Skip to main content
Log in

Abstract

Advancements in digital technology have made it easy to alter faces using editing software, posing challenges for industries in verifying photograph authenticity. Digital image forensics, a scientific method, is employed to gather data and determine the veracity of faces. This study assesses the effectiveness of digital image forensics in detecting fake digital faces using tools such as Foto Forensics, Forensically Beta, and Opanda IExif. Foto Forensics analyzes JPEG picture compression levels to detect image edits, revealing metadata differences compared to the original photo. Forensically Beta examines digital characteristics like color and noise levels to identify alterations. Opanda IExif scrutinizes image metadata, disclosing information about the camera used and subsequent changes. All three forensic methods effectively identify fake digital faces. Analyzing metadata differences and contrast variations between the original and altered faces proves to be an effective method for spotting alterations. Digital image forensics enhances legal and investigative processes, serving as a valuable tool for identifying digital face manipulation. Stronger digital security measures, including improved encryption, authentication, and legal regulations, are needed to protect against facial photograph manipulation. Updating legal and regulatory frameworks for digital security is vital to address increasingly sophisticated techniques used in facial photograph editing. As digital technology advances, continuous development and improvement of forensic techniques are crucial to detect digital face fabrication. Given the growing complexity of digital editing tools and the ease with which facial images can be altered, reliable methods are essential. Digital image forensics provides a systematic approach to gather data and verify the authenticity of digital photographs.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Lavrence, Christine and Cambre Carolina. 2020. ‘Do I look like my selfie?’: filters and the digital-forensic gaze. Social Media + Society 6(4). https://doi.org/10.1177/2056305120955182.

  2. Leone, Massimo. 2021. From fingers to faces: visual semiotics and digital forensics. International Journal for the Semiotics of Law-Revue Internationale de Sémiotique Juridique 34 (2): 579–599. https://doi.org/10.1007/s11196-020-09766-x.

    Article  Google Scholar 

  3. Saugmann, Rune. 2020. The security captor, captured. Digital cameras, visual politics and material semiotics. Critical Studies on Security 8 (2): 130–144. https://doi.org/10.1080/21624887.2020.1815479.

    Article  Google Scholar 

  4. Ross, Arun, Banerjee Sudipta, and Chowdhury Anurag. 2020. Security in smart cities: a brief review of digital forensic schemes for biometric data. Pattern Recognition Letters 138: 346–354. https://doi.org/10.1016/j.patrec.2020.07.009.

    Article  Google Scholar 

  5. Poulsen, Søren. 2021. Face off–a semiotic technology study of software for making deepfakes. Sign Systems Studies 49 (3–4): 489–508. https://doi.org/10.12697/SSS.2021.49.3-4.12.

    Article  Google Scholar 

  6. Seibold, Clemens, and Samek Wojciech, Hilsmann Anna, and Eisert Peter. 2017. Detection of face morphing attacks by deep learning. In Digital Forensics and Watermarking: 16th International Workshop. Proceedings 16, 107–120 Magdeburg, Germany: IWDW, August 23–25, 2017. Springer International Publishing.

  7. Javed, Abdul and Jalil Zunera. 2020. Byte-level object identification for forensic investigation of digital images. In 2020 International Conference on Cyber Warfare and Security (ICCWS) 1–4. IEEE Publications. https://doi.org/10.1109/ICCWS48432.2020.9292387.

  8. Al-Khateeb, Haider, Epiphaniou Gregory, and Daly Herbert. 2019. Blockchain for modern digital forensics: the chain-of-custody as a distributed ledger. Blockchain and Clinical Trial: Securing Patient Data 149–168. https://doi.org/10.1007/978-3-030-11289-9_7.

  9. Tripathi, Arun. 2022. A proactive improvement toward digital forensic investigation based on deep learning. Deep Learning in Visual Computing and Signal Processing 237.

  10. Neubert, Tom. 2017. Face morphing detection: An approach based on image degradation analysis. In Digital Forensics and Watermarking: 16th International Workshop. Proceedings 16, 93–106 Magdeburg, Germany: IWDW, August 23–25, 2017. Springer International Publishing.

  11. Balushi, Al, Shaker Yusra, Hothefa, and Kumar Basant. 2023. The use of machine learning in digital forensics. In 1st International Conference on Innovation in Information Technology and Business (ICIITB 2022), 96–113. Atlantis Press.

  12. Khudhair, Zaid, Mohamed Farhan, and Kadhim Karrar. 2021. A review on copy-move image forgery detection techniques. Journal of Physics: Conference Series 1892: 1: 012010. IOP Publishing. https://doi.org/10.1088/1742-6596/1892/1/012010.

  13. Amjed, Alaa, Mahmood Basim, and Almukhtar Khalid. 2022. Approaches for forgery detection of documents in digital forensics: A review. In Emerging Technology Trends in Internet of Things and Computing, Revised Selected Papers: First International Conference, TIOTC 2021, Erbil, Iraq, June 6–8, 2021, 335–351. Cham: Springer International Publishing.

  14. Patel, Shubham and Singh Rajendra. 2022. Digital forensics: Fundamentals and awareness to society against cybercrime. Journal of Advancements in Robotics 9 (2): 37–41.

    Google Scholar 

  15. Paul Joseph, D., and Norman, and Jasmine. 2019. An analysis of digital forensics in cyber security. In First International Conference on Artificial Intelligence and Cognitive Computing: AICC 2018, 701–708. Singapore: Springer.

  16. Chaturvedi, Aparna, Awasthi Aashish, and Shanker Surabhi. 2020. Cyber forensic - A literature review. Trinity Journal of Management IT and Media 10 (1): 24–29.

    Article  Google Scholar 

  17. Englbrecht, Ludwig, Meier Stefan, and Pernul Gunther. 2020. Towards a capability maturity model for digital forensic readiness. Wireless Networks 26 (7): 4895–4907. https://doi.org/10.1007/s11276-018-01920-5.

    Article  Google Scholar 

  18. Lin, Xiaodong. 2018. Introductory computer forensics. Springer International Publishing.

  19. Swain, Aanasuya. 2020. Big data challenges and hype digital forensic. Big Data Analytics and Computing for Digital Forensic Investigations 43.

  20. Powell, Ashleigh and Haynes Cyndee. 2020. Social media data in digital forensics investigations. Digital Forensic Education: An Experiential Learning Approach 281–303. https://doi.org/10.1007/978-3-030-23547-5_14.

  21. Pan, Weiwei and Chen Guolong. 2016. A method of off-line signature verification for digital forensics. In 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD), 488–493. IEEE Publications. https://doi.org/10.1109/FSKD.2016.7603222.

  22. Yaacoub, Jp, Noura Hassan, and Salman Ola, and Chehab Ali. 2022. Advanced digital forensics and anti-digital forensics for IoT systems: techniques, limitations and recommendations. Internet of Things 19: 100544. https://doi.org/10.1016/j.iot.2022.100544.

    Article  Google Scholar 

  23. Kiruthika, S., and Masilamani Vedhanayagam. 2023. Image quality assessment based fake face detection. Multimedia Tools and Applications 82 (6): 8691–8708. https://doi.org/10.1007/s11042-021-11493-9.

    Article  Google Scholar 

  24. Årnes, Andre. 2017. Digital forensics. John Wiley & Sons.

  25. Tyagi, Shobhit and Yadav Divakar. 2022. A detailed analysis of image and video forgery detection techniques. The Visual Computer 1–21.

  26. Feng, Disheng, Lu Xuequan, and Lin Xufeng. 2020. Deep detection for face manipulation. In Neural Information Processing. Proceedings part V 27: 27th International Conference, ICONIP 2020, Bangkok, Thailand, November 18–22, 2020, 316–323. Springer International Publishing.

  27. Kävrestad, Joakim. 2020. Fundamentals of digital forensics. Springer International Publishing.

  28. Naick, Doraswamy and Bachalla Neelima. 2016. Application of digital forensics in digital libraries. International Journal of Library and Information Science (IJLIS) 5 (2): 89–94.

    Google Scholar 

  29. Das, Dolly, Shaw Urjashee, and Medhi Smriti. 2017. Realizing digital forensics as a big data challenge. In 4th International Conference on Computing for Sustainable Global Development, New Delhi.

  30. Bakas, Jamimamul, Naskar Ruchira, and Nappi Michele, and Bakshi Sambit. 2021. Object-based forgery detection in surveillance video using capsule network. Journal of Ambient Intelligence and Humanized Computing 12 (1): 1–3.

    Google Scholar 

  31. Quick, Darren and Choo Kkwang Raymond. 2016. Big forensic data reduction: Digital forensic images and electronic evidence. Cluster Computing 19 (2): 723–740. https://doi.org/10.1007/s10586-016-0553-1.

    Article  Google Scholar 

  32. Al-Duwairi, Basheer, Shatnawi Ahmed, Jaradat Hala, Al-Musa Afnan, and Al-Awadat Hamzah. 2022. On the digital forensics of social networking web-based applications. In 2022 10th International Symposium on Digital Forensics and Security (ISDFS), 1–6. IEEE Publications.

  33. Khan, Abdulla, Shaikh Aftab Ayub, Laghari Asif Ahmed, Dootio Mazhar Ali, Rind Ali, and Malook, and Awan Shafique Ahmed. 2022. Digital forensics and cyber forensics investigation: security challenges, limitations, open issues, and future direction. International Journal of Electronic Security and Digital Forensics 14 (2): 124–150. https://doi.org/10.1504/IJESDF.2022.121174.

    Article  Google Scholar 

  34. Ferreira, Sara, Antunes Mario, and Correia Manuel. 2021. Forensic analysis of tampered digital photos. In Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications, Revised Selected Papers 25: 25th Iberoamerican Congress, CIARP 2021, Porto, Portugal, May 10–13, 2021, 461–470. Springer International Publishing.

  35. Aggarwal, Ananta. 2021. Critical analysis of digital forensic in criminal justice. Supremo Amicus 26: 49.

    Google Scholar 

  36. Casino, Fran, Dasaklis Thomas, Spathoulas Georgios, and Anagnostopoulos Marios, et al. 2022. Research trends, challenges, and emerging topics in digital forensics: a review of reviews. Ieee Access : Practical Innovations, Open Solutions 10: 25464–25493. https://doi.org/10.1109/ACCESS.2022.3154059.

    Article  Google Scholar 

  37. Kebande, Victor and Venter Hendrik. 2018. On digital forensic readiness in the cloud using a distributed agent-based solution: issues and challenges. Australian Journal of Forensic Sciences 50 (2): 209–238. https://doi.org/10.1080/00450618.2016.1194473.

    Article  Google Scholar 

  38. Wilson-Kovacs, Dana. 2019. Effective resource management in digital forensics: an exploratory analysis of triage practices in four English constabularies. Policing: An International Journal 43 (1): 77–90. https://doi.org/10.1108/PIJPSM-07-2019-0126.

    Article  Google Scholar 

  39. Kumari, Shabnam, Tyagi Amit Kumar, and Rekha Gangula. 2021. Applications of blockchain technologies in digital forensics and threat hunting. In Recent trends in blockchain for information systems security and privacy, 159–173. CRC Press.

  40. Zhu, Xiangyu, Wang Hao, Fei Hongyan, and Lei Zhen, and Li Stan. 2021. Face forgery detection by 3D decomposition. In Proceedings IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2928–2938. https://doi.org/10.1109/CVPR46437.2021.00295.

  41. Vincze, Eva. 2016. Challenges in digital forensics. Police Practice and Research 17 (2): 183–194. https://doi.org/10.1080/15614263.2015.1128163.

    Article  Google Scholar 

  42. Yang, Ke, Li Da, Guo Qinglei, Wang Hejian, Bai Desheng, and Pan Xiukui. 2022. Research on deep forgery data identification and traceability technology based on blockchain. In IEEE 2nd International (Ed.) 2022 Conference on Data Science and Computer Application (ICDSCA), 230–234. IEEE Publications. https://doi.org/10.1109/ICDSCA56264.2022.9988274.

  43. Vinolin, V., and M. Sucharitha. 2021. Dual adaptive deep convolutional neural network for video forgery detection in 3D lighting environment. The Visual Computer 37 (8): 2369–2390. https://doi.org/10.1007/s00371-020-01992-5.

    Article  Google Scholar 

  44. Chen, Guangxuan, Wu Di, Chen Guangxiao, and Hu Bo, and Huang Anan. 2020. Discussion on the talents cultivation of digital forensics DOI: https://doi.org/10.38007/Proceedings.0000961.

  45. Tembe, Anushree and Thombre Supriya. 2017. Survey of copy-paste forgery detection in digital image forensic. In International Conference on Innovative Mechanisms for Industry Applications (ICIMIA), 248–252. IEEE Publications. https://doi.org/10.1109/ICIMIA.2017.7975613.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manotar Tampubolon.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tampubolon, M. Digital Face Forgery and the Role of Digital Forensics. Int J Semiot Law 37, 753–767 (2024). https://doi.org/10.1007/s11196-023-10030-1

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11196-023-10030-1

Keywords

Navigation