Description
Camera Ballistics
We all know that ballistic fingerprinting is an essential method for investigation of guns. Now the same will be possible in the area of digital photography, as we can get a reliable answer to the question: “Was this photo really taken by that camera?”.
Answers the question if a photo was taken by a suspected camera – Camera Ballistics is a unique software product that uses advanced algorithms and cutting-edge technology to determine if a photo was truly taken by a suspected camera or not. Photos contain more information than what you can see in the image. Camera Ballistics’ unique scientific algorithm goes deeper than just EXIF. It will identify if a photo was taken by a suspected camera device or not, giving you maximum data from photos and making Camera Ballistics an essential tool for every forensic investigator.
The Principle
Camera Ballistics is not based on metadata such as EXIF, but it uses mathematics to analyze the physics of the sensor. Due to small differences in size and material composition, each pixel behaves differently, involving effects such as Photo Response Nonuniformity making each sensor unique. We can simplify the principle to say that it identifies anomalies of every pixel and uses this information to create a description of the camera sensor – the sensor fingerprint. This is true even between devices of the same make and model. It’s these differences that allow you to generate a sensor fingerprint and link an image to the specific camera that created it. Camera Ballistics will compare the photos under investigation to the sensor fingerprint to determine if there is a match.
Two steps to digital forensic expertise
The power of Camera Ballistics is further amplified by its sleek and intuitive interface that guides you through processing in just a few clicks. Camera Ballistics takes its complex analysis method and turns it into a two-phase process. Simply create a few reference photos with the suspect camera for the program to learn about the device’s sensor and a sensor fingerprint will be generated. Camera Ballistics will use this fingerprint to analyze the photos you are investigating and match it to the ones taken by the suspected camera.
1) Learn – In this first step, you will supply reference photos from a camera in order to create its sensor fingerprint. The more photos you supply, the more precise your results will be. It is recommended to take at least 30 photos of white walls or clouds – images without sharp shapes and edges. Camera Ballistics will apply advanced algorithms to this folder in order to establish the sensor fingerprint.
2) Analyze – This step will match the fingerprint file created by the learn process to the photos under investigation. When you run the analysis, you can see the processing progress followed by the mathematical data and results as after analysis. Finally, a comprehensive and well-organized PDF report suitable for submission as evidence is generated. The report contains clickable thumbnails of all processed images, the camera device make and model, GPS data, camera settings, mean square error, fingerprint presence result, match probability and correlation.
Generate tamper proof evidence
All possible information such as device make, model, GPS, camera settings, mean square error, fingerprint presence result, probability, and correlation will be organized into a well-designed and comprehensive PDF report, suitable for submission as evidence.
Interpreting results
Results should be interpreted like other typical ballistics tests: if traces of the device fingerprints are found, then there is an extremely high probability that a photo comes from the camera. If not found, it doesn’t necessarily mean that the particular camera has not been used to capture the image. This may happen when photos are resized too much or edited so the fingerprint information is damaged or lost.
Case applications
(Proof that an image matched to a camera can be just as lethal to a case defense as a bullet matched to a gun.) – There are innumerable possible case applications with Camera Ballistics. They key is to have your lab equipped with the right tools so when you need them. Imagine a person is suspected of producing child pornography. The suspect has many pictures saved to a hard drives, but denies that he took any of them, saying they were only downloaded from the internet. You also found a few digital cameras. Well now you can scientifically find the truth.
Imagine another scenario – an explicit photo of a high school student has gone viral between classmates. The victim tells the investigator who it was that took the picture, but the suspect denies it. The investigator can quickly determine if the suspect’s phone was used to take the picture or not. Or, when an alibi is in question Camera Ballistics can also be used to solidify or disprove a suspect’s whereabouts if a photo is provided as ‘proof’. The suspect says they were at a certain location and can prove it with photos. With our photo verification tool, an investigator can determine if the camera took the photos, when they were taken and use GPS data to pinpoint location.
The Law
How is a Camera Ballistics evidence accepted in courts? Well the technology is quite new, just as firearms ballistics or fingerprint authentication were in the past. Its acceptance depends on the country. The accuracy of this method is 99.9% or better, which is in line with the classical fingerprint test. Plus, there are two more advantages independent of the law. First, with this tool you get important information, which can further help to direct the investigation on the right path. Second, you can easily get a suspect’s conviction under the pressure of Camera Ballistics evidence.
Combination with phone forensics – When you use Camera Ballistics in combination with our premier mobile device forensic tool MOBILedit Forensic Express, you get not only all photos extracted from a phone, but each photo comes with information if it was taken by the analyzed phone or not. This will clearly distinguish downloaded, shared or received photos from those that were actually taken by phone owner.
Reviews
There are no reviews yet.