Photo Manipulation: Software to Unmask Tampering

  • Alessandro Tanasi


In the Internet era, digital images are extensively produced, shared, and used as an information sharing method. Media are commonly used in unlimited forms: i.e. human communications, social networks, medical records, evidence into a court of law. In many cases, people need to trust digital images, for example an investigative journalist in needs of using a digital image as source. The wide availability of professional digital image editing software allows people to easily manipulate images to show fake contents, in such a way that may lead to misinformation, financial or human lives’ losses. In digital image forensics, image authentication verifies the originality of an image by detecting malicious manipulation. We present what image authentication is and why people should care about it; furthermore, we classify and discuss modern digital image authentication approaches, techniques, and tools.


  1. Adobe. (n.d.). Extensible Metadata Platform (XMP). Retrieved from
  2. CIPA. (2012). Exchangeable Image File Format for Digital Still Cameras: Exif Version 2.3. Retrieved from
  3. Duce, D. (Ed.). (2003). Portable Network Graphics (PNG) Specification (2nd ed.). Retrieved from
  4. Error Level Analysis. (n.d.). In Wikipedia. Retrieved 2017, from
  5. file (command). (n.d.). In Wikipedia. Retrieved 2017, from
  6. Fırat, B. (n.d.). Phoenix—Image Forensics. Retrieved from
  7. First Draft. (n.d.). Visual Verification Guide—Photos. Retrieved from
  8. Ghiro. (n.d.). [Homepage]. Retrieved from
  9. Google. (n.d.-a). Google Street View. Retrieved from
  10. Google. (n.d.-b). Google Images. Retrieved from
  11. Hacker Factor. (n.d.). FotoForensics. Retrieved from
  12. Harvey, P. (n.d.). ExifTool by Phil Harvey. Retrieved from
  13. ImageForensic. (n.d.). [Homepage]. Retrieved from
  14. ImpulseAdventure. (2017). JPEGsnoop 1.8.0—JPEG File Decoding Utility. Retrieved from
  15. IPTC. (n.d.). Photo Metadata. Retrieved from
  16. JPEG. (n.d.). [Homepage]. Retrieved from
  17. Microsoft. (n.d.). Photo DNA Cloud Service. Retrieved from
  18. Offensive Security. (n.d.). Kali Linux. Retrieved from
  19. pHash. (n.d.). pHash. The Open Source Perceptual Hash Library. Retrieved from
  20. Pontello, M. (2018, April 8). TrID—File Identifier. Retrieved from
  21. Reveal. (n.d.). Reveal Image Verification Assistant. Retrieved from
  22. Ssdeep Project. (2017, November 7). Ssdeep—Fuzzy hashing Program. Retrieved from
  23. The Apache Software Foundation. (n.d.). Apache Tika—a Content Analysis Toolkit. Retrieved from
  24. TinEye. (n.d.). Reverse Image Search. Retrieved from
  25. Ubuntu. (n.d.). [Homepage]. Retrieved from
  26. World Wide Web Consortium. (1987). GIF. Graphics Interchange Format. A Standard Defining a Mechanism for the Storage and Transmission of Raster-Based Graphics Information. Retrieved from

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Alessandro Tanasi
    • 1
  1. 1.Ghiro ProjectMilanItaly

Personalised recommendations