Photo Forensics Studio — Image Manipulation Detection & Analysis

Last updated:

Detect photo manipulation, forgeries, and hidden data with 30+ forensic analysis tools. Error Level Analysis, JPEG Ghost detection, clone detection, Fourier Transform, steganography detection, bit plane extraction, EXIF/GPS metadata, and more.

🔬
Photo Forensics Studio

Professional-grade image analysis with 30+ forensic techniques. Detect manipulation, extract hidden data, analyze metadata — all running locally in your browser.

🚀 Launch Forensics Studio
🔒 100% Client-Side — Your images never leave your device
Error Level AnalysisELA
👻JPEG Ghost Sweep
🔍Clone Detection
Fourier TransformFFT
🔐Stego Detectionχ²
📐Benford's Law
🧬PCA Decomposition
📡Noise Analysis
🔲Edge Detection
📊JPEG Quality Map
💡Light Direction
🌡Color Temperature
🎚Level Sweep
🔬Noise Variance Map
🌈Chromatic Aberration
📍GPS + Weather Verify
🖼RGB / HSL Channels
0–7Bit Plane Extraction
📈Histogram Analysis
📝String Extraction

Image Forensics for OSINT & Digital Investigation

Max Intel's Photo Forensics Studio provides investigators, journalists, and security researchers with a comprehensive suite of image analysis tools — all running locally in the browser. Whether you're verifying a news photo, investigating a social media post, checking for hidden steganographic data, or analyzing metadata from a suspect image, this tool provides the techniques used by professional forensic analysts. These methods align with guidelines published by the Scientific Working Group on Digital Evidence (SWGDE) and are validated through NIST's Computer Forensics Tool Testing (CFTT) program.

Detecting Photo Manipulation

Error Level Analysis (ELA), first described by Dr. Neal Krawetz in research presented at the Black Hat Briefings, is the cornerstone of image forensic investigation. By re-compressing a JPEG at a known quality and comparing the error levels, manipulated regions become visible — they show different compression artifacts than the surrounding original content. JPEG Ghost detection extends this by sweeping across all quality levels to find double-compressed regions. Clone detection identifies copy-paste manipulations by finding duplicate blocks within the image. Research published in IEEE Transactions on Image Processing has shown that these combined techniques can detect manipulations in over 90% of forged images when applied together.

Advanced Frequency & Statistical Analysis

The Fourier Transform (FFT), a mathematical technique described in the IEEE Signal Processing Magazine, reveals periodic patterns and manipulation artifacts invisible to the naked eye. Benford's Law analysis — validated by research in the Journal of Forensic Sciences — checks whether the first-digit distribution of DCT coefficients matches natural expectations — deviations may indicate artificial modification. The Chi-Square (χ²) steganography detector identifies blocks where hidden data may have been embedded using LSB techniques. PCA decomposition separates the image into principal components, revealing subtle structures.

Metadata & EXIF Analysis

EXIF metadata can reveal critical information: camera make/model, lens details, GPS coordinates, timestamps, software used for editing, and more. The built-in GPS map displays the exact location where a photo was taken if GPS data is present, and automatically fetches historical weather conditions (temperature, precipitation, cloud cover, sunrise/sunset) for that location and date to verify if the photo's visual content is consistent with real-world conditions at the claimed time. The string extraction tool scans raw image bytes for embedded text, URLs, software identifiers, and other forensic artifacts.

Detecting AI-Generated Images

While no single tool can definitively identify AI-generated images, combining multiple analyses provides strong signals. Noise variance mapping reveals unnaturally uniform noise patterns common in AI outputs. Fourier Transform analysis may show unusual frequency signatures absent in real photographs. Chromatic aberration analysis can detect physically impossible lens artifacts. Bit plane extraction at LSB levels can reveal patterns characteristic of GAN and diffusion model outputs. The key is combining multiple techniques rather than relying on any single analysis.

OSINT Investigation Workflows

For OSINT investigators, image forensics is essential for verifying the authenticity of evidence photos, social media posts, and documents. Combine this tool with OCR text extraction to read text in suspicious images, Stylometry Analyzer · steganography tools to test for hidden messages, and geolocation to cross-reference GPS data from EXIF metadata.

Photo Forensics — Frequently Asked Questions

What is Error Level Analysis (ELA)?

ELA detects image manipulation by re-saving a JPEG at a known quality level and comparing the result to the original. Regions that have been edited or pasted in will show different error levels than the surrounding unmodified areas, appearing as brighter patches in the ELA output. It's one of the most widely used forensic techniques for detecting photo tampering.

How does JPEG Ghost detection work?

JPEG Ghost detection sweeps across quality levels (1–99) re-compressing the image and measuring the difference at each step. When the sweep reaches the original compression quality, the error drops to near zero — but if a pasted region was originally saved at a different quality, it will show a "ghost" at that different quality level. The animated sweep makes it easy to visually spot double-compressed regions.

Can this tool detect AI-generated images?

While no single tool definitively detects AI-generated images, several analyses here provide useful signals. Noise analysis and noise variance mapping can reveal unnaturally uniform noise patterns common in AI outputs. Fourier Transform may show unusual frequency characteristics absent from real camera photos. Chromatic aberration analysis may reveal physically impossible lens artifacts. Bit planes at the LSB level can show patterns characteristic of GAN or diffusion model outputs. The key is combining multiple techniques.

Are my images uploaded to any server?

No. Every analysis runs entirely in your browser using HTML5 Canvas and JavaScript. Your images never leave your device. The only external request is loading the EXIF parsing library (exifr) and fonts. There is no backend server involved in any analysis. You can verify this by monitoring your browser's Network tab while using the tool.

What is Chi-Square (χ²) steganography detection?

Chi-Square analysis detects hidden data embedded in image pixels using LSB (Least Significant Bit) steganography. It compares the distribution of pixel values against statistical expectations — LSB embedding creates pairs of values (0-1, 2-3, 4-5, etc.) with unusually equal frequencies. Red regions in the heat map output indicate blocks with high probability of containing hidden data.

What do bit planes reveal?

Each pixel's color values can be decomposed into 8 binary digits (bits). Bit plane 7 (MSB) carries the most visual information, while bit plane 0 (LSB) carries the least. Examining lower bit planes can reveal hidden steganographic data (which is typically encoded in bits 0–1), editing artifacts from image manipulation, and noise patterns that differ between manipulated and unmanipulated regions.

How does Benford's Law apply to image forensics?

Benford's Law predicts that in many natural datasets, the leading digit "1" appears about 30% of the time, "2" about 17.6%, and so on in a logarithmic distribution. When applied to gradient magnitudes of image pixels, natural photographs generally follow this distribution closely. Significant deviations may indicate artificial creation or manipulation — though this is one signal among many and should be combined with other analyses.