Oxygen forensics search functions
More often than not, a suspect will make some If PhotoDNA has not been calculated, similar images cannot be found. Note: PhotoDNA hash is calculated at data import. Investigators can view basic file information, such as date created, date modified, date accessed, file path, and hash function. That will prompt a list of all similar images that were found within the device using the PhotoDNA algorithm. To view the similar images for a particular photo, click it. To access results, simply navigate to the Similar Images tab within the Files section, as shown in the panel below. Similar Image Analysis is done automatically when entering the Files section of an extraction or a case. Because PhotoDNA bases its matches on visual similarity and not binary information, it will locate any and all images that appear to be similar. This isn’t an issue for PhotoDNA technology.
![oxygen forensics search functions oxygen forensics search functions](https://teeltechcanada.com/2015/wp-content/uploads/2019/12/Oxygen-Social-Links-300x225.jpg)
However, because hashes use binary information to identify exact copies, it’s impossible to use them to find images that are similar in appearance but have a different hash value. This can be vital in proving or disproving the validity and authenticity of evidential data in a case. Hashing is a great tool for finding an exact duplicate of a file or identifying whether a file has been altered from its original form. PhotoDNAīefore going any further, let’s review the Using PhotoDNA technology, this feature is capable of examining up to 300 thousand photos and identifying their matches in seconds.
![oxygen forensics search functions oxygen forensics search functions](https://cybericus.com/wp-content/uploads/2021/01/mobile-forensic-tools.jpg)
Similar Image Analysis is the latest analytic tool introduced by Oxygen Forensic® Detective v.13.5. However, while hashes don’t have the ability to locate files that have been changed, Similar Image Analysis can do that instantly. Oftentimes, they will manipulate a file to make it undetectable in the event of a hash search. It is natural for a criminal to try to conceal their tracks.