• Global directory Global directory
  • Product logins Product logins
  • Contact us Contact us

Our Privacy Statement & Cookie Policy

All Thomson Reuters websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.

  • Privacy Statement
  • Cookie Policy

social media forensics case study

Join our community

Sign up for industry-leading insights, updates, and all things AI @ Thomson Reuters.

social media forensics case study

Data and technology: How law enforcement agencies see the future

Technology offers many potential benefits for law enforcement agencies, but they face challenges in adopting it. Learn more about the future of law enforcement agencies' practical use of data and technology.

social media forensics case study

Preventing account takeover: New threats and tools in digital authentication

How can financial institutions respond in ways that advance prevention, quickly remediate breaches, and maintain relatively frictionless customer experiences?

social media forensics case study

Mitigate risk, detect fraudulent activity, and streamline investigations

In today’s digital world, risk and fraud detection is even more important than ever before

social media forensics case study

CoCounsel: The GenAI assistant for legal professionals

Bringing together generative AI, trusted content, and expert insights for a new era of work.

Cut drafting in half

Professional-grade GenAI for drafting right from within Microsoft Word

Related posts

social media forensics case study

Navigating the challenges (infographic)

social media forensics case study

Navigating the shift: Trends in law enforcement staffing

social media forensics case study

How technology solves 5 key challenges hampering law enforcement investigations

More answers.

social media forensics case study

What is skip tracing? An overview

social media forensics case study

The 10 generative AI skills your legal department needs to master right now

social media forensics case study

Glossary of legal terms

The Role of Social Media Forensics in Digital Forensics

3 Pages Posted: 6 Oct 2022

Vivekananth. P

Blue Crest University College

Date Written: August 28, 2022

Social media forensics collects evidence from social media sites such as Facebook, WhatsApp, TikTok, and Snapchat to identify criminals. This paper discusses social media crimes such as hacking, photo morphing, shopping scams, cyberbullying, and link baiting. The paper deliberates the social media forensics techniques such as evidence collection, storing, analyzing, and preserving; the paper discusses the process of forensics examination in social media forensics. The paper examines the social media forensics tools such as WebPreserver, make a Website Hub, Pipl Search, TinEye, and TweetBeaver and discusses the applications of each device. The paper concludes by discussing the future of social media forensics.

Keywords: Social Media, Forensics, Cyber, Hacking

Suggested Citation: Suggested Citation

Vivekananth. P (Contact Author)

Blue crest university college ( email ), do you have a job opening that you would like to promote on ssrn, paper statistics, related ejournals, forensic science ejournal.

Subscribe to this fee journal for more curated articles on this topic

Psychology Research Methods eJournal

Forensic psychology ejournal, engineering education ejournal, digital forensics, instruments & software ejournal.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

Evidence collection and forensics on social networks: : Research challenges and directions

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options.

  • Asif M Al-Razgan M Ali Y Yunrong L (2024) Graph convolution networks for social media trolls detection use deep feature extraction Journal of Cloud Computing: Advances, Systems and Applications 10.1186/s13677-024-00600-4 13 :1 Online publication date: 6-Feb-2024 https://dl.acm.org/doi/10.1186/s13677-024-00600-4
  • Brown J Onik A Baggili I (2024) Blue Skies from (X?s) Pain: A Digital Forensic Analysis of Threads and Bluesky Proceedings of the 19th International Conference on Availability, Reliability and Security 10.1145/3664476.3670904 (1-12) Online publication date: 30-Jul-2024 https://dl.acm.org/doi/10.1145/3664476.3670904
  • Arshad H Omlara E Abiodun I Aminu A (2020) A semi-automated forensic investigation model for online social networks Computers and Security 10.1016/j.cose.2020.101946 97 :C Online publication date: 1-Oct-2020 https://dl.acm.org/doi/10.1016/j.cose.2020.101946
  • Show More Cited By

Index Terms

Applied computing

Law, social and behavioral sciences

Human-centered computing

Information systems

Information systems applications

Social and professional topics

Computing / technology policy

Recommendations

Electronic evidence and the law.

Today, documents and data are likely to be encountered in electronic form. This creates a challenge for the legal system since its rules of evidence evolved to deal with tangible (“physical”) evidence. Digital evidence differs from tangible evidence in ...

Digital System, Evidence & Forensics Issues in Correctional Environments

The correctional environment is one of the most controlled in the United States. Despite the regimentedsystem that epitomizes correctional facilities, digital systems have entered that environment as contraband anddata backchannels subject to compromise ...

Pervasive social networking forensics

In pervasive social networking forensics, mobile devices (e.g. mobile phones) are a typical source of evidence. For example, figures from an Australian law enforcement agency show the number of mobile phones submitted for analysis increasing at an ...

Information

Published in.

Elsevier Science Publishers B. V.

Netherlands

Publication History

Author tags.

  • Social Media forensic acquisition
  • Forensic preservation
  • Social Media as Evidence
  • Admissibility
  • Research Goals
  • Review-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 4 Total Citations View Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0
  • Arshad H Jantan A Hoon G Abiodun I (2020) Formal knowledge model for online social network forensics Computers and Security 10.1016/j.cose.2019.101675 89 :C Online publication date: 1-Feb-2020 https://dl.acm.org/doi/10.1016/j.cose.2019.101675

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Forensic Analysis of Social Media Android Apps via Timelines

  • Conference paper
  • First Online: 17 March 2024
  • Cite this conference paper

social media forensics case study

  • Ayodeji Ogundiran 10 ,
  • Hongmei Chi 11 ,
  • Jie Yan 10 &
  • Jerry Miller 12  

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 921))

Included in the following conference series:

  • Future of Information and Communication Conference

248 Accesses

Gaining a comprehensive understanding of the chronology of events and digital artifacts, particularly within the realm of social media, presents a formidable challenge in digital forensics. This demanding endeavor necessitates the scrutiny of vast volumes of events, largely due to the rapid proliferation of the internet, interconnected devices, and cutting-edge technologies in today’s world. As the prevalence of storage devices surges and digital handheld devices in the Internet of Things (IoT) continues to gain popularity, the task of conducting digital forensic timeline analyses is progressively growing more complex, particularly for upcoming generations of Internet users. Given a case study, we reconstruct digital evidence based on timeline and links analysis. The preliminary results help digital experts to recover the case investigation in a fast way.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Dorai, G., Houshmand, S., Aggarwal, S.: Data extraction and forensic analysis for smartphone paired wearables and IoT devices

Google Scholar  

A. C. and C. Commission, “Romance baiting scams on the rise, Feb. 12, 2021. https://www.scamwatch.gov.au/news-alerts/romance-baiting-scams-on-the-rise (Accessed 29 May 2023)

Jin, Y.: Timeline analysis for Android-based systems

Bhandari, S., Jusas, V.: An abstraction based approach for reconstruction of timeline in digital forensics. Symmetry 12 (1), 104 (2020). https://doi.org/10.3390/sym12010104

Article   Google Scholar  

“Criminal Use of Social Media | Office of Justice Programs.” https://www.ojp.gov/ncjrs/virtual-library/abstracts/criminal-use-social-media (Accessed 04 Apr 2023)

Inglot, B. Liu, L. Antonopoulos, N.: A framework for enhanced timeline analysis in digital forensics, In: 2012 IEEE International Conference on Green Computing and Communications, Besancon, France: IEEE, Nov. 2012, pp. 253–256. doi: https://doi.org/10.1109/GreenCom.2012.50

Guðjónsson, K.: Mastering the Super Timeline With log2timeline (2021)

Pribadi, B., Rosdiana, S., Arifin, S.: Digital forensics on facebook messenger application in an android smartphone based on NIST SP 800–101 R1 to reveal digital crime cases. Procedia Comput. Sci. 216 , 161–167 (2023). https://doi.org/10.1016/j.procs.2022.12.123

Domingues, P., Andrade, L.M., Frade, M.: Microsoft’s Your Phone environment from a digital forensic perspective. Forensic Sci. Int. Digit. Investig. 38 , 301177 (2021). https://doi.org/10.1016/j.fsidi.2021.301177

Darsana, M. S., Khosh, V. A. M., Dija, S., Indu, V.: Windows 10 cloud storage and social media application forensics, In: 2018 IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), Madurai, India: IEEE, Dec. 2018, pp. 1–5. doi: https://doi.org/10.1109/ICCIC.2018.8782410

Basumatary, B., Kalita, H. K.: Social media forensics - a holistic review, In: 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India: IEEE, Mar. 2022, pp. 590–597. doi: https://doi.org/10.23919/INDIACom54597.2022.9763129

Gibson, B., Townes, S., Lewis, D., Bhunia, S.: Vulnerability in massive API scraping: 2021 linkedin data breach, In: 2021 International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA: IEEE, Dec. 2021, pp. 777–782. doi: https://doi.org/10.1109/CSCI54926.2021.00191

Focus, F.: Timelines In Digital Forensic Investigation: From Investigation To Court,” Forensic Focus, Sep. 10, 2020. https://www.forensicfocus.com/articles/timelines-in-digital-forensic-investigation-from-investigation-to-court/ (Accessed 26 Apr 2023)

“The Impact of Mishandled Evidence on the Accused,” Aug. 21, 2019. https://trackerproducts.com/the-impact-of-mishandled-evidence-on-the-accused/ (Accessed 15 May 2023)

C. Farivar, “How One Man Lost $1 Million To A Crypto ‘Super Scam’ Called Pig Butchering,” Forbes. https://www.forbes.com/sites/cyrusfarivar/2022/09/09/pig-butchering-crypto-super-scam/ (Accessed 29 May 2023)

Kasiaras, D., Zafeiropoulos, T., Clarke, N., Kambourakis, G.: Android forensics: correlation analysis, In: The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014), London, United Kingdom: IEEE, Dec. 2014, pp. 157–162. doi: https://doi.org/10.1109/ICITST.2014.7038797

Pohlen, C.: Linear Temporal Logic and Timeline Visualization

Sarhan, S.A.E., Youness, H.A., Bahaa-Eldin, A.M.: A framework for digital forensics of encrypted real-time network traffic, instant messaging, and VoIP application case study. Ain Shams Eng. J. 14 (9), 102069 (2023)

Arshad, H., Jantan, A., Hoon, G.K., Abiodun, I.O.: Formal knowledge model for online social network forensics. Comput. Secur. 89 , 101675 (2020)

Basumatary, B., Kalita, H. K. (2022). Social Media Forensics-A Holistic Review. In 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) (pp. 590–597). IEEE.\

Hussain, M., Siddiqui, S., Islam, N. Social Engineering and Data Privacy. In Fraud Prevention, Confidentiality, and Data Security for Modern Businesses (pp. 225–248). IGI Global (2023)

Muñoz, S. D., Pinto, E. P. G. A dataset for the detection of fake profiles on social networking services. In: 2020 International Conference on Computational Science and Computational Intelligence (CSCI) (pp. 230–237). IEEE (2020)

Bharti, N.S.G., Gulia, P.: Exploring machine learning techniques for fake profile detection in online social networks. Int. J. Electr. Comput. Eng. (IJECE) 13 (3), 2962–2971 (2023)

Saranya, S., & Usha, G. (2023). Forensic Analysis of Online Social Network Data in Crime Scene Investigation. In Artificial Intelligence and Blockchain in Digital Forensics (pp. 183–209). River Publishers

Menahil, A., Iqbal, W., Iftikhar, M., Shahid, W.B., Mansoor, K., Rubab, S.: Forensic analysis of social networking applications on an android smartphone. Wirel. Commun. Mob. Comput.Comput. 2021 , 1–36 (2021)

Download references

Acknowledgment

The research was partially sponsored by the Army Research Office and was accomplished under Grant Number W911NF-21–1-0264 and based upon work supported partly by the National Science Foundation under Grant No. 2101118 and No. 2101161. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Office or NSF, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes, notwithstanding any copyright notation herein.

Author information

Authors and affiliations.

Bowie State University, Bowie, MD, 20715-9465, USA

Ayodeji Ogundiran & Jie Yan

Florida A&M University, Tallahassee, FL, 32307, USA

Hongmei Chi

Florida International University, Miami, FL, 33199, USA

Jerry Miller

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Hongmei Chi .

Editor information

Editors and affiliations.

Saga University, Saga, Japan

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Cite this paper.

Ogundiran, A., Chi, H., Yan, J., Miller, J. (2024). Forensic Analysis of Social Media Android Apps via Timelines. In: Arai, K. (eds) Advances in Information and Communication. FICC 2024. Lecture Notes in Networks and Systems, vol 921. Springer, Cham. https://doi.org/10.1007/978-3-031-54053-0_37

Download citation

DOI : https://doi.org/10.1007/978-3-031-54053-0_37

Published : 17 March 2024

Publisher Name : Springer, Cham

Print ISBN : 978-3-031-54052-3

Online ISBN : 978-3-031-54053-0

eBook Packages : Intelligent Technologies and Robotics Intelligent Technologies and Robotics (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research
  • ABOUT OUR BLOGGER

social media forensics case study

5 Case Studies of Social Media Evidence in Criminal Investigations

social media forensics case study

This trend is also reflected in our ongoing survey of case law involving social media, where we recently identified 319 cases published in online databases in the first six months of 2012, which is about an 85 percent increase in the number of published social media cases over the same period in 2011, as reported by our prior survey earlier this year. About one half of those cases were criminal matters. As noted before, these are only the matters with published decisions that allow for us to see the facts of the case. As only a small fraction of cases involve an accessible published decision, it is safe to assume that several thousand, if not tens of thousands more cases involved social media evidence during this time period.

Below is a sampling of five recent criminal cases that illustrate both the importance of social media evidence to crime fighting and the diverse nature of cases involved. The published court opinions are publicly available via the hyperlink:

Bradley v. State

This is one of many recent cases where social media evidence was used to identify suspects and/or witnesses. In Bradley , the victim of an armed robbery identified his assailants through publically available Facebook photos. In its opinion denying Bradley’s appeal, the Texas appellate court pointedly noted that “Vast online photo databases—like Facebook—and relatively easy access to them will undoubtedly play an ever-increasing role in identifying and prosecuting suspects.”

Hoffman v. State

In Hoffman, an 18-year old female was convicted of vehicular manslaughter. The Court enhanced her sentence when the prosecution introduced into evidence her MySpace page with photos and comments glamorizing alcohol abuse.

US v. Anderson

Our survey results included several dozen cases involving child exploitation investigations. In US v. Anderson , a pedophile used Facebook to identify and lure victims.

People v. Mincey

After these sex offenders are convicted and released on probation or parole, they need to be monitored. There are many cases such as People v. Mincey where the defendant violated their probation by using and communicating on social media sites.

US v. Collins

In this court filing, it is revealed that the “Anonymous” hacker group employed Twitter to communicate and coordinate attacks: Terms of probation sought to prevent the defendants from using Twitter while on probation. Monitoring Twitter is a crucial capability for cybercrime investigations.

Click here for more published cases involving social media in 2012

Share this:

Filed under Case Law , Social Media Investigations

Tagged as Law enforcement; social media; investigations; LexisNexis; case law; criminal matters; criminal cases; Bradley v. State; Hoffman v. State; US v. Anderson; People v. Mincey; US v. Collins;

7 responses to “ 5 Case Studies of Social Media Evidence in Criminal Investigations ”

' src=

The emergence and the uncontrolled popularity of the social networking sites not only in online marketing and communication, but it has been of great help in solving crimes. Some criminal cases have used social media to locate and identify certain criminals that are facing heinous crimes. And when legal cases have been filed against these people, then they would be needing a really efficient and even the best criminal defense lawyer they can find to represent and defend them in court. http://thebestcriminaldefense.com

Pingback: Essay Draft 3 | es1102rachael

Pingback: Social Media and Crime – blevinscrimeblog

Pingback: Social Networks in the Legal Realm - Brandabur & Bowling

Pingback: Week 7 Discussion – johnson491

' src=

Social networking sites today is changing the way we communicate with others and sharing our life experience. However, there are two faces of it. People are using it in both the good and bad way. So the investigators should take interest in researching about the social media sites of the concerned people for easy and fast result. Most of the time, employers involve the social media sites while performing background check on their prospective employees. Though it is a good medium, investigators should not be biased and use it in the most transparent way.

Pingback: Role of Social Media in High-Profile Cases  - Layman Litigation

Leave a comment Cancel reply

social media forensics case study

John Patzakis, Esq.

@x1discovery

Search this blog, subscribe to blog.

Enter your email address to follow this blog and receive notifications of new posts by email.

Email Address:

Sign me up!

  • 367,211 Visitors

Blog Topics

  • Authentication (30)
  • Best Practices (130)
  • Business Productivity Search (9)
  • Case Law (71)
  • Case Study (15)
  • Cloud Data (38)
  • collection (16)
  • Comliance (3)
  • compliance (22)
  • Corporations (30)
  • Cyber security (3)
  • Cybersecurity (5)
  • dark web (1)
  • Data Audit (17)
  • Desktop Search (17)
  • eDiscovery (93)
  • eDiscovery & Compliance (59)
  • Enterprise eDiscovery (72)
  • Enterprise Search (24)
  • Google Workspace (1)
  • Hybrid Search (11)
  • Information Access (13)
  • Information Governance (34)
  • Information Management (31)
  • law firm (22)
  • Legal Ethics & Social Media (9)
  • Mobile Search (2)
  • MS Teams (8)
  • OneDrive (9)
  • Preservation & Collection (67)
  • productivity (3)
  • proportionality (12)
  • Records Management (7)
  • Relativity (5)
  • reviewing (1)
  • SharePoint (9)
  • SharePoint content (1)
  • Social Media Investigations (72)
  • Social Media Metadata (46)
  • Training and Certification (1)
  • Uncategorized (69)
  • Virtualized Environment (10)
  • X1 Search 8 (3)
  • X1 Search 9 (2)

Popular Posts

  • 5 Case Studies of Social Media Evidence in Criminal Investigations
  • Can Lawyers Be Disqualified by Merely Viewing a Linkedin Profile? The Implications of Indirect Social Media Communications and Legal Ethics Rules
  • Canadian Court Admonishes Police for Submitting Facebook Screenshots as Evidence
  • Mid-Year Report: Legal Cases Involving Social Media Rapidly Increasing

' src=

  • Already have a WordPress.com account? Log in now.
  • Subscribe Subscribed
  • Copy shortlink
  • Report this content
  • View post in Reader
  • Manage subscriptions
  • Collapse this bar
  • Open access
  • Published: 01 May 2021

Media forensics on social media platforms: a survey

  • Cecilia Pasquini   ORCID: orcid.org/0000-0002-2125-6983 1 ,
  • Irene Amerini 2 &
  • Giulia Boato 1  

EURASIP Journal on Information Security volume  2021 , Article number:  4 ( 2021 ) Cite this article

13k Accesses

33 Citations

3 Altmetric

Metrics details

The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the multimedia forensics research community pursued the ambition to scale the forensic analysis to real-world web-based open systems. This survey aims at describing the work done so far on the analysis of shared data, covering three main aspects: forensics techniques performing source identification and integrity verification on media uploaded on social networks, platform provenance analysis allowing to identify sharing platforms, and multimedia verification algorithms assessing the credibility of media objects in relation to its associated textual information. The achieved results are highlighted together with current open issues and research challenges to be addressed in order to advance the field in the next future.

1 Intro and motivation

The diffusion of easy-to-use editing tools accessible to a wider public induced in the last decade growing concerns about the dependability of digital media. This has been recently amplified by to the development of new classes of artificial intelligence techniques capable of producing high quality fake images and videos (e.g., Deepfakes) without requiring any specific technical know-how from the users. Moreover, multimedia contents strongly contribute to the viral diffusion of information through social media and web channels, and play a fundamental role in the digital life of individuals and societies. Thus, the necessity of developing tools to preserve the trustworthiness of images and videos shared on social media and web platforms is a need that our society can no longer ignore.

Many works in multimedia forensics have studied the detection of various manipulations and the identification of the media source, providing interesting results in laboratory conditions and well-defined scenarios under different levels of knowledge available to the forensic analyst. Recently, the research community also pursued the ambition to scale multimedia forensics analysis to real-world web-based open systems. Then, potential tampering actions through specialized editing tools or the generation of deceptive fake visual information are mixed and interleaved with routine sharing operations through web channels.

The extension of media forensics to such novel and more realistic scenarios implies the ability to face significant technological challenges related to the (possibly multiple) uploading/sharing process, thus requiring methods that can reliably work under these more general conditions. In fact, during those steps the data get further manipulated by the platforms in order to reduce the memory and bandwidth requirements. This hinders conventional forensics approaches but also introduces detectable patterns. We report in Table  1 two examples of images shared through popular social media platforms and downloaded from there, where it can be seen how the signal gets altered in terms of size and compression quality.

In this framework, being able of, even partially, retrieving information about the digital life of a media object in terms of provenance, manipulations and sharing operations, can represent a valuable asset, as it could support law enforcement agencies and intelligence services in tracing perpetrators of deceptive visual contents. More generally, it can help in preserving the trustworthiness of digital media and countering misinformation effects by enforcing trustable sources.

This survey aims at describing the work done so far by the research community on multimedia forensic analysis of digital images and videos shared through social media or web platforms, highlighting achieved results but also current open issues and research challenges which still have to be addressed to provide general solutions.

2 Overview and structure

We exemplify in Fig.  1 the main possible steps in the digital life of a media object shared online. While simplified, this representation is sufficiently expressive and allows us to annotate the focus of the different sections of this survey, thus clarifying the paper’s structure.

figure 1

Visual representation of the research topics reviewed in this survey. Each section corresponds to a color. For each color, solid rectangles highlight the phases studied by the methods reviewed in the corresponding section (i.e., where different hypotheses are defined for the forensic analysis), and dashed rectangles indicate the objects on which the analysis is based

We identify two main milestones, namely the acquisition and the upload steps, which are reported in bold in Fig.  1 . First, at acquisition a real scene/object is captured through an acquisition device and thus enters what we denote as digital ecosystem (i.e., the set of digital media objects). Afterwards, a number of operations can be applied, that we gather under the block “Post-processing”, including resizing, filtering, compressions, cropping, semantic manipulations. This is the phase on which most of the research approaches in multimedia forensics operate.

Then, through the upload phase, the object is shared through web services, and thus gets included in the world wide web. Technically, it is very common that acquired media objects are uploaded to web platforms either instantly (through automatic backup services like GooglePhoto or iCloud), or already during the post-processing phase (e.g., through Adobe Creative Cloud), thus squeezing the first and second phase. However, in our work we do not analyze those services (which are primarily conceived for storage purposes), but rather focus on platforms for social networking, dissemination, messaging, that typically process media objects in order to meet bandwidth and storage requirements. This includes popular Social Networks (SN) such as Facebook, Twitter, Instagram, and Google+, as well as messaging services such as WhatsApp, Telegram, and Messenger.

Afterwards, multiple different steps can follow where the object can be either downloaded, re-uploaded, or re-shared through other platforms. In addition, the multimedia content is generally tied to textual information (e.g., in news, social media posts, articles).

The present survey reviews methods performing some kind of multimedia forensic analysis of data that went through the upload phase, i.e., that has been shared (possibly multiple times) through social media or web platforms. We do not target the wider fields of computer forensics [ 1 ], but rather aim at reviewing the literature on forensic analysis of media objects shared online, leveraging both signal processing and/or machine learning approaches. Moreover, we focus on real (possibly manipulated) multimedia objects, while discarding specific scenarios such as the diffusion of synthetically generated media.

In this context, a number of forensic approaches have been proposed targeting different phases of the media digital life. A group of techniques addresses typical multimedia forensics tasks that concern the acquisition and post-processing steps (such as source identification or integrity verification) but perform the analysis on shared data. Those are reviewed in Section 3 Forensic analysis , which corresponds in Fig.  1 to the purple color. The dashed purple rectangle indicates the object on which the analysis is performed (i.e., the media object after the upload phase), while the solid purple rectangle highlights the phases on which different forensic hypotheses are formulated.

Another problem recently addressed in the literature is the analysis of a shared media object with the goal of reconstructing the steps involved from the upload phase on (i.e., the sharing history ). This body of work is described in Section 4 Platform provenance analysis , and corresponds in Fig.  1 to the yellow color.

Finally, a number of approaches analyze the shared media object in relation to its associated textual information, in order to identify inconsistencies that might indicate a fake source of visual/textual information. This stream of research is indicated in Fig.  1 in green and is treated in Section 5 Multimodal Verification analysis .

In addition, we present in Section 6 a complete overview of the datasets created for the above mentioned tasks which include data that have been shared through web channels.

3 Forensic analysis

Major issues in traditional multimedia forensics are the identification of the source of multimedia data and the verification of its integrity. This section reviews the major lines of such research applied on shared media objects (purple boxes in Fig.  1 ). The prevalence of existing works are mostly dedicated to the analysis of the acquisition source, either targeting the identification of the specific device or the camera model. On the other side, very few contributions are given on forgery detection, most of them reviewing well known methods on new datasets and demonstrating the difficulty of this task when investigated in the wild. The third focus area is the forensic analysis in adversarial conditions, as few approaches deal with counter forensics activities and can be traced back to the source identification issue [ 2 , 3 ]. In the following subsections, source identification and forgery detection methods will be reviewed separately, thereby the following major topics will be covered:

Source camera identification - device and model identification

Integrity verification

Afterwards, a summary and a discussion will be reported at the end of the section.

3.1 Source camera identification

The explosion in the usage of social network services enlarges the variability of image and video data and presents new scenarios and challenges especially in the source identification task, such as: knowing the kind of device used for the acquisition after the upload; knowing the brand and model of a device after the upload as well as the specific device associate to a shared media; dealing with the ability to cluster a bunch of data according to the device of origin; dealing with the ability to associate various profiles belonging to different SNs. Not all of such open questions are equally covered; i.e. very few works exist on brand identification [ 4 ]. On the contrary most of the works are mainly dedicated to source camera identification, such as, tracing back the origin of an image or a video by identifying the device or the model that acquired a particular media object. Similarly to what happened in forensic scenarios with no sharing processes, the idea behind these kind of approaches is that each phase of the acquisition process leaves an unique fingerprint on the digital content itself, which should be estimated and extracted. The fingerprint should be robust enough to the modification introduced by the sharing process, so that it is not drastically affected by the uploading/downloading operations and can be still detectable. Several papers use the PRNU (Photo Response Non-Uniformity) noise [ 5 ] as fingerprint to perform source identification, as it has proven widely viable for traditional approaches. Some others methods adopt some variants of the PRNU extraction method, and propose to use hybrid techniques or consider different footprints such as video file containers. We decide to split the source camera identification group of techniques in two categories: perfect knowledge methods and limited and zero knowledge methods , according to the level of information available or assumed on the forensic scenario. The first case, described in Section 3.1.1 , is related to the methods employing known reference databases of cameras to perform their task. In the second case (Section 3.1.2 ) the reference dataset can be partially known or completely unknown and no assumption on the numbers of camera composing the dataset is given. A summary of the papers, that will be described in the following, is reported in Table  2 with details regarding the techniques employed, the SNs involved and the dataset used.

3.1.1 Device and model identification: perfect knowledge methods

The main characteristic of the following set of works is the creation of a reference dataset of camera fingerprint. The source identification is in this case performed in a closed set and we refer to such approaches with the term perfect knowledge methods . Most of the works presented hereafter are mainly based on PRNU [ 5 ] and they are equally distributed among papers that address the problem of video camera source identification and those interested in the device identification of images. One of the first papers exploring video camera source identification of YouTube videos is [ 6 ] that already demonstrates the difficulties to reach a correct identification on shared object, since many parameters that affect PRNU come into play (e.g., compression, codec, video resolution and changes in the aspect ratio). As well as above, in the paper [ 7 ], another evaluation of the camera identification techniques proposed by [ 5 ] is given, this time considering images coming from social networks and online photo sharing websites. The results show once again that modifications introduced by the upload process make the PRNU detection almost ineffective, thus demonstrating the difficulties in working on shared data. For this reason different papers recently have been tried to improve PRNU estimation in order to achieve a stronger fingerprint in the case of heavy loss [ 3 ] and to speed up the computation [ 8 ]. The authors of [ 8 ], in particular, perform an analysis on stabilized and non-stabilized videos proposing to use the spatial domain averaged frames for fingerprint extraction. A novel method for PRNU fingerprint estimation is presented in [ 9 ] taking into account the effects of video compression on the PRNU noise through the selection of blocks of frames with at least one non-null DCT coefficient. In [ 10 ], a VGG network is employed as classifier to detect the images according to the Instagram filter applied, aiming at excluding certain images in the estimation of the PRNU and thus improving the reliability of the device identification method for Instagram photos. The VISION dataset [ 15 ] is employed by many methods reviewed in this Section. For an overview of public datasets used by each paper, please refer to the Table  2 .

Several works proposed the use of PRNU to address a slightly different problem, i.e., to link social media profiles containing images and videos captured by the same sensor [ 11 , 12 ]. In particular, in [ 11 ] a hybrid approach investigates the possibility to identify the source of a digital video by exploiting a reference sensor pattern noise generated from still images taken by the same device. Recently, a new dataset for source camera identification is proposed (the Forchheim Image Database - FODB) [ 16 ] considering five different social networks. Two CNNs methods have been evaluated [ 17 , 18 ] with and without degradation generated on the images by the sharing operation. An overview of the obtained results is shown in Fig.  2 when the two nets are trained on original images and data augmentation is performed with artificial degradations (rescaling, compression, flipping and rotation). The drop in the accuracy is quite mitigated from the employment of a general purpose net like the one proposed in [ 18 ].

figure 2

Camera identification accuracies for the Forchheim Image Database as reported in [ 16 ]. Camera-native (original) images and five sharing platforms (Facebook, Instagram, Telegram, Twitter, Whatsapp) have been evaluated

So far, we have discussed approaches for device identification on shared media objects; however, some interest has been also demonstrated on camera model identification. In particular, [ 4 ] and [ 14 ] propose the use of DenseNet, a Convolutional Neural Network (CNN) with RGB patches as input, tested on the Forensic Camera-Model Identification Dataset provided by the IEEE Signal Processing (SP) Cup 2018. Footnote 1

3.1.2 Device and model identification: limited and zero knowledge methods

In this section, we review the problem of clustering a set of images, according to their source, in case of limited side information about possible reference datasets or about the number of cameras. The first work in this sense involving images computes image similarity based on noise residuals [ 5 ] through a consensus clustering [ 19 ]. The work in [ 20 ] presents an algorithm to cluster images shared through SNs without prior knowledge about the types and number of the acquisition smartphones, as well as in [ 19 ] ( zero knowledge approaches), with the difference that more than one SN have been considered in this case. This method exploits batch partitioning, image resizing, hierarchical and graph-based clustering to group the images which results in more precise clusters for images taken with the same smartphone model.

In [ 13 ] and [ 21 ], the camera model identification issue in an open set scenario with limited knowledge is addressed: the aim in this case is to detect whether an image comes from one of the known camera models of the dataset or from an unknown one.

The paper in [ 22 ] faces the problem of profile linking, also addressed by the perfect knowledge method in [ 12 ]; this time an unsupervised approach is used applying a k-medoids clustering.

Differently from the other methods, that mainly use residual noise or PRNU to perform source identification, in [ 2 , 23 , 24 ] video file containers have been considered as hint for the identification and the classification of the device, the brand and the model of a device without a prior training phase. In particular in [ 24 ] a hierarchical clustering is employed whereas a likelihood-ratio framework is proposed in [ 2 ].

3.2 Integrity verification

An overview of the works dealing with forgery detection on shared data is outlined in this subsection and a summary is given in Table  3 , with details about the methodology, the SNs involved and the datasets used.

Some of the works discussed in the previous section addressed also the problem of integrity verification as demonstrated by [ 2 ], where the dissimilarity between a query video and a reference file container is searched in order to detect video forgery. Instead, the work in [ 25 ], derived from [ 21 ], proposes a graph-based representation of an image, named Forensic Similarity Graph, in order to detect manipulated digital images. In detail, a forgery introduces a unique structure into this graph creating communities of patches that are subject to the same editing operation.

In those works the kind of manipulations (splicing, copy-move, retouching, and so on) taken into account are not explicitly given since in both contributions the attention paid to shared media object is very limited.

The alterations that social media platforms apply on images are further investigated in [ 26 , 27 ] where their impact on tampering detection is evaluated. A number of well-established, state-of-the-art algorithms for forgery detection are compared on different datasets including images downloaded from social media platforms. The results confirm that such operations are so disruptive that sometimes could completely nullify the possibility of a successful forgery identification throughout a detector.

3.3 Summary and discussion

To summarize, as previously evidenced, the prevalence of the works discussed in this Section are mostly dedicated to the source camera identification problem and only few contributions are given on the identification of manipulations, demonstrating the difficulties of this particular issue when investigated on shared multimedia objects. Most of the approaches related to source identification address the problem of device camera identification and, to a lesser extent, to the model or brand identification. It has been demonstrated that the existing forensics analysis methods experience significant performance degradation due to the applied post-processing operations. For this reason, it is fundamental that future works will cover this gap in order to achieve successful forgery detection and reliable source identification of digital images and videos shared through social media or web platforms.

An important aspect to close this gap is the creation and diffusion of publicly available datasets to foster real-world oriented research in image forensics, which constitutes a non-trivial task. In fact, major effort should be dedicated to the design of data collections that are comprehensive and unbiased, so that the resulting benchmarks are realistic and challenging enough.

Furthermore, many points still need to be addressed in order to reliably analyze images and videos in the wild, such as the investigation of new kinds of fingerprints and distinctive characteristics: i.e., the PRNU, although very robust in no-sharing scenarios, it has not proven so reliable on shared data. In this context, data-driven approaches based on deep learning might empower more effective strategies for fingerprint extraction, as it has been recently explored in [ 29 ].

Another important point that need to be addressed to complete the analysis on the authenticity of images and video in the wild, is related to the Deepfake phenomenon. While there has been a recent burst of new methods for identifying synthetically generated fakes from a pristine media [ 30 ], the analysis of such kind of data after a sharing operation is still a rather unexplored problem. In [ 31 ] a preliminary analysis on Deepfake detection on Youtube videos is reported. Another point that is underrepresented in the literature so far, is a detailed analysis on adversarial forensics in regards to shared contents, a topic that is necessary to investigate more deeply in the future.

4 Platform provenance analysis

The process of uploading on sharing platforms can represent an important phase in the digital life of media data, as it allows to instantly spread the visual information and bring it to many users. While this sharing process typically hinders the ability of performing conventional media forensics tasks (as evidenced in the previous Section), it also introduces traces that allow to infer additional kind of information. In fact, data can be uploaded in many different ways, once or multiple times on diverse platforms and from different systems.

In this context, the possibility of reconstructing information on the sharing history of a certain object is highly valuable in media forensics. In fact, it could help in monitoring the visual information flow by tracing back the initial uploads, thus aiding source identification by narrowing down the search.

Several studies on this have been conducted in recent years that explore these possibilities. In this section, we collect and review such approaches, that we gather under the name of platform provenance analysis . Differently from what discussed in the previous section, platform provenance analysis studies the traces left by the upload phase itself and provides useful insights on the sharing operations applied to the object under investigation. We can broadly summarize the goals of platform provenance analysis as follows:

Identification of the platforms that have processed the object

Reconstruction of the full sharing history of the object

Extraction of information on the systems used in the upload phase.

As a first observation, we report that most of the works addressing platform provenance tasks focus on digital images. To the best of our knowledge, the provenance analysis of videos is currently limited to the approaches proposed in [ 2 ], where the structure of video containers is used as cue to identify previous operations. Moreover, a common trait of existing methodologies is the formalization of the addressed provenance-related task as a classification problem, and the use of supervised Machine Learning (ML) as a mean to extract information from the object. In fact, the typical pipeline adopted is reported in Fig.  3 : after the creation of a wide dataset containing representative data for the considered scenario, a feature representation carrying certain cues is extracted from each data sample and fed to a machine learning model, which is then trained to perform the desired task at inference phase.

figure 3

Pipeline of the approaches proposed for platform provenance analysis

The methods proposed so far in the literature present substantial differences in the way cues are selected and extracted, as well as in the choice of suitable machine learning models that can provide reliable predictions. Given the recurrence of the steps in Fig.  3 , in the following we will review existing methods for digital images by examining different aspects of their detection strategies within the depicted pipeline.

4.1 Dataset creation

In order to analyze the traces left by the sharing operations, suitable datasets must be created by reproducing the conditions of the studied scenario. For platform provenance analysis, images need to be uploaded to and downloaded from the web platforms and SNs under analysis. This can be performed automatically or manually, depending on the accessibility and regulations of the different platforms. For several platforms (such as Facebook, Twitter, Flickr [ 32 ]), APIs are available that allow to perform automatically sharing operations with different uploading options, thus significantly speeding up the collection process. Moreover, the platforms often allow to process multiple files in batches, although sharing with different parameters has to be performed manually.

Few works also freely release the datasets used for their analysis, which usually include the versions of each image before and after sharing. We refer to Section 6 for an overview. While some platforms also support other formats (such as PNG or TIFF), such datasets are almost exclusively composed of images in JPEG format, whose specificities are used for provenance analysis.

4.2 Cue selection

The sharing process by means of web platforms and SNs can include several operations leaving distinct traces in the digital image, which can be exposed by means of different cues.

For instance, as firstly observed in [ 33 ] for Facebook, compression and resizing are usually applied in order to reduce the size of uploaded images and this is performed differently on different platforms, also depending on the resolution and size of the data before uploading. As it is widely known in multimedia forensics, such operations can be detected and characterized by analyzing the image signal (i.e., the values in the pixel domain or in transformed domains), where distinctive patterns can be exposed. This approach is followed in [ 32 , 34 – 36 ] for platform provenance analysis, where the image signal is pre-processed to extract a feature representation (see Section 4.3 ).

Moreover, useful information can be leveraged from the image metadata , which provide additional side information on the image. While it can be argued that a signal-based forensic analysis would be preferable (as data structures can be falsified more easily than signals), such cues can play a particularly relevant role in platform provenance analysis. In fact, they typically are related to the software stack used by the platform, rather than to the hardware that acquired the data [ 37 ]. In [ 38 ], the authors consider several popular platforms (namely Facebook, Google+, Flickr, Tumblr, Imgur, Twitter, WhatsApp, Tinypic, Instagram, Telegram) and show that uploaded files are renamed with distinctive patterns, which occasionally even allow to reconstruct the URL of the web location of the file. Also, they notice platform-specific rules in the way images are resized and/or compressed with the JPEG standard; therefore, they propose a feature representation including the image resolution and the coefficients of the quantization table used for JPEG compression, which can be extracted from the image file without decoding.

Useful evidence for provenance analysis can then be contained in the EXIF information of JPEG files. In fact, sharing platforms usually strip out optional metadata fields (like acquisition time, GPS coordinates, acquisition device), but in JPEG files downloaded from diverse platforms different EXIF fields are retained. This aspect is also explored in [ 37 ], where the authors aim at linking JPEG headers of images acquired with Apple smartphones and shared on different apps to their acquisition device; their analysis show that JPEG headers can be used to identify the operating system version and the sharing app used to a certain extent.

Finally, the works in [ 39 , 40 ] propose a hybrid approach where both signal- and metadata-based features are extracted and used for classification.

4.3 Signal preprocessing

When the signal is used as source of information for the provenance analysis, different choices can be done to preprocess the signal and extract an effective feature representation. The goal is to capture traces left by the sharing operation which, as previously mentioned, usually involves a recompression phase.

To this purpose, a widely investigated solution is to rely on the Discrete Cosine Transform (DCT) domain, as proposed in [ 32 , 34 , 39 , 40 ]. In fact, the values of DCT coefficients provide evidence on the parameters used in previous JPEG compression processes and can effectively link a shared image to the (typically last) platform it comes from. In order to reduce the dimensionality of the feature representation, a common strategy is to extract the histogram of a subset of the 64 AC subbands, and further select a range of bins that are discriminative enough.

Alternatively, the approach in [ 36 ] explores the use of the PRNU noise as a carrier of traces left by different platforms. To this purpose, a wavelet-based denoising filter is applied to each image patch to obtain a noise residual, that is then fed to the ML classifier. When fused with DCT features, noise residuals can help in raising the accuracy of the provenance analysis, as shown in [ 35 ].

Finally, while proposing a methodology to detect different kind of processing operations based simply on image patches in the pixel domain, the authors in [ 41 ] show that, as a by-product, their approach can be effective also for provenance analysis.

4.4 Machine learning model

After the feature representation is extracted, different kinds of ML classifiers can then be trained to perform the desired task. Some works employ decision trees [ 38 ] or ensemble learning techniques like random forests [ 32 , 37 , 39 ], as well as Support Vector Machines [ 39 , 42 ] and Logistic Regression [ 39 ].

Most recently, researchers focused on deep learning techniques based on CNNs. In [ 34 ], one-dimensional CNNs are used to process DCT-based feature vectors, confirming the good performance obtained in [ 32 ] on extended datasets. The work in [ 40 ] fuses DCT-based and metadata-based features into a single CNN.

A two-dimensional CNN is instead used in [ 36 ] in order to learn discriminative representations of the extracted PRNU noise residuals, while in [ 35 ] such residual and DCT-based features are combined and fused through a novel deep learning framework ( FusionNet ).

4.5 Addressed tasks

The methods proposed for platform provenance analysis focus on different tasks related to the sharing history of the media object under investigation, concerning diverse kinds of information that can be of interest to aid the forensic analysis. The objectives of provenance analysis can be grouped as follows:

Identification of at least one sharing operation. Depending on the addressed application scenario, there might be no prior information at all on the object under investigation, including whether it was previously shared by means of any platform or not. Thus, a first useful information is to determine whether a sharing operation occurred through a (typically predefined) set of platforms, or whether the data comes directly from the acquisition device or offline editing tools.

Identification of the last sharing platform. Once a sharing operation is detected, thus it is determined that the content does not come natively from a device, it is of interest to identify which platform it was uploaded to. This task is addressed by most of the existing approaches. Although it cannot be excluded that more than one sharing operation was performed, provenance detectors generally identify the last platform that processed the data [ 2 , 34 ].

Reconstruction of multiple sharing operations. In this task, provenance detectors attempt to go beyond the last sharing and identify whether the data underwent more than one sharing operation. It is in fact a common scenario that an image is shared through a certain platform and then subsequently shared by the recipient through another platform [ 39 , 40 ].

Identification of the operating system of the sharing device. Gathering information on the hardware and software used in the sharing operation can be of interest in the forensics analysis, as it could aid the identification of the person who performed the sharing operation. In [ 39 ], it is shown that different operating systems leave distinct traces in the metadata of images shared through popular messaging apps, and can then be identified. Similarly, the authors in [ 37 ] observe that JPEG headers of shared images can provide information on the software stack that processed them, while it is harder to get information on the hardware.

4.6 Summary and discussion

In order to provide a clearer overview, Table  4 summarizes the aspects discussed in previous sections, by reporting condensed information for each proposed method. Moreover, Table  5 reports the specific web platforms and SNs included in the analysis of each different method, thus highlighting the diversity of data involved in this kind of studies.

This body of work has exposed for the first time important findings on the effect of sharing operations, and the possibility of effectively identifying their traces and infer useful information. In order to provide a quantitative overview of the methods’ capabilities, we report in Fig.  4 selected comparative results from the recent approaches [ 34 – 36 ] on available datasets for the task of identifying the last sharing platform. It emerges that state-of-the-art approaches yield satisfying accuracy, although in rather controlled experimental scenarios.

figure 4

Accuracy of different state-of-the-art approaches on the task of identifying the last sharing platform, as reported in the respective papers. The left barplot refers to the IPLAB dataset while the right one to the UCID Social dataset, and the analysis is performed on individual 64×64 patches

In fact, while these studies revealed many opportunities for platform provenance analysis, substantial open issues exist and represent challenges for future investigations. First, we can observe that all the proposed approaches are purely inductive, i.e., no theoretical tools are used to characterize specific operations, apart from possible preprocessing steps before feeding a supervised ML model. Therefore, the reliability of the developed detectors strongly rely on the quality of the produced training data, which need to be representative enough for the model to correctly analyze data at inference phase.

Related to that, it is hard to predict the generalization ability of the current detectors when unseen data are analyzed at inference phase. In fact, many factors exist that can induce data variability within the same class, and are currently mostly overlooked. For instance, the traces left by a certain platform or operating system are not constant over time (as observed in [ 37 ]), but they might change from version to version. Also, the process of uploading and downloading data to/from platforms is not standardized but can be performed through different tools and pipelines: from mobile/portable devices or computers, using platform-specific APIs or browser functionalities. As a result, a potential class “Shared with Facebook” in a provenance-related task should include many processing variants, for which data need to be collected.

A possible way to alleviate these issues would be to further investigate which component of the software stack (e.g., the use of a specific library) actually leaves the most distinctive traces in the object, and at which point in the overall processing pipeline this happens. For instance, previous studies on JPEG forensics [ 43 , 44 ] have shown that different libraries for JPEG compression leave specific traces, especially detectable in high quality images. This would help in establishing principled ways to predict whether a further processing variant would impact on the traces used in the provenance analysis, but would likely require to reverse engineer proprietary software.

Moreover, as we previously pointed out, it is worth recalling that the platform provenance analysis of videos based on signal properties is essentially unexplored, thus representing a relevant open problem for future investigations. On the other hand, a container-based analysis has been applied in [ 2 , 23 ].

More generally, studies such as [ 2 , 23 , 39 , 40 ] substantially reinforced the role of metadata and format-based cues, which were only marginally considered in multimedia forensics in favor of signal-based approaches but represent a valuable asset for platform provenance identification tasks.

Lastly, we observe that the “platform provenance analysis” as defined here is distinct from the problem of “provenance analysis” as formulated in [ 45 – 47 ], which is rather related to the issues described in the following Section 5 . In provenance analysis, a whole set of media object is analyzed, with the goal of understanding the relationships (in terms of types and parameters of transformations) between a set of semantically similar samples and reconstructing a phylogeny graph, thus requiring a substantially different approach. On the other hand, in platform provenance analysis a single object is associated to one or more sharing operations based on a set of objects (not necessarily content-wise similar) that underwent those sharing operations.

5 Multimodal verification analysis

In addition to entertainment purposes (e.g., video streaming services), images and videos typically appear in web pages and platform in conjuction with some form of textual information, which increases their communication - and potentially misinformation - strengths. In fact, the problem of false information originating and circulating on the Web is well recognized [ 48 ], and different non-exclusive categories of false information can be identified, including hoaxes, rumors, biased, or completely fake (i.e., fabricated) information.

Visual media can have a key role in supporting the dissemination of these forms of misinformation when coupled with a textual descriptive component, as it happens in popular web channels like online newspapers, social networks, blogs, forums. Therefore, there is a strong interest in developing techniques that can provide indications on the credibility of these information sources in a fully or semi-automatic manner, ideally detecting real-time whether unreliable information is about to be disseminated [ 49 ].

The analysis of images and videos can be functional to assess the credibility of composite objects , i.e., pieces of information that contain a textual component, one or more associated media objects, and optional metadata. Examples are given by online news, social media posts, blog articles. In this case, the problem is referred to as multimedia verification [ 50 ], which is a wide and challenging field that spans several disciplines, from multimedia analysis and forensics to data mining and natural language processing. In a multimedia verification analysis a high variety of factors is involved, for which no rigorous taxonomy is found in the literature. However, different approaches have been recently investigated to characterize patterns of manipulated visual and textual information.

In this context, an inherent difficulty is that the composite objects can be misleading in various ways. In fact, not only images and videos can be semantically manipulated or depict synthetic content (e.g., GAN-based imagery): they can also be authentic but used in the wrong context, i.e., associated to the wrong event, perhaps with incorrect geo-temporal information (Fig.  5 ).

figure 5

Examples of composite objects containing misleading content. Top: forged image shared online in relation to the Hurricane Sandy in 2012 [ 51 ]. Bottom: pictures of vietnamese siblings, erroneously posted in relation to the earthquake in Nepal in 2015 [ 56 ]

For this reason, most of the approaches resort to a multimodal representation of the analyzed composite object, where different kinds of information are processed together and typically fed to some kind of machine learning classifier or decision fusion system. This includes:

Visual cues: the visual component of the composite object (e.g., the images attached to a Tweet or to an online news), intended as signal and attached metadata;

Textual cues: the textual component of the composite object (e.g., the body of a Tweet or an online news, including hashtags, tags);

Propagation cues: metadata related to the format and dissemination of the composite object through the platform it belongs to (e.g., number and ratio of images per post, number of retweets/reposting, number of comments);

User cues: metadata related to the profile of the posting user (e.g., number of friends/followers, account age, posting frequency, presence of personal information and profile picture).

A number of approaches have addressed the problem of verifying composite objects by relying only on text or categorical data (i.e., textual information, propagation information, user information) and discarding from their analysis the visual component [ 51 – 55 ]. However, in this survey we focus on techniques that explicitly incorporate visual cues in their approach and process the corresponding signal.

We first differentiate the methods according to the available information they utilize in their analysis. In fact, in order to automatically verify composite objects, some kind of prior knowledge needs to be built on a set of examples and then be tested on unseen data. Thus, dedicated datasets have been developed for this purpose and represent the starting point for many of the reviewed studies. Relevant examples are given by the datasets developed for the “Verifying Multimedia Use task” (VMU) Footnote 2 of the MediaEval Benchmark Footnote 3 in 2015 and 2016 containing a collection of tweets, and the dataset collected in [ 57 ] through the official rumor busting system of the popular chinese microblog Sina Weibo.

A group of methods perform verification by solely relying on the cues extracted from the composite object under investigation and from one or more of these reference data corpora (typically used for training machine learning models), and those are reviewed in Section 5.1 .

Other approaches complement the information provided by the analyzed object and datasets by dynamically collecting additional cues from the web. For instance, they retrieve textually related webpages or similar images through the use of search engines for both text and visual components (e.g., Google search, Google Image search, Footnote 4 Tineye Footnote 5 ). Those methods are reported in Section 5.2 .

Finally, in Section 5.3 we focus on the line of research which addresses specifically the detection of media objects that are not manipulated but wrongly associated to the topic or event treated in the textual and metadata component of the composite object they belong (i.e., media repurposing ).

5.1 Methods based on a reference dataset

The work in [ 56 ] proposes an ensemble verification approach that merges together propagation cues, user cues, and visual cues based on image forensics methods. Starting from the data provided in the VMU2016, the authors process the maps provided by the algorithm in [ 58 ] for the detection of double JPEG artifacts by extracting statistical features. Two separate classifiers treat forensic-based features and textual/user cues, and an agreement-based retraining procedure is used to correctly fuse their outcome and express a decision (fake, real, or unknown) about each tweet.

In [ 57 ], the structure of the data corpus (which is based on different events) is considered to construct a number of features computed on each image, that are intended to describe characteristics of the image distribution and reveal distinctive pattern in social media posts. Inspired by previous work in image retrieval, the authors introduce a visual clarity score, a visual coherence score, a visual similarity distribution histogram, a visual diversity score, which together express how images are distributed among the same or different events. Such values are then combined with propagation-based features on the posts through different classifiers (SVM, Logistic Regression, KStar, Random Forests).

Recently, deep learning approaches have been employed for this problem. In [ 59 ], the authors aim at extracting event-invariant features that can be used to discriminate between reliable and unreliable composite objects, and to handle newly emerged events in addition to the ones used in training. To this purpose, they attempt to remove the dissimilarities of the feature representations among different events by letting a feature-extraction network compete with an event discriminator network.

The work in [ 60 ] employs Recurrent Neural Network (RNN) strategies to process visual-based information extracted through a pre-trained VGG-19. An attention mechanism is used for training, and textual-based and propagation-based are also incorporated in the model.

In order to capture correlations between different modes, in [ 61 ] it is proposed to train a variational autoencoder that separately encodes and decodes textual and visual information, and use multimodal encoded representation for classifying composite objects.

Lastly, the work in [ 62 ] rely only on visual information but trains in parallel different CNNs operating both in the pixel domain and in the frequency domain. The authors in fact conjecture that frequency-based features can capture different image qualities and compressions potentially due to repeated upload and download from multiple platforms, while pixel-based features can express semantic characteristics of images belonging to fake composite objects.

Since most of them address the VMU2016 dataset, which comes with predefined experimental settings and metrics, we can report a comparative overview of the results obtained by the different methods on the same data in Table  6 .

5.2 Methods based on web-searched information

Due to the abundance of constantly updated data, the web can constitute a valuable source of information to aid the verification analysis.

The work in [ 63 ] targets the detection of online news containing one or more images that have been edited. To this purpose, starting from a single analyzed online news, a system is proposed that performs textual and visual web searches and provides a number of other online news that are related to the same topic and contain visually similar images. The latter can be successively compared with the original ones in order to discover possible visual inconsistencies. A further step is taken in [ 65 ], where a methodology to automatically evaluate the authenticity and possible alterations of the retrieved images is proposed.

In [ 66 ], a number of textual features are extracted from the outcome of a web-based search performed on the keywords of the event represented in the analyzed post, and on its associated media objects. Visual features from multimedia forensics are also extracted (namely double JPEG features [ 58 ], grid artifacts features [ 67 ], and Error Level Analysis Footnote 6 ) and jointly processed through logistic regressors and random forest classifiers. This approach has been extended in [ 68 ] by incorporating textual features used in sentiment analysis, and in [ 69 ] by exploiting additional advanced forensic visual features provided by the Splicebuster tool [ 70 ]. Moreover, these works are tested on datasets containing different kinds of composite objects, such as Tweets, news articles collected on Buzzfeed and Google News.

5.3 Methods for detecting media repurposing

While the methods previously discussed target the detection of generic manipulations in the visual component of composite objects, a number of approaches focus on the detection of re-purposed media content. Therefore, they do not search for tampering operations in the visual content, but rather for situations where authentic media are used in the wrong context, i.e., incorrectly referred to certain events and discussion topics.

In [ 71 ], this problem is tackled by resorting to a deep multimodal representation on composite objects, which allows for the computation of a consistency score based on a reference training dataset. To this purpose, the authors create their own dataset of images, captions and other metadata downloaded from Flickr, and also test their approach on existing datasets like Flickr30K and MS COCO. A larger and more realistic dataset called MEIR (Multimodal Entity Image Repurposing) Footnote 7 is then collected in [ 72 ], where an improved multimodal representation is proposed and a novel architecture is designed to compare the analyzed composite object with a set of retrieved similar objects.

A peculiar approach is proposed in [ 73 ] and improved in [ 74 ], where the authors verify the claimed geo-location of outdoor images by estimating the position of the sun in the scene through illumination and shadow effect models. By doing so, they can compare this estimation with the one computed through astronomical procedures starting from the claimed time and location of the picture.

Recently, there has been increasing interest in event-based verification (i.e., the problem of determining whether a certain media object correctly refers to the claimed event), for which specific challenges have also been organized by NIST as part of the DARPA MediFor project. Footnote 8 In this context, the work in [ 75 ] explores different strategies to apply CNNs for the analysis of possibly re-purposed images. Several pre-trained and fine-tuned networks are compared by extracting features at different layers of the networks, showing that deeper representations are generally more effective for the desired task.

Lastly, the work in [ 76 ] addresses the typical lack of training data for repurposing detection by proposing an Adversarial Image Repurposing Detection (AIRD) method which does not need repurposing examples for being trained but only real-world authentic examples. AIRD aims at simulating the interplay between a counterfeiter and a forensic analyst through training adversarially two competing neural networks, one generating deceptive repurposing examples and the other discriminating them from real ones.

5.4 Summary and discussion

To summarize, the body of work presented in this Section faces the problem of multimedia verification, tackled only in recent years by the research community. Here, credibility of composite objects (pieces of information that contain a textual component associated to the media objects) is assessed, allowing to expand the forensic analysis to new challenging scenarios like online news and social media posts.

We described all types of approaches including visual cues in the analysis and processing the relevant signal. We clustered techniques depending on the information exploited: solely relying on the cues extracted from the composite object and from one or more reference dataset, or including additional cues collected exploiting retrieval techniques on the web. Finally, we reviewed algorithms specifically addressing the detection of media repurposing, where media objects are wrongly associated to the described topic or event.

One major challenge in this context is the scarcity of representative and populated datasets, due to the difficulty of collecting realistic data. A reason for this is that recovering realistic examples of rumors or news articles providing de-contextualized media objects is highly challenging and time-consuming, also due to the fact that such composite objects have very short life online. As a result, the risk of overfitting should be carefully accounted for.

Another open issue is the interpretability of the detection tools. Indeed, in this scenario it is often hard to understand which kind of information learning-based system are actually using for providing their outcomes. This is also due to the intrinsic difficulty of the problem, which requires to characterize many different aspects appearing in misleading content. A comprehensive tool providing a reliable analysis on a given media object under investigation is in fact not yet available. An example of the tools currently at disposal is the Reveal Image Verificaton assistant, Footnote 9 which only provides a set of maps corresponding to different methodologies applied to the test image.

Again, it is also evident that multimodal video verification is strongly underdeveloped, and no data corpora is nowadays available for this task. Very few approaches were presented for synchronization [ 77 ] and human-based verification [ 78 , 79 ], but signal-based detection is still a challenging open issue.

In this section, we report an annotated list of the publicly available datasets for media forensics on shared data, with reference to the specific area for which they are created (i.e., forensics analysis, platform provenance or verification analysis). Those are summarized in Table  7 . In the first column, the name of each dataset is reported, together with the link for the download (if available). The considered SNs are explicitly stated together with the number of sharing to which images or video are subjected to. An indication of the numerosity of the dataset is also provided with a specification of the devices used.

Datasets built for forensic analysis and/or platform provenance analysis share similar characteristics. VISION [ 15 ] is the most widely employed dataset for the source camera identification problem in a whole, and is also used for platform provenance tests. The FLICKR UNICAMP [ 13 ] and SDRG [ 22 ] datasets have been also proposed with regards to perfect knowledge methods and to limited and zero knowledge methods respectively. Comprehensive datasets to support various forensics evaluation tasks are the Media Forensics Challenge (MFC) [ 80 ] dataset with 35 million internet images and 300,000 video clips and the Fake Video Corpus (FVC) [ 81 ] that exploits three different social networks. Recently a new dataset has been proposed, the Forchheim Image Database (FODB) [ 16 ]. It consists of more than 23,000 images of 143 scenes by 27 smartphone cameras. Each image is provided in the original camera-native version, and five copies from social networks.

In relation to the platform provenance analysis the types of datasets used are more various. The VISION dataset is still used together with MICC UCID social, MICC PUBLIC social [ 32 ], and UNICT-SNIM [ 38 ]. All of the datasets listed above consider only one sharing throughout various social networks and instant messaging applications.

More recent datasets, like ISIMA [ 39 ] and MICC multiple UCID [ 35 ], contain images shared two times and R-SMUD, V-SMUD [ 40 ] include pictures up to 3 sharings. Images used for these datasets are either acquired personally or taken in their original version from existing datasets. Moreover, data are collected with little attention to the visual content of the shared pictures, as the analysis focuses on properties that are largely content-independent.

As opposed to that, datasets for multimodal verification analysis (such as VMU [ 51 ], Weibo [ 57 ], MEIR [ 72 ]) are built by carefully selecting the visual and textual content, typically requiring manual selection. A common approach in these corpora is to collect data related to selected events (e.g., in VMU 2016 we find “Boston Marathon bombing,” “Sochi olympics,” “Nepal earthquake”), so that cluster of composite objects related to the same topic are created. Also, images and text descriptions are generally crawled from web platforms and, for the case of Weibo [ 57 ], fact checking platforms are used to gather composites objects related to hoaxes. While images are typically shared multiple times and possibly through different platforms, their sharing history is not thoroughly documented as in platform provenance analysis.

7 Conclusions and outlook

In this survey we have described the literature about digital forensic analysis of multimedia data shared through social media or web platforms. Works have been organized into three main classes, corresponding to the different processing considered in the digital life of a media object shared online and evidenced with three different colors in Fig.  1 : forensics techniques performing source identification and integrity verification on media uploaded on social networks; platform provenance analysis methodologies allowing to identify sharing platforms both in case of single or multiple sharing; and multimedia verification algorithms assessing the credibility of composite (text + media) objects. Challenges related to the single sub-problems were already revised at the end of relevant sections, while here we highlight the common open issues still requiring effort from the research community, thus providing possible directions for future works.

Just like it happened for the vast majority of computer vision and information processing problems, approaches based on Deep Neural Networks (DNNs) now dominate the field of multimedia forensics. In fact, they proved to deliver significantly superior performance, provided that a number of requirements for their training and deployment are met. In this context, the use of DNNs represents the most promising research direction for the forensic analysis of digital images and they have been also recently applied to spatio-temporal data (e.g., videos). Nevertheless, current approaches and solutions suffer from several shortcomings, that compromise their reliability and feasibility in real-world applications like the ones tackled in this survey. This includes the need of large amounts of good quality training data, which typically requires a time-consuming data collection phase, in particular in the context of shared media objects.

Indeed, a major challenge is the need to create even more comprehensive and un-biased realistic data corpora, able to capture the diversity of the shared media (and composite) objects. This, coupled with more theoretical works able to characterize specific operations happening in the sharing process, could support the generalization ability of the detectors when unseen data are analyzed.

Moreover, although research effort in this area has been increasingly devoted in the recent years, another important aspect is that the forensic analysis of digital videos currently lies at a much less advanced stage than for still images, thus representing a relevant open problem for future investigations. This is a crucial issue, since digital videos strongly contribute to the viral diffusion of information through social media and web channels, and nowadays play a fundamental role in the digital life of individuals and societies. Advances in artificial intelligence and computer graphics made media manipulation technologies widely accessible and easy-to-use, thus opening unprecedented opportunities for visual misinformation effects and urgently motivating a boost of forensic techniques for digital videos.

At a higher level, a consideration clearly emerging from our literature survey is that the forensic analysis of multimedia data circulating through web channels poses a number of new issues, and will represent an increasingly complex task. First, one questions whether a hard binary classification as “real” or “manipulated” is still representative enough when dealing with such a variety of possible different manipulations and digital histories. The definition of authenticity becomes in fact variegated, depending on the targeted applications. Arguably, systems with the ambition of treating web multimedia data will either narrow down the scenarios to strict definitions, or envision more sophisticated authenticity indicators expressing in some form different information on the diverse aspects of the object under investigation. This will likely encompass the application of many different tools possibly spanning multiple disciplines, whose synergy could be the key for advancing the field in the next future.

Concerning multimedia analysis, the design of signal-processing-oriented methods on top of data-driven AI techniques could mitigate part of the current shortcomings affecting deep learning-based approaches, such as the need of high data amount needed for training and the low interpretability of the outcomes. More generally, it is clear that a powerful analysis of other forms of information (e.g., text, metadata) can strongly aid the multimedia analysis and provide more complete indications of semantic authenticity, thus calling in the future for stronger connections between research in multimedia forensics, data mining, and natural language processing.

Availability of data and materials

Not applicable.

Declarations

https://www.kaggle.com/c/sp-society-camera-model-identification

http://www.multimediaeval.org/mediaeval2016/verifyingmultimediause/

http://www.multimediaeval.org/

https://images.google.com/

https://tineye.com/

http://fotoforensics.com/tutorial-ela.php

https://github.com/Ekraam/MEIR

https://www.nist.gov/itl/iad/mig/media-forensics-challenge-2019-0

http://reveal-mklab.iti.gr/reveal/

R. Böhme, F. C. Freiling, T. Gloe, M. Kirchner, in Computational Forensics , ed. by Z. J. M. H. Geradts, K. Y. Franke, and C. J. Veenman. Multimedia forensics is not computer forensics (SpringerBerlin, Heidelberg, 2009), pp. 90–103.

Chapter   Google Scholar  

M. Iuliani, D. Shullani, M. Fontani, S. Meucci, A. Piva, A video forensic framework for the unsupervised analysis of mp4-like file container. IEEE Trans. Inf. Forensic Secur. 14 (3), 635–645 (2019).

Article   Google Scholar  

S. Chen, A. Pande, K. Zeng, P. Mohapatra, Live video forensics: Source identification in lossy wireless networks. IEEE Trans. Inf. Forensic Secur. 10 (1), 28–39 (2015).

A. M. Rafi, U. Kamal, R. Hoque, A. Abrar, S. Das, R. Laganière, M. K. Hasan, Application of Densenet in camera model identification and post-processing detection. arXiv preprint 1809.00576 (2018).

J. Lukas, J. Fridrich, M. Goljan, Digital camera identification from sensor pattern noise. IEEE Trans. Inf. Forensic Secur. 1 (2), 205–214 (2006).

W. van Houten, Z. Geradts, Source video camera identification for multiply compressed videos originating from youtube. Digit. Investig. 6 (1), 48–60 (2009).

A. Castiglione, G. Cattaneo, M. Cembalo, U. Ferraro Petrillo, Experimentations with source camera identification and online social networks. J. Ambient Intell. Humanized Comput. 4 (2), 265–274 (2013).

S. Taspinar, M. Mohanty, N. Memon, Camera fingerprint extraction via spatial domain averaged frames. arXiv preprint arXiv:1909.04573 (2019).

E. K. Kouokam, A. E. Dirik, Prnu-based source device attribution for youtube videos. Digit. Investig. 29: , 91–100 (2019).

Y. Quan, X. Lin, C. -T. Li, in Data Mining , ed. by R. Islam, Y. S. Koh, Y. Zhao, G. Warwick, D. Stirling, C. -T. Li, and Z. Islam. Provenance analysis for instagram photos (SpringerSingapore, 2018), pp. 372–383.

Google Scholar  

M. Iuliani, M. Fontani, D. Shullani, A. Piva, Hybrid reference-based video source identification. Sensors. 19 (3), 649 (2019).

F. Bertini, R. Sharma, A. Iannì, D. Montesi, in International Database Engineering & Applications Symposium . Profile resolution across multilayer networks through smartphone camera fingerprint, (2015), pp. 23–32.

P. R. Mendes Júnior, L. Bondi, P. Bestagini, S. Tubaro, A. Rocha, An in-depth study on open-set camera model identification. IEEE Access. 7: , 180713–180726 (2019).

A. Kuzin, A. Fattakhov, I. Kibardin, V. I. Iglovikov, R. Dautov, in 2018 IEEE International Conference on Big Data (Big Data) . Camera model identification using convolutional neural networks (IEEENew York, 2018), pp. 3107–3110.

D. Shullani, M. Fontani, M. Iuliani, O. A. Shaya, A. Piva, Vision: a video and image dataset for source identification. EURASIP J. Inf. Secur. 2017 (1), 1–16 (2017).

B. Hadwiger, C. Riess, The Forchheim image database for camera identification in the wild. arXiv preprint 2011.02241 (2020).

A. M. Rafi, T. I. Tonmoy, U. Kamal, Q. M. J. Wu, M. K. Hasan, Remnet: Remnant convolutional neural network for camera model identification. arXiv preprint 1902.00694 (2020).

M. Tan, Q. Le, in Proceedings of the 36th International Conference on Machine Learning , 97. EfficientNet: Rethinking model scaling for convolutional neural networks, (2019), pp. 6105–6114.

F. Marra, G. Poggi, C. Sansone, L. Verdoliva, Blind PRNU-based image clustering for source identification. IEEE Trans. Inf. Forensic Secur. 12 (9), 2197–2211 (2017).

R. Rouhi, F. Bertini, D. Montesi, X. Lin, Y. Quan, C. Li, Hybrid clustering of shared images on social networks for digital forensics. IEEE Access. 7: , 87288–87302 (2019).

O. Mayer, M. C. Stamm, Forensic similarity for digital images. arXiv preprint 1902.04684 (2019).

R. Rouhi, F. Bertini, D. Montesi, C. Li, in IEEE International Workshop on Biometrics and Forensics (IWBF) . Social network forensics through smartphones and shared images (IEEENew York, 2019), pp. 1–6.

P. Yang, D. Baracchi, M. Iuliani, D. Shullani, R. Ni, Y. Zhao, A. Piva, Efficient video integrity analysis through container characterization. IEEE J. Sel. Top. Sig. Process. 14 (5), 947–54 (2020).

R. Ramos López, E. Almaraz Luengo, A. L. Sandoval Orozco, L. J. G. Villalba, Digital video source identification based on container’s structure analysis. IEEE Access. 8: , 36363–36375 (2020).

O. Mayer, M. C. Stamm, Exposing Fake Images With Forensic Similarity Graphs. IEEE J. Sel. Top. Sig. Process. 14 (5), 1049–1064 (2020).

M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, in IEEE International Conference on Multimedia Expo Workshops (ICMEW) . Detecting image splicing in the wild (web), (2015), pp. 1–6.

M. Zampoglou, S. Papadopoulos, Y. Kompatsiaris, Large-scale evaluation of splicing localization algorithms for web images. Multimed. Tools Appl. 76 (4), 4801–4834 (2017).

X. Jiang, S. Wei, R. Zhao, R. Liu, Y. Zhao, Y. Zhao, in Image and Graphics . A visual perspective for user identification based on camera fingerprint (SpringerCham, 2019), pp. 52–63.

M. Kirchner, C. Johnson, in IEEE International Workshop on Information Forensics and Security (WIFS) . SPN-CNN: boosting sensor-based source camera attribution with deep learning (IEEENew York, 2019), pp. 1–6.

L. Verdoliva, Media forensics and deepfakes: an overview. IEEE J. Sel. Top. Sig. Process. 14 (5), 910–932 (2020). in press.

S. Agarwal, H. Farid, Y. Gu, M. He, K. Nagano, H. Li, in IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops . Protecting world leaders against deep fakes (IEEENew York, 2019).

R. Caldelli, R. Becarelli, I. Amerini, Image origin classification based on social network provenance. IEEE Trans. Inf. Forensic Secur. 12 (6), 1299–1308 (2017).

M. Moltisanti, A. Paratore, S. Battiato, L. Saravo, in International Conference on Image Analysis and Processing . Image manipulation on facebook for forensics evidence (SpringerCham, 2015), pp. 506–517.

I. Amerini, T. Uricchio, R. Caldelli, in IEEE Workshop on Information Forensics and Security (WIFS) . Tracing images back to their social network of origin: A CNN-based approach (IEEENew York, 2017), pp. 1–6.

I. Amerini, C. -T. Li, R. Caldelli, Social network identification through image classification with CNN. IEEE Access. 7: , 35264–35273 (2019).

R. Caldelli, I. Amerini, C. T. Li, in European Signal Processing Conference (EUSIPCO) . PRNU-based image classification of origin social network with CNN (IEEENew York, 2018), pp. 1357–1361.

P. Mullan, C. Riess, F. Freiling, Forensic source identification using jpeg image headers: The case of smartphones. Digit. Investig. 28: , 68–76 (2019).

O. Giudice, A. Paratore, M. Moltisanti, S. Battiato, in Image Analysis and Processing - ICIAP 2017 . A classification engine for image ballistics of social data (SpringerCham, 2017), pp. 625–636.

Q. Phan, C. Pasquini, G. Boato, F. G. B. De Natale, in IEEE International Workshop on Multimedia Signal Processing (MMSP) . Identifying image provenance: An analysis of mobile instant messaging apps (IEEENew York, 2018), pp. 1–6.

Q. Phan, G. Boato, R. Caldelli, I. Amerini, in IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) . Tracking multiple image sharing on social networks (IEEENew York, 2019), pp. 8266–8270.

A. Mazumdar, J. Singh, Y. S. Tomar, P. K. Bora, in Pattern Recognition and Machine Intelligence . Detection of image manipulations using siamese convolutional neural networks (SpringerCham, 2019), pp. 226–233.

W. Sun, J. Zhou, in Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC) . Image origin identification for online social networks (osns) (IEEENew York, 2017), pp. 1512–1515.

B. Lorch, C. Riess, in ACM Workshop on Information Hiding and Multimedia Security (IH&MMSec’19) . Image forensics from chroma subsampling of high-quality JPEG images (ACMNew York, 2019).

C. Pasquini, R. Bohme, in IEEE International Conference on Image Processing (ICIP) . Towards a theory of jpeg block convergence (IEEENew York, 2018), pp. 550–554.

D. Moreira, A. Bharati, J. Brogan, A. Pinto, M. Parowski, K. W. Bowyer, P. J. Flynn, A. Rocha, W. J. Scheirer, Image provenance analysis at scale. IEEE Trans. Image Process. 27 (12), 6109–6123 (2018).

Article   MathSciNet   Google Scholar  

A. Bharati, D. Moreira, P. Flynn, A. Rocha, K. Bowyer, W. Scheirer, Learning transformation-aware embeddings for image forensics. arXiv preprint 2001.04547 (2020).

A. Bharati, D. Moreira, J. Brogan, P. Hale, K. Bowyer, P. Flynn, A. Rocha, W. Scheirer, in IEEE Winter Conference on Applications of Computer Vision (WACV) . Beyond pixels: Image provenance analysis leveraging metadata (IEEENew York, 2019), pp. 1692–1702.

S. Zannettou, M. Sirivianos, J. Blackburn, N. Kourtellis, The web of false information: Rumors, fake news, hoaxes, clickbait, and various other shenanigans. J. Data Inf. Qual. 11 (3), 1–37 (2019).

J. Cao, P. Qi, Q. Sheng, T. Yang, J. Guo, J. Li, in Disinformation, Misinformation, and Fake News in Social Media . Exploring the role of visual content in fake news detection (SpringerNew York, 2020).

C. Boididou, S. Papadopoulos, D. T. Dang Nguyen, G. Boato, M. Riegler, A. Petlund, I. Kompatsiaris, in Proceedings of CEUR Workshop . Verifying multimedia use at mediaeval 2016, (2016).

C. Boididou, S. Papadopoulos, M. Zampoglou, L. Apostolidis, O. Papadopoulou, Y. Kompatsiaris, Detection and visualization of misleading content on twitter. Int. J. Multimed. Inf. Retr. 7 (1), 71–86 (2018).

A. Gupta, H. Lamba, P. Kumaraguru, A. Joshi, in International Conference on World Wide Web. WWW ’13 Companion . Faking Sandy: Characterizing and identifying fake images on twitter during hurricane Sandy, (2013), pp. 729–736.

C. Boididou, S. Papadopoulos, Y. Kompatsiaris, S. Schifferes, N. Newman, in International Conference on World Wide Web . Challenges of computational verification in social multimedia, (2014), pp. 743–748.

C. Maigrot, V. Claveau, E. Kijak, in IEEE/WIC/ACM International Conference on Web Intelligence (WI) . Fusion-based multimodal detection of hoaxes in social networks (ACMNew York, 2018), pp. 222–229.

F. Yang, Y. Liu, X. Yu, M. Yang, in ACM SIGKDD Workshop on Mining Data Semantics . Automatic detection of rumor on sina weibo (ACMNew York, 2012).

C. Boididou, S. E. Middleton, Z. Jin, S. Papadopoulos, D. Dang-Nguyen, G. Boato, Y. Kompatsiaris, Verifying information with multimedia content on Twitter - A comparative study of automated approaches. Multimed. Tools Appl. 77 (12), 15545–15571 (2018).

Z. Jin, J. Cao, Y. Zhang, J. Zhou, Q. Tian, Novel visual and statistical image features for microblogs news verification. IEEE Trans. Multimed. 19 (3), 598–608 (2017).

T. Bianchi, A. Piva, Image forgery localization via block-grained analysis of JPEG artifacts. IEEE Trans. Inf. Forensic Secur. 7 (3), 1003–1017 (2012).

Y. Wang, F. Ma, Z. Jin, Y. Yuan, G. Xun, K. Jha, L. Su, J. Gao, in ACM SIGKDD International Conference on Knowledge Discovery & Data Mining . Eann: Event adversarial neural networks for multi-modal fake news detection (ACMNew York, 2018), pp. 849–857.

Z. Jin, J. Cao, H. Guo, Y. Zhang, J. Luo, in ACM International Conference on Multimedia . Multimodal fusion with recurrent neural networks for rumor detection on microblogs (ACMNew York, 2017), pp. 795–816.

D. Khattar, J. S. Goud, M. Gupta, V. Varma, in The World Wide Web Conference . Mvae: Multimodal variational autoencoder for fake news detection, (2019), pp. 2915–2921.

P. Qi, J. Cao, T. Yang, J. Guo, J. Li, in IEEE International Conference on Data Mining . Exploiting multi-domain visual information for fake news detection (IEEENew York, 2019), pp. 518–527.

C. Pasquini, C. Brunetta, A. F. Vinci, V. Conotter, G. Boato, in IEEE International Conference on Multimedia Expo Workshops (ICMEW) . Towards the verification of image integrity in online news (IEEENew York, 2015), pp. 1–6.

A. Gupta, P. Kumaraguru, C. Castillo, P. Meier, in International Conference on Social Informatics (SOCINFO) . Tweetcred: a real-time web-based system for assessing credibility of content on Twitter (SpringerNew York, 2019), pp. 1–6.

S. Elkasrawi, A. Dengel, A. Abdelsamad, S. S. Bukhari, in IAPR Workshop on Document Analysis Systems (DAS) . What you see is what you get? Automatic image verification for online news content (ACMNew York, 2016), pp. 114–119.

Q. -T. Phan, A. Budroni, C. Pasquini, F. G. De Natale, in CEUR Workshop . A hybrid approach for multimedia use verification (CEURAachen, 2016).

W. Li, Y. Yuan, N. Yu, Passive detection of doctored JPEG image via block artifact grid extraction. Sig. Process. 89 (9), 1821–1829 (2009).

Article   MATH   Google Scholar  

F. Lago, Q. Phan, G. Boato, in IEEE International Workshop on Multimedia Signal Processing (MMSP) . Image forensics in online news (IEEENew York, 2018), pp. 1–6.

F. Lago, Q. -T. Phan, G. Boato, Visual and textual analysis for image trustworthiness assessment within online news. Secur. Commun. Netw. (2019).

D. Cozzolino, G. Poggi, L. Verdoliva, in IEEE International Workshop on Information Forensics and Security (WIFS) . Splicebuster: A new blind image splicing detector (IEEENew York, 2015), pp. 1–6.

A. Jaiswal, E. Sabir, W. AbdAlmageed, P. Natarajan, in ACM International Conference on Multimedia . Multimedia semantic integrity assessment using joint embedding of images and text (ACMNew York, 2017), pp. 1465–1471.

E. Sabir, W. AbdAlmageed, Y. Wu, P. Natarajan, in Proceedings of the 26th ACM International Conference on Multimedia . Deep multimodal image-repurposing detection (ACMNew York, 2018), pp. 1337–1345.

P. Kakar, N. Sudha, Verifying temporal data in geotagged images via sun azimuth estimation. IEEE Trans. Inf. Forensic Secur. 7 (3), 1029–1039 (2012).

X. Li, X. Qu, W. Xu, S. Wang, Y. Tong, L. Luo, Validating the contextual information of outdoor images for photo misuse detection. arXiv preprint 1811.08951 (2018).

M. Goebel, A. Flenner, L. Nataraj, B. S. Manjunath, Deep learning methods for event verification and image repurposing detection. Electron. Imaging Media Watermarking Secur. Forensic. 2019 (5), 530–15307 (2019).

A. Jaiswal, Y. Wu, W. AbdAlmageed, I. Masi, P. Natarajan, in IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) . Aird: Adversarial learning framework for image repurposing detection (IEEENew York, 2019).

G. Pinheiro, M. Cirne, P. Bestagini, S. Tubaro, A. Rocha, in IEEE International Conference on Image Processing (ICIP) . Detection and synchronization of video sequences for event reconstruction (IEEENew York, 2019), pp. 4060–4064.

D. Teyssou, J. -M. Leung, E. Apostolidis, K. Apostolidis, S. Papadopoulos, M. Zampoglou, O. Papadopoulou, V. Mezaris, in First International Workshop on Multimedia Verification (MuVer) . The inVID plug-in: Web video verification on the browser (ACMNew York, 2017), pp. 23–30.

A. Axenopoulos, V. Eiselein, A. Penta, E. Koblents, E. La Mattina, P. Daras, A framework for large-scale analysis of video “in the wild” to assist digital forensic examination. IEEE Secur. Priv. 17 (1), 23–33 (2019).

H. Guan, M. Kozak, E. Robertson, Y. Lee, A. N. Yates, A. Delgado, D. Zhou, T. Kheyrkhah, J. Smith, J. Fiscus, in 2019 IEEE Winter Applications of Computer Vision Workshops (WACVW) . MFC datasets: Large-scale benchmark datasets for media forensic challenge evaluation (IEEENew York, 2019), pp. 63–72.

O. Papadopoulou, M. Zampoglou, S. Papadopoulos, I. Kompatsiaris, A corpus of debunked and verified user-generated videos. Online Inf. Rev. 43 (1) (2019).

VISION Dataset. https://lesc.dinfo.unifi.it/en/datasets . Accessed 16 Apr 2021.

SDRG Dataset. http://smartdata.cs.unibo.it/datasets#images . Accessed 16 Apr 2021.

MFC Dataset. https://mfc.nist.gov/ . Accessed 16 Apr 2021.

FVC Dataset. https://mklab.iti.gr/results/fake-video-corpus/ . Accessed 16 Apr 2021.

FODB Dataset. https://faui1-files.cs.fau.de/public/mmsec/datasets/fodb/ . Accessed 16 Apr 2021.

ISIMA Dataset. http://loki.disi.unitn.it/ISIMA/ . Accessed 16 Apr 2021.

IPLAB Dataset. https://iplab.dmi.unict.it/DigitalForensics/social_image_forensics/ . Accessed 16 Apr 2021.

MICC Dataset. http://lci.micc.unifi.it/labd/2015/01/trustworthiness-and-social-forensic/ . Accessed 16 Apr 2021.

G. Schaefer, M. Stich, in SPIE Storage and Retrieval Methods and Applications for Multimedia, vol. 5307 . Ucid: an uncompressed color image database (SPIEBellingham, 2004), pp. 472–480.

R-SMUD, V-SMUD Dataset. http://loki.disi.unitn.it/~rvsmud/ . Accessed 16 Apr 2021.

RAISE Dataset. http://loki.disi.unitn.it/RAISE/ . Accessed 16 Apr 2021.

VMU, 2016 Dataset. https://github.com/MKLab-ITI/image-verification-corpus . Accessed 16 Apr 2021.

E. Sabir, W. AbdAlmageed, Y. Wu, P. Natarajan, in ACM on Multimedia Conference . Deep multimodal image-repurposing detection (ACMNew York, 2018), pp. 1337–1345.

Download references

Acknowledgements

No acknowledgements to be reported.

This material is based upon work supported by the Defense Advanced Research Projects Agency (DARPA) under Agreement No. HR00112090136 and by the PREMIER project, funded by the Italian Ministry of Education, University, and Research (MIUR).

Author information

Authors and affiliations.

University of Trento, Via Sommarive 9, Trento, 38123, Italy

Cecilia Pasquini & Giulia Boato

Sapienza University of Rome, Via Ariosto 25, Roma, 00185, Italy

Irene Amerini

You can also search for this author in PubMed   Google Scholar

Contributions

CP designed the focus and structure of the manuscript, in consultation with IA and GB. CP, IA, and GB individually carried out a literature search on the selected topics and identified relevant contributions to be reviewed. They together formalized overall achievements, limitations, and open challenges of the state of the art in the field. All co-authors contributed in writing the manuscript and have approved the submitted version.

Corresponding authors

Correspondence to Cecilia Pasquini or Giulia Boato .

Ethics declarations

Competing interests.

The authors declare that they have no competing interests.

Additional information

Publisher’s note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Pasquini, C., Amerini, I. & Boato, G. Media forensics on social media platforms: a survey. EURASIP J. on Info. Security 2021 , 4 (2021). https://doi.org/10.1186/s13635-021-00117-2

Download citation

Received : 05 October 2020

Accepted : 23 March 2021

Published : 01 May 2021

DOI : https://doi.org/10.1186/s13635-021-00117-2

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Media forensics
  • Social media
  • Platform provenance analysis
  • Media verification

social media forensics case study

ticktechtold_tTt_logo

7 Real-Life Cases Solved Using Digital Forensics [References]

Today, we will dive into the fascinating world of real-life cases that digital forensics technology has helped to crack open.

So, buckle up and get ready for a thrilling journey through 7 real-life cases that digital forensics technology helped solve .

Digital forensics is vital for law enforcement, private investigators, and even corporations looking to protect their digital assets.

Case 1: The BTK Serial Killer

Get ready because we’re diving into one of American history’s most infamous criminal cases.

Profiling the Killer

The killer got his nickname, “BTK,” from his chilling method of operation: Bind, Torture, Kill.

Digital forensics experts were able to recover deleted data from the disk, which led them to a computer at a local church.

And as technology continues to advance, it’s becoming increasingly essential for investigators to develop their digital forensics skills .

But that’s just the tip of the iceberg. Let’s move on to our next case, where digital forensics played a crucial role in bringing terrorists to justice.

Case 2: The Boston Marathon Bombing

Two homemade bombs detonated near the finish line of the Boston Marathon, killing three people and injuring hundreds more.

In the days following the attack, law enforcement launched a massive manhunt to capture the suspects, using every resource available to them.

Surveillance footage, cellphone data, and social media activity were all analyzed using advanced digital forensics techniques.

Ultimately, digital forensics helped investigators to apprehend Dzhokhar Tsarnaev, who was later convicted and sentenced to death. His brother, Tamerlan, was killed during a police shootout.

Case 3: Catching the Catfish

The internet can be a fantastic place to connect with people worldwide, but it can also be a breeding ground for deception and malicious intent.

But as their relationship progressed, Sarah started to feel that something wasn’t quite right. She decided to hire a private investigator, who soon discovered that “Chris” was not who he claimed to be.

By examining the EXIF metadata of the photos, the investigator was able to determine that they had been manipulated, and the phone number “Chris” had been using was linked to several other catfishing schemes.

This case is a prime example of how digital forensics can be used to solve serious crimes and help everyday people protect themselves from online deception.

Case 4: The Murder of Laci Peterson

The case took several twists and turns, but ultimately, digital forensics helped build a case against her husband, Scott Peterson.

Investigators used digital forensics to analyze Scott’s computer, cellphone records, and GPS data, which painted a damning picture of his movements and activities before and after Laci’s disappearance.

Experts created a detailed digital reconstruction of the crime scene, which helped the jury visualize and understand the complex timeline of events leading up to Laci’s murder.

The Laci Peterson case highlights the power of digital forensics in providing key evidence that can sway a jury and ensure that justice is served.

Case 5: The Disappearance of Madeleine McCann

Despite countless leads and extensive investigations, Madeleine has never been found. However, digital forensics has played an essential role in the ongoing search for answers.

One such instance where digital forensics played a crucial role in the Madeleine McCann case was when investigators analyzed the computers of a key suspect.

Additionally, digital forensics experts have examined countless images and videos from the area where Madeleine vanished, using data recovery techniques to recover and analyze deleted or damaged files.

Now, let’s explore a case where digital forensics brought down a notorious online criminal empire.

Case 6: The Takedown of Silk Road

Founded by Ross Ulbricht in 2011, Silk Road quickly gained notoriety as the go-to place for illegal transactions.

This involved the use of file carving tools and other specialized software to analyze encrypted data and reveal the hidden connections between users and transactions.

The Silk Road takedown is a prime example of how digital forensics can help law enforcement dismantle criminal networks operating in the shadows of the internet.

Case 7: The Murder of April Jones

The case quickly gained national attention, and the desperate search for April captured the hearts of millions. Once again, digital forensics would prove to be instrumental in securing a conviction.

In the days following April’s disappearance, investigators turned to digital forensics to build their case against Bridger.

Digital forensics also played a role in linking Bridger’s vehicle to the crime scene. By analyzing GPS data from his car, investigators were able to place him at the scene of April’s abduction and track his movements afterward.

These seven real-life cases offer a glimpse into the remarkable power of digital forensics in solving crimes and bringing criminals to justice.

References Used

Related posts.

Does-Digital-Forensics-Require-Coding-Programming-Skills

Does Digital Forensics Require Coding or Programming Skills?

A career as a digital forensics analyst sounds exciting, especially when it involves uncovering digital evidence, helping to apprehend suspects, and testifying in a court…

who-uses-and-need-digital-forensics

Who Benefits From Using Digital Forensics: 5 Types of People

digital-forensics-branches

The 9 Different Branches Of Digital Forensics [Explained]

how-long-does-whatsapp-keep-chat-histor

How Long Is Chat History Saved In WhatsApp? [Explained]

If you use WhatsApp frequently, you may be wondering how long the app keeps your chat history. WhatsApp is a popular messaging app that is…

what-is-digital-forensics

A Comprehensive Guide to Digital Forensics [Tools & Career]

VPN-PIA-vs-Hide.ME

VPN Comparision Between Private Internet Access vs.Hide.ME

benefits-of-using-telegram-for-business

13 Benefits of Using Telegram App for Business [Guide]

Hey there! Are you wondering why Telegram is good for business? Look no further! In today’s fast-paced world, businesses are always on the lookout for…

telegram-notify-contacts-when-joined

Does Telegram Show Your Location? [App Settings & Sharing]

Leave a comment cancel reply.

Save my name, email, and website in this browser for the next time I comment.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

Forensic Analysis of Social Media Data Research Challenge and Directions

Profile image of Muhammad Firdaus

The challenge to analyze data from social media sources not only for businesses and organizations but also for Law Enforcement Agencies. Social media offers various avenues for the collection and use of its data as evidence within a digital forensics investigation. The trail of digital information on social media, if explored correctly, can offer remarkable support in the criminal investigation. Social media evidence must be collected using careful, correct procedures and in a manner that ensures its integrity. Hence, social media evidence must be collected by a legally and scientifically appropriate forensic process and also coincide with the privacy rights of individuals. Following the legal process is a challenging task for legal practitioners and investigators to be able to carry out effective investigations and gather valid evidence efficiently. This paper explains the existing conditions of evidence acquisition, admissibility, and jurisdiction mechanisms in forensic social media. It also illustrates the direct challenges in gathering, analyzing, presenting, and validating evidence from social media data in the law enforcement process.

Related Papers

International Journal of Digital Crime and Forensics

mark casson

The increasing use of social media, applications or platforms that allow users to interact online, ensures that this environment will provide a useful source of evidence for the forensics examiner. Current tools for the examination of digital evidence find this data problematic as they are not designed for the collection and analysis of online data. Therefore, this paper presents a framework for the forensic analysis of user interaction with social media. In particular, it presents an inter-disciplinary approach for the quantitative analysis of user engagement to identify relational and temporal dimensions of evidence relevant to an investigation. This framework enables the analysis of large data sets from which a (much smaller) group of individuals of interest can be identified. In this way, it may be used to support the identification of individuals who might be ‘instigators’ of a criminal event orchestrated via social media, or a means of potentially identifying those who might b...

social media forensics case study

2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS)

Sotiris Ioannidis

Norulzahrah Zainudin

JUITA: Jurnal Informatika

Social media is a place that people use to socialize. In addition to socializing, social media is also often used as a crime medium by certain people. In the evidentiary process, law enforcers have the duty to present the evidence used by the suspect in committing his crime. The method used in collecting digital evidence from social media must have a clear scientific basis and guidelines. If the method used is not known as a theory or method in digital forensics, this will undermine all expert testimony and evidence presented in the court. Making a framework that can be recognized by all judicial administrators (judges, public prosecutors, attorneys for defendants, witnesses and defendants) is a solution that can be used as a standard so that the evidence process runs well. The framework that has been created by the researcher is an update from the previous framework. The framework design is made using the Composite Logic method. The composite logic method will collaborate with the ...

Umit Karabiyik

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent any criminal activities in different forms. It will also help researchers to develop new models/techniques in the future. This paper provides literature review of the social network forensics methods, models, and techniques in order to provide an overview to the researchers for their future works as well as the law enf...

Lecture Notes in Computer Science

Rafael Sandoval

Umit Karabiyik , M. Abdullah CANBAZ , Tayfun TUNA , Esra Akbas , Bilal Gonen , Ramazan Aygun

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent any criminal activities in different forms. It will also help researchers to develop new models/techniques in the future. This paper provides literature review of the social network forensics methods, models, and techniques in order to provide an overview to the researchers for their future works as well as the law enforcement investigators for their investigations when crimes are committed in the cyber space. It also provides awareness and defense methods for OSN users in order to protect them against to social attacks.

Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management

Theodoros Semertzidis

Jasmin Ćosić

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Nana Kwame Gyamfi

Stephen Rice

Journal of Computer Science IJCSIS , Urjashee Shaw , Smriti Medhi , Dolly Das

Lindsay Freeman

MOHAMMAD SAMEEN RISHI

Communications in Computer and Information Science

Edlira Kalemi

Merly Thomas

Digital Investigation

Andrew Marrington

Electronics

Adnan Akhunzada

Shahzad Saleem

swetha 1032

Journal of Forensic, Legal & Investigative Sciences

Abel Yeboah-ofori

Sudhir Dwivedi

Hamdi Yesilyurt

gyani paswan

Brintha Rajakumari S

Computer Science & Information Technology (CS & IT) Computer Science Conference Proceedings (CSCP)

Journal of Educational and Social Research

Mensur Morina

Digital Forensic Science [Working Title]

Petra Perner

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

Learning Materials

  • Business Studies
  • Combined Science
  • Computer Science
  • Engineering
  • English Literature
  • Environmental Science
  • Human Geography
  • Macroeconomics
  • Microeconomics
  • social media forensics

Social media forensics involves the collection, analysis, and presentation of data from social networking websites for investigative or legal purposes. It plays a critical role in uncovering digital evidence by analyzing user interactions, posts, and metadata to establish timelines and authenticate activities. This field requires specialized tools and techniques to ensure the integrity and admissibility of evidence in court.

Millions of flashcards designed to help you ace your studies

  • Cell Biology

Which technique did investigators use in the defamation case to authenticate reviews?

What is a primary legal consideration in social media forensics?

Which techniques are commonly used for authorship attribution in social media forensics?

Which of the following is NOT a process involved in social media forensics?

What is one key benefit of social media forensics in legal cases?

What is the primary focus of social media forensics?

What role do social media companies play in forensics?

Which privacy concern is a major issue in social media forensics?

How can forensic experts verify if a post timestamp on social media is legitimate?

What is the role of authorship attribution in social media forensics?

Why is prompt action critical in social media forensic investigations?

Review generated flashcards

to start learning or create your own AI flashcards

Start learning or create your own AI flashcards

  • Business Law
  • Contract Law
  • European Law
  • Forensic Science
  • Criminology
  • DNA barcoding
  • DNA contamination
  • DNA databases
  • DNA degradation
  • DNA extraction
  • DNA phenotyping
  • DNA profile matching
  • DNA quantification
  • DNA sampling
  • DNA sequencing advances
  • Fire Investigation
  • Linguistics
  • PCR amplification
  • Photography
  • SEM imaging
  • SEM in metallurgy
  • SNP analysis
  • STR analysis
  • Trace Evidence
  • abnormal psychology
  • accelerants
  • acute stress disorder
  • adhesive tape
  • aerial imaging in forensics
  • age estimation
  • allele dropout
  • allele frequency
  • allelic dropout
  • alloy identification
  • alloy microstructures
  • analytical toxicology
  • anatomical study
  • anthropological genetics
  • anthropological linguistics
  • antidote mechanisms
  • antiforensics techniques
  • anxiety studies
  • application analysis
  • archaeological recovery
  • arson investigation
  • artificial intelligence in forensics
  • atomic absorption
  • atomic absorption spectroscopy
  • audio forensic science
  • automated comparison
  • autopsy techniques
  • autosomal DNA
  • ballistics innovations
  • behavioral analysis
  • behavioral toxicology
  • big data statistics
  • biochemical evidence
  • biochemical markers
  • biochemical pathways
  • bioinformatics in forensics
  • bioinformatics statistics
  • biological diversity
  • biological profile
  • biological profiling
  • biological variation
  • bioluminescence
  • biomarker identification
  • biomarkers of exposure
  • biometrics in investigation
  • biopharmaceutics
  • biotechnology drugs
  • birefringence
  • blockchain forensics
  • blood spatter innovation
  • blood trace analysis
  • bone marrow suppression
  • bone microstructure
  • bootstrap methods
  • botanical DNA barcoding
  • botanical databases
  • botanical decomposition
  • botanical fingerprinting
  • botanical forensics research
  • botanical genetics
  • botanical identification
  • botanical microscopy
  • botanical molecular markers
  • botanical serology
  • botanical tissues
  • botanical toxicology
  • botanical trace evidence
  • browser forensics
  • building material examination
  • burn patterns
  • cancer pathology
  • capillary electrophoresis
  • carbon monoxide effects
  • carcinogenic potential
  • cardiotoxicants
  • cardiovascular pathology
  • casting defects
  • catabolic reactions
  • catalysis reactions
  • cell pathology
  • cellular biology
  • cellular pathology
  • chelating agents
  • chemical botany
  • chemical composition
  • chemical etching
  • chemical identification
  • chemical mixtures
  • chemical pathology
  • chemical profiling
  • chemical sensors
  • chemical signature analysis
  • chemical structures
  • chemical synthesis
  • chemical toxicology
  • chromosomal DNA
  • chromosome mapping
  • clinical pathology
  • clinical toxicology
  • cloud forensics
  • cognitive behavior
  • cold case analysis
  • comparative linguistics
  • composite material analysis
  • compression testing
  • computer forensics
  • condensed matter
  • contamination control
  • contrast adjustment
  • correlation analysis
  • corrosion products
  • corrosion study
  • corruption risk assessment
  • cortical bone
  • cranial morphology
  • cranial sutures
  • crime scene analysis
  • crime scene photography
  • crime scene reconstruction
  • crime scene technology
  • criminal behavior analysis
  • criminal psychopaths
  • criminalistics
  • criminogenic needs
  • criminological theories
  • crystal structure analysis
  • cultural linguistics
  • cyanobacteria analysis
  • cyber forensics
  • cyber forensics in economics
  • cytotoxic effects
  • data carving
  • data recovery forensics
  • deep web forensics
  • density gradient analysis
  • density testing
  • dermal toxicity
  • dialect identification
  • diatom analysis
  • diffraction patterns
  • digital evidence analysis
  • digital evidence handling
  • digital forensics
  • digital imaging techniques
  • digital pathology
  • disease pathology
  • disk forensics
  • distribution theory
  • document examination
  • dose-response assessment
  • dose-response curve
  • drone technology in forensics
  • drug chemistry
  • drug discovery
  • drug formulation
  • drug metabolite
  • drug safety assessments
  • dust analysis
  • earth processes
  • economic behavioral patterns
  • economic corruption detection
  • economic crime analysis
  • economic cybercrime
  • economic data interpretation
  • economic decision making
  • economic espionage
  • economic impact assessment
  • economic intelligence
  • economic modeling techniques
  • economic policy impacts
  • economic profiling
  • economic regulations
  • economic system analysis
  • economic trend analysis
  • electron beams
  • elemental composition
  • email forensics
  • email header analysis
  • emotional disorders
  • encryption analysis
  • endiocrinology pharmacology
  • energy dispersion
  • energy-dispersive x-ray spectroscopy
  • environmental forensics
  • environmental geology
  • environmental pathology
  • environmental pharmacology
  • environmental sampling
  • environmental toxicants
  • enzyme inhibition
  • enzyme reactions
  • ethics in psychiatry
  • explosion investigation
  • explosives analysis
  • fabric matching
  • fiber analysis
  • fiber analysis advancements
  • file system analysis
  • fire cause determination
  • fire debris examination
  • fire dynamics
  • fire modeling
  • fire origin analysis
  • fire patterns analysis
  • fire reconstruction
  • fire residue
  • fire scene analysis
  • fire scene photography
  • fire spread analysis
  • firearm examination
  • floral morphology
  • fluorescence analysis
  • foodborne toxins
  • force analysis
  • forensic accounting
  • forensic anthropology techniques
  • forensic archaeology
  • forensic artifact analysis
  • forensic authorship
  • forensic bioinformatics
  • forensic biology
  • forensic botany
  • forensic botany case studies
  • forensic botany methods
  • forensic bryology
  • forensic chemico-toxicology
  • forensic chemistry
  • forensic corpus
  • forensic data acquisition
  • forensic data validation
  • forensic dendrology
  • forensic economics theory
  • forensic file analysis
  • forensic genomics
  • forensic genotyping
  • forensic geology
  • forensic imaging
  • forensic innovation
  • forensic investigation
  • forensic medicine
  • forensic metallurgy
  • forensic microbiology
  • forensic mycology
  • forensic narrative
  • forensic osteology
  • forensic palynology
  • forensic pharmacology
  • forensic phonetics
  • forensic photography
  • forensic plant biochemistry
  • forensic pragmatics
  • forensic reconstruction
  • forensic report writing
  • forensic semantics
  • forensic serology
  • forensic sociolinguistics
  • forensic speech science
  • forensic statistics
  • forensic stylistics
  • forensic tools evaluation
  • forensic toxicology
  • forensic toxicology breakthroughs
  • forensic toxicology cases
  • forensic translation
  • forged metals
  • fossil evidence
  • fractography
  • fungal forensics
  • fungal identification
  • gas analysis
  • gene polymorphism
  • gene sequencing
  • genetic fingerprinting
  • genetic material
  • genetic mutation
  • genetic pathology
  • genetic predispositions
  • genome sequencing
  • genomic DNA
  • genomic technology in forensics
  • genotoxic substances
  • geochronology
  • geographical profiling
  • geologic structures
  • geological hazards
  • geological modeling
  • geological survey
  • glass analysis
  • glass fracture analysis
  • global economic crimes
  • gravity analysis
  • gunshot residue
  • hair evidence
  • heavy metal toxicity
  • herbal pharmacology
  • histological stain techniques
  • histomorphometry
  • historical linguistics
  • homicide investigation
  • human biology
  • human cognition
  • hydrocarbon detection
  • hydrogen embrittlement
  • identity theft crimes
  • ignitable liquids
  • ignition sources
  • image authentication
  • image metadata
  • image stabilization
  • immunoassay
  • immunochemistry
  • immunotoxicology
  • impact physics
  • impact testing
  • infection pathology
  • inferential statistics
  • infrared analysis
  • infrared photography
  • insect biology
  • investigative interviewing
  • iot device forensics
  • juvenile delinquency
  • karst topography
  • kinship analysis
  • laser ablation
  • laser spectroscopy
  • latent fingerprints
  • leaf morphology
  • leaf venation
  • learning theories
  • legal aspects of economics
  • legal aspects of fire investigation
  • legal linguistics
  • legal psychology
  • lethal dose
  • lie detection
  • light absorption
  • likelihood ratios
  • linguistic attribution
  • linguistic deception
  • linguistic evidence
  • linguistic profiling
  • live forensics
  • log analysis
  • luminol testing
  • magnetic properties
  • malware analysis
  • malware forensics
  • martensitic transformation
  • media analysis
  • medicinal chemistry
  • memory analysis
  • memory and perception
  • memory retention
  • mental capacity
  • mental disorder classification
  • mental health law
  • mental illness assessment
  • mental resilience
  • metadata analysis
  • metal coating analysis
  • metal deposition
  • metal failure analysis
  • metal foams
  • metallic inclusions
  • metallic ions
  • metallic residues
  • metallographic analysis
  • metallurgical engineering
  • metallurgical failure
  • metallurgical phase diagrams
  • metallurgical samples
  • metric traits
  • microbial forensics
  • microsatellite
  • microscope analysis
  • microscopic examination
  • microscopic plant analysis
  • microstructure examination
  • mineral analysis
  • minerals identification
  • mobile device forensics
  • molecular analysis
  • molecular biology
  • molecular dynamics
  • molecular ecology
  • molecular pharmacology
  • molecular spectroscopy
  • molecular toxicology
  • morphological analysis
  • morphological study
  • motivation theories
  • mudrock analysis
  • musculoskeletal pathology
  • mutagenic substances
  • nano analysis
  • nanocharacterization
  • nanoparticle analysis
  • nanopharmacology
  • nanotechnology in forensics
  • nanotoxicology
  • network analysis
  • network forensics
  • network intrusion analysis
  • network packet analysis
  • neurocriminology
  • neuroscience basics
  • neurotoxicology
  • neutron detection
  • non-coding DNA
  • non-metric traits
  • nondestructive testing
  • nonverbal behavior
  • nuclear DNA
  • optical microscopy
  • os forensics
  • osteobiography
  • osteological collection
  • osteometric analysis
  • oxidation reactions
  • oxidation-reduction
  • paint binders
  • paint layer comparison
  • paleoepidemiology
  • paleogenomics
  • paleogeography
  • palynological sampling
  • parentage testing
  • particle chemistry
  • particle morphology
  • particle size distribution
  • password cracking
  • pathological findings
  • pathology informatics
  • pedoarchaeology
  • perception processes
  • peripheral neurotoxicity
  • personality theory
  • pesticide toxicity
  • pharmaceutical biotechnology
  • pharmaceutical chemistry
  • pharmaceutical sciences
  • pharmacoeconomics
  • pharmacoepidemiology
  • pharmacognosy
  • phonetic analysis
  • photo correlation
  • photo documentation
  • photo enhancement
  • photographic analysis
  • photographic archiving
  • photographic evidence
  • photographic scales
  • phylogenetic analysis
  • phytochemical analysis
  • phytochemistry
  • plant DNA profiling
  • plant anatomy
  • plant cladistics
  • plant histology
  • plant pathology
  • plant physiology
  • plant population genetics
  • plant systematics
  • plant taxonomy
  • plants as evidence
  • plasma physics
  • plastic evidence
  • poison identification
  • polarization
  • pollination biology
  • polymer analysis
  • polymorphic markers
  • population affinity
  • postcranial analysis
  • pragmatic analysis
  • predictive analytics in economics
  • protein profiling
  • protein therapeutics
  • psychological aspects of arson
  • psychological assessment
  • psychological manipulation
  • psychological resilience
  • psychometric evaluation
  • psychometrics
  • psychophysiology
  • psychotherapeutic methods
  • quantitative PCR
  • quantitative research
  • quaternary geology
  • questioned documents
  • radiation toxicology
  • radio frequency
  • real-time PCR
  • reference samples
  • refractive index measurement
  • registry forensics
  • regulatory pharmacology
  • remote forensics
  • residue examination
  • resonance effects
  • respiratory toxicology
  • risk management in economics
  • rock formation
  • rock mechanics
  • sampling distributions
  • scanning electron microscopy
  • scanning probe microscopy
  • scene documentation
  • scene processing
  • sedimentary rocks
  • self-awareness
  • sequence alignment
  • serial killers
  • sex estimation
  • sexual assault analysis
  • single-cell analysis
  • skeletal differentiation
  • skeletal excavation
  • skeletal maturation
  • skeletal morphology
  • skeletal pathologies
  • skeletal preservation
  • skeletal remains
  • skeletal trauma
  • smart technology in forensics
  • soil comparison
  • soil composition
  • soil samples
  • soot patterns
  • source code forensics
  • spatial statistics
  • spectral imaging
  • spectroscopy in forensics
  • spectroscopy in metals
  • statistical computing
  • stature estimation
  • steganography detection
  • stress and trauma
  • stress response
  • structural fire investigation
  • subatomic particles
  • substance profiling
  • surface analysis
  • surface morphology
  • surface treatments
  • suspect interrogations
  • syntactic analysis
  • synthetic fibers
  • system toxicology
  • systematic toxicology
  • tandem repeats
  • taphonomy developments
  • tephra analysis
  • theoretical linguistics
  • theranostics
  • therapeutic drug monitoring
  • thermal imaging in forensics
  • threshold limit values
  • timeline analysis
  • tissue analysis
  • toxic effects
  • toxic substance control
  • toxicogenomics
  • toxicokinetics
  • toxicological dose-response
  • toxicological evaluation
  • toxicological profiles
  • toxicological research
  • toxicological screening
  • toxicology in fires
  • trabecular bone
  • trace metal analysis
  • trace metal detection
  • trajectory analysis
  • translational pharmacology
  • trauma and stress
  • trauma examination
  • ultraviolet analysis
  • ultraviolet light analysis
  • ultraviolet photography
  • ultraviolet spectroscopy
  • usb forensics
  • vapor phase analysis
  • vegetation analysis
  • video forensics
  • violent crime analysis
  • virtual machine forensics
  • vitrification
  • voice identification
  • voice recognition forensics
  • welding defects
  • white-collar crimes
  • wi-fi forensics
  • wildfire investigation
  • wireless forensics
  • wood anatomy
  • wood fragments
  • x-ray fluorescence
  • xenobiotic metabolism
  • Human Rights Law
  • International And Humanitarian Law
  • UK Criminal Law
  • UK Legal System
  • US Legal System

Social Media Forensics Definition

Social media forensics is a critical field that involves the application of forensic investigation techniques to analyze, recover, and interpret electronic media data that originates from social media platforms. With the increasing integration of social networks into daily life, understanding how this data can be used in legal investigations is paramount.

What is Social Media Forensics

Social media forensics encompasses a variety of processes aimed at discovering and handling data from social media. These analyses are often involved in legal contexts where digital evidence is required. Such evidence may be necessary in various cases such as cyberbullying, harassment, and intellectual property theft . The process includes:

  • Identification: Locating potential sources of digital evidence.
  • Collection: Gathering and preserving the data in a way that maintains its integrity.
  • Analysis: Examining the data to extract useful information.
  • Presentation: Organizing and explaining the data in a legal context.

Social Media Forensics Techniques

To effectively conduct investigations on social media, experts employ various forensic techniques. These techniques ensure that data is not only retrieved but is also admissible in legal proceedings. Common techniques include:

  • Metadata Analysis : Examining the information about data files, such as creation date and modification history.
  • Data Recovery: Restoring deleted messages, posts, or multimedia from social media accounts.
  • Network Forensics : Tracking the interactions and connections between users to understand the communication paths.
  • Image and Video Analysis: Analyzing multimedia to authenticate and verify its originality.

Consider a case where a suspect's alibi depended on a post timestamp on a social media platform. By using metadata analysis , forensic experts could verify if the timestamp was legitimate or altered.

Always remember that social media content is dynamic. Quick action is necessary to preserve digital evidence effectively.

Legal Aspects of Social Media Forensics

The legal aspects of social media forensics are complex and multifaceted. Understanding these elements is crucial for anyone engaging in the collection and analysis of data from social networking platforms for legal purposes. These aspects ensure that investigations remain within the boundaries of the law while providing valid evidence in legal contexts. Below, we explore privacy concerns and legislative frameworks that impact this field.

Privacy Concerns in Social Media Forensics

In the realm of social media forensics, privacy is a paramount concern. Users often assume that their online activities are private, but investigators might need to access this data for legal purposes. Such actions raise ethical and legal questions regarding the right to privacy and can impact how social media data is perceived in court. Key privacy concerns include:

  • User Consent: Whether users have consented to their data being collected and analyzed.
  • Data Sensitivity: The nature of the information being accessed and its potential impact on individuals or groups.
  • Third-Party Involvement: The role of social media companies in providing access to user data.

Social Media Forensics Case Study

Social media forensics plays a pivotal role in modern investigations, providing critical insights and evidence. Through case studies, we can better understand how these practices are applied in real-world scenarios. Below are examples that highlight the methods and implications of using social media forensics in various contexts.

Real-world Examples Featuring Social Media Forensics

In recent years, a range of cases has demonstrated the effectiveness of social media forensics in legal investigations. One notable example is a cyberbullying case involving a teenager who suffered harassment through anonymous messages on multiple social media platforms. Investigators employed data recovery techniques to trace the messages back to their original source, leading to the identification and prosecution of the individuals involved. Another significant case involved defamation , where a business was accused of false advertising through fake reviews. Forensic experts utilized metadata analysis to authenticate the timestamps and user accounts responsible for the reviews, ultimately proving their falsified nature. These examples illustrate the power of social media forensics in uncovering hidden information that can serve justice .

Imagine a scenario where an individual's geolocation, tagged in their social media post during a specific time, contradicted their alibi in a criminal investigation. Forensic experts could use network forensics to assess the accuracy of the tagging feature and provide crucial evidence in the case.

A deep dive into social media forensics can reveal how investigators address the unique challenges of digital environments. Consider the legal complexities involving cross-jurisdictional issues where data might be stored in servers across different countries. Forensic experts must navigate international laws and collaborate with global law enforcement agencies to secure necessary warrants or legal permits for accessing data. Furthermore, the evolving nature of technology requires continuous updating of skills and tools to effectively engage with new platforms and data types. The intricacy of extracting, analyzing, and presenting digital evidence requires a blend of technical prowess and legal acuity, ensuring that the evidence is not only accurate but also admissible in court. Ethical considerations often impact decisions, particularly regarding user privacy and the proportionality of forensic measures.

Lessons Learned from Social Media Forensics Cases

Examining previous social media forensics cases imparts valuable lessons and insights for future investigations. First and foremost, the importance of prompt action in data preservation cannot be overstated, as social media content can quickly be altered or removed. Additionally, the need for comprehensive training and expertise in handling digital evidence is evident. As technology advances, so too must the skills of those utilizing social media forensics to ensure they are aware of the latest tools and methodologies. It is also crucial to maintain clear and detailed documentation throughout the forensic process to build strong, credible evidence chains. Such documentation aids in preventing challenges to the authenticity and reliability of the evidence. Finally, collaboration and communication with legal entities and technology providers play a significant role in overcoming access barriers and ensuring that forensic measures comply with current laws and ethical standards.

When conducting investigations, always consider potential bias that might arise from data interpretation, ensuring objectivity and impartiality remain central to your analyses.

Authorship Attribution for Social Media Forensics

Authorship attribution plays a significant role in social media forensics by helping determine the origin of content found on digital platforms. This process involves analyzing textual patterns to identify the author of anonymous or disputed writings, which is critical in both criminal investigations and intellectual property cases.

Methods in Authorship Attribution

Different methods are employed in authorship attribution for social media forensics, each bringing unique insights. Essential techniques include:

  • Stylometry: This method analyzes writing style using statistical methods to evaluate characteristics like word frequency, sentence structure, and grammar. Stylometry assumes that every author has a unique 'literary fingerprint.'
  • NLP (Natural Language Processing): NLP techniques utilize computational linguistics to process and analyze large amounts of natural language data. This helps in identifying patterns and features that are indicative of an author's style.
  • Machine Learning Algorithms: Supervised and unsupervised machine learning models are trained with known samples to classify and predict authorship based on text patterns. Common algorithms include decision trees and neural networks.

In a recent cyber harassment case, investigators employed stylometric analysis, breaking down the linguistic characteristics of threatening messages sent via social media, eventually linking them to a specific individual.

Always ensure the sample size is adequate for reliable results when conducting authorship attribution analyses.

Challenges in Authorship Attribution

Authorship attribution in social media forensics involves several challenges that can impact accuracy and feasibility. Key challenges include:

  • Short Texts: Social media often consists of short messages that provide limited linguistic data, making it difficult to establish a reliable authorship model.
  • Language Variability: Informal language, abbreviations, and emojis commonly used in social media may hinder textual analysis and complicate pattern recognition.
  • Shared Accounts: Multiple users managing a single social media account can pose a significant challenge in attribution due to the blended writing styles.
  • Evolving Language: Online language constantly evolves, demanding continuous adaptation in attribution techniques and models.

A deep dive into the complexity of social media authorship attribution reveals unique problems, such as distinguishing between intentional style mimicry and genuine author identity. For example, an individual might imitate someone else's writing style to create false leads in an investigation. Addressing such sophisticated deception requires refining existing models and developing new strategies that account for behavioral patterns and contextual nuance. Another complexity lies in analyzing multilingual content, where authors might switch between languages in their writing, further complicating attribution analysis. Therefore, combined cross-linguistic models are researched to handle diverse data sources.

social media forensics - Key takeaways

  • Social Media Forensics: The application of forensic investigation techniques to analyze, recover, and interpret data from social media platforms, often used in legal investigations.
  • Processes in Social Media Forensics: Includes identification, collection, analysis, and presentation of digital evidence, applying techniques like metadata analysis and data recovery.
  • Legal Aspects: Involves complex privacy concerns and legislative frameworks, addressing user consent, data sensitivity, and third-party involvement.
  • Case Studies: Real-world examples, such as cyberbullying and defamation , demonstrate the effectiveness of social media forensics in uncovering critical evidence.
  • Authorship Attribution: Identifying the origin of anonymous or disputed digital content using techniques like stylometry and natural language processing (NLP).
  • Challenges in Authorship Attribution: Issues include short texts, language variability, and evolving language, requiring advanced techniques and consistent methodological updates.

Flashcards in social media forensics 12

Metadata analysis to verify timestamps and accounts.

Obtaining data without informing the user.

Sentiment analysis, CAPTCHA, and image recognition.

Presentation of data in a legal context.

It helps uncover hidden information to serve justice.

Designing social media marketing strategies.

social media forensics

Learn with 12 social media forensics flashcards in the free StudySmarter app

We have 14,000 flashcards about Dynamic Landscapes.

Already have an account? Log in

Frequently Asked Questions about social media forensics

Test your knowledge with multiple choice flashcards.

social media forensics

Join the StudySmarter App and learn efficiently with millions of flashcards and more!

Keep learning, you are doing great.

Discover learning materials with the free StudySmarter app

1

About StudySmarter

StudySmarter is a globally recognized educational technology company, offering a holistic learning platform designed for students of all ages and educational levels. Our platform provides learning support for a wide range of subjects, including STEM, Social Sciences, and Languages and also helps students to successfully master various tests and exams worldwide, such as GCSE, A Level, SAT, ACT, Abitur, and more. We offer an extensive library of learning materials, including interactive flashcards, comprehensive textbook solutions, and detailed explanations. The cutting-edge technology and tools we provide help students create their own learning materials. StudySmarter’s content is not only expert-verified but also regularly updated to ensure accuracy and relevance.

social media forensics

StudySmarter Editorial Team

Team Law Teachers

  • 9 minutes reading time
  • Checked by StudySmarter Editorial Team

Study anywhere. Anytime.Across all devices.

Create a free account to save this explanation..

Save explanations to your personalised space and access them anytime, anywhere!

By signing up, you agree to the Terms and Conditions and the Privacy Policy of StudySmarter.

Sign up to highlight and take notes. It’s 100% free.

Join over 22 million students in learning with our StudySmarter App

The first learning app that truly has everything you need to ace your exams in one place

  • Flashcards & Quizzes
  • AI Study Assistant
  • Study Planner
  • Smart Note-Taking

Join over 22 million students in learning with our StudySmarter App

Kia ora - welcome to our new website. We've tried to ensure old links will redirect to the correct pages, but some links may no longer work. Find out more .

About us Mō mātou

About the Ministry of Health and the New Zealand health system. 

Quick links

  • Consultations

New Zealand’s health system

  • Government Policy Statement
  • Health system roles and organisations
  • Overview and statutory framework
  • Vote Health

Organisation and leadership

  • Chief clinical officers
  • Executive Governance Team
  • Ministry directorates
  • Public Health Agency
  • Statutory roles

Corporate publications

  • Annual reports
  • Briefings to incoming Ministers
  • Health and Independence reports
  • Mental health annual reports
  • Strategic intentions
  • Current vacancies
  • Employee benefits
  • Information for job applicants

Regulation & legislation Ngā here me ngā ture

Health providers and products we regulate, and laws we administer.

  • Legislation we administer
  • Rest home audit reports
  • Assisted dying

Certification of health care services

Drug checking, health practitioners competence assurance act, medicinal cannabis.

  • Medicines control

Mental health and addiction

  • Notifiable diseases

Pharmacy licensing

Psychoactive substances, smoked tobacco, vaping, herbal smoking and smokeless tobacco, strategies & initiatives he rautaki, he tūmahi hou.

How we’re working to improve health outcomes for all New Zealanders.

Health strategies

  • New Zealand Health Strategy
  • Health of Disabled People Strategy
  • Pae Tū: Hauora Māori Strategy
  • Rural Health Strategy
  • Te Mana Ola: The Pacific Health Strategy
  • Women’s Health Strategy

Programmes and initiatives

  • Gambling harm
  • Health workforce
  • Mental health, addiction and suicide prevention
  • Pacific health
  • Smokefree 2025

Māori health Hauora Māori

Increasing access to health services, achieving equity and improving outcomes for Māori.

  • Subscribe for Māori health updates

Ao Mai te Rā anti-racism initiative

Māori health models, te tiriti o waitangi framework, wai 2575 health services and outcomes inquiry, whakamaua: māori health action plan, statistics & research he tatauranga, he rangahau.

Data and insights from our health surveys, research and monitoring.

  • New Zealand Health Survey
  • Health targets

System monitoring

  • Mental health and addiction targets
  • Planning and performance data
  • New Zealand Gambling Survey
  • Past surveys

Statistics and data sets

  • Māori health data and statistics
  • Mental health data and statistics
  • Obesity data and statistics
  • Suicide data and statistics
  • Tobacco data and statistics
  • COVID-19 and immunisation research projects
  • Gambling harm research and evaluation
  • Our role in health research

News Ngā karere

Find all the latest news and updates from the Ministry of Health - Manatū Hauora.

  • Media centre

social media forensics case study

Research into health and wellbeing impacts of adverse weather conditions

Key findings and recommendations on the health and wellbeing impacts of Cyclone Gabrielle have been published today.

  • News article
  • Environmental health
  • Emergency management

Three additional ‘Safe Areas’ announced

New ‘Safe Areas’ will be in place around three abortion service providers from 27 September 2024, to protect the safety, wellbeing, privacy and dignity of people who are accessing or providing abortion services. 

Ministry prosecutes vape retailer

A Christchurch shopkeeper has been fined $56,000 for the illegal sale of vapes and cigarettes, including selling vapes to minors.  

2023 Health and Independence Report published

The Ministry of Health – Manatū Hauora has published the 2023 Health and Independence Report. 

Redesigned Ministry of Health website now live

The redesigned Ministry of Health website has been launched today.

  • About the Ministry

Consultation for Draft Strategy to Prevent and Minimise Gambling Harm 2025/26 to 2027/28 opens

Today the Ministry of Health – Mānatu Hauora has opened consultation on the proposed strategy to prevent and minimise gambling harm for the next three years.

Consultation to update the New Zealand clinical trial regulatory guidelines

A plan aiming to streamline clinical trial reporting procedures in some circumstances is now out for consultation. Medsafe is seeking public feedback on a series of proposed updates to the regulatory guidelines for people conducting clinical trials for medicines and medical devices.

Pause on Surgical mesh update

It’s been one year since the Director-General of Health, Dr Diana Sarfati, supported a pause in the use of surgical mesh to treat stress urinary incontinence (SUI) on the recommendation of the Surgical Mesh Roundtable (MRT). 

  • Elective services

Publication of the Registrar (assisted dying) Annual Report 2024

The Ministry of Health has published the Registrar (assisted dying) Annual Report to the Minister of Health, covering the period 1 April 2023 to 31 March 2024. 

Severe disease invasive Group A Strep now a ‘notifiable’ disease

Invasive group A streptococcal infection (iGAS) will become a ‘notifiable’ disease on 1 October 2024. In addition, Cabinet has now also removed COVID-19 from the list of quarantinable infectious diseases.

  • Public health

New Zealand’s first health strategy for people with rare disorders

  • Diseases & conditions
  • Health system

End of Life Choice Act Review

The Ministry of Health will be inviting the public to share their views on the End of Life Choice Act as part of a review of the Act.

Ministry warns against the use of progesterone for ‘abortion reversal’

2023 drug harm index published, review of evidence behind suicide prevention initiatives released, filter by type.

  • Media release (529)
  • News article (645)
  • Programme update (10)

Filter by topic

  • Abortion (5)
  • About the Ministry (9)
  • Addiction (1)
  • Alcohol (2)
  • Allied health (4)
  • Antimicrobial resistance (1)
  • Assisted dying (5)
  • Babies and toddlers (0–2 years) (3)
  • Border health (1)
  • Bowel cancer (2)
  • Certification of health care services (3)
  • Child health (1)
  • COVID-19 (948)
  • Crown entities & agencies (2)
  • Diabetes (1)
  • Disability (1)
  • Diseases & conditions (13)
  • Drinking-water (3)
  • Elective services (3)
  • Emergency management (190)
  • Environmental health (5)
  • Funding & payments (1)
  • Gambling harm (2)
  • Health IT (8)
  • Health system (11)
  • Health targets (1)
  • Hospital events (1)
  • Hospitals & specialist care (1)
  • Immunisation (21)
  • Inequalities (1)
  • Influenza (16)
  • Long-term conditions (2)
  • Māori health (4)
  • Maternity (3)
  • Measles (5)
  • Medicinal cannabis (3)
  • Medicine issues (10)
  • Medicines control (6)
  • Mental health (17)
  • Ministerial health committees (1)
  • Mortality (1)
  • Natural disasters (2)
  • News & media (5)
  • Notifiable diseases (7)
  • Nursing (3)
  • Nutrition (5)
  • Oral health (4)
  • Pacific health (3)
  • Preventative health (2)
  • Primary health care (3)
  • Public health (16)
  • Public Health Advisory Committee (2)
  • Public health units (1)
  • Radiation safety (3)
  • Regulation (3)
  • Screening (2)
  • Sexual & reproductive health (3)
  • Smokefree law (5)
  • Statistics (5)
  • Suicide (8)
  • Support services (2)
  • Surveys (3)
  • Tobacco (7)
  • Tobacco control (8)
  • Vaping (13)
  • Workforce (8)
  • Youth health (1)
  • email Email
  • print Print
  • chat Feedback

© Ministry of Health – Manatū Hauora

COMMENTS

  1. How social media changed crime investigations

    A recent report from the Congressional Research Service estimates that 70% of adults used some form of social media in 2021, compared to only 5% in 2005. This vast increase in popularity means that more and more people are sharing their lives via social media, and with respect to criminals, potentially leaving or publicly publishing evidence ...

  2. The Role of Social Media Forensics in Digital Forensics

    The Role of Social Media Forensics in Digital Forensics

  3. Toward social media forensics through development of iOS analyzers for

    These Python-based plugins extract the required data from the social media applications' databases and present the evidential artifacts in a human-readable format. We integrated these analyzers into the Autopsy Forensics tool and showcased the gathered evidence so that investigators are capable to analyze the extracted information effortlessly.

  4. (PDF) Media forensics on social media platforms: a survey

    1. Abstract. The dependability of visual information on the web and the authenticity of digital media appearing virally in social. media platforms has been raising unprecedented concerns. As a ...

  5. Social Media Data in Digital Forensics Investigations

    The social networking service examined in this study was Twitter. They discovered the commonly used websites, domains, accounts, and hashtags of these DHNs. One group identified was the infamous hacker group called Anonymous. ... In such a case, any social media evidence or digital evidence becomes inadmissible in court. Rule 37 (e) of the FRCP ...

  6. Systematic Literature Review on the Synergy of Social Media Forensics

    The case study in explores Facebook data forensic analysis with the goal of demonstrating the difficulties and methods associated with examining digital evidence on this social media network. The authors emphasize the significance of comprehending Facebook's intricate data structure, given its extensive usage and relevance in forensic ...

  7. Social Media Forensics

    The imminent and inevitable exponential growth of Social Media platforms in the near future is undeniable and so is the fact that the Social media ecosystem would be subjected to various security breaches, online deviant activities, terrorist recruitments and operations, or would be a hotspot of various cybercrimes, terrorist recruitments, illegal campaigning or anti-national propagandas more ...

  8. Evidence collection and forensics on social networks: Research

    Social Media evidence is a new frontier in digital forensics. In 2018, 3.196 billion users were reported, which are actively engaged in sharing their everyday activities on social media sites. The information published on social media, about an individual, his actions, and dealings is used occasionally as a potential tool by investigators to ...

  9. Evidence collection and forensics on social networks:

    Social Media (SM) evidence is a new and rapidly emerging frontier in digital forensics. The trail of digital information on social media, if explored correctly, can offer remarkable support in criminal investigations. However, exploring social media for potential evidence and presenting these proofs in court is not a straightforward task.

  10. Forensic Analysis of Social Media Android Apps via Timelines

    Timeline analysis of social media forensic evidence plays a crucial role in supporting law enforcement investigations. By analyzing the chronological sequence of social media activities, investigators can establish a clear picture of events, relationships, and patterns relevant to the case [21, 22].This Section highlights the key aspects and software of utilizing timeline analysis in social ...

  11. Forensic analysis of social networks (case study)

    In 2017, there was a 350% increase in Ninth Circuit cases using social media evidence as compared to the first cases in 2010. There was a 3933% increase in the California state cases from the ...

  12. Evidence collection and forensics on social networks: Research

    In 2014, a review labeled the social media forensics as digital forensics 2.0, and the authors suggested the sub-domain is the future of digital forensics (Keyvanpour et al., 2014). The study had a thorough overview of the literature until 2014 and discussed the use of social media forensics in cybersecurity measures and identified the issues ...

  13. Leveraging metadata in social media forensic investigations

    The pivotal role of metadata in social media forensic investigations, emphasizing its significance in unravelling digital clues. • By exploring metadata, the study reveals a wealth of information essential for authenticating and tracing the origin of online content, thereby enhancing the depth and accuracy of forensic analyses.

  14. 5 Case Studies of Social Media Evidence in Criminal Investigations

    7 responses to "5 Case Studies of Social Media Evidence in Criminal Investigations" Reena Esquieres. April 11, 2015 at 2:36 PM. The emergence and the uncontrolled popularity of the social networking sites not only in online marketing and communication, but it has been of great help in solving crimes. Some criminal cases have used social ...

  15. Media forensics on social media platforms: a survey

    The dependability of visual information on the web and the authenticity of digital media appearing virally in social media platforms has been raising unprecedented concerns. As a result, in the last years the multimedia forensics research community pursued the ambition to scale the forensic analysis to real-world web-based open systems. This survey aims at describing the work done so far on ...

  16. PDF Digital Forensics: Crimes and Challenges in Online Social

    ure 1 shows the global penetration of digital around the world (Kemp, 2019). The 2019 Global Social Media Research Summary by Smart Insights confirms the data presented by (Kemp, 2019) that global social med. a penetration is 45% of the total world's population (3.484 billion people). The 3.484. illion users represent the 9% growth in the ...

  17. Unlocking Digital Evidence: Social Media Forensics

    However, with the increasing reliance on these platforms, there has been a rise in criminal activities, harassment, misinformation, and fraudulence, necessitating the expertise of forensic social media investigators. This case study outlines a scenario where ECS Infotech, a leading provider of digital forensic solutions, was approached by a ...

  18. Forensic Investigation of Social Media and Instant Messaging Services

    Case Studies Mohd Najwadi Yusoff School of Computer Science, Universiti Sains Malaysia, Penang, Malaysia. [email protected] ... social media forensics; instant messaging forensics; mobile applications investigation. 1. Introduction The exponential growth of social media and instant messaging applications facilitated

  19. 7 Real-Life Cases Solved Using Digital Forensics [References]

    Case 4: The Murder of Laci Peterson. In 2002, the disappearance of Laci Peterson, a pregnant woman from Modesto, California, captured the nation's attention. The case took several twists and turns, but ultimately, digital forensics helped build a case against her husband, Scott Peterson. The Disappearance.

  20. Forensic conflict studies: Making sense of war in the social media age

    This article proposes digital forensic process tracing as a methodological innovation to tackle this challenge and make case study research on the causes of war fit for the social media age. It argues that two important features of process-tracing methodology - source criticism and Bayesian updating - are well developed in theory but are ...

  21. (PDF) Forensic Analysis of Social Media Data Research Challenge and

    Forensic investigation of social media and instant messaging services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as case studies. In Contemporary Digital Forensic Investigations Of Cloud And Mobile Applications (pp. 41-62).

  22. Forensic Investigation of Social Media and Instant Messaging Services

    Chapter 4 - Forensic Investigation of Social Media and Instant Messaging Services in Firefox OS: Facebook, Twitter, Google+, Telegram, OpenWapp, and Line as Case Studies. ... Two types of binary images, meant to be used as forensic evidence in our case studies, were extracted. The first binary image was extracted from the FxOS phone internal ...

  23. Social Media Forensics: Legal Aspects & Cases

    Social Media Forensics Case Study. Social media forensics plays a pivotal role in modern investigations, providing critical insights and evidence. Through case studies, we can better understand how these practices are applied in real-world scenarios. Below are examples that highlight the methods and implications of using social media forensics ...

  24. News

    A review of the evidence on effectiveness of suicide prevention initiatives has been published today on the Ministry of Health website ... Media release (529) News article (645) Programme update (10) Filter by topic. Abortion (5) ... Follow us on social media Twitter. Facebook. LinkedIn. YouTube. Health and disability websites.