I was imagining something similar to "scalado remove" which we discussed on the list before - that erases some part of the foreground.<div>I would think that in general image manipulations on the device could be made pretty difficult to detect - since the device it's being done on is the device that took the images it might even match the sensor noise, as well as the huffman coding tables etc. On the other hand "replacing with background" would require building a background model (that wouldn't in general be pixel-for pixel aligned with the image to be doctored) and that would have different characteristics to a natural image. I'm not sure what features a forensic examination would use, but pixel-level features and statistics might always be faked. Global consistency (like correct shadows) might be harder to achieve but I would think that detecting images doctored by sophisticated user + sophisticated software is very difficult.</div>
<div><br></div><div>Proving chain of custody within obscuracam could involve marking when an image has been taken by obscuracam itself (then you're limited by the security of the intent that was called) and storing sufficient data to bit-perfectly restore any image that was read off the sdcard. In both cases obscuracam has to sign this to declare its part of the chain of custody safe, but in neither case do we go all the way to the sensor.</div>
<div><br></div><div>Andrew<br><br><div class="gmail_quote">On Wed, May 23, 2012 at 12:57 PM, Bryan Nunez <span dir="ltr"><<a href="mailto:bryan@witness.org" target="_blank">bryan@witness.org</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
Hi Mandy,<div><br></div><div>I'm cc'ing the SSC group for their thoughts on this as well.</div><div><br></div><div>I'm not familiar with the iphone "replace" software, but am assuming it does some sort of image manipulation that could affect the authenticity of what's being depicted in the image or video.</div>
<div><br></div><div>As with any image or video, manipulation of both the visual and meta data is possible. What we're trying to do with InformaCam is build in a mechanism that will essentially create a "sealed" around the image or video file which can be mathematically checked to reveal if any tampering has occurred between the time the file was sent and the time the recipient "opens" the file. What happens before the file is "sealed" is harder to verify.</div>
<div><br></div><div>Thanks,<br>Bryan<br><br><div class="gmail_quote">On Wed, May 23, 2012 at 12:37 PM, Mandy Lee <span dir="ltr"><<a href="mailto:mandy.lee@int-bar.org" target="_blank">mandy.lee@int-bar.org</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div lang="EN-GB" link="blue" vlink="purple">
<div>
<p class="MsoNormal">Hi Bryan and Sam<u></u><u></u></p>
<p class="MsoNormal">Thomas Szlukovenyi who will be joining our meeting by phone for a short while on 18 June, has highlighted this question below. Mark is hoping to gain some cooperation from Thomson Reuters so would like us to be fully prepared to answer
his question.<u></u><u></u></p>
<p class="MsoNormal">Could you let us have your thoughts on this?<u></u><u></u></p>
<p class="MsoNormal"><u></u> <u></u></p>
<p>2. Verification is a big issue. Of course you somehow have to make
<u></u><u></u></p>
<p>> sure that the pictures have not been altered and unfortunately there
<u></u><u></u></p>
<p>> is no secure technological method for doing so. Even very experienced
<u></u><u></u></p>
<p>> photo editors can be fooled by the latest developments in Photoshop's
<u></u><u></u></p>
<p>> "content aware fill" or the Iphone's "Replace" software under
<u></u><u></u></p>
<p>> development. Also there is the issue of copyright and is the picture
<u></u><u></u></p>
<p>> actually showing what it says it does. This could easily become
<u></u><u></u></p>
<p>> politically important - some people or NGOs might want to take advantage of it.<u></u><u></u></p>
<p>><u></u> <u></u></p>
<p class="MsoNormal"><u></u> <u></u></p>
<p class="MsoNormal">Many thanks<u></u><u></u></p>
<p class="MsoNormal">Mandy<u></u><u></u></p>
<p class="MsoNormal"><u></u> <u></u></p>
<p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#1f497d">Mandy Lee</span><span style="color:#1f497d"><u></u><u></u></span></p>
<p class="MsoNormal"><span style="font-size:10.0pt;font-family:"Arial","sans-serif";color:#1f497d">Executive Assistant </span><span style="color:#1f497d"><u></u><u></u></span></p>
<p class="MsoNormal"><span style="color:#1f497d"><u></u> <u></u></span></p>
<p class="MsoNormal"><a href="http://www.ibanet.org/" target="_blank"><span style="color:blue;text-decoration:none"><img border="0" width="216" height="139" alt="Description: Description: Description: IBA logo email signature"></span></a><span style="color:#1f497d"><u></u><u></u></span></p>
<p class="MsoNormal"><u></u> <span class="HOEnZb"><font color="#888888"><u></u></font></span></p><span class="HOEnZb"><font color="#888888">
</font></span></div><span class="HOEnZb"><font color="#888888">
</font></span></div><span class="HOEnZb"><font color="#888888">
</font></span></blockquote></div><span class="HOEnZb"><font color="#888888"><br><br clear="all"><div><br></div>-- <br>Bryan Nunez<br>Technology Manager<br>WITNESS<div><a href="tel:%2B1%20%28718%29%20783-2000%20x-311" value="+17187832000" target="_blank">+1 (718) 783-2000 x-311</a></div>
<br>
</font></span></div>
<br>_______________________________________________<br>
Ssc-dev mailing list<br>
<br>
Post: <a href="mailto:Ssc-dev@lists.mayfirst.org">Ssc-dev@lists.mayfirst.org</a><br>
List info: <a href="https://lists.mayfirst.org/mailman/listinfo/ssc-dev" target="_blank">https://lists.mayfirst.org/mailman/listinfo/ssc-dev</a><br>
<br>
To Unsubscribe<br>
Send email to: <a href="mailto:Ssc-dev-unsubscribe@lists.mayfirst.org">Ssc-dev-unsubscribe@lists.mayfirst.org</a><br>
Or visit: <a href="https://lists.mayfirst.org/mailman/options/ssc-dev/aws%40andrewsenior.com" target="_blank">https://lists.mayfirst.org/mailman/options/ssc-dev/aws%40andrewsenior.com</a><br>
<br>
You are subscribed as: <a href="mailto:aws@andrewsenior.com">aws@andrewsenior.com</a><br>
<br></blockquote></div><br></div>