首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 109 毫秒
1.
利用暗记特征鉴别彩色激光打印、复印文件   总被引:1,自引:0,他引:1  
目的探讨激光打印机的暗记特征,为鉴别彩色激光打印、复印文件找到一种有效的方法。方法根据不同物质对光的反射特性及蓝色与黄色互补特性的原理,采用420nm左右蓝光照射方法,对部分品牌彩色激光打印、复印文件进行了初步分析研究,总结了暗记点阵形态特征、小点形态特征、出现位置特征和排列含义等特征。结果此方法对彩色激光打印、复印机具的种类鉴别和个体鉴别简便、有效。  相似文献   

2.
目的探讨坠车损伤及与火车撞击损伤鉴别。方法对行人被撞23例和铁路客车坠车23例死者损伤的部位、类型进行统计分析,有两处以上损伤部位的分别累计计算,采用SPSS软件进行数据进行处理、分析。结果躯干部与身体纵轴方向一致的擦伤是铁路客车坠车区别于行人被撞主要鉴别点。手部损伤伤是铁路客车坠车区别于行人被撞主要鉴别点。下肢损伤不能作为铁路客车坠车区别于行人被撞主要鉴别点。  相似文献   

3.
目的建立液相色谱分析方法,对市售的30种不同厂家牌号(原装)染料型黑色喷墨打印字迹进行区分鉴别。方法通过选择最佳的提取条件、流动相,考察纸张、字迹形成方式等的影响,及样品及仪器的稳定性实验,确定实验条件。结果选择了最佳的反相高效液相色谱(RP-HPLC)分析方法:固定相为X-bridge Shield RP18(3.5μm,4.6×100mm),流动相为乙腈-NH4HCO3溶液(10mmol/L),梯度洗脱,检测波长为585nm、475nm;用该方法,根据字迹染料成分的差异将30种样品分为四大类17小类。结论该方法可以为鉴别区分不同厂家染料型黑色喷墨打印字迹提供依据。  相似文献   

4.
目的建立一种简便快速、灵敏准确的鉴别指甲油样品的方法。方法以乙腈为提取剂,在乙腈/水(80∶20),检测波长为UV-220nm的色谱条件下,对22种不同产地、不同品牌的指甲油样品进行HPLC分析。结果依据指甲油中组分的不同,可将其分为5大类,每类中各个样品又可根据其色谱峰峰面积比的不同,进一步进行种类的鉴别。结论该方法是一种简便、快速、准确的鉴别指甲油的方法。  相似文献   

5.
钟燕 《法制与社会》2011,(25):87-88
损失的界定和赔偿计算方式是证券民事赔偿案件处理过程中无法绕过的问题。本文笔者通过对损失赔偿范围界定和赔偿计算的一般方法进行研究的基础上,借鉴其它国家和地区的做法,结合我国目前对虚假陈述赔偿的界定和计算,尝试提出了对我国操纵证券市场民事赔偿损失的界定和赔偿计算方式的改进建议。  相似文献   

6.
警犬鉴别人体气味操作方法研究进展   总被引:4,自引:2,他引:2  
警犬鉴别是刑事侦查工作中进行个体气味鉴定的独特技术手段。目前已经形成的警犬鉴别人体气味的方法有直接鉴别法、罐内或瓶内鉴别法、管式鉴别法和气孔鉴别法,由于管式鉴别法和气孔鉴别法的鉴别结果有较高的可信度,故被法庭科学认为是2种较好的鉴别人体气味的方法。  相似文献   

7.
生物特征识别技术是近几年在全球范围内迅速发展起来的计算机安全技术,它是指根据人的生理特征及行为特征,利用图像处理和模式识别技术鉴别和验证身份。生物特征识别技术是一种可靠的身份识别方式,在许多身份识别系统中起着不可替代的重要作用。本文介绍了生物特征识别系统的原理及应用领域,分析了其面临的挑战和发展方向。  相似文献   

8.
问:对因侵犯公民的人身权利造成的损害,国家应如何赔偿?请求人提出什么要求才符合法律规定?答:按照法律规定,因侵犯公民的人身权利所造成的损害,国家以支付赔偿金为主要赔偿方式。赔偿的计算标准,可根据不同性质、不同情况,分别计算,请求人可根据这种计算结果,...  相似文献   

9.
危险废物是指列入国家危险废物名录,或者根据国家规定的危险废物鉴别标准和鉴别方法认定的具有危险特性的废物。危险特性包括腐蚀性、毒性、易燃性、反应性、感染性,经鉴别具有反应性危险特性的固体废物,应认定为危险废物。  相似文献   

10.
为规范执行程序中迟延履行期间债务利息的计算,根据《中华人民共和国民事诉讼法》的规定,结合司法实践,制定本解释。第一条 根据民事诉讼法第二百五十三条规定加倍计算之后的迟延履行期间的债务利息,包括迟延履行期间的一般债务利息和加倍部分债务利息。迟延履行期间的一般债务利息,根据生效法律文书确定的方法计算:生效法律文书未确定给付该利息的,不予计算。  相似文献   

11.
Reverse engineering is the primary step to analyze a piece of malware. After having disassembled a malware binary, a reverse engineer needs to spend extensive effort analyzing the resulting assembly code, and then documenting it through comments in the assembly code for future references. In this paper, we have developed an assembly code clone search system called ScalClone based on our previous work on assembly code clone detection systems. The objective of the system is to identify the code clones of a target malware from a collection of previously analyzed malware binaries. Our new contributions are summarized as follows: First, we introduce two assembly code clone search methods for malware analysis with a high recall rate. Second, our methods allow malware analysts to discover both exact and inexact clones at different token normalization levels. Third, we present a scalable system with a database model to support large-scale assembly code search. Finally, experimental results on real-life malware binaries suggest that our proposed methods can effectively identify assembly code clones with the consideration of different scenarios of code mutations.  相似文献   

12.
为了解决犯罪嫌疑人在被调查时,提出所涉及计算机犯罪行为为木马所为这一问题,本文以木马程序攻击为例,针对相关电子证据和计算机取证进行分析判断,以确定犯罪嫌疑人的罪行或证明其清白。  相似文献   

13.
王怀勇 《政法论丛》2021,(1):105-116
随着算法在金融领域应用的深入,算法固有的缺陷和特性也逐渐与金融本身的风险和逻辑发生耦合,形成了算法歧视、算法绑架、算法趋同等新型金融风险。然而,现有的金融科技算法规制框架存在主体、对象和工具层面的诸多问题,导致金融科技算法风险规制的低效和失灵,因而需要进行规制路径的优化和调适。从主体层面出发,应构建以金稳会为基础的规制协调机制和监管者、行业协会、企业分工合作的多元规制格局;从对象层面着手,应在将所有算法应用业态纳入统一规制框架的基础上,确立以"数据规模"为标准的规制门槛;从工具层面调整,应构建以"快捷沙盒"为制度载体的算法测试制度和可选择的算法披露机制,并积极探索自动化监管模式和代码规制的落地和应用。  相似文献   

14.
Due to historical legal challenges, there is a driving force for the development of objective methods of forensic toolmark identification. This study utilizes an algorithm to separate matching and nonmatching shear cut toolmarks created using fifty sequentially manufactured pliers. Unlike previously analyzed striated screwdriver marks, shear cut marks contain discontinuous groups of striations, posing a more difficult test of algorithm applicability. The algorithm compares correlation between optical 3D toolmark topography data, producing a Wilcoxon rank sum test statistic. Relative magnitude of this metric separates the matching and nonmatching toolmarks. Results show a high degree of statistical separation between matching and nonmatching distributions. Further separation is achieved with optimized input parameters and implementation of a “leash” preventing a previous source of outliers—however complete statistical separation was not achieved. This paper represents further development of objective methods of toolmark identification and further validation of the assumption that toolmarks are identifiably unique.  相似文献   

15.
Digital investigation of anthropological material through computed tomography (CT) offers several new opportunities in morphometrics. However, an object measured with computer-assisted methods does not necessarily exactly match the original one. The scanning and surface reconstruction of the object induce some alterations, and data acquisition is prone to measurement uncertainty. The purpose of this research is to evaluate the intra- and inter-observers variations in medical CT scan measurements of a known-size phantom and two dry crania. Two software packages, AMIRA and Treatment and Increased Vision for Medical Imaging (TIVMI), which use different techniques of surface reconstructions, were compared. The mean difference between the measurements was lower for TIVMI, using an objective algorithm based on the half-maximum height (HMH) protocol in three dimensions (3D). AMIRA can induce up to a 4% error in known measurements and 5% uncertainty in dry skull measurements. This study emphasises the risk of object shape alteration in each step of its digitisation.  相似文献   

16.
In this paper, we review literature on antiforensics published between 2010 and 2016 and reveal the surprising lack of up‐to‐date research on this topic. This research aims to contribute to this knowledge gap by investigating different antiforensic techniques for devices running Windows 7, one of the most popular operating systems. An approach which allows for removal or obfuscation of most forensic evidence is then presented. Using the Trojan software DarkComet RAT as a case study, we demonstrate the utility of our approach and that a Trojan Horse infection may be a legitimate possibility, even if there is no evidence of an infection on a seized computer's hard drive. Up‐to‐date information regarding how forensic artifacts can be compromised will allow relevant stakeholders to make informed decisions when deciding the outcome of legal cases involving digital evidence.  相似文献   

17.
In this article, the performance of a score‐based likelihood ratio (LR) system for comparisons of fingerprints with fingermarks is studied. The system is based on an automated fingerprint identification system (AFIS) comparison algorithm and focuses on fingerprint comparisons where the fingermarks contain 6–11 minutiae. The hypotheses under consideration are evaluated at the level of the person, not the finger. The LRs are presented with bootstrap intervals indicating the sampling uncertainty involved. Several aspects of the performance are measured: leave‐one‐out cross‐validation is applied, and rates of misleading evidence are studied in two ways. A simulation study is performed to study the coverage of the bootstrap intervals. The results indicate that the evidential strength for same source comparisons that do not meet the Dutch twelve‐point standard may be substantial. The methods used can be generalized to measure the performance of score‐based LR systems in other fields of forensic science.  相似文献   

18.
Numerous studies have focused on determining whether objective statistical methods can be used to discriminate between known matches and nonmatches when comparing laboratory prepared toolmarks. This study involved an analysis of striated toolmarks made as a function of varying vertical and horizontal angles of attack. Comparisons based on experimental data show that replicate toolmarks from the same tool show high correlation values at identical vertical and horizontal angles, with the correlation decreasing as the angular difference increases, especially for horizontal angular changes. Comparisons between nonmatching samples produce low correlation values that remain unchanged as horizontal angular differences increase. While complete statistical separation was not achieved between matching and nonmatching samples, there is evidence demonstrating that toolmarks can be identified if the variation in horizontal angle is within 10°. The experiment shows that computer‐aided comparison techniques could be viable for identification with the proper statistical algorithm.  相似文献   

19.
Patch-Match is an efficient algorithm used for structural image editing and available as a tool on popular commercial photo-editing software. The tool allows users to insert or remove objects from photos using information from similar scene content. Recently, a modified version of this algorithm was proposed as a counter-measure against Photo-Response Non-Uniformity (PRNU) based Source Camera Identification (SCI). The algorithm can provide anonymity at a great rate (97%) and impede PRNU based SCI without the need of any other information, hence leaving no-known recourse for the PRNU-based SCI. In this paper, we propose a method to identify sources of the Patch-Match-applied images by using randomized subsets of images and the traditional PRNU based SCI methods. We evaluate the proposed method on two forensics scenarios in which an adversary makes use of the Patch-Match algorithm and distorts the PRNU noise pattern in the incriminating images she took with his camera. Our results show that it is possible to link sets of Patch-Match-applied images back to their source camera even in the presence of images that come from unknown cameras. To our best knowledge, the proposed method represents the very first counter-measure against the usage of Patch-Match in the digital forensics literature.  相似文献   

20.
Historical and recent challenges to the practice of comparative forensic examination have created a driving force for the formation of objective methods for toolmark identification. In this study , fifty sequentially manufactured chisels were used to create impression toolmarks in lead (500 toolmarks total). An algorithm previously used to statistically separate known matching and nonmatching striated screwdriver marks and quasi-striated plier marks was used to evaluate the chisel marks. Impression toolmarks, a more complex form of toolmark, pose a more difficult test for the algorithm that was originally designed for striated toolmarks. Results show in this instance that the algorithm can separate matching and nonmatching impression marks, providing further validation of the assumption that toolmarks are identifiably unique.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号