Forensic Analysis of AI-Generated Image Alterations Using Metadata Evaluation, ELA, and Noise Pattern Analysis
DOI:
https://doi.org/10.63158/journalisi.v7i4.1362Keywords:
Digital Image Forensics, AI-Generated Images, Metadata Analysis, ELA, Noise AnalysisAbstract
This study develops a forensic workflow to assess the authenticity of digital images, addressing the challenge of distinguishing AI-generated content from real photographs. The goal is to analyze metadata, compression behavior, and noise characteristics to identify synthetic images. The dataset includes eight images: two original Xiaomi 14T Pro photos and six AI-generated variants from Gemini, ChatGPT, and Copilot. Metadata was extracted using ExifTool version 13.25 on Kali Linux, while Error Level Analysis (ELA) and Noise Pattern Analysis (NPA) were performed with consistent parameters on the Forensically platform. Authentic images displayed complete EXIF metadata, uniform compression patterns, and stochastic sensor noise. In contrast, AI-generated images lacked EXIF data, included XMP or C2PA provenance, exhibited localized compression anomalies, and showed smoother, more structured noise patterns. The study presents a practical and reproducible forensic workflow that integrates metadata evaluation, ELA, and noise analysis to detect synthetic content. The findings demonstrate that despite their visual realism, AI-generated images still leave detectable forensic traces, offering valuable tools for image authenticity verification.
Downloads
References
S.-Y. Wang, O. Wang, R. Zhang, A. Owens, and A. A. Efros, “CNN-generated images are surprisingly easy to spot... for now,” Apr. 2020. doi: 10.48550/arXiv.1912.11035.
L. Verdoliva, “Media Forensics and DeepFakes: an overview,” Jan. 2020. doi: 10.48550/arXiv.2001.06564.
A. Näslund, “Image metadata. From information management to interpretative practice,” Museum Management and Curatorship, vol. 39, no. 4, pp. 398–418, Jul. 2024, doi: 10.1080/09647775.2022.2073562.
H. T. Sencar and N. Memon, “Overview of State-of-the-Art in Digital Image Forensics,” in Algorithms, Architectures and Information Systems Security, vol. Volume 3, in Statistical Science and Interdisciplinary Research, vol. Volume 3. , WORLD SCIENTIFIC, 2008, pp. 325–347. doi: 10.1142/9789812836243_0015.
J. A. Redi, W. Taktak, and J.-L. Dugelay, “Digital image forensics: a booklet for beginners,” Multimed Tools Appl, vol. 51, no. 1, pp. 133–162, 2011, doi: 10.1007/s11042-010-0620-1.
H. Farid, “Exposing Digital Forgeries from JPEG Ghosts,” IEEE Transactions on Information Forensics and Security, vol. 4, no. 1, pp. 154–160, Mar. 2009, doi: 10.1109/TIFS.2008.2012215.
N. K. Gill, R. Garg, and E. A. Doegar, “A Review Paper on Digital Image Forgery Detection Techniques,” in 8th International Conference on Computing, Communication and Networking Technologies, Delhi: IEEE, 2017. doi: 10.1109/ICCCNT.2017.8203904.
N. D. Arizona, M. A. Nugroho, A. R. Syujak, R. K. Saputra, and I. Sulistyowati, “Metadata Forensic Analysis as Support for Digital Investigation Process by Utilizing Metadata-Extractor,” Journal of Intelligent Software Systems, vol. 3, no. 2, pp. 27–31, Dec. 2024, doi: 10.26798/jiss.v3i2.1503.
N. A. N. Azhan, R. A. Ikuesan, S. A. Razak, and V. R. Kebande, “Error Level Analysis Technique for Identifying JPEG Block Unique Signature for Digital Forensic Analysis,” Electronics (Basel), vol. 11, no. 9, 2022, doi: 10.3390/electronics11091468.
M. Kharrazi, H. T. Sencar, and N. Memon, “BLIND SOURCE CAMERA IDENTIFICATION,” in 2004 International Conference on Image Processing, Singapore: IEEE, 2004, pp. 709–712. doi: 10.1109/ICIP.2004.1418853.
A. K. Boyat and B. K. Joshi, “A Review Paper : Noise Models in Digital Image Processing,” Signal Image Process, vol. 6, no. 2, pp. 63–75, Apr. 2015, doi: 10.5121/sipij.2015.6206.
J. Lukáš, J. Fridrich, and M. Goljan, “Detecting digital image forgeries using sensor pattern noise,” in Proc.SPIE, Feb. 2006, p. 60720Y. doi: 10.1117/12.640109.
J. Lukáš, J. Fridrich, and M. Goljan, “Digital Camera Identification from Sensor Pattern Noise,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 2, pp. 205–214, Jun. 2006, doi: 10.1109/TIFS.2006.873602.
A. Piva, “An Overview on Image Forensics,” Int Sch Res Notices, vol. 2013, no. 1, p. 496701, Jan. 2013, doi: 10.1155/2013/496701.
A. Bharati et al., “Beyond Pixels: Image Provenance Analysis Leveraging Metadata,” in 2019 IEEE Winter Conference on Applications of Computer Vision (WACV), 2019, pp. 1692–1702. doi: 10.1109/WACV.2019.00185.
N. Yu, L. Davis, and M. Fritz, “Attributing Fake Images to GANs: Learning and Analyzing GAN Fingerprints,” Aug. 2019. doi: 10.48550/arXiv.1811.08180.
H. Bisri and M. I. Marzuki, “Forensik Citra Digital Menggunakan Metode Error Level Analysis, Clone Detection dan Exif Untuk Deteksi Keaslian Gambar,” G-Tech: Jurnal Teknologi Terapan, vol. 7, no. 2, pp. 586–595, Mar. 2023, doi: 10.33379/gtech.v7i2.2363.
D. Baracchi, D. Shullani, M. Iuliani, and A. Piva, “FloreView: An Image and Video Dataset for Forensic Analysis,” IEEE Access, vol. 11, pp. 109267–109282, Oct. 2023, doi: 10.1109/ACCESS.2023.3321991.
N. Soni, “Forensic Value of Exif Data: An Analytical Evaluation of Metadata Integrity across Image Transfer Methods,” Perspectives in Legal and Forensic Sciences, vol. 2, no. 2, 2025, doi: 10.70322/plfs.2025.10006.
M. Subli, M. M. Efendi, and Salman, “PERBANDINGAN HASIL ANALISA FOTO HOAX MENGGUNAKAN METODE EXIF/METADATA, REVERSE IMAGE DAN FORENSICS,” Jurnal Teknik Informatika dan Sistem Informasi, vol. 9, no. 1, pp. 798–811, May 2022, doi: 10.35957/jatisi.v9i1.1578.
S. Raghavan, “Digital forensic research: current state of the art,” CSI Transactions on ICT, vol. 1, no. 1, pp. 91–114, 2013, doi: 10.1007/s40012-012-0008-7.
T. Gloe, M. Kirchner, A. Winkler, and R. Böhme, “Can we trust digital image forensics?,” in Proceedings of the 15th ACM International Conference on Multimedia, in MM ’07. New York, NY, USA: Association for Computing Machinery, 2007, pp. 78–86. doi: 10.1145/1291233.1291252.
M. Anugraha, R. P. Kristianto, and A. Hartanto, “Forensic Metadata Analysis in Detecting Digital Image Manipulation,” Journal of Science and Computers, vol. 9, no. 2, pp. 56–61, Aug. 2025, doi: 10.61179/infact.v9i02.754.
T. S. Gunawan, S. A. M. Hanafiah, M. Kartiwi, N. Ismail, N. F. Za’bah, and A. N. Nordin, “Development of Photo Forensics Algorithm by Detecting Photoshop Manipulation Using Error Level Analysis,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 7, no. 1, pp. 131–137, 2017, doi: 10.11591/ijeecs.v7.i1.pp131-137.
T. Van Lanh, K.-S. Chong, S. Emmanuel, and M. S. Kankanhalli, “A Survey on Digital Camera Image Forensic Methods,” in 2007 IEEE International Conference on Multimedia and Expo, 2007, pp. 16–19. doi: 10.1109/ICME.2007.4284575.
Downloads
Published
Issue
Section
License
Authors Declaration
- The Authors certify that they have read, understood, and agreed to the Journal of Information Systems and Informatics (JournalISI) submission guidelines, policies, and submission declaration. The submission has been prepared using the provided template.
- The Authors certify that all authors have approved the publication of this manuscript and that there is no conflict of interest.
- The Authors confirm that the manuscript is their original work, has not received prior publication, is not under consideration for publication elsewhere, and has not been previously published.
- The Authors confirm that all authors listed on the title page have contributed significantly to the work, have read the manuscript, attest to the validity and legitimacy of the data and its interpretation, and agree to its submission.
- The Authors confirm that the manuscript is not copied from or plagiarized from any other published work.
- The Authors declare that the manuscript will not be submitted for publication in any other journal or magazine until a decision is made by the journal editors.
- If the manuscript is finally accepted for publication, the Authors confirm that they will either proceed with publication immediately or withdraw the manuscript in accordance with the journal’s withdrawal policies.
- The Authors agree that, upon publication of the manuscript in this journal, they transfer copyright or assign exclusive rights to the publisher, including commercial rights














