{"id":1465,"date":"2016-09-21T14:14:37","date_gmt":"2016-09-21T14:14:37","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=1465"},"modified":"2024-12-11T18:55:49","modified_gmt":"2024-12-11T18:55:49","slug":"blurring-detection-using-ela","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/","title":{"rendered":"ELA in Digital Forensics: Identifying Modified Image Regions"},"content":{"rendered":"<p>The field of <a href=\"https:\/\/www.digitalforensics.com\/digital-forensics\/digital-image-authentication\">digital image forensics<\/a> relies on a variety of specialized techniques to uncover hidden manipulations in visual data. In our previous article we discussed using ELA for detection of fragments insertion from the same image or another image. This method also allows examiner to detect other image modifications. For example, image scaling, brightness, contrast and saturation correction, editing with an image editor, and filters usage.<\/p>\n<p>But ELA results interpretation in such cases demands more experience from examiner. The best way to gain it is analysing images with known modifications.<!--more--><\/p>\n<p>For example, let&#8217;s examine blurred background on an image. On figures 1 and 2 you can see the image and its error pattern, on figures 3 and 4 &#8211; Gaussian Blur filter usage results.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1467\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/1.png\" alt=\"1\" width=\"548\" height=\"805\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1.png 548w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-204x300.png 204w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-512x752.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-11x16.png 11w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-22x32.png 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-19x28.png 19w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-38x56.png 38w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/1-44x64.png 44w\" sizes=\"auto, (max-width: 548px) 100vw, 548px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1. Original image<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1468\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/2.png\" alt=\"2\" width=\"547\" height=\"805\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2.png 547w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-204x300.png 204w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-512x753.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-11x16.png 11w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-22x32.png 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-19x28.png 19w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-38x56.png 38w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/2-43x64.png 43w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2. Image error pattern<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1469\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/3.png\" alt=\"3\" width=\"548\" height=\"805\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3.png 548w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-204x300.png 204w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-512x752.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-11x16.png 11w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-22x32.png 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-19x28.png 19w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-38x56.png 38w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/3-44x64.png 44w\" sizes=\"auto, (max-width: 548px) 100vw, 548px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3. Gaussian Blur filter<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1470\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/4.png\" alt=\"4\" width=\"547\" height=\"805\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4.png 547w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-204x300.png 204w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-512x753.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-11x16.png 11w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-22x32.png 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-19x28.png 19w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-38x56.png 38w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/4-43x64.png 43w\" sizes=\"auto, (max-width: 547px) 100vw, 547px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4. Image error pattern<\/em><\/p>\n<p>As you can see, error pattern on the first picture is quite\u00a0homogeneous. Only sky on the pattern has dark colour. Error pattern of compressed images always has dark parts only if the image has homogeneous, without small parts, background.<\/p>\n<p>On modified picture you can clearly see parts with different error pattern. One part is for the monument on the front, the other &#8211; for blurred background.<\/p>\n<p>To understand it better, let&#8217;s examine an image, where background blurring became the result of using wide aperture (fig. 5, 6).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1471\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/5.png\" alt=\"5\" width=\"939\" height=\"626\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5.png 939w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-300x200.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-768x512.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-512x341.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-920x613.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/5-64x43.png 64w\" sizes=\"auto, (max-width: 939px) 100vw, 939px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5. Background blurring with wide aperture<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1472\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/6.png\" alt=\"6\" width=\"938\" height=\"625\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6.png 938w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-300x200.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-768x512.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-512x341.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-920x613.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/6-64x43.png 64w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 6. Image error pattern<\/em><\/p>\n<p>Error pattern of such image shows smooth error level changing from front to background. This change corresponds with image sharpness changes because of disposal of focus point. It&#8217;s difficult to find smooth changes on original images where background objects are beyond the depth of field. But you will never find such changes in images modified with editors if a mask was used for it.<\/p>\n<p>Sometimes it&#8217;s very difficult to interpret ELA results right while examining blurring. The image on figure 7 illustrates an article about making photos with shallow depth of field. But on its error pattern you can clearly see two zones: the first (a tree and a squirrel) resembles sharpness improving results, the other (background) &#8211; resembles blurring results.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1473\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/7.png\" alt=\"7\" width=\"941\" height=\"589\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7.png 941w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-300x188.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-768x481.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-512x320.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-920x576.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-16x10.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-32x20.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-56x35.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/7-64x40.png 64w\" sizes=\"auto, (max-width: 941px) 100vw, 941px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7. Original image<\/em><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1474\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/8.png\" alt=\"8\" width=\"938\" height=\"587\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png 938w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-300x188.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-768x481.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-512x320.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-920x576.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-16x10.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-32x20.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-56x35.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8-64x40.png 64w\" sizes=\"auto, (max-width: 938px) 100vw, 938px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8. Image error pattern<\/em><\/p>\n<p>&nbsp;<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"h-error-level-analysis\"><span class=\"ez-toc-section\" id=\"Error_Level_Analysis\"><\/span>Error Level Analysis<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Nowadays Error Level Analysis or ELA has become the most common method for image modification detection. This method is used by lots of both commercial and free tools and web-services [1, 2].\u00a0<\/p>\n\n\n\n<p>This method is based on the fact that JPEG image compression removes overmuch information about original\u2019s brightness and color [3]. The amount of information being removed depends on compression rate and, of course, signal quantization matrix. If original image compressed only once is quantizated by the same matrix as the original, modified image won\u2019t be different from the original. But if the original image is saved in JPEG a number of times, there will be significant differences between the original and modified image [4]. The result of ELA is error pattern, which shows differences between the original and modified image. The aim of the forensic examiner is to interpret error pattern right.<\/p>\n\n\n\n<p>This method works very well for modification detection in images created from fragments with different error level (fig. 9, 10).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"332\" height=\"265\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1.png\" alt=\"ela1\" class=\"wp-image-1505\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1.png 332w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1-300x239.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1-32x26.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1-28x22.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1-56x45.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA1-64x51.png 64w\" sizes=\"auto, (max-width: 332px) 100vw, 332px\" \/><\/figure>\n<\/div>\n\n\n<p><em>Figures 9,10. Modified image and its error pattern<\/em><\/p>\n\n\n\n<p>But if fragments are taken from files with the same error level or are cloned from the same image, such analysis won\u2019t bring good results, especially when your tool doesn\u2019t allow to choose compression rate value for calculating error pattern (fig. 11, 12, 13).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"412\" height=\"152\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2.png\" alt=\"ela2\" class=\"wp-image-1506\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2.png 412w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2-300x111.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2-56x21.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA2-64x24.png 64w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/figure>\n<\/div>\n\n\n<p><em>Figure 11. An image compressed with 85 quality created from fragments of an image with 50 quality<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"412\" height=\"152\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3.png\" alt=\"ela3\" class=\"wp-image-1507\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3.png 412w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3-300x111.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3-56x21.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA3-64x24.png 64w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/figure>\n<\/div>\n\n\n<p><em>Figure 12. Error pattern calculated for 85 quality<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"412\" height=\"152\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4.png\" alt=\"ela4\" class=\"wp-image-1508\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4.png 412w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4-300x111.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4-16x6.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4-32x12.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4-28x10.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4-56x21.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/ELA4-64x24.png 64w\" sizes=\"auto, (max-width: 412px) 100vw, 412px\" \/><\/figure>\n<\/div>\n\n\n<p><em>Figure 13. Error pattern calculated for 50 quality. Now we can see cloned fragments<\/em><\/p>\n\n\n\n<p>The chances of successful modification detection depend on technique of editing used. For example, if fragment was pasted in a cropped image which wasn\u2019t saved in between, reliability of the method decreases. The same can be said about highly compressed images.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-about-the-authors\"><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Serge Petrov<\/p>\n\n\n\n<p>Interests: Digital Video Forensics, Forgery Detection, Audio Forensics<\/p>\n\n\n\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noreferrer noopener\">Igor Mikhaylov<\/a><\/p>\n\n\n\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noreferrer noopener\">Oleg Skulkin<\/a><\/p>\n\n\n\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"References\"><\/span>References:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>AMPED software. Authenticate.\u00a0<a href=\"https:\/\/ampedsoftware.com\/authenticate\">https:\/\/ampedsoftware.com\/authenticate<\/a><\/li>\n\n\n\n<li>Fotoforensics.\u00a0<a href=\"http:\/\/fotoforensics.com\/\">http:\/\/fotoforensics.com\/<\/a><\/li>\n\n\n\n<li>Joint Photographic Experts Group.\u00a0<a href=\"https:\/\/jpeg.org\/\">https:\/\/jpeg.org<\/a><\/li>\n\n\n\n<li>A Picture\u2019s Worth: Digital Image Analysis and Forensics. Dr. Neal Krawetz, Hacker Factor Solutions, August 2007. Presented at the Black Hat Briefings 2007.\u00a0<a href=\"https:\/\/www.blackhat.com\/presentations\/bh-dc-08\/Krawetz\/Whitepaper\/bh-dc-08-krawetz-WP.pdf\">https:\/\/www.blackhat.com\/presentations\/bh-dc-08\/Krawetz\/Whitepaper\/bh-dc-08-krawetz-WP.pdf<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"The field of digital image forensics relies on a variety of specialized techniques to uncover hidden manipulations in&hellip;","protected":false},"author":126,"featured_media":1474,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-1465","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>ELA Forensics: Detecting Blurring and Image Manipulation<\/title>\n<meta name=\"description\" content=\"Learn how Error Level Analysis (ELA) helps digital forensic examiners detect blurred backgrounds, masked edits, and image manipulation through pixel\u2011level artifact patterns.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ELA in Digital Forensics: Identifying Modified Image Regions\" \/>\n<meta property=\"og:description\" content=\"Learn how Error Level Analysis (ELA) helps digital forensic examiners detect blurred backgrounds, masked edits, and image manipulation through pixel\u2011level artifact patterns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-21T14:14:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:55:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png\" \/>\n\t<meta property=\"og:image:width\" content=\"938\" \/>\n\t<meta property=\"og:image:height\" content=\"587\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"ELA in Digital Forensics: Identifying Modified Image Regions\",\"datePublished\":\"2016-09-21T14:14:37+00:00\",\"dateModified\":\"2024-12-11T18:55:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/\"},\"wordCount\":744,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/8.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/\",\"name\":\"ELA Forensics: Detecting Blurring and Image Manipulation\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/8.png\",\"datePublished\":\"2016-09-21T14:14:37+00:00\",\"dateModified\":\"2024-12-11T18:55:49+00:00\",\"description\":\"Learn how Error Level Analysis (ELA) helps digital forensic examiners detect blurred backgrounds, masked edits, and image manipulation through pixel\u2011level artifact patterns.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/8.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/09\\\/8.png\",\"width\":938,\"height\":587},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/blurring-detection-using-ela\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"ELA in Digital Forensics: Identifying Modified Image Regions\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"ELA Forensics: Detecting Blurring and Image Manipulation","description":"Learn how Error Level Analysis (ELA) helps digital forensic examiners detect blurred backgrounds, masked edits, and image manipulation through pixel\u2011level artifact patterns.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/","og_locale":"en_US","og_type":"article","og_title":"ELA in Digital Forensics: Identifying Modified Image Regions","og_description":"Learn how Error Level Analysis (ELA) helps digital forensic examiners detect blurred backgrounds, masked edits, and image manipulation through pixel\u2011level artifact patterns.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-09-21T14:14:37+00:00","article_modified_time":"2024-12-11T18:55:49+00:00","og_image":[{"width":938,"height":587,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"ELA in Digital Forensics: Identifying Modified Image Regions","datePublished":"2016-09-21T14:14:37+00:00","dateModified":"2024-12-11T18:55:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/"},"wordCount":744,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/","name":"ELA Forensics: Detecting Blurring and Image Manipulation","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png","datePublished":"2016-09-21T14:14:37+00:00","dateModified":"2024-12-11T18:55:49+00:00","description":"Learn how Error Level Analysis (ELA) helps digital forensic examiners detect blurred backgrounds, masked edits, and image manipulation through pixel\u2011level artifact patterns.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/09\/8.png","width":938,"height":587},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/blurring-detection-using-ela\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"ELA in Digital Forensics: Identifying Modified Image Regions"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1465","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=1465"}],"version-history":[{"count":5,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1465\/revisions"}],"predecessor-version":[{"id":15990,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1465\/revisions\/15990"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/1474"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=1465"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=1465"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=1465"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}