|Basics||Usage||Using FotoForensics: How to use this site.|
|About IPv6||IPv6 Support: Information about IPv6 network connectivity.|
|Malware||Malware: The impact of computer viruses on analysis and a quick test to check for infections.|
|Research||Research: A sample of the research topics performed at this site.|
|Training||Challenges||Challenges: Sample puzzles and problems for practice.|
|Mistakes||Common Mistakes: The five most common mistakes made during analysis.|
|Present: RCG||Russian Circle Group is a training example for applied forensics against an organized group.|
|Tools||Color Adjustment||Color Adjustment: How to adjust the HSV colorspace for analysis.|
|Digest||File Digest: A description of basic file digests and their use for specific file identification.|
|ELA||Error Level Analysis: How ELA works and how to interpret results.|
|Expectations||Browser Expectations: Every web browser has distinct quirks that impact analysis.|
Format Expectations: Every file format has distinct artifacts that impact analysis.
|Hidden Pixels||Hidden Pixels: Unaligned JPEGs and transparent PNGs contain pixels that are not displayed. These hidden pixels may identify applications.|
|JPEG %||Estimate JPEG Quality: Identifies the last JPEG quality level.|
|Metadata||Metadata Analysis: A description of metadata and how to use it for analysis.|
|Search||Similar Picture Search: Methods for finding variants of pictures online.|
The reading categories include links to the Hacker Factor blog and other web sites. These resources provide additional information related to digital picture analysis and photo forensics.
← Please select a reading list category.