Create an account Home  ·  Topics  ·  Downloads  ·  Your Account  ·  Submit News  ·  Top 10  
· Home
· Content
· Forensic Downloads
· Forensics Feedback
· Forums
· Members List
· Statistics
· Surveys
· Top 10
· Topics
· Training Reviews
· Web Links
· Your Account

Our Membership

Latest: Sarahhaydock
New Today: 2
New Yesterday: 2
Overall: 29713

Computer Forensics
This is a free and open peer to peer medium for digital and computer forensics professionals and students. Please help us maintain it by contributing and perhaps linking to us from your own website.

Recent Posts

 With the drizzle, a round of crescent
 the sunset kisses the Western Hills
 eSoftTools Excel Password Unlocker
 Ceiling suppliers
 Red Raspberry Extract Wholesale

Computer Forensics World Forums

Pages Served
We received
page views since August 2004

Security Sources

OnGuard Online
ISO 17799 ISO 27001
ISO 27000 Toolkit
ISO 27001 & 27000
Security Policies

Computer Forensics World: Forums

Computer Forensics World :: View topic - Superimposed Photos
 Forum FAQForum FAQ   SearchSearch   UsergroupsUsergroups   ProfileProfile   Log in to check your private messagesLog in to check your private messages   Log inLog in 

Superimposed Photos

Post new topic   Reply to topic    Computer Forensics World Forum Index -> General Computer Forensic Issues
View previous topic :: View next topic  
Author Message

Joined: Oct 29, 2017
Posts: 1

PostPosted: Sun Oct 29, 2017 11:51 pm    Post subject: Superimposed Photos Reply with quote

Hye! Anyone here know how to identify superimposed photos from the perspective of computer forensic?
Back to top
View user's profile

Joined: Nov 17, 2017
Posts: 1

PostPosted: Sat Nov 18, 2017 3:14 am    Post subject: How identify superimposed photos Reply with quote

We see hundreds or even thousands of images a day, and almost all of them have been digitally manipulated in some way. Some have gotten basic color corrections or simple Instagram filter effects, while others have received full on Photoshop jobs to completely transform the subject. It turns out humans arenít very good at recognizing when an image has been manipulated, even if the change is fairly substantial. Here a few tips for authenticating images on our own. First is try reverse image searching. It means that looks for images that are exact matches, as well as those that are thematically similar. Second is look for weirdness. Fight the urge to zoom in too far to examine an image. This unedited image shows weirdness and artifacts when you're up this close. You don't have the CSI "enhance" tool.

Third, check the EXIF data. When a digital camera captures an image, it appends a whole array of information called EXIF data to the image file. This data includes all the critical camera settings, as well as other info like GPS data if itís available (which is typically the case with smartphone photos, unless the person has intentionally turned location settings off). For example, if you have the location of the photo, you can plug it into Google Maps and use Street View to get a general idea of what the location might actually look like. The Street View scene wonít necessarily be 100 percent accurate and up-to-date, but it can be a good starting point. You can see the EXIF data for a photo by opening it in Photoshop or another image editing program, but there are also websites that will show you the data, like Photo-sharing site Flickr also displays a lot of metadata when itís available. Both Windows and Mac can also give you some metadata if you right click on the file in Explorer or Finder.

Fourth, examine the shadows. The image has been edited to flip the man's face, which creates a clear contradiction in the direction of the shadows. It was part of a study to determine how well people can recognize faked photos. Fifth, be wary of online tools. There are some websites that can read the software tags, like this one that can tell you exactly what actions were taken in Lightroom when editing a photo. Thatís more useful, but you still need an understanding of the software itself to make an accurate interpretation. There is software out there that can identify these more complex manipulations, but itís typically only available commercially, for security and law enforcement operations.

Thank you.
Back to top
View user's profile
Display posts from previous:   
Post new topic   Reply to topic    Computer Forensics World Forum Index -> General Computer Forensic Issues All times are GMT + 10 Hours
Page 1 of 1

Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Powered by phpBB 2.0.10 © 2001 phpBB Group
phpBB port v2.1 based on Tom Nitzschner's phpbb2.0.6 upgraded to phpBB 2.0.4 standalone was developed and tested by:
ArtificialIntel, ChatServ, mikem,
sixonetonoffun and Paul Laudanski (aka Zhen-Xjell).

Version 2.1 by Nuke Cops © 2003

Forums ©


TMs property of their respective owner. Comments property of posters. © 2007 Computer Forensics Science World.
Digital forensic computing news syndication: Computer Forensics Training News or UM Text
Software is copyrighted (c)2003, and is free under licence agreement. All Rights Are Reserved.