Advertisement

Photo Manipulation: Software to Unmask Tampering

  • Alessandro Tanasi
Chapter

Abstract

In the Internet era, digital images are extensively produced, shared, and used as an information sharing method. Media are commonly used in unlimited forms: i.e. human communications, social networks, medical records, evidence into a court of law. In many cases, people need to trust digital images, for example an investigative journalist in needs of using a digital image as source. The wide availability of professional digital image editing software allows people to easily manipulate images to show fake contents, in such a way that may lead to misinformation, financial or human lives’ losses. In digital image forensics, image authentication verifies the originality of an image by detecting malicious manipulation. We present what image authentication is and why people should care about it; furthermore, we classify and discuss modern digital image authentication approaches, techniques, and tools.

References

  1. Adobe. (n.d.). Extensible Metadata Platform (XMP). Retrieved from https://www.adobe.com/products/xmp.html.
  2. CIPA. (2012). Exchangeable Image File Format for Digital Still Cameras: Exif Version 2.3. Retrieved from http://www.cipa.jp/std/documents/e/DC-008-2012_E.pdf.
  3. Duce, D. (Ed.). (2003). Portable Network Graphics (PNG) Specification (2nd ed.). Retrieved from http://www.libpng.org/pub/png/spec/iso/index-object.html.
  4. Error Level Analysis. (n.d.). In Wikipedia. Retrieved 2017, from https://en.wikipedia.org/wiki/Error_level_analysis.
  5. file (command). (n.d.). In Wikipedia. Retrieved 2017, from https://en.wikipedia.org/wiki/File_(command).
  6. Fırat, B. (n.d.). Phoenix—Image Forensics. Retrieved from https://github.com/ebemunk/phoenix.
  7. First Draft. (n.d.). Visual Verification Guide—Photos. Retrieved from https://firstdraftnews.org/en/education/curriculum-resource/visual-verification-guide-photos/.
  8. Ghiro. (n.d.). [Homepage]. Retrieved from http://www.getghiro.org/.
  9. Google. (n.d.-a). Google Street View. Retrieved from https://www.google.com/streetview/.
  10. Google. (n.d.-b). Google Images. Retrieved from https://images.google.com/.
  11. Hacker Factor. (n.d.). FotoForensics. Retrieved from https://fotoforensics.com.
  12. Harvey, P. (n.d.). ExifTool by Phil Harvey. Retrieved from https://sno.phy.queensu.ca/~phil/exiftool/.
  13. ImageForensic. (n.d.). [Homepage]. Retrieved from https://www.imageforensic.org/.
  14. ImpulseAdventure. (2017). JPEGsnoop 1.8.0—JPEG File Decoding Utility. Retrieved from http://www.impulseadventure.com/photo/jpeg-snoop.html.
  15. IPTC. (n.d.). Photo Metadata. Retrieved from https://iptc.org/standards/photo-metadata/.
  16. JPEG. (n.d.). [Homepage]. Retrieved from https://jpeg.org.
  17. Microsoft. (n.d.). Photo DNA Cloud Service. Retrieved from https://www.microsoft.com/en-us/photodna.
  18. Offensive Security. (n.d.). Kali Linux. Retrieved from https://www.kali.org.
  19. pHash. (n.d.). pHash. The Open Source Perceptual Hash Library. Retrieved from http://phash.org/.
  20. Pontello, M. (2018, April 8). TrID—File Identifier. Retrieved from http://mark0.net/soft-trid-e.html.
  21. Reveal. (n.d.). Reveal Image Verification Assistant. Retrieved from http://reveal-mklab.iti.gr/reveal/.
  22. Ssdeep Project. (2017, November 7). Ssdeep—Fuzzy hashing Program. Retrieved from http://ssdeep.sourceforge.net.
  23. The Apache Software Foundation. (n.d.). Apache Tika—a Content Analysis Toolkit. Retrieved from https://tika.apache.org/.
  24. TinEye. (n.d.). Reverse Image Search. Retrieved from https://www.tineye.com/.
  25. Ubuntu. (n.d.). [Homepage]. Retrieved from https://www.ubuntu.com/.
  26. World Wide Web Consortium. (1987). GIF. Graphics Interchange Format. A Standard Defining a Mechanism for the Storage and Transmission of Raster-Based Graphics Information. Retrieved from https://www.w3.org/Graphics/GIF/spec-gif87.txt.

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Alessandro Tanasi
    • 1
  1. 1.Ghiro ProjectMilanItaly

Personalised recommendations