The analysis tools in FiA 64 are scientifically peer reviewed and proven methods to detect image manipulation.

FiA 64 includes analysis tools that can only be found in here including Differential Mapping.

Have confidence with your results with the included 33 unique image authentication tools.

HOW CAN I AUTHENTICATE IMAGES?

Load Images

Compatible with all standard image types: BMP, GIF, JPG, JPG 2000, PBM, PCX, PGM, PNG, PPM, RAS, TIF.

 

Structure Analysis

Compare an images data structure to detect if image editing software has been used.

EXIF Analysis

Extract EXIF data and reveal details such as camera brand, model, serial number, settings, editing/tampering software, etc.

JPG QT

Report and save Luminance and Chrominance Quantization Tables for JPG images.

JPG DCT

Reveal traces of JPEG recompression or indicate that the evidence image is consistent with an original.

Compression Level Analysis

Find possible traces of image re-compression, for each Red, Green, Blue (RGB) layer separately, and for their mean.

Color Filter Array

Explore the CFA interpolation process inside a digital photo camera to assess the correlation in each RGB layer.

G/B Screen

Look for traces of image inconsistencies left by green or blue screen removals by digital editing.

Color Spaces

Computes the RGB histogram that can be used to detect traces of previous brightness/contrast or histogram equalization.

DCT Map

Reveal local traces of image manipulation like content aware or copy/paste between different images.

CL Map

Find local traces of image manipulation like content aware or copy/paste between different images.

CFA Map

Find local traces of image manipulation like content aware or copy/paste between different images.

Differential Map

Detect and display local inconsistencies due to image tampering processes.

Error Level Analysis

Computes the arithmetic difference between evidence image and a series of JPG re-compressed versions of it.

Adaptive Error Level Analysis

Computes the adaptive arithmetic difference between evidence image and a series of JPG recompressed versions of it using a unique algorithm.

Smart Error Level Analysis

Computes the smart adaptive arithmetic difference between evidence image and a series of JPG recompressed versions of it using a unique algorithm.

Ghost

Ghost analysis can reveal possible traces of image re-compression.

Correlation Map

Computes and displays the correlation between neighboring pixels and blocks of pixels. It can reveal local traces of image manipulation like content aware or copy/paste between different images.

Probability Map

Find the probability distribution between neighboring pixel blocks.

BA Map

Displays the blocking artifacts of image data.

ADJPEG

Checks for inconsistencies left by local tampering and double JPEG compression.

NADJPEG

Checks for inconsistencies left by local tampering and double JPEG compression nonaligned blocks.

Histogram Equalization

Applies histogram equalization on each Red, Green, Blue channel, and the overall RGB image.

HP Filter

Detection of image tampering traces, like content-aware or copy/paste between different images. The HP analysis is based on Custom High Pass Filtering technique.

PRNU Residue

The digital camera's matrix (pixel sensor) is an optic to electric energy transducer. Its Photo Response Non-Uniformity (PRNU) can be used to detect copy/paste traces between images generated by different cameras or other types of image tampering.

Clone Fusion

Automatic search for clones or copy/paste areas from the same image.

PRNU Camera

Verify the suspect camera and compare the evidence image against reference images with the same resolution.

Difference (Δ)

Computes the difference between evidence (A) and a reference image (B). The numeric results are displayed as: arithmetic absolute difference, correlation coefficient, and mean quadratic difference.

File Batching and Sorting

Runs all the authentication functions on a file. It will detect traces left by different image editors and other file structure inconsistencies, and copy the analyzed files in organized folders.

Customized Fast Batch

End users can customize the authentication functions performed on a file batch. Allowing only certain functions to be run.

Folder Batching

Run file batching on multiple images in a directory.

WHERE TO PURCHASE?

Cognitech's FiA 64 is an addon product with TriSuite 64. It can be purchased alongside TriSuite 14. Please visit our purchasing page here

Phone: (626) 796-0326

Email: sales@cognitech.com