Click here to close now.

Welcome!

IoT User Interface Authors: Liz McMillan, Pat Romanski, Adrian Bridgwater, Lori MacVittie, Frank McCourt

News Feed Item

New Photo Sharing Service izitru Establishes Photoshop-Free Zone

Website, App, and API Identify Unmodified Photos Using Cutting-Edge Forensics

SAN JOSE, CA -- (Marketwired) -- 05/06/14 -- Fourandsix Technologies, Inc. today has launched izitru.com, a free image hosting site that applies advanced image forensics to prove that hosted photos have not been modified with Photoshop or other tools. Addressing a growing distrust of manipulated images, the new website and its companion iPhone app provide an easy way for consumers to share photos with credibility assured. In addition, a developer API offers the opportunity to integrate photo authentication into any website, or to support enterprise workflows that demand reliable photo evidence.

Restoring Trust in Photography

Due to the wide availability of image editing software, it is becoming rare to see photos that haven't been modified in some way from the time they were first captured. Viewers are unsure of what to trust, whether they're looking at a selfie on Facebook, an item for sale on eBay, or a dramatic storm cloud photo on Twitter. Notable photo hoaxes, sometimes even fooling legitimate news outlets, have heightened the sense of distrust to the point that even real photos are often questioned and picked apart online.

"While there's value in creative manipulation of photos, there remains a critical role for photos to play in documenting reality," said Fourandsix co-founder and CEO Kevin Connor. "Our goal with izitru is to provide the anchor for that reality, so that the most trustworthy photos can easily stand out from the chatter of manipulated imagery."

Izitru integrates more than a decade's worth of image forensics research that can distinguish an original JPEG file captured with a digital camera from subsequent derivations of that file that may have been changed in some way. As soon as an image has been uploaded to izitru, it is subjected to a series of six different forensic tests. Images that pass all six of these tests get the highest trust rating.

Share Trusted Images in Seconds

First-time visitors to izitru.com can generate an authenticated image link in seconds. Just tap the Upload button, and choose to upload any unmodified JPEG file from a digital camera. There's no need to create a user ID, though users who want to track and maintain multiple image links can sign in with an existing social media ID. The iPhone app further simplifies the process by including a built-in camera for capturing images.

Every image uploaded to izitru is hosted on a dedicated page with a prominent trust rating. A short URL and convenient sharing buttons make it easy to share the result on social media or via email.

Expert Forensic Analysis When Needed

The automated forensic techniques used by izitru are sufficient for most images, but there may occasionally be more challenging images that would benefit from a trained eye and more specialized analysis. For this reason, every image page on izitru features a Challenge button that visitors can tap to indicate they disagree with the forensic analysis. Images that receive a high number of challenges will get a closer look from izitru experts who will run more advanced tests. If appropriate, the trust rating will then be updated. This community feedback will also contribute to a continual refinement of izitru's automated testing routines.

API for Integration with Websites and Business Processes

Though the izitru app and website are immediately useful on their own, the greatest potential of this new service lies with an API that will permit third-party websites and businesses to bypass izitru.com and send images directly to the izitru servers for analysis. Using this API, a social media site could automatically rate the trustworthiness of photos as they are shared, or an insurance company could flag suspicious accident claim photos as they are submitted from a smartphone app.

Availability

The izitru website is available immediately, and the izitru app will be made available today in the Apple App Store. Both are free. Direct use of the API for integrating izitru with other websites or services is fee-based, and interested parties should contact izitru directly at [email protected].

About Fourandsix Technologies, Inc.

Fourandsix Technologies, Inc. serves the mission of developing practical solutions that separate truth from deception in photos. It was co-founded in 2011 by two established imaging experts: Kevin Connor, a former leader of the Adobe Photoshop product line, and Dartmouth College's Dr. Hany Farid, whose pioneering research in image forensics established the technical foundation of the company.

©2014 Fourandsix Technologies, Inc. Fourandsix and izitru are trademarks of Fourandsix Technologies, Inc. Adobe and Photoshop are registered trademarks of Adobe Systems Incorporated. Other company and organization names may be trademarks of their respective owners.

Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2583244
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2583247
Video-Link Available: http://www2.marketwire.com/mw/frame_mw?attachid=2583255

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Kevin Connor
Fourandsix Technologies, Inc.
650-946-1404
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

@CloudExpo Stories
"We help to transform an organization and their operations and make them more efficient, more agile, and more nimble to move into the cloud or to move between cloud providers and create an agnostic tool set," noted Jeremy Steinert, DevOps Services Practice Lead at WSM International, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
The basic integration architecture, as defined by ESBs, hasn’t changed for more than a decade. Most cloud integration providers still rely on an ESB architecture and their proprietary connectors. As a result, enterprise integration projects suffer from constraints of availability and reliability of these connectors that are not re-usable across other integration vendors. However, the rapid adoption of APIs and almost ubiquitous availability of APIs amongst most SaaS and Cloud applications are ra...
Agile, which started in the development organization, has gradually expanded into other areas downstream - namely IT and Operations. Teams – then teams of teams – have streamlined processes, improved feedback loops and driven a much faster pace into IT departments which have had profound effects on the entire organization. In his session at DevOps Summit, Anders Wallgren, Chief Technology Officer of Electric Cloud, will discuss how DevOps and Continuous Delivery have emerged to help connect dev...
"What Dyn is able to do with our Internet performance and our Internet intelligence is give companies visibility into what is actually going on in that cloud," noted Corey Hamilton, Product Marketing Manager at Dyn, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
The Internet of Things is not only adding billions of sensors and billions of terabytes to the Internet. It is also forcing a fundamental change in the way we envision Information Technology. For the first time, more data is being created by devices at the edge of the Internet rather than from centralized systems. What does this mean for today's IT professional? In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists addressed this very serious issue of pro...
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
Manufacturing has widely adopted standardized and automated processes to create designs, build them, and maintain them through their life cycle. However, many modern manufacturing systems go beyond mechanized workflows to introduce empowered workers, flexible collaboration, and rapid iteration. Such behaviors also characterize open source software development and are at the heart of DevOps culture, processes, and tooling.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Live Webinar with 451 Research Analyst Peter Christy. Join us on Wednesday July 22, 2015, at 10 am PT / 1 pm ET In a world where users are on the Internet and the applications are in the cloud, how do you maintain your historic SLA with your users? Peter Christy, Research Director, Networks at 451 Research, will discuss this new network paradigm, one in which there is no LAN and no WAN, and discuss what users and network administrators gain and give up when migrating to the agile world of clo...
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Internet of Things (IoT) will be a hybrid ecosystem of diverse devices and sensors collaborating with operational and enterprise systems to create the next big application. In their session at @ThingsExpo, Bramh Gupta, founder and CEO of robomq.io, and Fred Yatzeck, principal architect leading product development at robomq.io, discussed how choosing the right middleware and integration strategy from the get-go will enable IoT solution developers to adapt and grow with the industry, while at th...
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult – let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and liv...
The last decade was about virtual machines, but the next one is about containers. Containers enable a service to run on any host at any time. Traditional tools are starting to show cracks because they were not designed for this level of application portability. Now is the time to look at new ways to deploy and manage applications at scale. In his session at @DevOpsSummit, Brian “Redbeard” Harrington, a principal architect at CoreOS, will examine how CoreOS helps teams run in production. Attende...
"We have a tagline - "Power in the API Economy." What that means is everything that is built in applications and connected applications is done through APIs," explained Roberto Medrano, Executive Vice President at Akana, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes. In his session at DevOps Summit, Michael Demmer, VP of Engineering at Jut, will discuss how this can...
"A lot of the enterprises that have been using our systems for many years are reaching out to the cloud - the public cloud, the private cloud and hybrid," stated Reuven Harrison, CTO and Co-Founder of Tufin, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.