skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 222502 Find in a Library
Title: Best Practices for Image Authentication
Corporate Author: Scientific Working Group on Imaging Technology (SWGIT)
United States of America
Date Published: 2008
Page Count: 10
Sponsoring Agency: Scientific Working Group on Imaging Technology (SWGIT)
Washington, DC 20535
US Dept of Justice Federal Bureau of Investigation
Quantico, VA 22135
Sale Source: US Dept of Justice Federal Bureau of Investigation
Laboratory Branch
2501 Investigation Parkway
Quantico, VA 22135
United States of America
Document: HTML
Type: Guideline
Format: Document (Online)
Language: English
Country: United States of America
Annotation: This article addresses issues specific to digital image authentication done in relation to image analysis.
Abstract: This article provides guidance to laboratory personnel concerning practices appropriate when performing the authentication of digital images in a forensic setting, as differentiated from analysis in authenticating images for use as evidence. The article notes that image authentication is a subtask of image analysis, and a number of considerations, some cited therein, are to be taken into account when developing a proficiency in this area. Some of the general considerations cited are: provenance; metadata analysis; detection of manipulation; detection of image creation and staging; continuity issues, and criteria for reporting. Specific considerations discussed include the application of these analytic topics as applicable to child pornography investigations, and, in addition to a discussion of the issues provided, depicts a case work-flow example for these investigations (as delineated in SWGIT’s Best Practices for Forensic Image Analysis). These considerations are also applied to a discussion of their use in analyzing purported execution videos, and the difference in analytical focus between these and other investigations. This article is based on existing authentication tasks as employed by forensic analysts, and suggests that adherence to these practices can be of value to analysts, and can help refute subsequent defense claims of collusion to misrepresent official findings. Figures
Main Term(s): Evidence identification
Index Term(s): Crime laboratory equipment; Forensic sciences; Techniques
Note: From Forensic Science Communications, N 2, V 10, April 2008; downloaded April 29, 2008.
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.