Image Forensics for OSINT & Digital Investigation
Max Intel's Photo Forensics Studio provides investigators, journalists, and security researchers with a comprehensive suite of image analysis tools — all running locally in the browser. Whether you're verifying a news photo, investigating a social media post, checking for hidden steganographic data, or analyzing metadata from a suspect image, this tool provides the techniques used by professional forensic analysts. These methods align with guidelines published by the Scientific Working Group on Digital Evidence (SWGDE) and are validated through NIST's Computer Forensics Tool Testing (CFTT) program.
Detecting Photo Manipulation
Error Level Analysis (ELA), first described by Dr. Neal Krawetz in research presented at the Black Hat Briefings, is the cornerstone of image forensic investigation. By re-compressing a JPEG at a known quality and comparing the error levels, manipulated regions become visible — they show different compression artifacts than the surrounding original content. JPEG Ghost detection extends this by sweeping across all quality levels to find double-compressed regions. Clone detection identifies copy-paste manipulations by finding duplicate blocks within the image. Research published in IEEE Transactions on Image Processing has shown that these combined techniques can detect manipulations in over 90% of forged images when applied together.
Advanced Frequency & Statistical Analysis
The Fourier Transform (FFT), a mathematical technique described in the IEEE Signal Processing Magazine, reveals periodic patterns and manipulation artifacts invisible to the naked eye. Benford's Law analysis — validated by research in the Journal of Forensic Sciences — checks whether the first-digit distribution of DCT coefficients matches natural expectations — deviations may indicate artificial modification. The Chi-Square (χ²) steganography detector identifies blocks where hidden data may have been embedded using LSB techniques. PCA decomposition separates the image into principal components, revealing subtle structures.
Metadata & EXIF Analysis
EXIF metadata can reveal critical information: camera make/model, lens details, GPS coordinates, timestamps, software used for editing, and more. The built-in GPS map displays the exact location where a photo was taken if GPS data is present, and automatically fetches historical weather conditions (temperature, precipitation, cloud cover, sunrise/sunset) for that location and date to verify if the photo's visual content is consistent with real-world conditions at the claimed time. The string extraction tool scans raw image bytes for embedded text, URLs, software identifiers, and other forensic artifacts.
Detecting AI-Generated Images
While no single tool can definitively identify AI-generated images, combining multiple analyses provides strong signals. Noise variance mapping reveals unnaturally uniform noise patterns common in AI outputs. Fourier Transform analysis may show unusual frequency signatures absent in real photographs. Chromatic aberration analysis can detect physically impossible lens artifacts. Bit plane extraction at LSB levels can reveal patterns characteristic of GAN and diffusion model outputs. The key is combining multiple techniques rather than relying on any single analysis.
OSINT Investigation Workflows
For OSINT investigators, image forensics is essential for verifying the authenticity of evidence photos, social media posts, and documents. Combine this tool with OCR text extraction to read text in suspicious images, Stylometry Analyzer · steganography tools to test for hidden messages, and geolocation to cross-reference GPS data from EXIF metadata.