共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
近年来,文件检验技术有了很大的发展,把语言学作为刑事技术手段应用于侦查破案中,为文件检验开拓了新的领域。在办案实践中,充分注意作案人的言语特征,通过对作案人的言语识别,能够在一定程度上为侦查工作提供方向和范围,为认定作案人提供客观依据。本文试以运用语言学知识,然后结合本地区实际和所办的案件探讨了如何从作案者的年龄、职业、文化程度和性别和地域特征等方面,给作案人“画像”。 相似文献
3.
Due to present of enormous free image and video editing software on the Internet, tampering of digital images and videos have become very easy. Validating the integrity of images or videos and detecting any attempt of forgery without use of active forensic technique such as Digital Signature or Digital Watermark is a big challenge to researchers. Passive forensic techniques, unlike active techniques, do not need any preembeded information about the image or video. The proposed paper presents a comprehensive review of the recent developments in the field of digital image and video forensic using noise features. The previously existing methods of image and video forensics proved the importance of noises and encourage us for the study and perform extensive research in this field. Moreover, in this paper, forensic task cover mainly source identification and forgery detection in the image and video using noise features. Thus, various source identification and forgery detection methods using noise features are reviewed and compared in this paper for image and video. The overall objective of this paper is to give researchers a broad perspective on various aspects of image and video forensics using noise features. Conclusion part of this paper discusses about the importance of noise features and the challenges encountered by different image and video forensic method using noise features. 相似文献
4.
Source camera identification is one of the emerging field in digital image forensics, which aims at identifying the source camera used for capturing the given image. The technique uses photo response non-uniformity (PRNU) noise as a camera fingerprint, as it is found to be one of the unique characteristic which is capable of distinguishing the images even if they are captured from similar cameras. Most of the existing PRNU based approaches are very sensitive to the random noise components existing in the estimated PRNU, and also they are not robust when some simple manipulations are performed on the images. Hence a new feature based approach of PRNU is proposed for the source camera identification by choosing the features which are robust for image manipulations. The PRNU noise is extracted from the images using wavelet based denoising method and is represented by higher order wavelet statistics (HOWS), which are invariant features for image manipulations and geometric variations. The features are fed to support vector machine classifiers to identify the originating source camera for the given image and the results have been verified by performing ten-fold cross validation technique. The experiments have been carried out using the images captured from various cell phone cameras and it demonstrated that the proposed algorithm is capable of identifying the source camera of the given image with good accuracy. The developed technique can be used for differentiating the images, even if they are captured from similar cameras, which belongs to same make and model. The analysis have also showed that the proposed technique remains robust even if the images are subjected to simple manipulations or geometric variations. 相似文献
5.
Jihun Joun MS Hyunji Chung PhD Jungheum Park PhD Sangjin Lee PhD 《Journal of forensic sciences》2021,66(1):323-335
Electronic documents often contain personal or confidential information, which can be used as valuable evidence in criminal investigations. In the digital investigation, special techniques are required for grouping and screening electronic documents, because it is challenging to analyze relationships between numerous documents in storage devices manually. To this end, although techniques such as keyword search, similarity search, topic modeling, metadata analysis, and document clustering are continually being studied, there are still limitations for revealing the relevance of documents. Specifically, metadata used in previous research are not always values present in the documents, and clustering methods with specific keywords may be incomplete because text‐based contents (including metadata) can be easily modified or deleted by users. In this work, we propose a novel method to efficiently group Microsoft Office Word 2007+ (MS Word) files by using revision identifier (RSID). Through a thorough understanding of the RSID, examiners can predict organizations to which a specific user belongs, and further, it is likely to discover unexpected interpersonal relationships. An experiment with a public dataset (GovDocs) provides that it is possible to categorize documents more effectively by combining our proposal with previously studied methods. Furthermore, we introduce a new document tracking method to understand the editing history and movement of a file, and then demonstrate its usefulness through an experiment with documents from a real case. 相似文献
6.
7.
With recent advancements in image processing and printing technology, home printers have improved in performance and grown more widespread. As such, they have been increasingly used in counterfeiting and forgery. Most counterfeit bills in Korea have been created using home scanners and printers. The identification of printer model is thus necessary to rapidly track down criminals and solve crimes. Household printers can be largely divided into inkjet and laser printers. These two types of printers print halftone textures instead of continuous images. This study proposed a technique of printer classification based on halftone textures that can be observed in printed documents. Since halftone textures are expressed as periodic lattices, the images were transformed via FFT, which is highly effective at expressing periodicity. ResNet, known for its superior gradient flow, was used for training. The experiment was conducted on 12 color laser jets and 2 inkjets. Scans of bills printed by each printer were used, and halftone texture analysis was performed on these images for printer model classification. Each image was cropped into several parts; one of the cropped parts was analyzed. The analysis showed that laser printers could be 100% distinguished from inkjet printers. An accuracy of 98.44% was achieved in make classification. When 50 cropped images were used instead of a single image, the technique achieved 100% accuracy in model classification. The proposed technique is non-destructive; it offers high accessibility and efficiency as it can be performed using a scanner alone, without requiring additional optical equipment. 相似文献
8.
各国立法中的伪造包括有形伪造和无形伪造两种情况.有形伪造是指无制作权限人非法制作文书的行为;无形伪造是指有制作权限者制作内容虚伪文书的行为.有形伪造与无形伪造的区别在于"名义人与制作人之间的人格是否具有一致性".处罚无形伪造的宗旨在于其侵犯文书的证据力.我国刑法中的伪造包含有形伪造和无形伪造两种含义,司法实践存在处罚无形伪造行为的案件. 相似文献
9.
10.
Mohsen Jenadeleh M.Sc. Ph.D. Mohsen Ebrahimi Moghaddam Ph.D. 《Journal of forensic sciences》2016,61(3):623-636
Digital image forgery detection is important because of its wide use in applications such as medical diagnosis, legal investigations, and entertainment. Copy–move forgery is one of the famous techniques, which is used in region duplication. Many of the existing copy–move detection algorithms cannot effectively blind detect duplicated regions that are made by powerful image manipulation software like Photoshop. In this study, a new method is proposed for blind detecting manipulations in digital images based on modified fractal coding and feature vector matching. The proposed method not only detects typical copy–move forgery, but also finds multiple copied forgery regions for images that are subjected to rotation, scaling, reflection, and a mixture of these postprocessing operations. The proposed method is robust against tampered images undergoing attacks such as Gaussian blurring, contrast scaling, and brightness adjustment. The experimental results demonstrated the validity and efficiency of the method. 相似文献
11.
In our society digital images are a powerful and widely used communication medium. They have an important impact on our life. In recent years, due to the advent of high-performance commodity hardware and improved human-computer interfaces, it has become relatively easy to create fake images. Modern, easy to use image processing software enables forgeries that are undetectable by the naked eye. In this work we propose a method to automatically detect and localize duplicated regions in digital images. The presence of duplicated regions in an image may signify a common type of forgery called copy-move forgery. The method is based on blur moment invariants, which allows successful detection of copy-move forgery, even when blur degradation, additional noise, or arbitrary contrast changes are present in the duplicated regions. These modifications are commonly used techniques to conceal traces of copy-move forgery. Our method works equally well for lossy format such as JPEG. We demonstrate our method on several images affected by copy-move forgery. 相似文献
12.
《Science & justice》2023,63(4):439-450
A shoeprint image retrieval process aims to identify and match images of shoeprints found at crime scenes with shoeprint images from a known reference database. It is a challenging problem in the forensic discipline of footwear analysis because a shoeprint found at the crime scene is often imperfect. Recovered shoeprints may be partial, distorted, left on surfaces that do not mark easily, or perhaps come from shoes that do not transfer marks easily. In this study, we present a shoeprint retrieval method by using a convolutional neural network (CNN) and normalized cross-correlation (NCC). A pre-trained CNN was used to extract features from the pre-processed shoeprint images. We then employed NCC to compute a similarity score based on the extracted image features. We achieved a retrieval accuracy of 82% in our experiments, where a “successful” retrieval means that the ground truth image was returned in the top 1% of returned images. We also extend our shoeprint retrieval method to the problem of linking shoeprints recovered from crime scenes. This new method can provide a linkage between two crime scenes if the two recovered shoeprints originated from the same shoe. This new method achieved a retrieval accuracy of 88.99% in the top 20% of returned images. 相似文献
13.
《Women & Criminal Justice》2013,23(4):27-45
Abstract The extant literature suggests that habitual criminality among women is rare and that female career criminals are ostensibly nonexistent. Using the criminal records of 500 male and female adult recidivists, this study applies the concept of career criminality to women and describes how this application has specific gendered elements. Like their male peers, women are chronic, versatile offenders engaged in violent, property, and public-order offending. Women are disproportionately engaged in forgery, fraud, and prostitution whereas men are disproportionately engaged in rape, robbery, and aggravated assault. No gender differences existed for a variety of additional offenses and criminal justice system statuses. However, significant gender differences exist for social demographic characteristics, such as age and timing of onset, and criminal career parameter indicators, such as span of criminal career. These data and analyses indicate that the career criminal classification has important implications for criminal career research and gender-based criminology. 相似文献
14.
Qiran Sun M.Sc. Yiwen Luo M.Sc. Qinghua Zhang Ph.D. Xu Yang B.Sc. Che Xu B.Sc. 《Journal of forensic sciences》2016,61(4):1116-1121
Questioned document examiners are frequently required to determine whether the questioned ink entries on a document are written with the same ink, either for forged document identification or relative ink dating. How many methods are sufficient to discriminate potentially different inks? In this paper, 18 blue ballpoint inks were first nondestructively examined with a video spectral comparator. The ink entries were subsequently extracted with organic solvents for analysis of the volatile solvents and dyes by GC/MS, TLC, and LC‐MS/MS. The 18 ink samples were divided into 10, 9, 12, and 14 categories by these four methods, respectively. With the combined results, there were only two inks that remained indistinguishable, but they were further differentiated by microscopy. Therefore, to achieve effective discrimination of ballpoint ink entries, the authors suggest that a complete examination should include an analysis of their optical features, volatile solvents, and dyes as well as the ink quality. 相似文献
15.
刑法中伪造信用卡犯罪中的伪造不仅包括仿制其物理外观的形式伪造,还应包括将权利人信息写入磁条介质、芯片等的内容伪造。作为伪造对象的信用卡应当是具有物理载体的实体卡片,事实上不存在对虚拟信用卡的伪造。以虚假身份骗领无对应实体卡的虚拟信用卡应视为妨害信用卡管理罪中的骗领信用卡行为;利用权利人既有实体卡信息,复制虚拟信用卡的行为系对他人信用卡信息资料的非法使用而非伪造。有关伪造信用卡犯罪刑法规定的立法原意并不包含伪造空白信用卡,伪造空白信用卡具有严重的社会危害性,理应将其纳入刑法规制范围,以保持与妨害信用卡管理罪刑法规定的协调。不能通过司法解释改变立法原意,现行刑法中伪造信用卡犯罪的伪造含义应有相应的调整。 相似文献
16.
Abdel-Rahman HA 《Forensic science international》2000,114(2):97-105
The increase in the use of photographs on individual identification credentials such as driving licences, credit cards, security passes and passports has led, for the purpose of criminal activities, to the falsification of genuine documents bearing photographs of the perpetrating criminal. These photographs may be used as valuable physical evidence when compared with known photographs of a suspect as they form somewhat of a signature of the suspect that is left behind on the evidence. The comparison of ID photographs requires the cooperation of two predominantly visual disciplines; forensic photography and morphological anatomy. This paper describes a photographic technique which allows accurate anatomical measurement and tracing of facial features, which allows direct physical comparison of ID document images. 相似文献
17.
Biao Li M.Sc. Peng Xie Ph.D. Ying‐min Guo B.Sc. Qing Fei B.Sc. 《Journal of forensic sciences》2014,59(2):543-549
In many criminal and civil cases in China, the most commonly questioned documents are those written with gel pen ink. An important task for forensic document examiners is to identify whether two or more ink entries in one or more documents were written with the same ink type. The identification of the age of gel ink entries made poses an important and difficult problem for forensic document examiners. In this paper, the volatile components of gel ink were determined and the gel ink was classified by gas chromatography with a flame ionization detector. Calibration curves were created to express the relationship between the content of volatile gel ink components and the age of gel ink entries stored under natural and UV‐induced aging conditions. The correspondence between the natural and UV‐induced aging conditions was also established. The experimental results showed that GC was useful in the analysis of black gel ink and applicable for determining the relative age of gel ink entries under certain conditions. 相似文献
18.
Green JA 《Journal of forensic sciences》2012,57(4):1003-1007
Evaluation of paper brightness in multipage documents is a practice of forensic document examiners when there is a question of a page insertion or substitution. This article demonstrates that occasional errors occur in the manufacturing process that affects the consistency of paper brightness. The inconsistency of paper brightness may therefore influence conclusions reached in authenticating documents. Reams of multipurpose paper, from 21 manufacturers, were examined. When assessing the individual pages of each package with an ultraviolet light, approximately 30% of the reams revealed differences in paper brightness. A study of the paper-manufacturing process was conducted to determine where variations originate. It is concluded that brightness differences occur when one incompatible roll of paper is mistakenly placed with others used for one production run. It was also determined that brightness variations (when present) are patterned throughout individual reams. When the authenticity of a document is in question, consideration of these findings is essential to assure an accurate assessment. 相似文献
19.
As handwriting is influenced by physiology, training, and other behavioral factors, a study of the handwriting of twins can shed light on the individuality of handwriting. This paper describes the methodology and results of such a study where handwriting samples of twins were compared by an automatic handwriting verification system. The results complement that of a previous study where a diverse population was used. The present study involves samples of 206 pairs of twins, where each sample consisted of a page of handwriting. The verification task was to determine whether two half-page documents (where the original samples were divided into upper and lower halves) were written by the same individual. For twins there were 1236 verification cases -- including 824 tests where the textual content of writing was different, and 412 tests where it was the same. An additional set of 1648 test cases were obtained from handwriting samples of nontwins (general population). To make the handwriting comparison, the system computed macro features (overall pictorial attributes), micro features (characteristics of individual letters), and style features (characteristics of whole-word shapes and letter pairs). Four testing scenarios were evaluated: twins and nontwins writing the same text and writing different texts. Results of the verification tests show that the handwriting of twins is less discriminable than that of nontwins: an overall error rate of 12.91% for twins and 3.7% for nontwins. Error rates with identical twins were higher than with fraternal twins. Error rates in all cases can be arbitrarily reduced by rejecting (not making a decision on) borderline cases. A level of confidence in the results obtained is given by the fact that system error rates are comparable to that of humans (lower than that of lay persons and higher than that of questioned document examiners [QDEs]). 相似文献