The purpose of this quantitative correlational study was to determine if a unique signature exists for EXIF JPEG elements from an iPhone 7 iOS 11 for source device and native picture application authentication. Law enforcement investigators need reliable and field applicable techniques for source authentication (Kraetzer & Dittmann, 2015), facilitating criminal identification (Miller, 2013). The general problem was law enforcement does not possess the knowledge or expertise for digital image source authentication on specific hardware and version implementations (Cummins Flory, 2016; Gogolin, 2010; Holt & Bossler, 2016). The specific problem was law enforcement does not possess the knowledge or expertise for digital image source authentication with EXIF JPG images for an iPhone 7 with iOS 11 (Cummins Flory, 2016). Literature review presented law enforcement training considerations, hardware/software implications for EXIF JPEG source authentication, and non-EXIF source authentication implications. This quantitative correlational study presented a moderate to strong correlation between Manufacturer, Model and Operations to a unique signature from EXIF JPEG. Test-retest reliability identified secondary quantization table usage, reducing anticipated 100% matching output to 99.04%. Field values for an iPhone 7 with iOS 11 were identified with differences from iPhone 5s, iPhone 6 and Samsung Galaxy S7 with Android 7.0.
|Commitee:||Butler, William, Pittman, Jason|
|School:||Capitol Technology University|
|School Location:||United States -- Maryland|
|Source:||DAI-B 81/9(E), Dissertation Abstracts International|
|Subjects:||Information Technology, Computer science, Computer Engineering|
|Keywords:||EXIF, Image forensics, JPEG, Metadata, Quantization, Source authentication|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be