Home About Us Laboratory Services Forensic Science Communications Back Issues April 2008 Standards Standards and Guidelines - Forensic Science...
Info
This is archived material from the Federal Bureau of Investigation (FBI) website. It may contain outdated information and links may no longer function.

Standards and Guidelines - Forensic Science Communications - April 2008

Standards and Guidelines - Forensic Science Communications - April 2008
fsc_logo_top.jpg
fsc_logo_left.jpg

April 2008 - Volume 10 - Number 2

 

Standards and Guidelines

Best Practices for Image Authentication

Scientific Working Group on Imaging Technology (SWGIT)

Objective | Introduction | General Considerations | Specific Considerations |
Suggested Readings
| Disclaimer

Objective

This document provides personnel with guidance regarding practices appropriate when performing image authentication as part of image analysis.

Introduction

Forensic image authentication is the application of image science and domain expertise to discern if a questioned image or video is an accurate representation of the original data by some defined criteria. Image authentication is a subtask of image analysis, and general best-practice issues are discussed in SWGIT’s Best Practices for Forensic Image Analysis. This document addresses issues specific to image authentication. Questions involved in authentication include issues of image manipulation, image creation, and consistency with prior knowledge about the circumstances depicted in the image.

Image authentication must not be confused with the requirement to authenticate evidence as a precondition to admissibility in court. Likewise, authenticity differs significantly from integrity. Integrity ensures that the information presented is complete and unaltered from the time of acquisition until its final disposition. For example, the use of a hash function can verify that a copy of a digital image file is identical to the file from which it was copied, but it cannot demonstrate the veracity of the scene depicted in the image. For further information on digital image integrity, refer to SWGIT’s Best Practices for Maintaining the Integrity of Digital Images and Digital Video in this issue.

The process of image authentication can involve several tasks. These tasks include, but are not limited to, evaluation of image structure and content. Image structure issues include discovery of artifacts consistent with image manipulation or degradation, metadata analysis, and indications of provenance. Image content issues include continuity issues, evidence of manipulation, evidence of staging, and anachronism. General principles and procedures for such evaluations are described below.

Image authentication may involve the evaluation of a number of technical issues as discussed below; the image analyst should demonstrate a command of them. Training and proficiency are discussed in the Scientific Working Group on Digtal Evidence (SWGDE)/SWGIT Guidelines and Recommendations for Training in Digital & Multimedia Evidence.

General Considerations


Provenance

In the absence of a witness who can testify to the origin of a questioned image or video, it may be possible for an examiner to authenticate such data by identifying its origin (provenance).

Metadata Analysis

Digital image files contain both pixel data and information about the structure and content of the file itself; the latter is referred to as metadata. Metadata may be useful in identifying the source and processing history of the file but can be absent or altered.

Detection of Manipulation

For the purposes of this document, manipulation is defined as the modification of image features by direct alteration of image content at the pixel/voxel level. Detection of manipulation may involve analysis of textures within the image, shading and shadow, color balance, palette, lighting, quality of light, perspective, focus, and resolution.

Common manipulation techniques amenable to analysis involve primarily alteration and compositing. Alteration is the changing of image features through the use of artistic means. Figure 1 provides an example.


Figure 1 shows an altered image.


Figure 1: The original image is on the left. The image on the right was altered to remove the weapon from the table.

Compositing (also known as cut and paste) is the combination of elements of two or more images to form one image. Figure 2 provides an example.

Figure 2 is an example of compositing.


Figure 2: The top image was created by altering the bottom-left image and compositing it with the bottom-right image.

These techniques are sometimes incorrectly referred to as morphing. Morphing is the automated transformation of components of one image into those of another involving a sequence of intermediate images demonstrating incremental change.

While it is technically feasible to manipulate an image, particularly a single still image, in a manner that is not detectable by subsequent analysis using currently available tools and techniques, such manipulations involve a number of practical issues. These issues include, but are not limited to:

  • Access to the image.
  • The skill level of the artist necessary to perform the manipulation.
  • The time necessary to create the manipulation.
  • The availability of software and hardware necessary to perform the manipulation.
  • The level of fine detail in the image.
  • The complexity of the image content, such as physical interaction of people with one another and the environment.

For instance, changing the color of a fountain pen in an image may be easy for an unskilled artist to achieve, but it would be a much greater artistic and technical challenge to alter the image of a nude adult to appear to be a young child. Accordingly, the complex manipulations necessary in the latter case might be easier to detect compared to a simple color change.

The presence of a manipulation does not necessarily mean that the events depicted in an image did not occur or that the individuals depicted are not real or were not there at the time. There are multiple examples in known child pornography images in which the face of an adult has been altered to obscure identity. Likewise, there are other real child pornography images in which parts of the background have been obscured to prevent observers from determining information such as the location or date of the image.

Detection of Image Creation

This is the creation of image content entirely through artistic means. One example is the creation of virtual humans using three-dimensional (3-D) modeling software (e.g., “computer-generated” or “CG” humans). Detection of such creation involves the discovery of unrealistic components and features within the image, including subsurface scattering of light in the skin, depth of field, textures, movement, and physics.

Detection of Staging

Staging is the physical alteration of the scene prior to image acquisition. Detecting this may require coordination with scene investigators, correlation of image features with the real features at the scene, or comparison with other images of the scene or subject.

Continuity Issues

Continuity involves temporal inconsistencies in moving images or inconsistencies of content within the scene in a still image. Examples include “cut edits” in a video sequence and anachronism. Anachronism is image content incongruous for the date represented in the image. Similar analysis is done to detect incongruities of place and situation. Provenance issues involve the time, place, and manner of image creation. For instance, a photograph purporting to be an original of Abraham Lincoln recorded on modern film would be suspect.

Image Processing

Image processing often is not necessary for image authentication. For instance, a picture supposed to have been taken in Paris that shows the Washington Monument in the background will be suspect by inspection. Detection of incongruous textural features, however, may require substantial image processing. Image processing is discussed in SWGIT’s Recommendations and Guidelines for the Use of Digital Image Processing in the Criminal Justice System.

Report

Image authentication conclusions can rarely, if ever, be reported in terms of a numerical probability. It is sometimes possible to definitively detect manipulation or rule out authenticity. It is further possible to determine positive evidence for authenticity according to a set of criteria. Those criteria should be delineated in the report.

Specific Considerations

In today’s forensic context, certain authentication tasks are particularly common. The application of the general authentication considerations to some of these specific areas warrants discussion.

Child Pornography

Over the past decade, there has been a heightened public awareness of child pornography and the exploitation of children, leading to an increased caseload for many agencies.

A common assertion regarding purported child pornography is that the image does not depict the actual abuse of a child. Instead, there may be multiple claims:

  • The image is that of an adult that has been manipulated to appear to be that of a child.
  • A nonsexually explicit photograph of a child has been altered to appear to be a sexually explicit photograph.
  • The image was created through artistic means without the exploitation of real children (e.g., computer-generated children).

The best way to authenticate child pornography is to identify the victims in the image. Investigators do this through the use of known-victim databases and direct contact with victims and people who know the victims. If authentication cannot be done in this manner, then further forensic analysis may be necessary.

Detection of Manipulation

Common manipulations encountered by the analyst include cut and paste and removal or reduction of secondary sexual characteristics using so-called airbrushing and cloning tools, among others. Artifacts of such manipulation may include inconsistencies in lighting and shadows, inconsistencies and discontinuities in color and texture, differing resolutions within an image, changes in compression and noise artifacts, and repetition of textures and features. Subject-matter experts may be able to observe such artifacts directly through visual inspection or by using image-processing techniques.

Detection of Image Creation

It is increasingly practical to render virtual people, but some aspects of the human body remain a challenge for artists. Unrealistic features may be observed in:

  • Skin tones and textures.
  • Skeletal structure.
  • Flesh and muscle movement.
  • Body-to-object contact.
  • Skin-to-skin contact.
  • Skin creases.
  • Hair.
  • Ears.
  • Eyes.
  • Reaction of subjects/objects to gravity and physics.

Continuity Issues

Human beings move in a manner that is generally continuous and fluid. A recording of this movement in a sequence of images should reflect this continuity. Lapses in continuity of motion may indicate image manipulation or fabrication.

Provenance may be important. Many images encountered in child pornography are part of a series of images depicting the same individuals and/or scene. When a single image can be demonstrated to be part of a series (including video), the existence of the series supports its authenticity because of the difficulty of creating consistent, undetectable manipulations. Additionally, metadata may link an image to a specific camera, date and time, or author/creator.

The relationship between historical print media and computer imagery is of particular importance in the evaluation of child pornography. There were times and places in which child pornography was legal. These images were frequently published in magazines dedicated to child pornography. This era was prior to the advent of commercially available consumer-level digital image processing. This has specific implications:

  • During this period, it was practical and cost-effective to create pornography using real children in real sexual acts.
  • The technology of the period did not allow sophisticated digital image manipulation.

The practical implication of this for modern investigation is that when images dating from that period are encountered, their provenance argues for authenticity.

Child Pornography Case Work-Flow Example

A work-flow example is included below:

A local police agency submits 20 digital images depicting child pornography. The request is to determine if the individuals and events depicted in the imagery are real or the result of manipulation or fabrication.

Following the work flow delineated in SWGIT’s Best Practices for Forensic Image Analysis, the agency proceeds:

    1. The agency reviews the request and:
      1. Determines that it does this type of analysis.
      2. Determines that all necessary items to support the requested examination have been submitted.
      3. Determines that the agency has the necessary expertise, materials, and resources to perform the analysis.
      4. Assigns the analysis to an analyst.
    1. The analyst obtains the imagery. The analyst contacts the investigating agency and verifies that the images are original images.
    2. The analyst triages the images.
    1. The images are viewed to see if the subject is a known victim. The subject has not previously been noted and is considered a new victim.
    2. The images are prioritized to establish the order in which they will be analyzed. The analyst also evaluates the images as a group for comparison with respect to continuity and similar issues.
  1. Initial image processing is determined to be unnecessary in this case.
  2. The images are examined to determine if there is evidence of manipulation. The agency maintains a list of features that are evaluated for such a determination. A checklist of these features is used to streamline the note-taking process. Noting a feature in one image that bears further inspection, the analyst uses image processing to enhance the feature of interest. Upon conducting this inspection, the analyst finds that the feature represents artifacts explainable as the result of the photographic process. The analyst notes this and continues with the examination.
  3. Having found no unexplainable artifacts, the analyst considers the number of images depicting the same individual and/or location, as well as the level of detail. This image set consists of highly detailed views of the same victim in a number of poses taken in what appears to be one location. This is considered strong support of authenticity.
  4. The analyst writes the report.

Execution Videos

In the current geopolitical and technological environment, videos purporting to depict the execution of individuals are common. In some cases, determining the authenticity of these videos is operationally important.

A common assertion regarding purported execution videos is that the images do not depict an actual execution.

The best way to authenticate an execution video is to examine the putative victim. If this is not possible, forensic image analysis may be necessary. In contrast to child pornography, in which image manipulation and continuity are of primary importance, the evaluation of execution videos often involves the detection of staging and computer-generated special effects.

Detection of Manipulation

Cases have been observed in which documentation (e.g., a newspaper) is composited into the video to falsify the date. Instances also have been observed in which blood, wounds, and smoke have been artistically inserted.

In addition to the inconsistencies noted in the discussion of child pornography, artifacts seen in fake execution videos include the geometric artifacts of the modeling of special effects, such as globular smoke, reflecting the underlying geometric model used for the special effect.

Detection of Image Creation

Execution videos that are completely generated without the involvement of real people have yet to be demonstrated as forensically important. The same questions of realism that were discussed for child pornography would pertain to execution videos.

Detection of Staging

Indicators of staging include inconsistencies in the scene, unusual objects or arrangements of objects in the scene, and unnatural body movement or position. For example, in a staged hanging, the examination of the folds in the clothing might reveal an underlying scaffolding holding the body erect. This would suggest that the individual had been killed earlier and the execution was staged on a corpse. There have been cases in which a corpse was posed to make it appear that the subject was still alive for the purposes of extortion.

Subject-matter expertise is often critical when looking for staging—it may be important to have extensive knowledge of uniforms, weapons, anatomy, physiology, or other disciplines in order to reach an accurate conclusion. In some staged executions, blood substitutes such as colored syrup or water do not display appropriate viscosity or bloodstain pattern behavior. During the Iraq conflict, the news media reported that a photograph of what appeared to be a captured U.S. soldier had been posted to an Islamist Web site. The photograph turned out to be a posed scene using a toy action figure.1 Detection of staging was accomplished through recognition of the action figure, the lack of standard insignia and identification on the uniform, inauthentic appearance of a toy weapon, and the presence of World War II-vintage hand grenades on the victim’s vest (an anachronism).

1See http://www.nbcnews.com/id/6894934/#.U4d80yjw_To.

Continuity Issues

The basic principles of continuity assessment as described previously apply. In the case of execution videos, a common finding is the presence of multiple “takes,” in which the scene is replayed to show varying camera angles and perspectives. In a well-known case evaluated by multiple offices, frame-by-frame evaluation revealed that a gunshot entrance wound changed location on the body slightly over time. Analysis of optical flow or visual discontinuities may reveal editing. Consultation with specialists in the analysis of other media, such as audio, may be appropriate.

The Conspiracy Theory Defense

A common issue at trial is that someone has changed a scene or surveillance photograph for the purpose of misrepresentation. While, by definition, it is not possible to prove a negative (one cannot prove that there are no unicorns, only that no one has ever proven they exist), it is possible to demonstrate that it is unlikely. The previous discussions focused more on searching for evidence of manipulation, whereas this task is oriented more toward providing a measure of the difficulty in achieving an indiscernible manipulation.

It should be noted that crime scene photographers can assist in the process of refuting charges of scene alteration by taking photographs of the same objects or parts of a scene from more than one angle. As noted elsewhere, the process of creating multiple altered images of the same person, object, or scene is more difficult than creating a single altered image. This is because three-dimensional properties of people and objects, as well as the manner in which they interact with the lighting of a scene, are complex and difficult to re-create artificially in a consistent fashion in multiple images. Having multiple images of the same object from different viewpoints would thus undercut claims that an object was inserted into an image after the fact. Likewise, having multiple images that show the same empty location from multiple viewpoints can contradict arguments that an object had been digitally removed from a crime scene image.

Given that an analysis for a supposed modification provides no positive evidence for it, important considerations for a negative conclusion include:

  • The artifacts that would likely be produced and the techniques necessary to remove them.
  • The practical limitations of the algorithmic technique supposedly employed.
  • The time and expertise necessary to achieve the supposed modification, given the opportunity.
  • The resources (hardware, software, training) that would be required and their availability at the time of the supposed modification.

To illustrate with an example, consider an allegation of prisoner abuse recorded by video taken by a participant. The video had been downloaded onto a laptop computer and had been in his possession for two days. The defense claimed that the owner of the laptop computer had inserted images of the defendant into the video. Analysis of the video revealed no evidence of manipulation. Computer forensic analysis revealed that no software had been added or removed from the computer during the time period in question and that the laptop computer contained only a common media player and editing software that allowed editing clips. Modification of individual frames was not possible using this software. Therefore, modification of the sort claimed by the defense would not have been possible with the resources and time available.

Suggested Readings

The following SWGIT and SWGIT/SWGDE documents may be accessed at http://www.theiai.org/guidelines/.

SectionTitle

Section 1

Overview of SWGIT and the Use of Imaging Technology in the Criminal Justice System

Section 2

Considerations for Managers Migrating to Digital Imaging Technology

Section 3

Guidelines for Field Applications of Imaging Technologies in the Criminal Justice System

Section 4

Recommendations and Guidelines for Using Closed-Circuit Television Security Systems in Commercial Institutions

Section 5

Recommendations and Guidelines for the Use of Digital Image Processing in the Criminal Justice System

Section 6

Guidelines and Recommendations for Training in Imaging Technologies in the Criminal Justice System

Section 7

Recommendations and Guidelines for the Use of Forensic Video Processing in the Criminal Justice System

Section 8

General Guidelines for Capturing Latent Impressions Using a Digital Camera

Section 9

General Guidelines for Photographing Tire Impressions

Section 10

General Guidelines for Photographing Footwear Impressions

Section 11

Best Practices for Documenting Image Enhancement

Section 12

Best Practices for Practitioners of Forensic Image Analysis 

Section 13

Best Practices for Maintaining the Integrity of Digital Images and Digital Video

Section 14

Best Practices for Image Authentication

Section 15

Best Practices for Archiving Digital and Multimedia Evidence (DME) in the Criminal Justice System

SWGIT/SWGDE

Proficiency Test Program Guidelines

SWGIT/SWGDE

Guidelines and Recommendations for Training in Digital & Multimedia Evidence

SWGIT/SWGDE

Recommended Guidelines for Developing Standard Operating Procedures

SWGIT/SWGDE

SWGDE and SWGIT Digital & Multimedia Evidence Glossary