Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2014 Jan;6(1):31-5.
doi: 10.4103/0975-1475.127767.

Image manipulation: Fraudulence in digital dental records: Study and review

Affiliations

Image manipulation: Fraudulence in digital dental records: Study and review

Aman Chowdhry et al. J Forensic Dent Sci. 2014 Jan.

Abstract

Introduction: In present-day times, freely available software allows dentists to tweak their digital records as never before. But, there is a fine line between acceptable enhancements and scientific delinquency.

Aims and objective: To manipulate digital images (used in forensic dentistry) of casts, lip prints, and bite marks in order to highlight tampering techniques and methods of detecting and preventing manipulation of digital images.

Materials and methods: Digital image records of forensic data (casts, lip prints, and bite marks photographed using Samsung Techwin L77 digital camera) were manipulated using freely available software.

Results: Fake digital images can be created either by merging two or more digital images, or by altering an existing image.

Discussion and conclusion: Retouched digital images can be used for fraudulent purposes in forensic investigations. However, tools are available to detect such digital frauds, which are extremely difficult to assess visually. Thus, all digital content should mandatorily have attached metadata and preferably watermarking in order to avert their malicious re-use. Also, computer alertness, especially about imaging software's, should be promoted among forensic odontologists/dental professionals.

Keywords: Digital images; detection; manipulation; validation.

PubMed Disclaimer

Conflict of interest statement

Conflict of Interest: None declared

Figures

Figure 1
Figure 1
Usage of merge tool on a bite mark photograph
Figure 2
Figure 2
Tsuchihashi's classification
Figure 3
Figure 3
Original image of a lip print manipulated to another variety
Figure 4
Figure 4
Digital photographic records of palatal rugae on casts
Figure 5
Figure 5
Modification of Figure 4 showing how the same data was multiplied
Figure 6
Figure 6
Example for image metadata
Figure 7
Figure 7
Example for watermarking an image

Similar articles

Cited by

References

    1. Keiser-Neilsen S. Bristol: John Wright and Sons; 1980. Person Identification by Means of Teeth.
    1. Güneri P, Akdeniz BG. Fraudulent management of digital endodontic images. Int Endod J. 2004;37:214–20. - PubMed
    1. Rossner M, Yamada KM. What's in a picture? The temptation of image manipulation. J Cell Biol. 2004;166:11–5. - PMC - PubMed
    1. Fiete R. “Photo Fakery” oemagazine [Internet] 2005. Jan, [Last cited on 2012 Dec 12]. Available from: http://spie.org/x16032.xml?highlight=x2410andArticleID=x16032 .
    1. Singbal KP, Chhabra N, Madan B. Digital Imagery: Reality or Fakery. Int J Contemp Dent. 2010;1:93–8.

LinkOut - more resources