Amped Software solutions are used by the top law enforcement, military, and government agencies worldwide. The company focuses on developing global leading solutions for all image and video processing needs relating to forensics, investigations, public security, and intelligence. With an emphasis on the transparency of the methodologies used, Amped solutions empower customers with the three main principles of the scientific method: accuracy, repeatability, and reproducibility.
A new and evolving three-day refresher course, designed for analysts previously trained in Amped FIVE, who want to better understand the newly released filters and functionalities, to ensure the correct interpretation of data and learn to use the new tools to their full advantage. The course also provides the opportunity to look at particular cases and discuss, view and analyze challenges faced in forensic image and video enhancement.
One of the many great things about Authenticate is that even when you find that the image is a camera original, and has not been altered, it provides me with the justification for that finding so that I can write a thorough report showing what I have analyzed and what the results of that analysis are.
George Reis, Forensic Image and Video Analyst at Imaging Forensics
That was some of the best training I have ever received. The examples were real life cases and very relatable. The instruction was done in a clear and concise manner, and I now feel confident in my understanding of how the software works and explaining my processes in court.
Derek Williams, Certified Forensic Video Analyst, Durham Police, Ontario, Canada
I have never experienced a software package this easy to learn but yet so powerful. The secret is that everything can be done from one interface. I hesitate to employ the most overused term around town, WORKFLOW, but Amped allows the ultimate in logical workflow flexibility.
Kent Gibson, Media Professional and Court Expert Witness, Forensic AV
Major pros are the crystal clear workflow and the highly responsive team. A useful feature is the recording of the processing chain, including technical references. This definitely is a killer feature when considering ISO17025 standard requirements.
Major Guillaume Galou, Head of Signal-Image-Speech processing unit, French Gendarmerie Forensic Science Institute
DVRConv is the easiest way to convert unplayable video files. Videos from proprietary DVR/CCTV systems, dash cams, body worn cameras and any other video source, can now be converted automatically with no quality loss. Just drag, drop and you’re done.
Authenticate is a photo analysis software for forensic image authentication and tamper detection. With a single tool, several tests can be performed to determine if an image has been manipulated as well as verify if a photo was taken from a specific device.
FIVE is the most complete forensic software for enhancing and analyzing images and videos during investigations. A single tool to analyze crime scene photos, enhance surveillance and intelligence video and more, with a workflow compatible with forensic needs and constraints.
Amped Software training courses provide hands-on training on the use of Amped Software products as well as provide insight into the challenges users face in forensic video and digital multimedia evidence processing. Our courses are delivered worldwide, in large groups or private sessions, by experienced trainers.
Learn how Amped Software products can assist you with your investigations and improve your workflow efficiency, making it easy to analyze your evidence based on scientific methodologies. Easily convert unplayable files into playable video formats. Enhance blurred or dark videos and images. Ensure your photo evidence has not been tampered with and determine what specific device took the image.
Amped Authenticate users know how important it is to understand the processing history of an image, and they (hopefully!) know that “processing history” does not mean just splicing.For example, there are cases where the image has been scaled or re-compressed, and when one of these happen you should be aware of it, as they bring […]
Probably, Tip Tuesday aficionados have already understood the trend: we’re alternating tips for FIVE and Authenticate every week. Well… it is true. And it is intentional! Today we’re showing you some tips about tracking in Amped FIVE. Tracking an object is a basic, yet non trivial operation lying underneath a lot of Amped FIVE filters. […]
As Amped Authenticate users hopefully learned during our training courses, authenticating a digital image means much more than attaching a fake/real label to it. In some cases, you may be asked whether the integrity of a questioned digital image is preserved (or broken). In such a case, forgery localization tools should not be your first […]
Helping law enforcement and government agencies worldwide with their forensic requirements, ensuring evidence based on science.