Digital Forensics Research

Independent, evidence-based analysis of media authenticity. Exposing manipulation through empirical forensic methods.

Documented Cases

Fraud Documented

Canon CR2 RAW File Manipulation

14-bit histogram analysis reveals impossible sensor data patterns. Forensic evidence of deliberate image manipulation in purported authentic RAW files.

Analysis

Social Media Complicit in Hiding Canon RAW Editing Vulnerability?

A security disclosure about legacy RAW CR2 image hacking on social media gets deleted. Why does forensic security research trigger instant termination?