Identifying Tampered Images

Mossé Cyber Security Institute
11 Jan 202308:39

Summary

TLDRThe video script introduces viewers to methods for detecting tampered images, a critical skill in open source intelligence investigations. It outlines common manipulation techniques such as cloning, resizing, and adding elements to images. The script demonstrates the use of specialized tools like forensically and the nvid browser extension for Chrome to perform error level analysis and noise analysis on images. By analyzing shadows, lighting, and pixel demarcation, these tools can reveal discrepancies, indicating tampering. The video encourages practice and awareness of potential false positives, emphasizing the importance of image forensics in fields like politics and activism.

Takeaways

  • 🔍 Importance of image analysis in open source investigations.
  • 🖼️ Identifying image tampering is crucial for the integrity of an investigation.
  • 📸 Common tampering methods include cloning, resizing, replacing faces, and removing objects.
  • 🧩 Error level analysis can detect cloned sections within an image.
  • 🌐 Using tools like Forensically and NVIDIA Browser Extensions for Chrome for image analysis.
  • 🔊 Noise analysis helps identify foreign elements in an image.
  • 🖼️ Original images can be compared to tampered ones to spot discrepancies.
  • 🏞️ Examples provided in the script demonstrate how to detect alterations in images.
  • 🔍 Zooming in can reveal clear demarcation lines between colors indicating foreign elements.
  • 📈 Practicing with different tools is encouraged to improve image analysis skills.
  • 👥 Joining online communities can provide further learning in cybersecurity and image analysis.

Q & A

  • What is the main topic of the video?

    -The main topic of the video is how to identify tampered images during an investigation.

  • Why is it important to determine if an image has been tampered with?

    -It is important because the authenticity of an image can sometimes direct the course of the entire investigation, affecting the outcome and credibility of the findings.

  • What are some possible ways an image may have been tampered with?

    -An image may be tampered with by cloning and resizing parts, replacing faces, removing sections, altering lighting, or making minor corrections like removing blemishes or objects.

  • What is the first tool introduced in the video for image analysis?

    -The first tool introduced is error level analysis, which helps identify cloned sections within an image.

  • How does the noise analysis tool work?

    -The noise analysis tool identifies foreign elements or noise in an image that are not part of the original, highlighting them as distinct spots.

  • What does the clone detection tool do?

    -The clone detection tool identifies identical regions in an image by joining them together with lines, revealing any cloned parts.

  • How can you tell if a foreign element has been added to an image?

    -You can use a magnifier tool to zoom into the area where the element is suspected to be added. A clear line of demarcation between two adjacent colors indicates that a foreign element has been added.

  • What should you do if you need to practice identifying tampered images?

    -You can download data sets of tampered images from various websites to practice and use different tools to enhance your skills.

  • What is recommended for those who want to learn more about image forensics and other cybersecurity skills?

    -They are encouraged to join an online community of students on the video's website to register for a free account and gain access to more learning materials.

  • How can viewers engage with the content if they find it helpful?

    -Viewers can hit like, share the video on social media, and subscribe to the YouTube channel for more similar content.

Outlines

00:00

🕵️‍♀️ Image Tampering Identification Techniques

This paragraph introduces the topic of identifying tampered images during an investigation. Erica explains the importance of detecting alterations in images as it can influence the entire investigation's direction. She references a previous video on analyzing images for open source intelligence and suggests using special tools to process and analyze images for signs of tampering. The paragraph outlines various ways an image might be manipulated, such as cloning, resizing, replacing faces, removing objects, or altering lighting and shadows. Erica then demonstrates using tools like error level analysis and noise analysis to identify cloned sections and foreign elements in images, emphasizing the significance of these techniques in investigations.

05:02

🔍 Advanced Image Analysis Tools and Their Applications

In this paragraph, the focus is on advanced tools and techniques used for a deeper analysis of images suspected to be tampered with. Erica discusses the use of the forensically tool, which comprises multiple analysis tools, and the nvid browser extension for Chrome. She explains how these tools can help identify cloned sections, noise, and foreign elements in an image. The paragraph provides examples of how error level analysis and noise analysis can reveal discrepancies in images, such as added objects or edited out characters. It also touches on the use of clone detection and magnification tools to detect and confirm alterations in images. Erica encourages practice and highlights the value of these skills in fields like politics and activism, where tampered images are commonly encountered.

Mindmap

Keywords

💡Image Tampering

Image tampering refers to the process of altering or modifying an image in a way that changes its original content. In the context of the video, it is crucial to identify tampered images during an investigation as it can affect the direction and outcome of the entire inquiry. The video provides examples of tampered images, such as a bird added to a picture or the removal of a boatman from an image, to illustrate how alterations can be detected.

💡Forensic Analysis

Forensic analysis in the context of the video refers to the scientific examination of digital images to determine their authenticity. It involves using specialized tools and techniques to detect any signs of image manipulation. The video emphasizes the importance of forensic analysis in investigations, especially when dealing with open-source intelligence, and provides a walkthrough of using specific tools for this purpose.

💡Error Level Analysis

Error Level Analysis (ELA) is a technique used in digital forensics to identify areas of an image that have been compressed or altered multiple times. A higher error level indicates that a section of the image has been modified or cloned from another part of the image. In the video, ELA is used to detect the cloned bird in the image, as it shows a distinct bright color in the analysis result.

💡Noise Analysis

Noise analysis is a method used to detect foreign elements or 'noise' in an image that are not part of the original content. This tool identifies distinct spots or differences in the image that may indicate tampering or addition of elements. In the video, noise analysis is used to identify the addition of a distinct spot in the middle of an image, suggesting that the image has been altered.

💡Clone Detection

Clone detection is a process that identifies identical or very similar regions within an image that may suggest duplication or replication of parts. This technique is useful in detecting tampering where a section of the image is copied and pasted over another area. The video illustrates the use of clone detection by showing how lines connect cloned regions, revealing that the tree on the right in one image is a clone of the tree on the left.

💡JPEG Quality Slider

The JPEG quality slider is a tool that adjusts the level of detail and compression in a JPEG image. In the video, it is used to increase the image quality to 99, which helps to highlight areas of the image that have been cloned or altered. The higher quality setting makes the outline of the cloned bird more noticeable, aiding in the identification of tampering.

💡Lighting Consistency

Lighting consistency refers to the uniformity of lighting across different parts of an image. In the context of image tampering, if the lighting on a specific object appears different from the rest of the image, it may indicate that the object has been manipulated or added later. The video emphasizes the importance of observing differences in shadows for all objects in the image as a clue to tampering.

💡Digital Forensics

Digital Forensics is the field dedicated to the recovery and investigation of material found in digital devices. It involves the use of various tools and techniques to analyze and draw conclusions from digital data. In the video, digital forensics tools are used to analyze images and determine if they have been tampered with, which is a crucial skill in open-source intelligence gathering and investigations.

💡Open-Source Intelligence

Open-Source Intelligence (OSINT) is the practice of gathering information from publicly available sources to be used in intelligence context. In the video, the process of analyzing images for OSINT is discussed, highlighting the importance of verifying the authenticity of images found in public domains to ensure the reliability of the intelligence gathered.

💡False Positives

False positives occur when a diagnostic test or analysis incorrectly identifies a benign condition or element as harmful or malicious. In image analysis, a false positive might be when a tool indicates an area of an image as tampered when, in fact, it is not. The video mentions that investigators may encounter false positives and that a high level of analysis or expertise may be required to confirm the authenticity of an image.

💡Image Authentication

Image authentication is the process of verifying the integrity and origin of an image to confirm that it has not been altered or manipulated. This is a critical aspect of investigations, especially in fields like politics and activism, where the credibility of visual evidence can have significant implications. The video provides techniques and tools for image authentication to ensure that the images being analyzed are genuine and have not been tampered with.

Highlights

The video demonstrates how to identify tampered images, which is crucial in open source intelligence investigations.

Tampered images may have cloned, resized parts, or faces replaced with others.

Images can be modified to mask the disappearance of a section or to alter the lighting on a specific object.

Error level analysis is a tool to identify cloned sections within an image.

The nVid browser extension for Chrome performs a deeper analysis on target images.

Noise analysis can detect foreign elements in an image that are not part of the original.

Original images can be compared with tampered ones to confirm alterations.

Clone detection tool identifies identical regions in an image that may indicate editing.

Zooming into an image can reveal a clear line of demarcation between adjacent colors, indicating foreign elements.

Practicing with different tools is encouraged to improve image analysis skills.

False positives may occur during investigations, and image forensics experts can be consulted for deeper analysis.

Tampered images are commonly encountered in fields like politics and activism.

The video provides valuable insights for those in the field of cyber security and open source intelligence.

The presenter, Erica, invites viewers to join an online community for learning cyber security skills.

The video concludes with a call to action to like, share, and subscribe for more content on image analysis.

Transcripts

play00:00

[Music]

play00:00

hi there welcome to mcsi my name is

play00:05

Erica in this video I will demonstrate

play00:08

how you can identify tampered images

play00:10

during an awesome investigation

play00:13

have you watched the video on our

play00:14

Channel where I introduce you to

play00:16

analyzing images for open source

play00:18

intelligence

play00:19

if not you can find the link to it in

play00:22

the description box below

play00:24

during an Austin investigation it is

play00:27

highly likely that you would analyze

play00:28

images

play00:30

some of those images may have been

play00:32

modified or altered in some way

play00:34

determining whether an image has been

play00:36

tampered with or not is crucial as it

play00:39

sometimes directs the course of the

play00:41

entire investigation

play00:43

first let us talk about the possible

play00:45

ways in which an image may have been

play00:47

tampered with a part of the image may be

play00:50

cloned resized and placed within the

play00:52

same image

play00:55

part of another image may be placed on

play00:58

the target image for example replacing

play01:01

the face of one person in the image with

play01:03

another person's face

play01:06

a part of the image may have been

play01:09

removed the image would be modified to

play01:11

Mask The Disappearance of a section

play01:15

the lighting on a specific object may

play01:18

appear to be different from the rest of

play01:19

the image make sure to observe the

play01:22

differences in Shadows for all objects

play01:24

in the image

play01:27

minor corrections may have been made to

play01:29

the Target image this is typically in

play01:32

the form of removing blemishes or

play01:34

removing articles like bags that the

play01:36

target is holding in the picture

play01:38

[Music]

play01:40

now that you have an idea about the

play01:42

possible ways in which an image may have

play01:44

been tampered with let us utilize

play01:46

special tools to process some pictures

play01:49

this is the first image that we will

play01:51

analyze

play01:52

at first glance nothing appears out of

play01:55

the ordinary

play01:58

we will use this image analysis tool

play02:00

called forensically to analyze the image

play02:03

this tool is made up of multiple other

play02:06

tools to perform various types of

play02:08

analysis on the target image

play02:10

the first tool we will use is error

play02:13

level analysis if any sections of the

play02:16

image are clones that is one section has

play02:18

been copy formed this image or another

play02:20

one this tool will help us identify it

play02:24

now we will move the jpeg quality slider

play02:27

all the way to 99.

play02:29

we can see that the outline of this bird

play02:31

on the top right stands out from the

play02:34

rest of the image

play02:36

when any section of the image has been

play02:38

cloned from another the error level

play02:40

analysis tool will highlight it with a

play02:42

bright color

play02:46

let's process the same image using the

play02:48

nvid browser extension for Chrome

play02:51

navigate to the image forensic section

play02:55

and upload the target image for analysis

play03:02

[Music]

play03:06

this tool performs a deeper analysis on

play03:09

the target image

play03:11

we can see that the section where the

play03:13

bird exists on the top right appears

play03:16

extremely bright

play03:18

[Music]

play03:21

now let's compare the tampered image

play03:23

with the original one

play03:24

[Music]

play03:26

we can see that the bird on the top

play03:28

right has been added later on our image

play03:31

analysis tools helped hypothesize and

play03:33

confirm that we are dealing with a

play03:35

tampered image

play03:40

let's try another one

play03:42

this image appears to be of a water body

play03:45

however you can observe two shadows in

play03:48

the middle

play03:49

[Music]

play03:51

let's use forensically to observe if

play03:54

this image has been tampered with

play03:56

this time we will use the noise analysis

play03:59

tool when an image contains foreign

play04:02

elements that are not part of the

play04:03

original image like cloned portions then

play04:06

the image is said to have noise

play04:09

if noise or foreign elements are

play04:11

detected in an image the noise analysis

play04:14

tool would identify it as distinct spots

play04:16

on the image

play04:18

you can also move the slider to view the

play04:21

noise in the image this image appears to

play04:24

have a distinct spot in the middle

play04:28

nvid has also identified that the image

play04:30

contains a spot in the center

play04:33

it appears that this image has been

play04:35

tampered with

play04:36

let's take a look at the original image

play04:40

The Boatman in the middle has been

play04:41

edited out of the image

play04:45

now I will show you the original image

play04:47

in forensically

play04:49

when the noise analysis tool is used

play04:51

against it observe how the original

play04:54

image appears there are no abnormal

play04:57

spots in the image you can follow the

play04:59

outline of the characters

play05:01

If You observe noise in an image it is

play05:04

highly likely that the image has been

play05:06

tampered with

play05:09

let's try another one

play05:11

this appears to be an entrance to a

play05:13

rock-like structure

play05:16

when error level analysis is performed

play05:20

there seems to be a triangle above the

play05:22

doorway

play05:25

a preliminary analysis with the noise

play05:28

analysis tool does not indicate anything

play05:30

odd

play05:33

foreign

play05:36

we can see the same spot above the

play05:38

doorway

play05:39

it is possible that the image had been

play05:42

edited

play05:43

here is the original image

play05:46

there had been a triangle above the

play05:48

doorway other sections of the image may

play05:50

have been used to cover up the triangle

play05:52

section

play05:54

our image analysis tools picked up this

play05:56

change

play05:57

[Music]

play05:59

let's find out if this image had been

play06:01

tampered with

play06:02

we will run the Clone detection tool

play06:06

this tool takes some time to complete

play06:08

its analysis

play06:11

identical regions in an image are joined

play06:13

together by lines

play06:15

we can see that the two trees visible in

play06:18

front are clones of each other

play06:20

here is the original image

play06:23

the tree on the right is the cloned one

play06:27

now consider this image

play06:30

it is quite evident that the yellow line

play06:32

here has been added into the image it is

play06:35

not part of the original one

play06:38

we will use the magnifier tool to hover

play06:40

over the image

play06:42

now we are zooming into the section

play06:44

where the line coincides with the sky

play06:47

we can see a clear line of demarcation

play06:49

between the two colors yellow and blue

play06:53

however between elements of the same

play06:55

image even in the presence of two

play06:58

different colors that are adjacent to

play07:00

each other one color would blend into

play07:02

the other there is no clear line of

play07:05

demarcation

play07:06

only when external elements have been

play07:08

added to an image you can observe a

play07:11

separate line when you zoom into the

play07:13

image

play07:14

if you suspect that foreign elements

play07:16

have been added to the Target image you

play07:18

can zoom into that section to observe

play07:20

how the pixels of two adjacent colors

play07:22

exist

play07:24

you can also adjust the level of

play07:26

magnification

play07:29

you can download data sets of tampered

play07:31

images from different websites to

play07:33

practice identifying tampered images

play07:38

I encourage you to practice using

play07:40

different tools

play07:43

bear in mind you may also encounter

play07:45

false positives

play07:47

during an investigation the Austin

play07:49

professional typically performs a high

play07:51

level analysis on the target image if

play07:54

deeper analysis is required an image

play07:57

forensics expert can be called in

play07:59

when conducting Austin investigations on

play08:01

Targets in fields like politics and

play08:03

activism you would encounter tampered

play08:06

images on a regular basis

play08:09

I hope you have a good idea now about

play08:11

how tampered images can be identified

play08:15

if you like this video please hit like

play08:17

and share this video on social media

play08:20

don't forget to subscribe to our YouTube

play08:22

channel to receive more videos like this

play08:25

one

play08:25

join our online community of students

play08:28

learning useful cyber security skills if

play08:30

you haven't already to register for a

play08:32

free account right away go to our

play08:34

website

play08:36

happy learning and see you soon

play08:38

[Music]

Rate This

5.0 / 5 (0 votes)

Related Tags
Image ForensicsDigital AnalysisTampered DetectionOpen Source IntelInvestigation TechniquesCyber SecurityVisual AuthenticationError Level AnalysisNoise AnalysisClone Detection