With the rising popularity of social media such as Facebook and twitter, fake news with fake pictures that look real has become a big problem. Digital Photos are more integral to communication than ever before, but the wide availability of easy image editing and manipulation tools at the disposal of anyone with a computer, or a smartphone, makes them a risky proposition when trust is important.
Deepfake Videos Are Getting Terrifyingly Real – Artificially intelligent face swap videos, known as deep fakes, are more sophisticated and accessible than ever.
Whether you’re accepting citizen journalism photos for a news site, profile photos for a dating service, insurance claim photos, or even photos of identity documents like licenses and passports, it’s important to know what’s real and what’s manipulated. Before you share the news, always verify the source, if the image appears to be too good to be true, analyze it.
↓ 01 – FotoForensics [ The Best ] | Free | Paid | Web
FotoForensics uses an advanced algorithm to decode any possible photoshopped pictures and manipulation; it uses the Error Level Analysis (ELA) to identify areas within an image that are at different compression levels. With JPEG images, the entire picture should be at roughly the same error level. If a section of the image is at a significantly different error level, then it likely indicates a digital modification.
FotoForensics aims to simplify the evaluation process. It works like a microscope — by highlighting artifacts and details that the human eye may not be able to identify. Between having the right tools and training, most people can quickly learn how to evaluate pictures. FotoForensics provides the algorithms, online tutorials for self-paced learning, challenges to test your knowledge, and other resources to help you get started.
- Error Level Analysis
- Metadata Analysis
- Last-Save Quality
- Color Adjustments
- Parasite Detection
↓ 02 – Forensically | Free | Web
Forensically is a set of free tools for digital image forensics. It includes clone detection, error level analysis, metadata extraction and more. You should think of forensically as a kind of magnifying glass. It helps you to see details that would otherwise be hidden. Just like a magnifying glass it can’t tell true from false or good from evil, but it might help you to uncover the truth.
- Clone Detection – The clone detector highlights copied regions within an image. These can be a good indicator that a picture has been manipulated.
- Error Level Analysis – This tool compares the original image to a recompressed version. This can make manipulated regions stand out in various ways. For example they can be darker or brighter than similar regions which have not been manipulated.
- Noise Analysis – This tool is basically a reverse denoising algorithm. Rather than removing the noise it removes the rest of the image. It is using a super simple separable median filter to isolate the noise. It can be useful for identifying manipulations to the image like airbrushing, deformations, warping and perspective corrected cloning. It works best on high quality images.
- PCA – This tool performs principal component analysis on the image. This provides a different angle to view the image data which makes discovering certain manipulations & details easier. This tool is currently single threaded and quite slow when running on big images.
↓ 03 – JPEGsnoop | Open Source | Windows
JPEGsnoop is a free Windows application that examines and decodes the inner details of JPEG, MotionJPEG AVI and Photoshop files. It can also be used to analyze the source of an image to test its authenticity. Every digital photo contains a wealth of hidden information — JPEGsnoop was written to expose these details to those who are curious.
Not only can one determine the various settings that were used in the digital camera in taking the photo (EXIF metadata, IPTC), but one can also extract information that indicates the quality and nature of the JPEG image compression used by the camera in saving the file. Each digical cameras specifies a compression quality levels, many of them wildly different, leading to the fact that some cameras produce far better JPEG images than others.
JPEGsnoop reports a huge amount of information, including: quantization table matrix (chrominance and luminance), chroma subsampling, estimates JPEG Quality setting, JPEG resolution settings, Huffman tables, EXIF metadata, Makernotes, RGB histograms, etc. Most of the JPEG JFIF markers are reported. In addition, you can enable a full huffman VLC decode, which will help those who are learning about JPEG compression and those who are writing a JPEG decoder. Works great on Microsoft Windows 10.
- Decode JPEG, AVI (MJPG), PSD images
- MCU analysis with detailed decode
- Extract embedded JPEG images
- Detect edited images through compression signature analysis
- Report all image metadata (EXIF)
- Batch file processing
- No installation required
↓ 04 – Ghiro | Open Source | Linux
Ghiro is an Open Source software for digital photo and digital image forensics. The forensic analysis is fully automated, report data can be searched or aggregated in different perspectives. Ghiro is designed to assist you and your team in the process of analyzing a massive amount of images, it could become an essential tool in your forensic lab.
- Error Level Analysis (ELA) is a technique aimed to detect if an image is edited or not. It can be applied to compressed images, i.e. JPEG or PNG. The main idea is that an image in his original form has unique levels of compression. The analyzed image is resaved and differences in compression levels are calculated, if differences are detected a probability of edits is high. Ghiro calculates error levels and detects differences between them.
- Hash digest generation – Most common hashes are calculated for the image, to create an unique identifier of it. The calculated hashes are: CRC32, MD5, SHA1, SHA224, SHA256, SHA384, and SHA512
- Hash list matching – Suppose you are searching for an image and you have only the hash. You can provide a list of hashes and all images matching are reported.
- Strings extraction – All text strings contained in the analyzed image are extracted, like in the unix strings tool. The more interesting (i.e. URLs) are highlighted.
- Signature engine – Signature provides evidence about most critical data to highlight focal points and common exposures. Signature engine to highlight common exposure on over 120 signatures
↓ 05 – Amped Authenticate | Paid | Windows
Amped Authenticate is a software package for forensic image authentication and tamper detection on digital photos. Authenticate provides a suite of different tools to determine whether an image is an unaltered original, an original generated by a specific device, or the result of a manipulation with a photo editing software and thus may not be accepted as evidence.
Current products and processes are focused on one or a relatively few scientific tools. Authenticate puts the power of multiple tests, procedures, and reporting in one package to improve the user’s ability to detect tampered images or determine originality.
↓ 06 – izitru [ Discontinued ] | Free | Paid | Web
izitru uses automated forensic analysis techniques to certify unmodified digital camera images, so that you can share them in a more trusted manner. Unlike the other 2, it is a very basic photo forensic software that only gives out a ‘true’ or ‘false’ answer.
You only have access to the basic features. When an image is uploaded to izitru, our standard tests only determine whether it is an unmodified original from a digital camera. They do have tests that can identify specific types of editing, such as cloning or compositing, but these tests cannot currently be applied automatically to every image.