首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 15 毫秒
1.
    
Patch-Match is an efficient algorithm used for structural image editing and available as a tool on popular commercial photo-editing software. The tool allows users to insert or remove objects from photos using information from similar scene content. Recently, a modified version of this algorithm was proposed as a counter-measure against Photo-Response Non-Uniformity (PRNU) based Source Camera Identification (SCI). The algorithm can provide anonymity at a great rate (97%) and impede PRNU based SCI without the need of any other information, hence leaving no-known recourse for the PRNU-based SCI. In this paper, we propose a method to identify sources of the Patch-Match-applied images by using randomized subsets of images and the traditional PRNU based SCI methods. We evaluate the proposed method on two forensics scenarios in which an adversary makes use of the Patch-Match algorithm and distorts the PRNU noise pattern in the incriminating images she took with his camera. Our results show that it is possible to link sets of Patch-Match-applied images back to their source camera even in the presence of images that come from unknown cameras. To our best knowledge, the proposed method represents the very first counter-measure against the usage of Patch-Match in the digital forensics literature.  相似文献   

2.
分析木马源程序自身的特征,提出两种鉴别目标代码宿源的方法:根据其机器码和注册码的计算方式或者根据收信地址的保存方式和加密计算方式和参数进行鉴别。上述方法客观而高效。  相似文献   

3.
4.
一直涉案打印文件言语人的同一认定   总被引:2,自引:0,他引:2  
涉案打印文件言语人的同一认定,即打印文件撰稿人的认定,这是新时期文件检验面临的一个新的、需要深入研究的重要课题。文章以一起跨世纪侦查的重大案件为主,阐述了从涉案打印文件言语特征(形式)和思想内涵(内容)两方面成功认定案件嫌疑人的具体做法和体会。文章认为,只要满足相关条件,以现代语言科学有关理论为指导,根据打印文件言语特征,认定案件嫌疑人是可行的,也是科学的。  相似文献   

5.
本文以语音自动话者识别系统为平台,对实际案件中出现频率较高的10种伪装语音类型进行自动话者识别测试。通过对20位发音人的正常语音和10种类型伪装语音的话者辨认和话者确认测试,分析不同语音伪装类型对自动话者识别的影响。该结果对于深入认识伪装语音的特性及其话者识别研究具有重要意义,也为自动话者识别技术的改进提供了参考。  相似文献   

6.
目的 研究光盘表面不同区域留存的生产源特征的成因、特性 ,比较各种特征稳定性和特定性的差异。方法 通过寻找光盘表面各种生产源痕迹特征的规律和特点 ,为鉴定光盘生产加工来源提供准确依据。结果 研究表明 ,光盘表面不同区域的生产源特征稳定性、特定性存在差异。结论 根据各种生产源特征自身特性不同 ,加以区别使用 ,有助于正确做出只读光盘生产源鉴定  相似文献   

7.
苏联东欧剧变后,由原9个社会主义国家变成的29个非社会主义性质国家先后颁布的29部新宪法既吸取了社会主义时期宪法的教训,又借鉴了资本主义国家宪法的经验,它们是当代宪法典的重要类型和典型代表。这些宪法典的制定至少体现了当代宪法典制定的三大特点:强调公民的直接参与;注重世界人权公约的借鉴;重视宪法法院的设置。  相似文献   

8.
本文以目前社会上流行的两款不同类别的电子伪装语音器材为对象,对多名实验对象变声前、后的声学特征(基频、共振峰、声调、能量和过零率等)进行了深入的实验分析。实验结果和分析表明,变声相对于原声,其声学特征变化是有规律的,根据这一声学特征变化规律,对变声语音逆变声就能得到与原声符合很好的恢复语音,这为深入开展对经过电子伪装的语音进行同一人鉴定奠定了基础。  相似文献   

9.
机动车车体潜在标识符的检验   总被引:1,自引:0,他引:1  
宋庆芳  郭茂欢 《政法学刊》2009,26(3):124-128
机动车的发动机和车架等商品序列号是其原始标识符,一般是通过对金属表面冲压的方式形成的,是表明商品唯一性的代码。对已损毁的机动车车体原始标识符的检验鉴定,是侦破机动车盗抢案件的关键性技术环节。了解并掌握损毁、篡改机动车车体标识符的常用方法,改进并优化对潜在标识符的显现技术,进而提高此类案件的侦破率,是刑事技术领域的一项重要工作。  相似文献   

10.
本文以目前社会上流行的两款不同类别的电子伪装语音器材为对象,对多名实验对象变声前、后的声学特征(基频、共振峰、声调、能量和过零率等)进行了深入的实验分析。实验结果和分析表明,变声相对于原声,其声学特征变化是有规律的,根据这一声学特征变化规律,对变声语音逆变声就能得到与原声符合很好的恢复语音,这为深入开展对经过电子伪装的语音进行同一人鉴定奠定了基础。  相似文献   

11.
Biometrics contributes a new dimension to authentication and identification process of persons. Besides knowledge (passwords) and possession (smart cards), biometrics provides new means of personal identification. Biometrics procedures are used to recognize or verify behavioral or physical characteristics of a person. Also biometry provides us with a user-friendly method for automatically identification and becoming a competitor for current identification systems, especially for electronic transactions. Cause of biometric increasing position in electronic transaction and security identification system we must to assure perfect information security tools to purpose stability such a systems. But before deploying any security tools or system, one should carefully examine the sensibility and added value of it, as we do in our daily work. However, there are ways to compromise a system based on biometric identification. This article focuses on the future and draw-after of biometric identification, specifically implication on tomorrow's network society.  相似文献   

12.
Although several papers have recently been devoted to establishing the validity of identification using the ear, this part of the human body still remains underexploited in forensic science. The perfect overlap of two images of the same ear is not really possible, but photographs of the ears as a reliable means of inferring the identity of an individual are poorly treated in the literature. In this study, we illustrate a simple, reproducible method, which divides the photograph of an ear into four parts-helix, antihelix, concha, and lobe-by means of a suitable grid of four straight lines. Although the division does not follow exact anatomical features, their edges do join anatomical points which are more easily identifiable. Measurement of certain areas of these parts can be combined to produce a code allowing personal identification. This method produces false-positive identifications of <0.2%. Last, the repeatability and reproducibility aspects of the method are tested.  相似文献   

13.
    
Continuing advancements in the field of digital cameras and surveillance imaging devices have led law enforcement and intelligence agencies to use analysis of images and videos for the investigation and prosecution of crime. When determining identity from photographic evidence, forensic analysts perform comparison of visible facial features manually, which is inefficient. In this study, we will address research efforts to use facial marks as biometric signatures to distinguish between individuals. We propose two systems to assist forensic analysts during photographic comparison: an improved multiscale facial mark system in which facial marks are detected automatically, and a semi‐automatic facial mark system that integrates human knowledge within the improved multiscale facial mark system. Experiment results employ a high‐resolution time‐elapsed dataset acquired at the University of Notre Dame between 2009 and 2011. The results indicate that the geometric distributions of facial mark patterns can be used to distinguish between individuals.  相似文献   

14.
    
The study of frontal sinuses for personal identification is a considered approach in the forensic field. In Yoshino's system, the frontal sinus patterns of a given person were formulated as a code number (codY) obtained by arranging the class numbers in each classification item. The aim of this work was to use a new code number (codC) with eight digits that includes other two continuous variables obtained as ratios SOR1 (left frontal sinus area/left orbit area) and SOR2 (right frontal sinus area/right orbit area), comparing the results with that of Yoshino. Digital radiographic images of the skulls of 150 Chinese people were analyzed. Spearman's partial correlation coefficients were evaluated between variables characterizing frontal sinus patterns. We used a maximum-weight dependence tree for statistical analysis. Results demonstrated that codC significantly reduced the probability of having the same personal code number compared with codY. Our scientific approach results valid for personal identification purposes.  相似文献   

15.
Each digital camera has an intrinsic fingerprint that is unique to each camera. This device fingerprint can be extracted from an image and can be compared with a reference device fingerprint to determine the device origin. The complexity of the filters proposed to accomplish this is increasing. In this note, we use a relatively simple algorithm to extract the sensor noise from images. It has the advantages of being easy to implement and parallelize, and working faster than the wavelet filter that is common for this application. In addition, we compare the performance with a simple median filter and assess whether a previously proposed fingerprint enhancement technique improves results. Experiments are performed on approximately 7500 images originating from 69 cameras, and the results are compared with this often used wavelet filter. Despite the simplicity of the proposed method, the performance exceeds the common wavelet filter and reduces the time needed for the extraction.  相似文献   

16.
Use of acids and other caustic substances in destroying the human body to avoid personal identification is drawing great deal of attention in recent times. With rapid industrial growth, incidence of industrial disasters has increased. In an event of chemical industry disaster, human identification can become a challenge. Embedding bar codes and other electronic means for identification in denture have proved to be a novel innovation in identification of edentulous patients. However, the validity of this method in events of chemical extremes has not been assessed. Hence, the study was undertaken to know the effect of different acids on dentures embedded with quick response codes. Results of this study indicate that simple bar code can be readable up to 33 h after acid treatment. With minimal armamentarium, bar code can be generated incorporating large data into it, providing it to be a cheap and reliable means of denture identification.  相似文献   

17.
利用激光刻章机雕刻、光敏印章机制印伪造印章印文是近年来出现的一种新的、仿真程度较高的伪造印章印文的方法。鉴定实践表明,这类伪造印章印文趋于专业化、技术化,且伪造的印章印文与真实印章印文的相似度较高。依据传统的鉴定依据和方法难以鉴别真伪,因此从该类伪造方法对其特点和鉴定依据、方法要点进行研究,尤其是对伪造形成方式及特点的研究,有助于科学的鉴定其真伪。  相似文献   

18.
    
Fingerprint practitioners rely on level 3 features to make decisions in relation to the source of an unknown friction ridge skin impression. This research proposes to assess the strength of evidence associated with pores when shown in (dis)agreement between a mark and a reference print. Based upon an algorithm designed to automatically detect pores, a metric is defined in order to compare different impressions. From this metric, the weight of the findings is quantified using a likelihood ratio. The results obtained on four configurations and 54 donors show the significant contribution of the pore features and translate into statistical terms what latent fingerprint examiners have developed holistically through experience. The system provides LRs that are indicative of the true state under both the prosecution and the defense propositions. Not only such a system brings transparency regarding the weight to assign to such features, but also forces a discussion in relation to the risks of such a model to mislead.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号