Forensic Plate is a free, Open Source license plate recognition LPR software wich attempts to recover licence plates characters (or other kind of characters) from videos using information redundancy of several frames. The user sets boundaries and the software overlaps images. Moved Permanently. The document has moved here.
Forensic’s patented super-resolution algorithms and enhancement filters reveal an unseen level of detail in three simple steps: import, enhance, export. Trusted by organizations like the US Secret Service, NCIS, NYPD, and police departments across America, Forensic requires no time-consuming training, technology expertise, or special hardware to use and accepts video from any readable. Forensic Image Viewer: Sanderson Forensics: View various picture formats, image enhancer, extraction of embedded Exif, GPS data. Can be downloaded after registering on the forum. Ghiro: Alessandro Tanasi: In-depth analysis of image (picture) files. Highlighter: Mandiant: Examine log files using text, graphic or histogram views.
What is FiA 64?
FiA is a comprehensive software with analysis tools designed for forensic analysis and authentication of digital images. This extensive toolkit will allow the user to investigate the evidence and detect possible traces of tampering or other types of inconsistencies.
FiA is used to systematically detect forged/doctored file based digital image evidence is able to authenticate and uncover where tampering and modification has taken place in a doctored image. This solution allows the expert to prepare everything needed for official court ready reports and all results are based on a forensic scientific methodology. FiA is a proven solution based on years of research. More research is being conducted to further extend software authentication capabilities to video authentication.
FiA was developed for Law Enforcement Agencies only. In addition it is not effective to purchase this technology without the associated comprehensive training course.
The analysis tools in FiA 64 are scientifically peer reviewed and proven methods to detect image manipulation.
FiA 64 includes analysis tools that can only be found in here including Differential Mapping.
Have confidence with your results with the included 33 unique image authentication tools.
Load Images
Compatible with all standard image types: BMP, GIF, JPG, JPG 2000, PBM, PCX, PGM, PNG, PPM, RAS, TIF.
Structure Analysis
Compare an images data structure to detect if image editing software has been used.
EXIF Analysis
Extract EXIF data and reveal details such as camera brand, model, serial number, settings, editing/tampering software, etc.
JPG QT
Report and save Luminance and Chrominance Quantization Tables for JPG images.
JPG DCT
Reveal traces of JPEG recompression or indicate that the evidence image is consistent with an original.
Compression Level Analysis
Find possible traces of image re-compression, for each Red, Green, Blue (RGB) layer separately, and for their mean.
Color Filter Array
Explore the CFA interpolation process inside a digital photo camera to assess the correlation in each RGB layer.
G/B Screen
Look for traces of image inconsistencies left by green or blue screen removals by digital editing.
Color Spaces
Computes the RGB histogram that can be used to detect traces of previous brightness/contrast or histogram equalization.
DCT Map
Reveal local traces of image manipulation like content aware or copy/paste between different images.
CL Map
Find local traces of image manipulation like content aware or copy/paste between different images.
CFA Map
Find local traces of image manipulation like content aware or copy/paste between different images.
Differential Map
Detect and display local inconsistencies due to image tampering processes.
Error Level Analysis
Computes the arithmetic difference between evidence image and a series of JPG re-compressed versions of it.
Adaptive Error Level Analysis
Computes the adaptive arithmetic difference between evidence image and a series of JPG recompressed versions of it using a unique algorithm.
Smart Error Level Analysis
Computes the smart adaptive arithmetic difference between evidence image and a series of JPG recompressed versions of it using a unique algorithm.
Ghost
Ghost analysis can reveal possible traces of image re-compression.
Correlation Map
Computes and displays the correlation between neighboring pixels and blocks of pixels. It can reveal local traces of image manipulation like content aware or copy/paste between different images.
Probability Map
Find the probability distribution between neighboring pixel blocks.
BA Map
Displays the blocking artifacts of image data.
ADJPEG
Checks for inconsistencies left by local tampering and double JPEG compression.
NADJPEG
Checks for inconsistencies left by local tampering and double JPEG compression nonaligned blocks.
Histogram Equalization
Applies histogram equalization on each Red, Green, Blue channel, and the overall RGB image.
HP Filter
Detection of image tampering traces, like content-aware or copy/paste between different images. The HP analysis is based on Custom High Pass Filtering technique.
PRNU Residue
The digital camera's matrix (pixel sensor) is an optic to electric energy transducer. Its Photo Response Non-Uniformity (PRNU) can be used to detect copy/paste traces between images generated by different cameras or other types of image tampering.
Clone Fusion
Automatic search for clones or copy/paste areas from the same image.
PRNU Camera
Verify the suspect camera and compare the evidence image against reference images with the same resolution.
Difference (Δ)
Computes the difference between evidence (A) and a reference image (B). The numeric results are displayed as: arithmetic absolute difference, correlation coefficient, and mean quadratic difference.
File Batching and Sorting
Runs all the authentication functions on a file. It will detect traces left by different image editors and other file structure inconsistencies, and copy the analyzed files in organized folders.
Customized Fast Batch
End users can customize the authentication functions performed on a file batch. Allowing only certain functions to be run.
Folder Batching
Run file batching on multiple images in a directory.
Cognitech's FiA 64 is an addon product with TriSuite 64. It can be purchased alongside TriSuite 14. Please visit our purchasing page here
Phone: (626) 796-0326
Email: sales@cognitech.com
Forensic Software – Get Your Cyber Crimes and Digital Investigations Solved Quickly
Related:
Investigating a case of cyber crime is not an easy thing to do. The more complicated the case, the more difficult and time-consuming it will be. If you work with the law enforcement, you might need to streamline every case of cyber crimes that you take, so that you can solve it more easily.
No more complicated steps in your digital investigations. With forensic software, you can get your case of cyber crimes solved as efficiently as possible. It helps to bring you through various stages in your investigations, with the highest court approval rate.
EnCase Forensic
EnCase Forensic has become the global standard in digital investigations, providing the highest power, efficiency, and results. It walks you through the various stages of your investigations in logical steps: triage, collect, process, search, analyze, and report.
NetAnalysis
NetAnalysis is a forensic software that walks you through the investigation, analysis, and presentation of forensic evidence in operating system and mobile device usage. It features web browser forensics, filtering and searching, cache export and page rebuilding, and reporting.
DFF (Digital Forensics Framework)
Forensic Image Enhancement Software
DFF is the software used in digital investigations, which provides digital forensic analysis, investigation and threat detection. It offers various features, including evidence preservation, multimedia analysis, fast data reduction and triage, memory analysis, and user activity analysis.
Magnet Axiom
Magnet Axiom provides a complete digital investigation platform that helps you simplify your analysis and explore your digital evidence more deeply. It leads you to a simple investigation process, which includes evidence acquiring, evidence analysis, and single stage evidence processing.
Helix3 Enterprise
Helix3 Enterprise provides a cyber security solution that helps you to investigate malicious activities within your network. It features quick implementation, review employee internet usage, capture screenshots and key logging, and e-discovery across the entire network.
BlackLight
BlackLight is a forensic software used to analyze your computer volumes and mobile devices. It offers various features, including actionable intel, memory analysis, file filter view, media analysis, communication analysis, and reporting.
X-Ways Forensics
X-Ways Forensics provides an integrated computer forensic software used for computer forensic examiners. There are various features available, including disk cloning and imaging, complete access to disk, automatic partition identification, and superimposition of sectors.
SANS Digital Forensics
SANS Digital Forensics is a forensic software designed to provide any organizations the digital forensics needed for various types of cyber crimes. Aside from providing digital forensic software, it also provides courses to let the organizations deal with cyber crimes in the right way.
Other Forensic Software for Different Platforms
This Forensic software is available on almost all platforms. However, since the software needs a high-end device to perform well, it is better to use the desktop version of the software, since it usually offers more functionalities.
NirSoft
NirSoft is a Windows digital forensic investigation software that offers the ability to extract important data from your drives, with support for external drives. It provides tools to investigate your IE history, IE cache, IE cookies, IE pass, search data, information from other browsers, and live contacts.
BlackBag
BlackBag provides an advanced data retrieval technology that helps you to seek, reveal, and preserve the truth. It is available for Windows and Mac OS. It also provides training about handling cyber crimes, which helps users to use the software more proficiently.
MOBILedit Forensic
MOBILedit Forensic provides the most comprehensive digital investigation tool for Android devices. It offers various features, including support for almost all phones, extract important application data, bypass the passcode, and bypass the PIN code.
Autopsy
Forensic Image Enhancement Software Mac Os
Autopsy is a digital forensic software for Linux, with graphical user interface. It allows you to analyze computers and smartphones to reveal traces of digital evidence for cyber crime cases. Plugins are available for this software, which can bring new features to the software.
Belkasoft Evidence Center – Best Forensic Software of 2016
Belkasoft Evidence Center provides an all-in-one forensic solution for digital investigations, which can be used to deal with online and offline crimes. It features all-in-one forensic tool, simple and powerful system, advance low level expertise, as well as clean and concise reports. This software has been used by various law enforcements worldwide.
What is Forensic Software?
Forensic software is a type of software that deals with digital forensic investigations for both online and offline crimes. This software is usually used by law enforcements and governments who want to investigate various crimes involving digital devices, such as computers and smartphones. The software works by examining the target device and provides comprehensive analysis that will reveal suspicious activities within the device. It provides streamlined investigation steps, with concise reports that can be submitted to the court with a high approval rate. Sometimes, this software can also be used to prevent cyber crimes within a network, by detecting suspicious activities as it happens.
How to Install Forensic Software?
Forensic software needs to be installed on a compatible device. Since the software usually demands high performance computers or devices, you need to make sure that your device meets the requirements of the software. Once you do that, you can download the installation file from the official website of the respective software, and run the installation process on your compatible device.
Investigating a cyber crime can take a lot of time, especially when it comes to complex instances of cyber attacks. Regular crimes that involve the use of digital devices can also be very difficult to solve, especially if the device cannot be accessed in any way. This is where forensic software becomes necessary. It helps you with the investigation of various crimes that involve digital devices, with a streamlined investigation process. You don’t need to make your investigation more complex when you use this software. Instead, the software helps you through the logical investigation steps that allow you to solve the case more quickly and easily. Not only that, the results of your investigation are presented in customized reports, allowing you to submit the reports to the court as an evidence, with a high level of court acceptance.