Peer review is an often overlooked but important step in the finalization of an expert report. Once an expert has completed his/her expert report, especially one in which the expert…
Case Study: Expert Witness Claims Expertise Not Actually Present
In a previous post entitled “Interpreting Video Images: The Role of the Forensic Video Analyst,” I discussed the important role that a forensic video analyst can play in providing expert…
Interpreting Video Images: The Role of the Forensic Video Analyst
Do you see what I see? Looking at video evidence does not mean that you will actually see all that the video has to offer. Expert interpretation of video evidence…
Image Compression: Are Our Eyes Deceiving Us?
Digital compression of video images is a common occurrence. There are legitimate and laudatory reasons for such compression. Among those reasons are the fact that more data can be stored…
Editing of Images: When Do You Cross the Line?
Related to concerns with authentication, one of the most pervasive suspicions regarding digital image evidence is that the images have been surreptitiously edited in such a manner as to present…
Image Clarification: Not a Bar to Admissibility
One of the most commonly litigated issues regarding digital image evidence is the propriety of and limits to image clarification. Parties who tender clarified images argue that the clarified images…
Image Accuracy: Why the Correct Aspect Ratio Matters
Part of the process of authenticating a video image is to show that the image is an accurate depiction of what the camera recorded. One important technical issue bearing upon…
Social Media Images: Authentication Challenges
The widespread use of handheld cameras and the penchant for posting video to social media have created significant evidentiary challenges from an authentication perspective. For example, cameras mounted on motorcycles…
Using Digital Signatures to Authenticate Video Images
Watermarks were discussed in an earlier post as a method of authenticating video images or showing that image alteration has occurred. Watermarks come with limitations. A more commonly used method…
Using Watermarks to Authenticate Video Images
Another method of authenticating video images is to show scientifically that an image has not been altered or conversely that alteration has occurred. One such method has been the use…
You must be logged in to post a comment.