principal point analysis
– Shadows
– Photogrammetry
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
42. Types Of Analysis: Signal Level
Based on statistical features of pixel values; need good quality image
• Clone detection
– Cloned image blocks
– Similar couples of key points
• Resampling detection
– For resize, rotate, but also when splicing or cloning
• Enhancement Detection
– Specific for algorithms (median, histogram equalization, color
adjustment)
• Seam carving detection
• General intrinsic footprints
• Inconsistencies from acquisition and coding fingerprints
– CFA, PRNU, DCT, ELA…
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
43. Format-Based
JPEG compression engine
(for both luminance and chrominance channels):
the input image is
partitioned into 8x8
non-overlapping blocks
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
44. A JPEG image (luminance component only)
Format-Based
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
46. Format-Based
JPEG compression engine
(for both luminance and chrominance channels):
the input image
is partitioned
into 8x8 non-
overlapping
blocks
a DCT transform
is applied to each
block
48. THE TYPICAL PIPELINE
FOR A COPY-PASTE
OPERATION
+
=
original image
QF(1) = q1
resulting image
QF(3) = q3
2nd image
QF(2) = q2
duplicating
resizing
49. Order of quantization
Top row: single quantized with steps 2 (left) and 3 (right).
Bottom row: double quantized with steps 3 followed by 2 (left), and 2
followed by 3 (right)
50. F. Galvan, G. Puglisi, A. R. Bruna, S. Battiato, First Quantization Matrix Estimation from Double Compressed JPEG
Images, IEEE Transactions on Information Forensics and Security, 2014.
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
53. Social MF on Facebook
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Preliminar studies involving:
- Different devices
- Dataset of images:
- Different Scene (outdoor artificial,
outdoor natural, indoor)
- Different Quality (resolution and
compression)
- Different upload setting
has proven that some invariance could be
guaranteed.
Some specific editing could be then traced
and used to retrieve useful info about
image before uploading.
Moltisanti, Paratore, Battiato, Saravo - Image Manipulation on Facebook for Forensics
Evidence – ICIAP 2015, LNCS 2015;
54. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Social (Multimedia) Forensics
• Image and Video Phylogeny
ReVeal project
55. Video Fingerprint
• Photo DNA
(http://www.microsoftphotodna.com/ )
• VideoGenome
(http://v-nome.org/ )
• Videntifier
(http://www.eff2.net/ )
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
73
56. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
PRNU on Video (online)
Each video is re-encoded (compressed) after it is uploaded. This
compression is needed to reduce the bandwidth usage by reducing the file
size and thus increasing streaming speeds.
By re-encoding the video, the video is altered which makes it harder to
identify the source.
Related performances depends on the brand of the camera, the resolution
and the amount of compression.
The reliability of the PRNU pattern decreases exponentially if the
compression becomes higher.
Challenges:
- Video obtained by some post processing (e.g., transition effects, fusion of
more than one source, …)
- No reference available
- Various Encoders
62. WPP Report:The integrity of the
Image (Nov. 2014)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
Current practices and accepted
standards relating to the
manipulation of still images in
photojournalism and documentary
photography.
Media organizations
prohibit the alteration of
images beyond
traditional darkroom
techniques.
It means – as first – that the
alteration of images – where
alteration means the digital
addition or subtraction of
elements is forbidden
64. Data Manipulation on Science: Images
Gilbert, N. “Science Journals Crack down on Image Manipulation.” Nature (2009):
doi:10.1038/news.2009.991.
Source: Office For Research Integrity (ORI)
65. Forgery on Biomedical Images
Corriere della Sera – Ottobre 2013
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
66. Plagiarized paper:
Fabrication of
Monodisperse Magnetic
Fe3O4-SiO2
Nanocomposites with Core-
Shell Structures Hua Fang,*
Chun-yang Ma, Tai-li Wan,
Mei Zhang, and Wei-hai Shi
J. Phys. Chem C 2007, 111,
1065-1070
Original Paper
Oriented Assembly of
Fe3O4 Nanoparticles into
Monodisperse Hollow
Single-Crystal Microspheres
Yu et al, J. Phys. Chem. B
2006, 110, 21667-21671
(Figure 3)
M. Rossner and K. M. Yamada, “What’s in a picture? The temptation of image manipulation.,”
J. Cell Biol., vol. 166, no. 1, pp. 11–5, Jul. 2004.
Forgery on Science
67. Forgery on Science
“What’s in a picture? The temptation of image manipulation.,” J. Cell Biol., vol. 166, no. 1, pp.
11–5, Jul. 2004.
72. Image Manipulation: Case “Mozzarella Blu”
Multimedia Truthfulness
Verification in LegalMultimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
75. Evidence on the web
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
76. Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
http://revealproject.eu/
http://www.rewindproject.eu/
http://maven-project.eu/#_=_
https://s-five.eu/
The first public draft of the FIVE Best
Practice Manual is publically available
from Oct. 9, 2015 ("October/DIWG2015
version"): DRAFT_BPM_FIVE_20151009
79. Conclusions
• Multimedia Forensics is now a
consolidated field but new intriguing
challenges emerge every day.
• The various involved actors are expected:
– To disseminate «basic knowledge»
– To share «best practices» and results
– To identify new challenges
– ..
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
80. Survey
• Matthew C. Stamm, Min Wu and K. J. Ray Liu,
Information Forensics: An Overview of the First
Decade (2013), in: IEEE Access, 1(167-200)
• Alessandro Piva, An Overview on Image Forensics
(2013), in: ISRN Signal Processing, 2013 (Article ID
496701, 22 pages)
- C. Baron - Adobe Photoshop Forensics – Sleuths,
Thruts, and Fauxtography – Thomson Course
Tehcnology - 2009
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
81. On line Resources
Tutorial by Prof. Hany Farid - Digital Image Forensics:
lecture notes, exercises, and matlab code for a survey
course in digital image and video
forensics. http://www.cs.dartmouth.edu/farid/downloads/tutor
ials/digitalimageforensics.pdf
Special Issue on Multimedia in Forensics, Security and
Intelligence - IEEE Multimedia Magazine Vol. 19, Issue 1,
pp. 17-19, 2012
SOFTWARE: Amped5, Authenticate, Adroit, Four&Six, Izitru,
Ghiro, …
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
82. Credits
• Amped (www.amped.it)
• Undergraduate course: Computer
Forensics – University of Catania
(http://www.dmi.unict.it/~battiato/CF.html)
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015
83. Prof. Sebastiano Battiato
Dipartimento di Matematica e Informatica
University of Catania, Italy
Image Processing LAB – http://iplab.dmi.unict.it
battiato@dmi.unict.it
84. Main Contacts
Further Info
Image Processing Lab
Università di Catania
www.dmi.unict.it/~iplab
Email
battiato@dmi.unict.it
Multimedia Truthfulness Verification in Legal Environment and Social Media - WIFS 2015