首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
近年来,文件检验技术有了很大的发展,把语言学作为刑事技术手段应用于侦查破案中,为文件检验开拓了新的领域。在办案实践中,充分注意作案人的言语特征,通过对作案人的言语识别,能够在一定程度上为侦查工作提供方向和范围,为认定作案人提供客观依据。本文试以运用语言学知识,然后结合本地区实际和所办的案件探讨了如何从作案者的年龄、职业、文化程度和性别和地域特征等方面,给作案人“画像”。  相似文献   

3.
Due to present of enormous free image and video editing software on the Internet, tampering of digital images and videos have become very easy. Validating the integrity of images or videos and detecting any attempt of forgery without use of active forensic technique such as Digital Signature or Digital Watermark is a big challenge to researchers. Passive forensic techniques, unlike active techniques, do not need any preembeded information about the image or video. The proposed paper presents a comprehensive review of the recent developments in the field of digital image and video forensic using noise features. The previously existing methods of image and video forensics proved the importance of noises and encourage us for the study and perform extensive research in this field. Moreover, in this paper, forensic task cover mainly source identification and forgery detection in the image and video using noise features. Thus, various source identification and forgery detection methods using noise features are reviewed and compared in this paper for image and video. The overall objective of this paper is to give researchers a broad perspective on various aspects of image and video forensics using noise features. Conclusion part of this paper discusses about the importance of noise features and the challenges encountered by different image and video forensic method using noise features.  相似文献   

4.
Source camera identification is one of the emerging field in digital image forensics, which aims at identifying the source camera used for capturing the given image. The technique uses photo response non-uniformity (PRNU) noise as a camera fingerprint, as it is found to be one of the unique characteristic which is capable of distinguishing the images even if they are captured from similar cameras. Most of the existing PRNU based approaches are very sensitive to the random noise components existing in the estimated PRNU, and also they are not robust when some simple manipulations are performed on the images. Hence a new feature based approach of PRNU is proposed for the source camera identification by choosing the features which are robust for image manipulations. The PRNU noise is extracted from the images using wavelet based denoising method and is represented by higher order wavelet statistics (HOWS), which are invariant features for image manipulations and geometric variations. The features are fed to support vector machine classifiers to identify the originating source camera for the given image and the results have been verified by performing ten-fold cross validation technique. The experiments have been carried out using the images captured from various cell phone cameras and it demonstrated that the proposed algorithm is capable of identifying the source camera of the given image with good accuracy. The developed technique can be used for differentiating the images, even if they are captured from similar cameras, which belongs to same make and model. The analysis have also showed that the proposed technique remains robust even if the images are subjected to simple manipulations or geometric variations.  相似文献   

5.
Electronic documents often contain personal or confidential information, which can be used as valuable evidence in criminal investigations. In the digital investigation, special techniques are required for grouping and screening electronic documents, because it is challenging to analyze relationships between numerous documents in storage devices manually. To this end, although techniques such as keyword search, similarity search, topic modeling, metadata analysis, and document clustering are continually being studied, there are still limitations for revealing the relevance of documents. Specifically, metadata used in previous research are not always values present in the documents, and clustering methods with specific keywords may be incomplete because text‐based contents (including metadata) can be easily modified or deleted by users. In this work, we propose a novel method to efficiently group Microsoft Office Word 2007+ (MS Word) files by using revision identifier (RSID). Through a thorough understanding of the RSID, examiners can predict organizations to which a specific user belongs, and further, it is likely to discover unexpected interpersonal relationships. An experiment with a public dataset (GovDocs) provides that it is possible to categorize documents more effectively by combining our proposal with previously studied methods. Furthermore, we introduce a new document tracking method to understand the editing history and movement of a file, and then demonstrate its usefulness through an experiment with documents from a real case.  相似文献   

6.
文件形成时间的鉴定问题一直是文书鉴定领域最具争议和挑战的疑难问题.尤其是如何利用文件要素与时间的关系,定量分析判断文件的形成时间。通过对一起印章印文盖印时间鉴定的实际案例,探讨了如何运用统计学方法定量分析印章印文阶段性特征中的定量特征与印文盖印时间之间关系,为印章印文盖印时鉴定提供一种定量分析的方法,也为如何进一步运用统计学方法定量分析文件形成时间的类似问题提供了一种研究思路。  相似文献   

7.
With recent advancements in image processing and printing technology, home printers have improved in performance and grown more widespread. As such, they have been increasingly used in counterfeiting and forgery. Most counterfeit bills in Korea have been created using home scanners and printers. The identification of printer model is thus necessary to rapidly track down criminals and solve crimes. Household printers can be largely divided into inkjet and laser printers. These two types of printers print halftone textures instead of continuous images. This study proposed a technique of printer classification based on halftone textures that can be observed in printed documents. Since halftone textures are expressed as periodic lattices, the images were transformed via FFT, which is highly effective at expressing periodicity. ResNet, known for its superior gradient flow, was used for training. The experiment was conducted on 12 color laser jets and 2 inkjets. Scans of bills printed by each printer were used, and halftone texture analysis was performed on these images for printer model classification. Each image was cropped into several parts; one of the cropped parts was analyzed. The analysis showed that laser printers could be 100% distinguished from inkjet printers. An accuracy of 98.44% was achieved in make classification. When 50 cropped images were used instead of a single image, the technique achieved 100% accuracy in model classification. The proposed technique is non-destructive; it offers high accessibility and efficiency as it can be performed using a scanner alone, without requiring additional optical equipment.  相似文献   

8.
熊永明 《法学论坛》2005,20(3):110-116
各国立法中的伪造包括有形伪造和无形伪造两种情况.有形伪造是指无制作权限人非法制作文书的行为;无形伪造是指有制作权限者制作内容虚伪文书的行为.有形伪造与无形伪造的区别在于"名义人与制作人之间的人格是否具有一致性".处罚无形伪造的宗旨在于其侵犯文书的证据力.我国刑法中的伪造包含有形伪造和无形伪造两种含义,司法实践存在处罚无形伪造行为的案件.  相似文献   

9.
书画类鉴定古之就有,主要集中于文物鉴定,鉴定的主要目的是判断被鉴定文物是否为某某的真迹还是赝品。此类鉴别一般都是由文物专家或考古专家进行甄别,鉴别时往往拥有供参考的真品或文献。本文通过对两份绘画类试卷是否同一人绘画的检验,从文件检验的角度鉴别绘画是否为同一人所为。  相似文献   

10.
Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy–move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy–move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy–move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method.  相似文献   

11.
In our society digital images are a powerful and widely used communication medium. They have an important impact on our life. In recent years, due to the advent of high-performance commodity hardware and improved human-computer interfaces, it has become relatively easy to create fake images. Modern, easy to use image processing software enables forgeries that are undetectable by the naked eye. In this work we propose a method to automatically detect and localize duplicated regions in digital images. The presence of duplicated regions in an image may signify a common type of forgery called copy-move forgery. The method is based on blur moment invariants, which allows successful detection of copy-move forgery, even when blur degradation, additional noise, or arbitrary contrast changes are present in the duplicated regions. These modifications are commonly used techniques to conceal traces of copy-move forgery. Our method works equally well for lossy format such as JPEG. We demonstrate our method on several images affected by copy-move forgery.  相似文献   

12.
《Science & justice》2023,63(4):439-450
A shoeprint image retrieval process aims to identify and match images of shoeprints found at crime scenes with shoeprint images from a known reference database. It is a challenging problem in the forensic discipline of footwear analysis because a shoeprint found at the crime scene is often imperfect. Recovered shoeprints may be partial, distorted, left on surfaces that do not mark easily, or perhaps come from shoes that do not transfer marks easily. In this study, we present a shoeprint retrieval method by using a convolutional neural network (CNN) and normalized cross-correlation (NCC). A pre-trained CNN was used to extract features from the pre-processed shoeprint images. We then employed NCC to compute a similarity score based on the extracted image features. We achieved a retrieval accuracy of 82% in our experiments, where a “successful” retrieval means that the ground truth image was returned in the top 1% of returned images. We also extend our shoeprint retrieval method to the problem of linking shoeprints recovered from crime scenes. This new method can provide a linkage between two crime scenes if the two recovered shoeprints originated from the same shoe. This new method achieved a retrieval accuracy of 88.99% in the top 20% of returned images.  相似文献   

13.
Abstract

The extant literature suggests that habitual criminality among women is rare and that female career criminals are ostensibly nonexistent. Using the criminal records of 500 male and female adult recidivists, this study applies the concept of career criminality to women and describes how this application has specific gendered elements. Like their male peers, women are chronic, versatile offenders engaged in violent, property, and public-order offending. Women are disproportionately engaged in forgery, fraud, and prostitution whereas men are disproportionately engaged in rape, robbery, and aggravated assault. No gender differences existed for a variety of additional offenses and criminal justice system statuses. However, significant gender differences exist for social demographic characteristics, such as age and timing of onset, and criminal career parameter indicators, such as span of criminal career. These data and analyses indicate that the career criminal classification has important implications for criminal career research and gender-based criminology.  相似文献   

14.
Questioned document examiners are frequently required to determine whether the questioned ink entries on a document are written with the same ink, either for forged document identification or relative ink dating. How many methods are sufficient to discriminate potentially different inks? In this paper, 18 blue ballpoint inks were first nondestructively examined with a video spectral comparator. The ink entries were subsequently extracted with organic solvents for analysis of the volatile solvents and dyes by GC/MS, TLC, and LC‐MS/MS. The 18 ink samples were divided into 10, 9, 12, and 14 categories by these four methods, respectively. With the combined results, there were only two inks that remained indistinguishable, but they were further differentiated by microscopy. Therefore, to achieve effective discrimination of ballpoint ink entries, the authors suggest that a complete examination should include an analysis of their optical features, volatile solvents, and dyes as well as the ink quality.  相似文献   

15.
刑法中伪造信用卡犯罪中的伪造不仅包括仿制其物理外观的形式伪造,还应包括将权利人信息写入磁条介质、芯片等的内容伪造。作为伪造对象的信用卡应当是具有物理载体的实体卡片,事实上不存在对虚拟信用卡的伪造。以虚假身份骗领无对应实体卡的虚拟信用卡应视为妨害信用卡管理罪中的骗领信用卡行为;利用权利人既有实体卡信息,复制虚拟信用卡的行为系对他人信用卡信息资料的非法使用而非伪造。有关伪造信用卡犯罪刑法规定的立法原意并不包含伪造空白信用卡,伪造空白信用卡具有严重的社会危害性,理应将其纳入刑法规制范围,以保持与妨害信用卡管理罪刑法规定的协调。不能通过司法解释改变立法原意,现行刑法中伪造信用卡犯罪的伪造含义应有相应的调整。  相似文献   

16.
Fatal suffocation by rubber balloons in children: mechanism and prevention   总被引:2,自引:0,他引:2  
The increase in the use of photographs on individual identification credentials such as driving licences, credit cards, security passes and passports has led, for the purpose of criminal activities, to the falsification of genuine documents bearing photographs of the perpetrating criminal. These photographs may be used as valuable physical evidence when compared with known photographs of a suspect as they form somewhat of a signature of the suspect that is left behind on the evidence. The comparison of ID photographs requires the cooperation of two predominantly visual disciplines; forensic photography and morphological anatomy. This paper describes a photographic technique which allows accurate anatomical measurement and tracing of facial features, which allows direct physical comparison of ID document images.  相似文献   

17.
In many criminal and civil cases in China, the most commonly questioned documents are those written with gel pen ink. An important task for forensic document examiners is to identify whether two or more ink entries in one or more documents were written with the same ink type. The identification of the age of gel ink entries made poses an important and difficult problem for forensic document examiners. In this paper, the volatile components of gel ink were determined and the gel ink was classified by gas chromatography with a flame ionization detector. Calibration curves were created to express the relationship between the content of volatile gel ink components and the age of gel ink entries stored under natural and UV‐induced aging conditions. The correspondence between the natural and UV‐induced aging conditions was also established. The experimental results showed that GC was useful in the analysis of black gel ink and applicable for determining the relative age of gel ink entries under certain conditions.  相似文献   

18.
Evaluation of paper brightness in multipage documents is a practice of forensic document examiners when there is a question of a page insertion or substitution. This article demonstrates that occasional errors occur in the manufacturing process that affects the consistency of paper brightness. The inconsistency of paper brightness may therefore influence conclusions reached in authenticating documents. Reams of multipurpose paper, from 21 manufacturers, were examined. When assessing the individual pages of each package with an ultraviolet light, approximately 30% of the reams revealed differences in paper brightness. A study of the paper-manufacturing process was conducted to determine where variations originate. It is concluded that brightness differences occur when one incompatible roll of paper is mistakenly placed with others used for one production run. It was also determined that brightness variations (when present) are patterned throughout individual reams. When the authenticity of a document is in question, consideration of these findings is essential to assure an accurate assessment.  相似文献   

19.
As handwriting is influenced by physiology, training, and other behavioral factors, a study of the handwriting of twins can shed light on the individuality of handwriting. This paper describes the methodology and results of such a study where handwriting samples of twins were compared by an automatic handwriting verification system. The results complement that of a previous study where a diverse population was used. The present study involves samples of 206 pairs of twins, where each sample consisted of a page of handwriting. The verification task was to determine whether two half-page documents (where the original samples were divided into upper and lower halves) were written by the same individual. For twins there were 1236 verification cases -- including 824 tests where the textual content of writing was different, and 412 tests where it was the same. An additional set of 1648 test cases were obtained from handwriting samples of nontwins (general population). To make the handwriting comparison, the system computed macro features (overall pictorial attributes), micro features (characteristics of individual letters), and style features (characteristics of whole-word shapes and letter pairs). Four testing scenarios were evaluated: twins and nontwins writing the same text and writing different texts. Results of the verification tests show that the handwriting of twins is less discriminable than that of nontwins: an overall error rate of 12.91% for twins and 3.7% for nontwins. Error rates with identical twins were higher than with fraternal twins. Error rates in all cases can be arbitrarily reduced by rejecting (not making a decision on) borderline cases. A level of confidence in the results obtained is given by the fact that system error rates are comparable to that of humans (lower than that of lay persons and higher than that of questioned document examiners [QDEs]).  相似文献   

20.
练习摹仿笔迹的检验   总被引:1,自引:0,他引:1  
在笔迹检验所受理的案件中,采取练习摹仿手法进行作案的呈上升趋势。练习摹仿笔迹酷似被摹仿人笔迹,仿真度高。如何准确识别摹仿,认定摹仿人,已成为当前文检工作者研究的重点课题之一。本文作者总结实践经验,参考有关文献,探讨了练习摹仿笔迹的形成机理、特点、变化规律、相关因素及检验对策。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号