Why Amped Authenticate?

With the constant development and introduction of new digital technologies, digital images are now key sources of evidence for investigations. And thanks to social media and the prevalence of high-quality mobile phone cameras, there is a dramatic increase of images submitted as evidence by citizens and witnesses, to law enforcement agencies.

Are you intersted in this product?

1300 55 33 24

contact@cdfs.com.au

Quote Request

PHOTO ANALYSIS AND TAMPERING DETECTION

Unveil the processing history of a digital image to determine if it can be used as reliable evidence

  • Detect tampered areas in images
  • Determine the authenticity of images and documents
  • Analyze multiple images with batch tools
  • Identify the device used to take the photo

What is Amped Authenticate?

Amped Authenticate is the leading forensic software for unveiling the processing history of a digital image. Amped Authenticate provides a suite of powerful tools to determine whether an image is an unaltered original, an original generated by a specific device, or the result of manipulation using a photo editing software, making its admissibility as evidence questionable. Amped Authenticate is used by digital forensic experts and intelligence agencies worldwide.

Why Amped Authenticate?

With the constant development and introduction of new digital technologies, digital images are now key sources of evidence for investigations. And thanks to social media and the prevalence of high-quality mobile phone cameras, there is a dramatic increase of images submitted as evidence by citizens and witnesses, to law enforcement agencies.

Modern digital images are mines of information: in addition to the visual content, metadata often contain precise information about when, where and who captured the image. But unfortunately, in just a few seconds, both visual content and metadata can now be easily manipulated to create credible fakes.

Without solid ways to validate that the information is accurate, these photographs could pose issues when they are presented as evidence in a case and in court. Therefore, thoroughly investigating an image and ensuring its trustworthiness and source is critical in today’s investigations.

It is also necessary to be able to link photographs to a specific camera and consequently to a suspect. Billions of images are uploaded to the internet and shared on social media platforms every day. Investigators are constantly faced with the task of trying to identify the person who posted the original photo on the internet. Linking a photo to a camera is now as important as linking a bullet to a gun.

The Difficult Way of Working

Understanding if an image is an original or the result of manipulation is not an easy task. Only a few world-recognized experts were able to determine if an image used as evidence in court was an original or if someone tampered with it, making the photo unacceptable as evidence or alibi. Experts previously had to do this with self-made tools, very specialized scientific techniques, or a cobbled-together set of very expensive mathematical/engineering tools.

The Easy Way of Working

In order to permit more investigators and forensic labs to analyze the processing history of photos, Amped Software has integrated into one single software package, forensically accepted techniques that were previously only available to top-notch researchers.

Amped Authenticate empowers law enforcement agencies and forensic lab experts with very effective tools to identify tampering on an image and to verify if a digital photograph has been generated by a specific device. The camera ballistics feature in Amped Authenticate determines that a specific device – and not just the camera make or model – was used to generate a specific photo.

As opposed to other solutions that provide only one, or just a few tools for authenticating images, Amped Authenticate puts the power of multiple scientific tools, procedures, and reporting, in one software package to improve the user’s ability to detect tampered images or determine originality.

All tools available in Amped Authenticate are based on peer reviewed scientific papers, each performing a different test on the structure of an image and how it was created.

Amped Authenticate provides a very user-friendly interface that allows to open an image in the most common formats (JPEG, HEIF, PNG, TIFF, BMP, etc.) and easily select several filters and tools to perform diverse tests on the image.

Image forensics is based on a fundamental idea: every processing step in the life-cycle of an image leaves some distinctive traces in the image itself. These traces can be leveraged to reconstruct the processing history, identify the image’s originating device, and possibly localize manipulated regions. This is what Amped Authenticate is all about. It allows to carry out a thorough forensic analysis with numerous filters, and produce a customizable forensic report ensuring that your results are well explained and reproducible.

Overview

Use filters in the Overview category for a preliminary evaluation of your evidence image: perform a deep visual inspection, with levels adjustment, pixel-fidelity magnification, and side-by-side comparison with possible reference images. Briefly analyze the primary file format elements with Amped Authenticate’s automatic warning computation system, helping you to immediately spot suspicious/uncommon metadata and image properties.

Overview

Use filters in the Overview category for a preliminary evaluation of your evidence image: perform a deep visual inspection, with levels adjustment, pixel-fidelity magnification, and side-by-side comparison with possible reference images. Briefly analyze the primary file format elements with Amped Authenticate’s automatic warning computation system, helping you to immediately spot suspicious/uncommon metadata and image properties.

File Analysis

Take a deep dive into all image metadata and encoding properties. This category includes filters for simple and assisted bitstream examination, Exif and other metadata extraction, JPEG Quantization Table analysis, and comparison with Amped Authenticate’s internal database (featuring more than 14k tables from thousands of camera models). You can also check whether the image was downloaded from a Social Media Platform such as Facebook, Flickr, Instagram, Whatsapp, Twitter, and others.

Global Analysis

Reconstructing the processing history of the image is essential for a thorough forensic analysis. Global Analysis filters detect traces of multiple JPEG compression, reveal the previous compression quality, expose artifacts introduced by resizing/rotation/digital zoom, unveil traces of histogram and color processing, and uncover periodic noise typical of images recaptured from LCDs.

Camera Identification

Every camera leaves a distinctive noise in the produced images. Amped Authenticate lets you estimate this noise using a few images from that camera, thus creating a Camera Reference Pattern (CRP) file. You can then use the stored CRP to understand whether an evidence image was captured using that specific camera exemplar, with high accuracy. All of this still works even when the image has been mildly compressed, rotated by multiples of 90 degrees, downscaled, or croppedo.

Local Analysis

Being able to localize manipulated regions is of the utmost importance. Amped Authenticate provides you with many filters for this task, based on complementary analysis domains. Traces introduced by JPEG compression, artifacts left by interpolation algorithms, local noise consistency analysis, and suspicious similarity of cloned regions, are all used to provide you with effective, precise, and fine-grained forgery localization maps.

 

/* Omit closing PHP tag at the end of PHP files to avoid "headers already sent" issues. */