The "Technique Descriptions" section is located in the left sidebar below the image upload area.
📚 Technique Descriptions
[Learn about each forensic analysis method]
[🕵️ ELA] [📋 Metadata]
[📊 Histogram] [👻 Noise/Ghost]
[💾 Quantization] [🔄 CMFD]
[📡 PRNU] [📈 Frequency]
[😁 Deepfake] [🔀 Resampling]
[🔐 Steganography] [🔑 Hash Verify]
- What it shows: Compression differences revealing edits
- Analogy: Like special lighting revealing paint touch-ups
- File size: 4 KB | Content: 109 lines
- What it shows: Camera info, timestamps, GPS, software used
- Analogy: Like a "birth certificate" of the image
- File size: 5.4 KB | Content: Comprehensive EXIF guide
- What it shows: Pixel brightness distribution
- Analogy: Like a "census of pixels"
- File size: 6.3 KB | Content: Pattern interpretation guide
- What it shows: Sensor noise patterns and compression ghosts
- Analogy: Like checking if fabric threads match
- File size: 7.2 KB | Content: Noise consistency analysis
- What it shows: JPEG compression fingerprint
- Analogy: Like molecular signatures of compression
- File size: 7.7 KB | Content: Camera/editor identification
- What it shows: Identical copied regions
- Analogy: Like fingerprint matching for images
- File size: 6.6 KB | Content: Detection methods explained
- What it shows: Sensor-specific camera fingerprint
- Analogy: Like ballistic analysis of gun striations
- File size: 8.2 KB | Content: Camera identification guide
- What it shows: Frequency components revealing manipulation
- Analogy: Like X-ray vision into image structure
- File size: 9.2 KB | Content: Scoring system explained
- What it shows: AI-generated face characteristics
- Analogy: Like a lie detector for faces
- File size: 9.6 KB | Content: Artifact patterns detailed
- What it shows: Image scaling and interpolation patterns
- Analogy: Like tree rings showing growth history
- File size: 8.8 KB | Content: Scaling factor detection
- What it shows: Hidden data in Least Significant Bits (LSB)
- Analogy: Like invisible ink detection using special tests
- File size: 6.1 KB | Content: Statistical analysis guide
- What it shows: Cryptographic provenance and authenticity
- Analogy: Like DNA testing for digital files
- File size: 10.0 KB | Content: Blockchain tracking guide
1. What is [Technique]?
└─ Non-technical explanation with analogies
2. What Does [Technique] Measure?
└─ Specific metrics and measurements
3. How to Interpret Results
├─ ✅ Normal Patterns (Likely Authentic)
└─ ⚠️ Suspicious Patterns (Possible Manipulation)
4. Common Artifacts Detected
└─ Real-world forgery examples
5. Visual Analogy / Real-World Example
└─ Concrete relatable comparisons
6. Limitations
└─ Important caveats and false positive/negative info
7. Best Practices
└─ Do's and don'ts checklist
8. Key Questions to Ask
└─ Decision-making framework
- New to digital forensics?
- Want to understand what each tool does?
- Click any technique to learn basics
- Tool shows unexpected results?
- Want to understand specific metric?
- Click corresponding technique description
- Confused by forensic findings?
- Want to interpret authenticity scores?
- Click technique to see interpretation guide
- Building forensic investigation skills?
- Preparing legal testimony?
- Training others in forensics?
- Read descriptions for educational value
1. Open Veritas app
2. Click "📈 Frequency" to learn FFT/DCT
3. Click "🕵️ ELA" to learn error analysis
4. Upload image
5. Analyze with now-informed expectations
6. Refer back to descriptions during results review
1. See unusual bright patches in ELA analysis
2. Click "🕵️ ELA" → Read "Common Artifacts"
3. Understand it indicates compression difference
4. Refer to "Key Questions" section
5. Check metadata via "📋 Metadata" description
6. Run CMFD to check for copy-move
7. Make informed decision about authenticity
1. Need to understand each technique for court
2. Click through all 10 descriptions (10 min read)
3. Focus on "Limitations" sections to understand reliability
4. Reference "Best Practices" for correct usage statements
5. Use descriptions as reference during analysis
6. Print descriptions as reference materials
| Metric | Value |
|---|---|
| Total Techniques | 12 |
| Total Content | ~91 KB |
| Total Lines | ~1,800+ |
| Average per Technique | ~7.6 KB, 150 lines |
| Shortest Description | ELA (4 KB, 109 lines) |
| Longest Description | Hash Verification (10 KB) |
| Non-technical Language | 100% (no jargon) |
| Real-world Examples | 35+ included |
| Visual Analogies | 12 (one per technique) |
- Location:
Descriptions/folder - Format: Markdown (.md)
- Encoding: UTF-8
- Naming: Technique name (e.g.,
ELA.md)
- Streamlit's built-in markdown renderer
- Supports: Headers, bold, lists, code blocks, links
- Responsive: Adapts to screen size
- Scrollable: Long content handled automatically
- Fast loading: <50ms per description
- No external dependencies needed
- Works offline
- Minimal resource usage
- Learn forensic techniques without expensive training
- Understand practical applications
- Build foundational knowledge
- Reference material for assignments
- Quick reference during investigations
- Refresh knowledge on techniques
- Use as training material for others
- Reference for legal documentation
- Understand strengths/limitations of each tool
- Make informed analytical decisions
- Explain findings to non-technical stakeholders
- Build chain of custody documentation
- Understand current forensic practices
- Identify research gaps
- Verify technical accuracy
- Citation source for publications
✨ Non-Technical Language
- Everyday analogies everyone understands
- No forensics jargon
- Complex concepts simplified
- Accessible to general public
✨ Comprehensive Coverage
- All techniques fully documented
- Multiple perspectives included
- Real-world examples provided
- Limitations honestly discussed
✨ Practical Guidance
- Interpretation frameworks provided
- Best practices documented
- Common pitfalls explained
- Decision-making support
✨ Quality Content
- Technically accurate information
- Evidence-based recommendations
- Realistic scoring thresholds
- Honest about false positives/negatives
✨ Easy Integration
- Seamlessly integrated in sidebar
- No UI clutter
- Quick access from anywhere
- Persistent selection during session
Each technique button in sidebar directly opens its description:
- Click button → Description loads instantly
- Scroll to read → No context switching needed
- Keep analyzing → Selection persists during session
- Switch descriptions → Click another button anytime
- Read introduction first: Understand core concept
- Review normal patterns: Know what authentic looks like
- Study red flags: Recognize suspicious indicators
- Understand limitations: Don't over-trust results
- Ask key questions: Use provided decision framework
- Combine techniques: Use multiple tools for stronger conclusions
Descriptions mention when to combine with other techniques:
ELA works well with:
- Metadata (verify editing software)
- Histogram (confirm compression artifacts)
- Frequency (analyze pixel patterns)
CMFD works well with:
- ELA (show edit boundaries)
- Noise (verify clone source)
- PRNU (identify camera source)
And so on...
Each description guides you to complementary techniques!
The description module is designed to be easily updated. If you find:
- Unclear explanations
- Missing examples
- Technical inaccuracies
- New techniques to add
Simply update the corresponding .md file and reload the app!
Total Time to Read All Descriptions: ~30-45 minutes
Time to Read One Description: ~3-5 minutes
Recommended for: Everyone using Veritas, from beginners to experts