{"id":1738,"date":"2016-11-04T15:58:58","date_gmt":"2016-11-04T15:58:58","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=1738"},"modified":"2024-12-11T18:52:51","modified_gmt":"2024-12-11T18:52:51","slug":"attack-of-the-clones","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/","title":{"rendered":"Photo Modification Analysis by Digital Forensics &#8211; Practical Examples!"},"content":{"rendered":"<p>One of the most common digital photo modifications is adding something to the original. But sometimes bad guys need to remove objects from a photo, and <a href=\"https:\/\/www.digitalforensics.com\/digital-forensics\/digital-image-authentication\">digital image forensics<\/a> often reveals these manipulations. Different graphic editors can help them do it, and a user doesn\u2019t even need experience &#8211; many tools work automatically. Even when software can\u2019t perform the modification on its own, countless tutorials online teach offenders how to do it manually. The most common technique for removing unwanted objects is cloning nearby parts of the image. Sometimes cloned fragments must be scaled or have their brightness and contrast adjusted so the altered area matches the main background.<br \/>\n<!--more--><\/p>\n<p>The main technique used by forensic professionals here is called clone detection.<\/p>\n<p>Different forgery detection suites contain utilities capable of clone detection. For example, you can use Amped Authenticate [1], or MATLAB Code written in Image and Communication Lab and available publicly.<\/p>\n<p>Ok, let&#8217;s check some practical examples. This one is created by amateur photoshopper:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1740\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/1.png\" alt=\"1\" width=\"878\" height=\"578\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1.png 878w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-300x197.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-768x506.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-512x337.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-64x42.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/1-184x120.png 184w\" sizes=\"auto, (max-width: 878px) 100vw, 878px\" \/><\/p>\n<p>One of available clone detection algorithms shows the following result (matched parts are circled in red):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1741\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/2.png\" alt=\"2\" width=\"882\" height=\"585\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2.png 882w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-300x200.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-768x509.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-512x340.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/2-64x42.png 64w\" sizes=\"auto, (max-width: 882px) 100vw, 882px\" \/><\/p>\n<p>The other algorithm shows different results, some are false positives (matched parts connected with lines):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1742\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/3.png\" alt=\"3\" width=\"880\" height=\"580\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3.png 880w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-300x198.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-768x506.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-512x337.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-64x42.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/3-184x120.png 184w\" sizes=\"auto, (max-width: 880px) 100vw, 880px\" \/><\/p>\n<p>And here is the result of manual visual examination of the digital image (matched parts circled with colour):<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1743\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/4.png\" alt=\"4\" width=\"885\" height=\"583\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4.png 885w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-300x198.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-768x506.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-512x337.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-28x18.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-64x42.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/4-184x120.png 184w\" sizes=\"auto, (max-width: 885px) 100vw, 885px\" \/><\/p>\n<p>Curious reader can keep playing &#8220;find 10 matches&#8221; game, and compare his or her results with the original image after [3]:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1744\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/11\/5.png\" alt=\"5\" width=\"877\" height=\"582\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5.png 877w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-300x200.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-768x510.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-512x340.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-32x21.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-28x19.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-56x37.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/5-64x42.png 64w\" sizes=\"auto, (max-width: 877px) 100vw, 877px\" \/><\/p>\n<p>To detect forgery it&#8217;s enough to find at least one cloned object. Both algorithms have solved the problem. But they couldn&#8217;t identify every trace of forgery. What if master of photoshop plays the game?<\/p>\n<p>To find all problem parts clone detection algorithms must count scaling, rotation, flipping and changing of colour and brightness. As you can see, such algorithm will take a\u00a0lot of computing\u00a0resources. So now an examiner shouldn&#8217;t forget about the computer system he or she has.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"References\"><\/span>References:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><a href=\"https:\/\/ampedsoftware.com\/\">Amped Software<\/a><\/li>\n<li><a href=\"http:\/\/lci.micc.unifi.it\/labd\/2015\/01\/copy-move-forgery-detection-and-localization\/\">Copy-Move Forgery Detection and Localization<\/a><\/li>\n<li><a href=\"https:\/\/www.drive2.ru\/b\/2403889\/\">Rubtsov Mikhail blog<\/a><\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Serge Petrov<\/p>\n<p>Interests: Digital Video Forensics, Forgery Detection, Audio Forensics<\/p>\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"One of the most common digital photo modifications is adding something to the original. But sometimes bad guys&hellip;","protected":false},"author":126,"featured_media":1745,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-1738","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Photo Modification Analysis by Digital Forensics: Examples<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Photo Modification Analysis by Digital Forensics - Practical Examples!\" \/>\n<meta property=\"og:description\" content=\"One of the most common digital photo modifications is adding something to the original. But sometimes bad guys&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-04T15:58:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:52:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/attack-of-the-clones-weare4n6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1154\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Photo Modification Analysis by Digital Forensics &#8211; Practical Examples!\",\"datePublished\":\"2016-11-04T15:58:58+00:00\",\"dateModified\":\"2024-12-11T18:52:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/\"},\"wordCount\":370,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/attack-of-the-clones-weare4n6.png\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/\",\"name\":\"Photo Modification Analysis by Digital Forensics: Examples\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/attack-of-the-clones-weare4n6.png\",\"datePublished\":\"2016-11-04T15:58:58+00:00\",\"dateModified\":\"2024-12-11T18:52:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/attack-of-the-clones-weare4n6.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/attack-of-the-clones-weare4n6.png\",\"width\":1154,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/attack-of-the-clones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Photo Modification Analysis by Digital Forensics &#8211; Practical Examples!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Photo Modification Analysis by Digital Forensics: Examples","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/","og_locale":"en_US","og_type":"article","og_title":"Photo Modification Analysis by Digital Forensics - Practical Examples!","og_description":"One of the most common digital photo modifications is adding something to the original. But sometimes bad guys&hellip;","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-11-04T15:58:58+00:00","article_modified_time":"2024-12-11T18:52:51+00:00","og_image":[{"width":1154,"height":683,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/attack-of-the-clones-weare4n6.png","type":"image\/png"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Photo Modification Analysis by Digital Forensics &#8211; Practical Examples!","datePublished":"2016-11-04T15:58:58+00:00","dateModified":"2024-12-11T18:52:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/"},"wordCount":370,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/attack-of-the-clones-weare4n6.png","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/","name":"Photo Modification Analysis by Digital Forensics: Examples","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/attack-of-the-clones-weare4n6.png","datePublished":"2016-11-04T15:58:58+00:00","dateModified":"2024-12-11T18:52:51+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/attack-of-the-clones-weare4n6.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/11\/attack-of-the-clones-weare4n6.png","width":1154,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/attack-of-the-clones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Photo Modification Analysis by Digital Forensics &#8211; Practical Examples!"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=1738"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1738\/revisions"}],"predecessor-version":[{"id":15982,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1738\/revisions\/15982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/1745"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=1738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=1738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=1738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}