How To Do Context Analysis of Digital Images in Amped Authenticate

A flow chart with boxes outlined in blue, red, green, and yellow
By Marco Fontani, Forensics Director at Amped Software For several years, researchers and people in the field of image and video processing have been saying that “seeing is no longer believing”. Image and video manipulation techniques have become powerful and

Mobile Device Biometrics – What They Are and How They Work

This article originally appeared at https://www.grayshift.com/mobile-device-biometrics-what-they-are-and-how-they-work/ Using biometrics is the process of measuring and analyzing biological data to identify an individual. Mobile devices with biometric-enabled features are used for many purposes, one of which is authentication. This authentication method provides

The Future Of ENF Systems

by James Zjalic The subject of authentication is important across the entire digital forensic field and we as examiners have various weapons at our disposal in which to defend against the onslaught of manipulators, liars and charlatans. Authentication is frequently

A Method For Verifying Integrity And Authenticating Digital Media

by Martin Harran, William Farrelly & Kevin Curran Due to their massive popularity, image files, especially JPEG, offer high potential as carriers of other information. Much of the work to date on this has focused on steganographic ways of hiding

From iPhone to Access Point

Introduction A wireless Access Point (AP) is a device that allows wireless devices to connect to internet using Wi-Fi. With the remarkable increase in number of wireless devices the number of APs has also increased drastically to serve the Wi-Fi

Authenticating Internet Web Pages as Evidence: a New Approach

By John Patzakis [1] and Brent Botta [2] Previously, in Forensic Focus, we addressed the issue of evidentiary authentication of social media data (see previous entries here and here). General Internet site data available through standard web browsing, instead of