首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
熊永明 《法学论坛》2005,20(3):110-116
各国立法中的伪造包括有形伪造和无形伪造两种情况.有形伪造是指无制作权限人非法制作文书的行为;无形伪造是指有制作权限者制作内容虚伪文书的行为.有形伪造与无形伪造的区别在于"名义人与制作人之间的人格是否具有一致性".处罚无形伪造的宗旨在于其侵犯文书的证据力.我国刑法中的伪造包含有形伪造和无形伪造两种含义,司法实践存在处罚无形伪造行为的案件.  相似文献   

2.
In our society digital images are a powerful and widely used communication medium. They have an important impact on our life. In recent years, due to the advent of high-performance commodity hardware and improved human-computer interfaces, it has become relatively easy to create fake images. Modern, easy to use image processing software enables forgeries that are undetectable by the naked eye. In this work we propose a method to automatically detect and localize duplicated regions in digital images. The presence of duplicated regions in an image may signify a common type of forgery called copy-move forgery. The method is based on blur moment invariants, which allows successful detection of copy-move forgery, even when blur degradation, additional noise, or arbitrary contrast changes are present in the duplicated regions. These modifications are commonly used techniques to conceal traces of copy-move forgery. Our method works equally well for lossy format such as JPEG. We demonstrate our method on several images affected by copy-move forgery.  相似文献   

3.
刑法中伪造信用卡犯罪中的伪造不仅包括仿制其物理外观的形式伪造,还应包括将权利人信息写入磁条介质、芯片等的内容伪造。作为伪造对象的信用卡应当是具有物理载体的实体卡片,事实上不存在对虚拟信用卡的伪造。以虚假身份骗领无对应实体卡的虚拟信用卡应视为妨害信用卡管理罪中的骗领信用卡行为;利用权利人既有实体卡信息,复制虚拟信用卡的行为系对他人信用卡信息资料的非法使用而非伪造。有关伪造信用卡犯罪刑法规定的立法原意并不包含伪造空白信用卡,伪造空白信用卡具有严重的社会危害性,理应将其纳入刑法规制范围,以保持与妨害信用卡管理罪刑法规定的协调。不能通过司法解释改变立法原意,现行刑法中伪造信用卡犯罪的伪造含义应有相应的调整。  相似文献   

4.
Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy–move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy–move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy–move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.  相似文献   

5.
对艺术伪造的理解在德国有广义和狭义之分.广义的艺术伪造包括艺术模仿、艺术篡改和艺术诈骗.狭义的艺术伪造则与广义的艺术伪造中的艺术诈骗是一致的,都与被署名人的作品无关.不过,从德国法律适用的角度看,艺术伪造主要分为两类:一类是与被署名人作品无关的艺术伪造;另一类则是与被署名人作品有关的艺术伪造.对前者的认定不是依据德国著作权法,而是依据其他法律;对后者的认定则是依据德国著作权法,同时德国刑法有关规定对此亦可适用.与我国法相比,德国著作权法更强调以作品存在为前提来保护作者的著作权.另外,对与被署名人作品有关的艺术伪造的规制,德国法律严于我国.  相似文献   

6.
This article presents a possible mode of forgery by transferring an original signature written either with a pencil or with an Eraser Mate pen by means of transparent pressure tape. It also describes the characteristics of this kind of forgery and proposes some methods of disclosing it.  相似文献   

7.
Nowadays, surveillance systems are used to control crimes. Therefore, the authenticity of digital video increases the accuracy of deciding to admit the digital video as legal evidence or not. Inter‐frame duplication forgery is the most common type of video forgery methods. However, many existing methods have been proposed for detecting this type of forgery and these methods require high computational time and impractical. In this study, we propose an efficient inter‐frame duplication detection algorithm based on standard deviation of residual frames. Standard deviation of residual frame is applied to select some frames and ignore others, which represent a static scene. Then, the entropy of discrete cosine transform coefficients is calculated for each selected residual frame to represent its discriminating feature. Duplicated frames are then detected exactly using subsequence feature analysis. The experimental results demonstrated that the proposed method is effective to identify inter‐frame duplication forgery with localization and acceptable running time.  相似文献   

8.
Region duplication forgery is one of the tampering techniques that are frequently used, where a part of an image is copied and pasted into another part of the same image. In this paper, a phase correlation method based on polar expansion and adaptive band limitation is proposed for region duplication forgery detection. Our method starts by calculating the Fourier transform of the polar expansion on overlapping windows pair, and then an adaptive band limitation procedure is implemented to obtain a correlation matrix in which the peak is effectively enhanced. After estimating the rotation angle of the forgery region, a searching algorithm in the sense of seed filling is executed to display the whole duplicated region. Experimental results show that the proposed approach can detect duplicated region with high accuracy and robustness to rotation, illumination adjustment, blur and JPEG compression while rotation angle is estimated precisely for further calculation.  相似文献   

9.
10.
《Digital Investigation》2014,11(2):120-140
In this paper, we present a passive approach for effective detection and localization of region-level forgery from video sequences possibly with camera motion. As most digital image/video capture devices do not have modules for embedding watermark or signature, passive forgery detection which aims to detect the traces of tampering without embedded information has become the major focus of recent research. However, most of current passive approaches either work only for frame-level detection and cannot localize region-level forgery, or suffer from high false detection rates for localization of tampered regions. In this paper, we investigate two common region-level inpainting methods for object removal, temporal copy-and-paste and exemplar-based texture synthesis, and propose a new approach based on spatio-temporal coherence analysis for detection and localization of tampered regions. Our approach can handle camera motion and multiple object removal. Experiments show that our approach outperforms previous approaches, and can effectively detect and localize regions tampered by temporal copy-and-paste and texture synthesis.  相似文献   

11.
Document forgery is a significant issue in Korea, with around ten thousand cases reported every year. Analyzing paper plays a crucial role in examining questionable documents such as marketable securities and contracts, which can aid in solving criminal cases of document forgery. Paper analysis can also provide essential insights in other types of criminal cases, serving as an important clue for solving cases such as the source of a blackmail letter. The papermaking process generates distinct forming fabric marks and formations, which are critical features for paper classification. These characteristics are observable under transmitted light and are created by the forming fabric pattern and the distribution of pulp fibers, respectively. In this study, we propose a novel approach for paper identification based on hybrid features. This method combines texture features extracted from images converted using the gray-level co-occurrence matrix (GLCM) approach and a convolutional neural network (CNN), with another set of features extracted by the CNN using the same images as input. We applied the proposed method to classification tasks for seven major paper brands available in the Korean market, achieving an accuracy of 97.66%. The results confirm the applicability of this method for visually inspecting paper products and demonstrate its potential for assisting in solving criminal cases involving document forgery.  相似文献   

12.
本文通过对一起检验鉴定案例的分析,提出练习记忆摹仿的概念,并对该类案件的检验鉴定,总结出十点启示。  相似文献   

13.
吴亦 《刑事技术》2001,(2):27-28
在实际办案中,笔者发现局部再现性伪装笔迹这种伪装的新特点.在越来越多的经济纠纷案件中,案后样本字迹中也出现了局部再现性伪装.本文就一起案后样本局部再现性伪装笔迹的检验,进行一些讨论.  相似文献   

14.
Due to present of enormous free image and video editing software on the Internet, tampering of digital images and videos have become very easy. Validating the integrity of images or videos and detecting any attempt of forgery without use of active forensic technique such as Digital Signature or Digital Watermark is a big challenge to researchers. Passive forensic techniques, unlike active techniques, do not need any preembeded information about the image or video. The proposed paper presents a comprehensive review of the recent developments in the field of digital image and video forensic using noise features. The previously existing methods of image and video forensics proved the importance of noises and encourage us for the study and perform extensive research in this field. Moreover, in this paper, forensic task cover mainly source identification and forgery detection in the image and video using noise features. Thus, various source identification and forgery detection methods using noise features are reviewed and compared in this paper for image and video. The overall objective of this paper is to give researchers a broad perspective on various aspects of image and video forensics using noise features. Conclusion part of this paper discusses about the importance of noise features and the challenges encountered by different image and video forensic method using noise features.  相似文献   

15.
Copy-move is one of the most commonly used image tampering operation, where a part of image content is copied and then pasted to another part of the same image. In order to make the forgery visually convincing and conceal its trace, the copied part may subject to post-processing operations such as rotation and blur. In this paper, we propose a polar cosine transform and approximate nearest neighbor searching based copy-move forgery detection algorithm. The algorithm starts by dividing the image into overlapping patches. Robust and compact features are extracted from patches by taking advantage of the rotationally-invariant and orthogonal properties of the polar cosine transform. Potential copy-move pairs are then detected by identifying the patches with similar features, which is formulated as approximate nearest neighbor searching and accomplished by means of locality-sensitive hashing (LSH). Finally, post-verifications are performed on potential pairs to filter out false matches and improve the accuracy of forgery detection. To sum up, the LSH based similar patch identification and the post-verification methods are two major novelties of the proposed work. Experimental results reveal that the proposed work can produce accurate detection results, and it exhibits high robustness to various post-processing operations. In addition, the LSH based similar patch detection scheme is much more effective than the widely used lexicographical sorting.  相似文献   

16.
微晶荧光乳浊液显现血、汗指纹的研究   总被引:1,自引:0,他引:1  
目的 显现非渗透性和半渗透性客体上的血指纹、汗潜指纹。方法 应用微晶小颗粒荧光乳浊液显现血、汗指纹。结果 对常见的各种非渗透性和半渗透性客体上的新鲜和陈旧的血、汗指纹均可显出。结论 该方法与传统的物理显现方法相比较在于显出效果基本不受指纹遗留时间和客体的性质及表面颜色的影响 ,并且此方法实用、可靠 ,同时该配方还可用于非渗透性和半渗透性客体上涉油指纹的显现 ,是常见客体上血、汗指纹显现的一个重要突破  相似文献   

17.
短波紫外照射对汗潜手印DNA检测的影响初探   总被引:1,自引:0,他引:1  
目的探测短波紫外灯的照射是否会对汗潜手印DNA检测产生影响。方法由每名志愿者在纸张上捺印4枚拇指指印使每枚指印的脱落细胞量保持基本相同,抽取每名志愿者所捺印的一枚指印作为一组,共有四组,将三组指印置于短波紫外灯的照射下,照射时间分别设置为10min﹑30min和1h,还有一组不照射,然后用磁珠法对所有指印提取DNA并进行定量。结果短波紫外灯的照射会对汗潜手印中的DNA造成减损,照射时间越长,减损得越多。结论尽量减少短波紫外灯对汗潜手印照射的时间(可控制在10min内),以保证汗潜手印有足够量的DNA而能被用于STR分型检测。  相似文献   

18.
通过对CNAS-T18指印项目实施与结果的解析,讨论了当前国内利用指印印面特征的现状:民事案件指印鉴定基础理论的不足。提出了对民事案件指印特征重新进行分类研究,以及探讨、规范利用指印印面特征步骤、方法的必要性和紧迫性。强调了指印印面特征在解决民事案件中的重要作用。  相似文献   

19.
8种方法显现的汗潜指印STR分型研究   总被引:1,自引:0,他引:1  
目的研究常见指印显现方法对指印STR检验的影响。方法采用Invisorb spin forensic试剂盒提取纯化人汗潜指印DNA,低拷贝模板(LCN)STR复合扩增,荧光电泳检验。结果用铜粉、铝粉、荧光粉、黑磁粉、"502"胶、茚三酮、磺酸双三嗪荧光显色液显现的玻片、纸张和胶带纸粘面上的汗潜指印可成功进行STR分型。结论常见指印显现方法不影响指印STR检验。  相似文献   

20.
目的研究高效、环保的手印显现技术,拓展黄色荧光粉YAG:Ce,Gd的应用范围。方法采用液相沉积法对黄色荧光粉进行氨基化修饰,并对修饰前后粉体进行红外光谱、光学性能及表面形貌的分析。结果氨基化的黄色荧光粉能够成功地显现非渗透性和渗透性客体上的油脂手印和汗液手印。结论本方法使手印显现效果达到高效、无毒、无损的要求。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号