Why Image Authentication Software is the Best Tool for Your Business
FiA 64 Image Authentication Software
What is FIA 64?
Forensic Image Authentication
- FIA is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the evidence and detect possible traces of tampering or other types of inconsistencies.
- FIA is used to systematically detect forged/doctored file-based digital image evidence is able to authenticate and uncover where tampering and modification have taken place in a doctored image. This solution allows the expert to prepare everything needed for official court-ready reports and all results are based on a forensic scientific methodology. FIA is a proven solution based on years of research. More research is being conducted to further extend software authentication capabilities to video authentication.
- FIA was developed for Law Enforcement Agencies only. In addition, it is not effective to purchase this technology without the associated comprehensive training course.
- Purchase FiA Feature List
The analysis tools in FiA 64 are scientifically peer-reviewed and proven methods to detect image manipulation.
TOOLS ONLY FOUND IN FiA
FIA 64 includes analysis tools that can only be found here including Differential Mapping.
Have confidence in your results with the included 33 unique image authentication tools?
HOW CAN I AUTHENTICATE IMAGES?
Load Images
Compatible with all standard image types: BMP, GIF, JPG, JPG 2000, PBM, PCX, PGM, PNG, PPM, RAS, TIF.
Structure Analysis
Compare an image's data structure to detect if image editing software has been used.
EXIF Analysis
Extract EXIF data and reveal details such as camera brand, model, serial number, settings, editing/tampering software, etc.
JPG QT
Report and save Luminance and Chrominance Quantization Tables for JPG images.
JPG DCT
Reveal traces of JPEG recompression or indicate that the evidence image is consistent with an original.
Compression Level Analysis
Find possible traces of image re-compression, for each Red, Green, Blue (RGB) layer separately, and for their mean.
Color Filter Array
Explore the CFA interpolation process inside a digital photo camera to assess the correlation in each RGB layer.
G/B Screen
Look for traces of image inconsistencies left by green or blue screen removals by digital editing.
Color Spaces
Computes the RGB histogram that can be used to detect traces of previous brightness/contrast or histogram equalization.
DCT Map
Reveal local traces of image manipulation like content-aware or copy/paste between different images.
CL Map
Find local traces of image manipulation like content awareness or copy/paste between different images.
CFA Map
Find local traces of image manipulation like content-aware or copy/paste between different images.
Differential Map
Detect and display local inconsistencies due to image tampering processes.
Error Level Analysis
Computes the arithmetic difference between evidence image and a series of JPG re-compressed versions of it.
Adaptive Error Level Analysis
Computes the adaptive arithmetic difference between evidence images and a series of JPG recompressed versions of it using a unique algorithm.
Smart Error Level Analysis
Computes the smart adaptive arithmetic difference between evidence images and a series of JPG recompressed versions of it using a unique algorithm.
Ghost
Ghost analysis can reveal possible traces of image re-compression.
Correlation Map
Computes and displays the correlation between neighboring pixels and blocks of pixels. It can reveal local traces of image manipulation like content-aware or copy/paste between different images.
Probability Map
Find the probability distribution between neighboring pixel blocks.
BA Map
Displays the blocking artifacts of image data.
ADJPEG
Checks for inconsistencies left by local tampering and double JPEG compression.
NADJPEG
Checks for inconsistencies left by local tampering and double JPEG compression nonaligned blocks.
Histogram Equalization
Applies histogram equalization on each Red, Green, Blue channel, and the overall RGB image.
HP Filter
Detection of image tampering traces, like content-aware or copy/paste between different images. The HP analysis is based on the Custom High Pass Filtering technique.
PRNU Residue
The digital camera's matrix (pixel sensor) is an optic to electric energy transducer. Its Photo Response Non-Uniformity (PRNU) can be used to detect copy/paste traces between images generated by different cameras or other types of image tampering.
Clone Fusion
Automatic search for clones or copy/paste areas from the same image.
PRNU Camera
Verify the suspect camera and compare the evidence image against reference images with the same resolution.
Difference (Δ)
Computes the difference between evidence (A) and a reference image (B). The numeric results are displayed as arithmetic absolute difference, correlation coefficient, and mean quadratic difference.
File Batching and Sorting
Runs all the authentication functions on a file. It will detect traces left by different image editors and other file structure inconsistencies, and copy the analyzed files in organized folders.
Customized Fast Batch
End users can customize the authentication functions performed on a file batch. Allowing only certain functions to be run.
Folder Batching
Run file batching on multiple images in a directory.
WHERE TO PURCHASE?
Cognitech's FiA 64 is an add-on product with TriSuite 64. It can be purchased alongside TriSuite 14. Please visit our purchasing page here
Phone: (626) 796-0326
Email: sales@cognitech.com
0 $type={blogger}
You can spam comment then remove it