Literature DB >> 24696587

Image manipulation: Fraudulence in digital dental records: Study and review.

Aman Chowdhry1, Keya Sircar1, Deepika Bablani Popli1, Ankita Tandon1.   

Abstract

INTRODUCTION: In present-day times, freely available software allows dentists to tweak their digital records as never before. But, there is a fine line between acceptable enhancements and scientific delinquency. AIMS AND
OBJECTIVE: To manipulate digital images (used in forensic dentistry) of casts, lip prints, and bite marks in order to highlight tampering techniques and methods of detecting and preventing manipulation of digital images.
MATERIALS AND METHODS: Digital image records of forensic data (casts, lip prints, and bite marks photographed using Samsung Techwin L77 digital camera) were manipulated using freely available software.
RESULTS: Fake digital images can be created either by merging two or more digital images, or by altering an existing image. DISCUSSION AND
CONCLUSION: Retouched digital images can be used for fraudulent purposes in forensic investigations. However, tools are available to detect such digital frauds, which are extremely difficult to assess visually. Thus, all digital content should mandatorily have attached metadata and preferably watermarking in order to avert their malicious re-use. Also, computer alertness, especially about imaging software's, should be promoted among forensic odontologists/dental professionals.

Entities:  

Keywords:  Digital images; detection; manipulation; validation

Year:  2014        PMID: 24696587      PMCID: PMC3970385          DOI: 10.4103/0975-1475.127767

Source DB:  PubMed          Journal:  J Forensic Dent Sci        ISSN: 0975-1475


Introduction

Forensic odontology/forensic dentistry is defined as “that branch of forensic medicine which in the interest of justice deals with the proper handling and examination of dental evidence and with the proper evaluation and presentation of the dental findings.”[1] Traditionally, forensic odontology covered human identification and injury analysis. However, tasks of forensic odontologists have broadened in recent years to cover issues related to child abuse and domestic violence, human rights protection, insurance claims, and professional ethics. For all the above tasks, records have to be maintained through casts, radiographs etc. The storage of physical dental records like dental casts and radiographs is fraught with difficulties of space and is also very expensive. This has led to increasing dependence on digital photography and digital radiology for preservation and documentation of ante-mortem and post-mortem dental records. The very nature of digital imaging makes it very easy for the operator to adjust or modify digital image files. Many such manipulations, however, constitute inappropriate changes to original data, and making such changes can be classified as scientific misconduct.[2] Skilled technical personnel can spot such manipulations using features in the imaging software.[3] Good science requires reliable data. Consequently, to protect the integrity of research, the scientific community takes strong action against perceived scientific misconduct. In the current definition provided by the U.S. government, “Research misconduct is defined as fabrication, falsification, or plagiarism in proposing, performing, or reviewing research, or in reporting research results.”[3] At the outset, it is imperative to define what constitutes digital image fraud. Any alteration of the original image in part or full with malicious intent of altering its implication constitutes digital fraud. It includes:[4] Additions, Removal or Masking, Modifications of specific characteristics of image (color/contrast etc.), Splicing, blending of multiple images into a single composite, and Combination of any or all of the above. Being accused of misconduct initiates a painful process that can disrupt one's research and career. To avoid such a situation, it is important to understand where the ethical lines are drawn between acceptable and unacceptable image adjustment.[3]

Aims and objectives

In this article, we highlight some universal guidelines for the apposite handling of digital image data and provide some examples to exemplify pitfalls and inapt practices. This article also discusses anti-tampering techniques and methods of detecting and preventing manipulation of digital images.

Materials and Methods

Digital image records of forensic data (casts, lip prints, bite marks) were manipulated using freely available softwares. Softwares used were Adobe® Photoshop® (Adobe Systems Inc, San Jose, CA, USA), Corel Draw® (Corel Corporation, Ottawa, Ontario, Canada), Picasa 3.9.1.535 version. To record digital images of casts, lip prints, bite marks, Samsung Techwin L77 digital camera (Samsung, Korea) was used. The tools employed on images for manipulation are listed together with their function in Table 1.[5]
Table 1

Tools used for digital photo editing

Tools used for digital photo editing

Results and Observations

It was quite evident that ostentatious digital images can be created either by merging two or more digital images or by altering an existing image. Figure 1 shows use of merge tool on a bite mark photograph
Figure 1

Usage of merge tool on a bite mark photograph

Figure 2 shows Tsuchihashis classification[6]
Figure 2

Tsuchihashi's classification

Figure 3 shows original image of a lip print manipulated to another variety
Figure 3

Original image of a lip print manipulated to another variety

Figure 4 shows digital photographic records of palatal rugae on casts[7]
Figure 4

Digital photographic records of palatal rugae on casts

Figure 5 shows multiplication of data in figure 4 using clone stamp tool.
Figure 5

Modification of Figure 4 showing how the same data was multiplied

Usage of merge tool on a bite mark photograph Tsuchihashi's classification Original image of a lip print manipulated to another variety Digital photographic records of palatal rugae on casts Modification of Figure 4 showing how the same data was multiplied

Discussion

The old adage of ‘publish or perish’ is very pertinent in the present scenario and it is not unexpected for sloppiness, plagiarism, and even fraud to find their way too easily in today's intense research atmosphere. By far and away, the most significant problem is that scientists do not understand complex data-acquisition tools and occasionally seem to be duped by the ease of use of image-processing programs to manipulate data in a manner that amounts to misrepresentation.[8] Procedural hindrances to objectionable image manipulation have been greatly reduced resulting in an ease of bringing about any change to an image with just the click of a mouse. Over the last 10-15 years, there have been a few highly public instances of falsified images (Abbott 1997;[9] Aldhous and Reich 2009;[10] Weissmann 2006;[11] Xin 2006;[12] Young 2008[13]), but most of the problem lies with the lack of a basic understanding of how to properly handle image data.[14] Digital image modification is done at a pixel level and makes it to a large extent undetectable when viewed with a naked eye. Several measures, such as few described below, help in detection of altered digital images:

Cautious skepticism

Look for evident anomalies in the photo. This can comprise items not in the correct perspective, conflicting angles of reflection or unexpected discontinuities. Check for inconsistent gloom or features that seem slightly bigger or smaller than standard. Any inconsistencies may divulge the photo to be forged.[15]

Scrutinize

With the assumption that tampering disturbs certain underlying statistical properties of an image, these forensic techniques can detect specific forms of tampering. Air-brushing or re-touching can be detected by measuring deviations of the underlying color filter array correlations. A digital composite of two people can be detected by measuring differences in the direction to the illuminating light sources from their faces and body. Any inconsistencies in lighting can then be used as an evidence of tampering. Duplication or cloning can be detected by first partitioning an image into small blocks. The presence of identical and spatially coherent regions in an image can be used as an evidence of tampering.[16]

Image analyzing software, tools, and Laboratory Investigation

If there is doubt about integrity of images and previous steps didn't detect the same, then the images can be submitted to a proficient image processing lab. Detection of altered images has also been made easier by forensic tools that scrutinize scientific images (available through the US Department of Health and Human Services Office of Research Integrity).[1718] These tools have been used by some journals, and their routine use is currently being considered by many editors and publishers.[19] The accuracy and reliability of digital dental records is very important when such records are considered as forensic evidence. The knack of image fakery has a long history, and in today's digital age, it is possible to very easily change the information represented by an image without leaving any apparent traces of tampering. No method yet exists, which accomplishes efficiently and precisely the image forge recognition mission. Considering that “prevention is better than cure,” we propose that the person making a digital record should validate his data by taking certain steps to prevent the manipulation of the data by any third party for any spurious purpose. A few points for prevention of fraudulent use of digital images can be stated as:

Meta data (data about data)

It is attaching of information in the form of data to digital image. (Figure 6 shows how an image metadata looks like.) It's like a miniature text file appended to files only adding a few bytes to the total file size so as to discourage manipulation at an amateurish scale.[1011] Most of the images are stored in Exchangeable Image File (EXIF) format, so that you can view it in any organizer that can speak EXIF format.[19]
Figure 6

Example for image metadata

Example for image metadata

Digital watermarking

A digital watermark is a super impose on a digital photo (consisting of text/logo/copyright notice). The purpose of a watermark is to recognize the work and discourage its unauthorized usage. Though a watermark can't thwart unauthorized use of digital image, it makes tampering more difficult and offer shield from manipulation. It can differentiate between malicious and non-malicious changes to a greater or lesser extent.[20] Figure 7 shows a superimposed water mark on previously used image [Figure 4] of casts.[7]
Figure 7

Example for watermarking an image

Example for watermarking an image

Summary and Conclusion

Digital imaging has provided scientists with new prospects to obtain and manipulate data using techniques that were difficult or impossible to employ in the past. There is a possible use of retouched images for fraudulent purposes even in forensic investigations. Computer alertness, especially about imaging software's, should be promoted among forensic odontologist/dental professionals. Anticipatory measures such as attached metadata and preferably water marking of digital images should be done in order to avert their malicious reuse. Until there is an integrated response from the research community as to what constitutes appropriate image manipulation, the problem of “data beautification” will continue to plague science.
  13 in total

1.  Scientific misconduct. Online sleuths challenge Cell paper.

Authors:  Hao Xin
Journal:  Science       Date:  2006-12-15       Impact factor: 47.728

2.  Beautification and fraud.

Authors: 
Journal:  Nat Cell Biol       Date:  2006-02       Impact factor: 28.824

3.  Forensic software traces tweaks to images.

Authors:  Helen Pearson
Journal:  Nature       Date:  2006-02-02       Impact factor: 49.962

4.  Science fraud: from patchwork mouse to patchwork data.

Authors:  Gerald Weissmann
Journal:  FASEB J       Date:  2006-04       Impact factor: 5.191

5.  Digital image forensics.

Authors:  Hany Farid
Journal:  Sci Am       Date:  2008-06       Impact factor: 2.142

6.  Establishing the reliability of palatal rugae pattern in individual identification (following orthodontic treatment).

Authors:  D Shukla; A Chowdhry; D Bablani; P Jain; R Thapar
Journal:  J Forensic Odontostomatol       Date:  2011-07-01

7.  Forged images lead to German inquiry.

Authors:  A Abbott
Journal:  Nature       Date:  1997-05-29       Impact factor: 49.962

8.  Studies on personal identification by means of lip prints.

Authors:  Y Tsuchihashi
Journal:  Forensic Sci       Date:  1974-06

9.  Avoiding twisted pixels: ethical guidelines for the appropriate use and manipulation of scientific digital images.

Authors:  Douglas W Cromey
Journal:  Sci Eng Ethics       Date:  2010-06-22       Impact factor: 3.525

10.  What's in a picture? The temptation of image manipulation.

Authors:  Mike Rossner; Kenneth M Yamada
Journal:  J Cell Biol       Date:  2004-07-05       Impact factor: 10.539

View more
  3 in total

1.  Gatekeepers of the academic world: a recipe for good peer review.

Authors:  Aman Chowdhry
Journal:  Adv Med Educ Pract       Date:  2015-04-16

2.  A simple working type Integrated Rugoscopy Chart proposed for analysis and recording rugae pattern.

Authors:  Aman Chowdhry
Journal:  J Forensic Dent Sci       Date:  2016 Sep-Dec

Review 3.  Digital Smile Design.

Authors:  Priya Ann Thomas; Divya Krishnamoorthi; Jayashree Mohan; Ramesh Raju; Sasikala Rajajayam; Sashikant Venkatesan
Journal:  J Pharm Bioallied Sci       Date:  2022-07-13
  3 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.