See what you can do with Amped Authenticate

Below are a few samples of images processed with Amped Authenticate. For every photo, you will see the tampered image under analysis, the result of analysis with one of Amped Authenticate's filters, and the original image used to create the fake one.

Case Examples

Fake Documents

Fake Documents - Distorted
Fake Documents - Process
Fake Documents - Original

Object Removed

Object Removed - Distorted
Object Removed - Process
Object Removed - Original

Wire Removed

Wire Removed - Distorted
Wire Removed - Process
Wire Removed - Original

Cloned Doors

Cloned Doors - Distorted
Cloned Doors - Process
Cloned Doors - Original

Subject Removed from scene

Subject Removed - Distorted
Subject Removed - Process
Subject Removed - Original

Helicopter Moved in a different position

Helicopter Moved - Distorted
Helicopter Moved - Process
Helicopter Moved - Original

Object Removed

Object Removed - Distorted
Object Removed - Process
Object Removed - Original

Lighthouse Removed

Lighthouse Removed - Distorted
Lighthouse Removed - Process
Lighthouse Removed - Original

Subject removed

Player - Distorted
Player - Process
Player - Original

Player Removed

Player Removed - Distorted
Player Removed - Process
Player Removed - Original

Subject Removed

Subject Removed - Distorted
Subject Removed - Process
Subject Removed - Original

Cloned Windows

Cloned Windows - Distorted
Cloned Windows - Process
Cloned Windows - Original

Replaced Logo

Replaced Logo - Distorted
Replaced Logo - Process
Replaced Logo - Original

Specialized Tools

Visual Inspection

Visual Inspection

File Format Analysis

File Format Analysis

JPEG File Structure

JPEG File Structure

Integrated Hex Viewer

Integrated Hex Viewer

Hex Strings Viewer

Hex Strings Viewer

Metadata (EXIF) Analysis

Metadata Analysis

JPEG Compression Analysis

JPEG Compression Analysis

Social Media Identification

Social Media Identification

Thumbnail and Preview Mismatch Analysis

Mismatch Analysis

Double Compression Analysis

Double Compression Analysis

Pixel Correlation Analysis

Pixel Correlation Analysis

Previous Save Quality Estimation

Save Quality Estimation

JPEG Dimples Detection

JPEG Dimples Detection

Color Adjustment Analysis

Color Adjustment Analysis

Camera Ballistics

Camera Ballistics

Forgery Localization: JPEG Based

Forgery Localization - JPEG Based

Forgery Localization: Noise Based

Forgery Localization - Noise Based

Forgery Localization: Correlation Based

Forgery Localization - Correlation Based

Forgery Localization: Clone Based

Forgery Localization - Clone Based