Forensic Investigation Report
Forensic Investigation Report
Case Title:
Image Tampering Analysis in the Bomb Blast Investigation of John
Doe.
Objective:
To verify the authenticity of three images presented as evidence of
John Doe's involvement in a recent bomb blast in Mumbai. Each
image allegedly proves a link between John Doe and terrorist
activities, but there are strong suspicions of tampering.
Tools Used:
ExifTool – For metadata analysis to detect any discrepancies
and editing traces.
Forensically – For deeper tampering analysis, including Error
Level Analysis (ELA), Clone Detection, and noise analysis.
This is the python code used to compare the hashes of original and
copied image.
Image 1:
Financial Transaction Screenshot
Verification:
First duplicate of this image is created and original image is kept in
faraday bag so that original image can’t be tampered.
Then SHA hash of both the image is verified.
Findings:
The metadata indicates that the file was edited with Adobe
Photoshop on "2019-05-04 at 08:43:19," which is after the date
when the original transaction was allegedly made.
Metadata fields reveals the camera information also as the
camera used was HP oj5600.
Findings:
The ELA output shows a higher error level around the signature
of Manager.
This indicates that these specific areas were likely modified
separately from the rest of the image.
4. Metadata Analysis using Forensically
Findings:
We can once again verify that the original image was tampered
using Adobe Software tool which we already found out using
Exiftool.
Original Image:
Differences:
Conclusion:
The combination of metadata analysis, ELA, and clone detection
reveals that the image of the financial transaction was manipulated.
The altered transaction details, combined with the metadata
suggesting post-transaction editing, confirm that this image is
unreliable and should be excluded as evidence in the investigation.
Image 2:
Photo of John Doe with the accused of the Bomb blast case.
Findings:
The metadata indicates the use of deepswapper, confirming
that AI-based face morphing was employed.
The Modify Date shows recent editing on 2015-08-14 at
19:02:39.
Model of Camera used is SONY ILCE-6000.
Findings:
ETA shows inconsistencies in the circled part. Either the images
has been digitally added onto the original image or has been
tampered with.
The tool has highlighted areas where the image appears to have
been manipulated, possibly through techniques like copy-paste
or overlaying.
3. Noise Analysis using Forensically
Objective: Verify the consistency of facial features and noise
patterns to detect deepfake alterations.
Findings:
This tool identifies subtle inconsistencies in texture around John
Doe's face, particularly around the beard and glasses,
suggesting an overlay.
Noise analysis shows a different noise pattern on John’s face
compared to the rest of the image, which is characteristic of
face morphing and deepfake manipulations.
Original Image:
Differences:
Conclusion:
The combination of metadata analysis, ELA, noise analysis, and
magnifier tool results provides conclusive evidence that this image
was manipulated. The face-morphing and the use of AI-based editing
tools to alter John Doe’s appearance make this image unreliable as
evidence. It should be excluded from the investigation due to its
tampered nature.