信息网络安全 ›› 2015, Vol. 15 ›› Issue (4): 62-67.doi: 10.3969/j.issn.1671-1122.2015.04.011
收稿日期:
2015-01-15
出版日期:
2015-04-10
发布日期:
2018-07-16
作者简介:
作者简介: 尚士泽(1985-),男,辽宁,博士研究生,主要研究方向:变造文件被动无损取证研究;孔祥维(1963-),女,辽宁,教授,博士,主要研究方向:多媒体取证、模式识别和信息检索研究;尤新刚(1963-),男,北京,研究员,主要研究方向:多媒体信息安全研究.
基金资助:
SHANG Shi-ze1, KONG Xiang-wei1(), YOU Xin-gang1,2
Received:
2015-01-15
Online:
2015-04-10
Published:
2018-07-16
摘要:
伪造、变造文件检验属于司法取证中文书鉴定部分,传统方法需要依靠文检设备和专业检测人员,具有检测成本高、检测时间长,可能存在有损检验等局限。近年来只利用扫描仪和计算机的数字被动无损取证技术应运而生。文章首先阐述了文件生成过程及其伪造、变造方式,其次对伪造、变造文件的被动无损取证技术进行了总结和分析,从设备取证、纸张取证、文件变造取证三个方面详细阐述了文档来源取证、纸张来源取证和文档真实性鉴别的原理和技术方法。对具体设备和每种变造方式引入的特征进行了详细的介绍,并阐述相应的取证方法,最后给出了数字被动无损取证技术面临的问题和挑战。
中图分类号:
尚士泽, 孔祥维, 尤新刚. 伪造变造文件数字被动无损取证技术综述[J]. 信息网络安全, 2015, 15(4): 62-67.
SHANG Shi-ze, KONG Xiang-wei, YOU Xin-gang. A Survey of Digital Passive Lossless Forensics on Forged and Altered Document[J]. Netinfo Security, 2015, 15(4): 62-67.
[1] | 吴清海, 韩毅, 夏鸣. 文检技术在行政执法中的应用[M]. 南京:江苏科学技术出版社, 2007. |
[2] | 马继刚. 当前文件检验的热点问题[J]. 中国司法鉴定, 2007, (1):47-50. |
[3] | 白萃萃, 梁鲁宁, 魏晓惠, 等. 利用彩色文件上的图文特征鉴别喷墨打印机品牌[J]. 中国司法鉴定, 2013, (2):62-65. |
[4] | 杨旭, 施少培, 徐彻. 系统检验方法在可疑文件鉴定中运用[J]. 中国司法鉴定, 2013, (4):32-35. |
[5] | 刘晓光, 郭甜. 打印机打印法变造文件的检验[J]. 贵州警官职业学院报, 2008, (4):53-55. |
[6] | Gebhardt J, Goldstein M, Shafait F, et al.Document Authentication using Printing Technique Features and Unsupervised Anomaly Detection[C]//12th International Conference on Document Analysis and Recognition, Piscataway, 2013:479-483. |
[7] | Lampert C H, Mei L, Breuel T M.Printing Technique Classification for Document Counterfeit Detection[C]//International Conference on Computational Intelligence and Security, Guangzhou, 2006: 639-644. |
[8] | Umadevi M, Agarwal A, Rao R.Printed Text Characterization for Identifying Print Technology using Expectation Maximization Algorithm[C]//Multi-disciplinary Trends in Artificial Intelligence, Hyderabad, 2011, (7080): 201-212. |
[9] | Tchan J.Classifying Digital Prints According to Their Production Process using Image Analysis and Artificial Neural networks[C]//The International Society for Optical Engineering, San Jose, 2000:105-116. |
[10] | Tchan J.The Development of an Image Analysis System That Can Detect Fraudulent Alterations Made to Printed Images[C]//The International Society for Optical Engineering, San Jose, 2004:151-159. |
[11] | Schulze C, Schreyer M, Stahl A, et al.Using DCT Features for Printing Technique and Copy Detection[J]. Advances in Digital Forensics , 2009, (306): 95-106. |
[12] | Shang S, Memon N, Kong X.Detecting documents forged by printing and copying[J]. EURASIP Journal on Advances in Signal Processing, 2014, 140. |
[13] | Chiang P J, Khanna N, Mikkilineni A K, et al.Printer and Scanner Forensics[J]. IEEE Signal Processing Magazine, 2009, 26(2):72-83. |
[14] | Ali G N, Mikkilineni A K, Chiang P J, et al.Intrinsic and Extrinsic Signatures for Information Hiding and Secure Printing with Electrophotographic Devices[C]//NIP19: International Conference on Digital Printing Technologies, New Orleans, 2009:511-514. |
[15] | Wu Y, Kong X, You X, et al.Printer Forensics Based on Page Document's Geometric Distortion[C]//International Conference on Image Processing, Cairo, 2009:2909-2912. |
[16] | Bulan O, Mao J, Sharma G.Geometric Distortion Signatures for Printer Identification[C]//Proceeding of the International Conference on Acoustics, Speech and Signal Processing. Taipei, 2009:1401-1404. |
[17] | 沈林杰, 孔祥维, 尤新刚. 基于字符图像质量评价的打印机取证[J]. 东南大学学报:自然科学版, 2007, 37(Sl): 92-95. |
[18] | Kong X, You X, Wang B, et al.Laser Printer Source Forensics for Arbitrary Chinese Characters[C]//Proceeding of International Conference on Security and Management Las Vegas, 2010:356-360. |
[19] | Oliver J, Chen J.Use of Signature Analysis to Discriminate Digital Printing Technologies[C], International Conference on Digital Printing Technologies, San Diego, 2002:218-222. |
[20] | 王宁, 韩国强, 顾国生. 打印文件鉴别打印机型的文字图像模糊识别[J]. 计算机应用研究, 2008, 25(3):953-956. |
[21] | 邓伟, 罗小巧, 鄢煜尘, 等. 基于打印字符分析的打印文件检验研究[J]. 计算机应用研究, 2011, 28(2):4763-4769. |
[22] | 王锦生. 喷墨打印机打印文件检验[J]. 刑事技术, 1998, (4):21-23. |
[23] | Yoshinori A, Atsushi Y, Yoshiyasu H.Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral Analysis[C]//The 4th International Workshop on Computational Forensics, Berlin, 2011, (6540): 101-113. |
[24] | Yoshinori A, Atsushi Y, Yoshiyasu H.Estimation of Inkjet Printer Spur Gear Teeth Number from Pitch Data String of Limited Length[C]//The 3rd International Workshop on Computational Forensics, The Hague, 2009:25-32. |
[25] | Wang C, Kong X, Shang S, et al.Photocopier Forensics Based on Arbitrary Text Characters[C]//SPIE-IS&T Electronic Imaging - Media Watermarking, Security, and Forensics, Burlingame, 2013: 86650G. |
[26] | Gou H, Swaminathan A, Wu M.Robust Scanner Identification Based on Noise Features[C]//The 9th International Conference on Security, Steganography and Watermarking of Multimedia Contents, San Jose, 2007, 6505:S5050-S5060. |
[27] | Khanna N, Chiu G T C, Allebach J P, et al. Scanner Identification with Extension to Forgery Detection[C]//The 10th International Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. San Jose, 2008, (6819): G8190-G8190. |
[28] | Dirik A E, Sencar H T, Memon N.Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen[C]//International Conference on Acoustics, Speech and Signal Processing, Piscataway, 2009:1385-1388. |
[29] | Shang S, Kong X, You X.Copy Paper Brand Source Identification using Commodity Scanners[J]. Information Technology Journal, 2011, 10(11):2112-2118. |
[30] | Beusekom J V, Shafait F, Breuel T M.Document Inspection using Text-line Alignment[C]//International Workshop on Document Analysis Systems, Boston, 2010:263-270. |
[31] | Beusekom J V, Shafait F, Breuel T M.Text-line Examination for Document Forgery Detection[J]. International Journal on Document Analysis and Recognition. 2013, 16(2):189-207. |
[32] | Beusekom J V, Shafait F.Distortion Measurement for Automatic Document Verification[C]//International Conference on Document Analysis and Recognition, Los Alamitos, 2011:289-293. |
[33] | Kee E, Farid H.Printer Profiling for Forensics and Ballistics[C]//ACM Workshop on Multimedia and Security Workshop, Oxford, 2008:3-10. |
[34] | 孔祥维, 吴玉宝. 一种利用半色调信息检测文档真实性的打印文档取证方法: 中国, 201010154461.6[P], 2012-11-05. |
[35] | Khanna N, Chiu G T C, Allebach J P, et al. Scanner Identification with Extension to Forgery Detection[C]//International Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, 2008, 6819: G8190-G8190. |
[36] | Bertrand R, Gomez-Kramer P, Terrades O R, et al.A System Based on Intrinsic Features for Fraudulent Document Detection[C]//International Conference on Document Analysis and Recognition, Piscataway, 2013:106-110. |
[37] | 姚洪波,孟正,李希,等. 基于P2P的远程控制系统设计与实现[J]. 信息网络安全,2014,(3):32-38. |
[38] | 杨大利,朱一凡,马婧雯. 基于LAMP技术的服务器安全配置方案研究[J]. 信息网络安全,2014,(3):39-45. |
[39] | 包佳敏,胡爱群. Android系统文件监听技术的研究[J]. 信息网络安全,2014,(3):46-51. |
[40] | 徐国天. 远程控制木马通信协议及线索调查方法研究[J]. 信息网络安全,2014,(3):52-56. |
[41] | 焦娜. 一种基于Android平台的安全图片传输技术[J]. 信息网络安全,2014,(3):57-61. |
[42] | 王家波,赵泽茂,李林. 位置服务中一种基于假轨迹的轨迹隐私保护方法[J]. 信息网络安全,2014,(3):62-67. |
[43] | 吴乐华,孙贤鲁,孟槟,等. 基于Android手机软件认证的U盘锁系统[J]. 信息网络安全,2014,(3):68-73. |
[44] | 徐浚诚,游林. 异构WSN中基于参考值的可恢复隐私保护数据融合[J]. 信息网络安全,2014,(3):74-79. |
[45] | 李增鹏,马春光,李迎涛. 基于层次分析涉密信息系统风险评估[J]. 信息网络安全,2014,(3):80-86. |
[46] | 史记,曾昭龙,杨从保,等. Fuzzing测试技术综述[J]. 信息网络安全,2014,(3):87-91. |
[47] | 李建,周化钢,彭越,等. 以用户为中心的可信终端身份管理模型[J]. 信息网络安全,2014,(4):1-6. |
[48] | 战晓苏,权乐,江凌. “舒特”攻击行动描述与效能评估探要[J]. 信息网络安全,2014,(4):7-12. |
[49] | 张涛,牛伟颖,孟正,等. 基于Windows内核模式下进程监控的用户权限控制系统设计与实现[J]. 信息网络安全,2014,(4):13-19. |
[50] | 张驰,罗森林. 基于端口和编号的漏洞代码匹配方法研究[J]. 信息网络安全,2014,(4):20-24. |
[51] | 陈震,刘洪健. 基于倒排列表的网流索引检索与压缩方法[J]. 信息网络安全,2014,(4):25-30. |
[1] | 刘浩阳. Android设备取证研究[J]. 信息网络安全, 2015, 15(9): 29-32. |
[2] | 隆波;周道明;麦永浩. 专业电子设备取证技术研究[J]. , 2013, 13(8): 0-0. |
[3] | 张辉极;薛艳英. 基于Android系统的取证技术分析[J]. , 2012, 12(4): 0-0. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||