首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
计算机分离重叠指纹实验研究   总被引:1,自引:0,他引:1  
目的探讨利用计算机分离重叠指纹方法的实用价值。方法对人工合成和现场采集的重叠指纹进行了大量实验研究,并得出了相关结论。结果计算机分离重叠指纹方法不仅应用范围广泛,操作技术简单,分离效果较好,且不破坏检材,是当前较有效的一种方法。  相似文献   

2.
指纹可以通过它的形态和特征进行人类的个体识别,但对模糊、残缺、重叠、变形的指纹要给予同一认定是相当困难的,笔者应用红细胞粘连试验对指纹的ABO血型进行检验,收到了较好的效果,现报告如下,供同行参考。  相似文献   

3.
公安刑侦人员在犯罪现场往往会看到犯罪嫌疑人遗留在各种塑料、地板、玻璃、纸板或其他物体上的汗液指纹,而遗留在这类客体上的汗液指纹用传统方法提取时经常遇到各种不便,而且提取出来的效果也不尽如人意。本文笔者提出了尝试用硫酸铜显现镀锌板表面无色汗液指纹的方法,并对此种方法进行了详细阐述。  相似文献   

4.
在刑事技术指纹检验工作中,现场指纹受到压力、承痕体等客观条件影响,经常会出现不同程度的变形,有的指纹显现后因中心、三角重叠或错位,碰巧重叠部分拼接纹线又比较流畅,如果简单的从表象分析,往往容易做出错误的判断,以下总结两起变形指纹的检验经验,希望能给同行以借鉴.  相似文献   

5.
微晶荧光乳浊液显现血、汗指纹的研究   总被引:1,自引:0,他引:1  
目的 显现非渗透性和半渗透性客体上的血指纹、汗潜指纹。方法 应用微晶小颗粒荧光乳浊液显现血、汗指纹。结果 对常见的各种非渗透性和半渗透性客体上的新鲜和陈旧的血、汗指纹均可显出。结论 该方法与传统的物理显现方法相比较在于显出效果基本不受指纹遗留时间和客体的性质及表面颜色的影响 ,并且此方法实用、可靠 ,同时该配方还可用于非渗透性和半渗透性客体上涉油指纹的显现 ,是常见客体上血、汗指纹显现的一个重要突破  相似文献   

6.
CAFIS系统的指纹图像计算机自动识别是通过摄像机或扫描仪把指纹档案卡上的指纹转换成电信号,经A/D变换后输入到计算机,组成一幅二维灰度图像,进而实现他的特征抽取或结构分析。CAFIS系统采用的是效果最好的并被实际应用部门所接受的“在纹型粗分类基础上用指纹细节属性进行比对”的识别算法。 通常,一枚指纹的数据文件由指纹原图文件和特征点文件组成,而真正参与识别比对的只有特征点文件。为了提高自动识别的有效性,CAFIS系统对细节  相似文献   

7.
近年来,盗窃电脑内存、硬盘、CPU等计算机配件案件有增无减,而留在电脑主机外壳面上的指纹在粉未显现方法中用磁性粉显现效果最佳,由于电脑主机外壳是凸凹不平的,属非光滑客体,不能用指纹胶带直接粘取提取,大多数采用照相拍摄提取。笔者通过实验用胶水有效地提取到主机外壳上用  相似文献   

8.
如何充分利用指纹计算机自动识别系统(以下简称指纹系统)新增功能,发挥指纹倒查这种检索方式的优势,更好的为侦查破案服务,笔者介绍几种在工作实践中总结出的能够有效提高犯罪嫌疑人指纹倒查破案率的方法和查档技巧,望能与同行交流指正。  相似文献   

9.
随着Photoshop软件功能的不断优化,其在文件检验工作中的应用也越来越广泛。本文是利用Photoshop软件对黑色圆珠笔和蓝色圆珠笔形成的重叠笔迹进行成功分离的一个案例。为了解决笔迹鉴定实践中重叠笔迹的分离问题,本文采用了一种新方法——Photoshop软件分离法对重叠笔迹进行分离,具体采用两次叠加处理的方法。利用Photoshop软件分离重叠笔迹是将计算机技术与笔迹鉴定相结合的一种处理技术,通过笔者在实践中的多次探索,成功分离了两种油墨种类的书写工具形成的重叠笔迹。笔者将具体操作步骤及分离过程列入文中,以供同行业的人员参考。  相似文献   

10.
浅谈变形、残缺、变异指纹的查档与鉴定   总被引:3,自引:1,他引:2  
手印是犯罪案件现场中较为常见的痕迹之一。但由于种种因素所致,会引起现场手印产生变形、残缺、变异等,如果对这些变化不清楚或了解不深透,势必会影响手印的正确检验鉴定工作。本文就现场手印极易产生变形、残缺、变异的主要原因及常见的反映形式进行探讨,目的在于能引起专业人员的共同重视。1现场指纹的变形指纹变形主要是因为人在接触各种客体时,由于用力大小、用力方向的不同,使乳突纹线挤压变形;或者由于在客体上滑动,导致指纹的移动和重叠。对于现场指纹来说,由于作案过程中某些动作的特定性,决定了作案人在现场遗留的指纹有着不同程…  相似文献   

11.
李栋 《政法学刊》2014,(3):66-69
信息技术的广泛应用,推动着社会的发展,人类的进步。然而,利用计算机网络犯罪的现象也相伴而生。近年来,各类重特大案件中涉及到计算机网络也越来越多,如何遏制利用计算机网络犯罪,已是世界各国共同面临的新的突出问题。公安机关计算机网络犯罪侦查部门和相关领域的专家、学者也都在着力于研究网络犯罪的侦查措施和如何防控。  相似文献   

12.
Radiology has been used extensively in conventional dental identification, anatomically based identification and identification using maxillofacial skeletal landmarks such as the frontal sinus. Examples of these are well documented in the literature. The purpose of this paper was to revisit the methods where radiographic methods may be used to determine identity using the teeth, the root structures and the frontal sinuses. Additionally suggestions are offered for management of radiography in mass disasters and cases where age determination is required. Computer assisted tomography can be used in the assessment of the degree of fit of a weapon to a wound in cases of blunt force skull injury and plane films can assist in depicting the pattern of post mortem skull fractures. Micro-computed tomography has been used in matching weapons to wounds in sharp-force injury cases. The radiologist's role in cases of civil litigation and fraud is discussed and case examples are given. There are gaps in the science where radiological methods are used. The author offers several suggestions for possible research projects to close some of these gaps.  相似文献   

13.
论计算机搜查的法律规制   总被引:2,自引:0,他引:2  
计算机搜查是当前司法实践中一种全新的取证措施,在世界范围内得到了日益广泛的运用,同时也引发了一系列的法律障碍。本文从计算机搜查的基本含义切入,采取比较研究的方法,指出我国实务中计算机搜查应当实现由一步式向两步式的根本性转变。在此基础上,本文阐述了我国的计算机搜查在应否申请令状、如何确定搜查范围以及维护案外人的合法权益、借助第三方的协助等方面遭遇的法律问题,并深入地论证了亟待确立的有关法律规则。  相似文献   

14.
高富平 《法学杂志》2012,33(6):7-11
云计算本质是新型的信息服务模式,它既改变了用户设备、软件的支配关系,也使用户对数据丧失了直接的掌控能力。因此,云服务引发了许多新的法律问题,如信息安全、数据权利、知识产权、司法管辖。云服务问题仍然植根于信息通信技术应用产生的问题,我们必须从技术、标准、法律、商业等多角度,解决云计算机的安全和相关问题,以消除我国信息技术的应用方面的法律障碍。  相似文献   

15.
《Digital Investigation》2005,2(2):137-146
A prominent banking institution in the United States has submitted an application to have its Computer Forensics unit inspected as the first step towards attaining accreditation. Several other corporations and businesses that operate Computer Forensics units are also considering submitting their applications. This is in response to the American Society of Crime Laboratory Directors/Laboratory Accreditation Board's (ASCLD/LAB) accreditation program which began offering accreditation in the Digital Evidence Discipline in 2003. As defined in the ASCLD/LAB accreditation manual, any laboratory conducting forensic analysis in any of the four sub-disciplines of Digital Evidence (Audio Analysis, Computer Forensics, Digital Imaging Analysis, or Video Analysis) can apply for accreditation. This information is widely known in the forensic crime laboratory community, but most executives and examiners in the corporate and business sector are not aware that they also can apply for accreditation in the Digital Evidence discipline.  相似文献   

16.
Nordic police cooperation concerning cybercrimes has been developed during the last few years, e.g. through the Nordic Computer Forensics Investigators (NCFI) and Nordplus training programmes. More empirical research is needed in order to enhance cybercrime investigation and address the training needs of police officers. There is a knowledge gap concerning organizational models for the police’s cybercrime investigation: How the function is organized, what the professional characteristics of the staff are and how to combine computer forensics with crime investigation? The purpose of this paper was to study the organization of cybercrime investigation in Finland. Data were collected by a questionnaire from all 11 local police districts and the National Bureau of Investigation in July–August 2014. In addition, six thematic interviews of cybercrime investigators were conducted in 2014. Three investigation models of computer integrity crimes were found: (1) Computer forensic investigators conduct the entire pre-trial examination, (2) Computer forensic investigators conduct only the computer forensics, and tactical investigation is done by an occasional investigator, (3) Computer forensic investigators conduct only the computer forensics and tactical investigation is centralized to designated investigators. The recognition of various organizational models and educational backgrounds of investigators will help to develop cybercrime investigation training.  相似文献   

17.
Computer technology has become an increasingly important tool for conducting eyewitness identifications. In the area of lineup identifications, computerized administration offers several advantages for researchers and law enforcement. PC_Eyewitness is designed specifically to administer lineups. To assess this new lineup technology, two studies were conducted in order to replicate the results of previous studies comparing simultaneous and sequential lineups. One hundred twenty university students participated in each experiment. Experiment 1 used traditional paper-and-pencil lineup administration methods to compare simultaneous to sequential lineups. Experiment 2 used PC_Eyewitness to administer simultaneous and sequential lineups. The results of these studies were compared to the meta-analytic results reported by N. Steblay, J. Dysart, S. Fulero, and R. C. L. Lindsay (2001). No differences were found between paper-and-pencil and PC_Eyewitness lineup administration methods. The core findings of the N. Steblay et al. (2001) meta-analysis were replicated by both administration procedures. These results show that computerized lineup administration using PC_Eyewitness is an effective means for gathering eyewitness identification data.  相似文献   

18.
A quantitative modification of immunofluorescent test (IFT) is described. It was used for species identification of blood stains on material evidence objects. This modification is 1000 times more sensitive than electrophoretic methods traditionally used for this purpose in forensic medicine. Computer processing of the results helps objectively and persuasively determine the species appurtenance of blood and other biological objects. Results of the test represented as histograms should be attached to forensic medical conclusions as proofs for the court.  相似文献   

19.
论计算机信息交易的法律性质   总被引:1,自引:0,他引:1  
齐爱民  周伟萌 《法律科学》2010,28(3):118-126
计算机信息交易是指以计算机信息为客体的在线电子交易,是电子商务的一种特殊类型。计算机信息交易包括计算机信息在线销售与计算机信息在线服务。从法律性质上讲,计算机信息交易是一种信息产品交易,而不涉及知识产权许可与知识产权转让。计算机信息交易的核心是信息产品上的信息财产权,而不是知识产权。  相似文献   

20.
腾讯QQ是一种具有即时通讯功能的计算机软件,和软件复制产品、电磁记录一样都属于计算机信息。盗窃腾讯QQ号码的实质是盗窃腾讯QQ软件复制品。计算机软件是著作权法的客体,而作为无体物的软件复制品和电磁记录却不能构成物权法的客体,只能视为动产给予保护。我国应该借鉴美国统一计算机信息交易法的立法经验,加紧制定计算机信息交易法以规范计算机信息交易,填补相关法律漏洞。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号