[1] |
吴清海, 韩毅, 夏鸣. 文检技术在行政执法中的应用[M]. 南京:江苏科学技术出版社, 2007.
|
[2] |
马继刚. 当前文件检验的热点问题[J]. 中国司法鉴定, 2007, (1):47-50.
|
[3] |
白萃萃, 梁鲁宁, 魏晓惠, 等. 利用彩色文件上的图文特征鉴别喷墨打印机品牌[J]. 中国司法鉴定, 2013, (2):62-65.
|
[4] |
杨旭, 施少培, 徐彻. 系统检验方法在可疑文件鉴定中运用[J]. 中国司法鉴定, 2013, (4):32-35.
|
[5] |
刘晓光, 郭甜. 打印机打印法变造文件的检验[J]. 贵州警官职业学院报, 2008, (4):53-55.
|
[6] |
Gebhardt J, Goldstein M, Shafait F, et al.Document Authentication using Printing Technique Features and Unsupervised Anomaly Detection[C]//12th International Conference on Document Analysis and Recognition, Piscataway, 2013:479-483.
|
[7] |
Lampert C H, Mei L, Breuel T M.Printing Technique Classification for Document Counterfeit Detection[C]//International Conference on Computational Intelligence and Security, Guangzhou, 2006: 639-644.
|
[8] |
Umadevi M, Agarwal A, Rao R.Printed Text Characterization for Identifying Print Technology using Expectation Maximization Algorithm[C]//Multi-disciplinary Trends in Artificial Intelligence, Hyderabad, 2011, (7080): 201-212.
|
[9] |
Tchan J.Classifying Digital Prints According to Their Production Process using Image Analysis and Artificial Neural networks[C]//The International Society for Optical Engineering, San Jose, 2000:105-116.
|
[10] |
Tchan J.The Development of an Image Analysis System That Can Detect Fraudulent Alterations Made to Printed Images[C]//The International Society for Optical Engineering, San Jose, 2004:151-159.
|
[11] |
Schulze C, Schreyer M, Stahl A, et al.Using DCT Features for Printing Technique and Copy Detection[J]. Advances in Digital Forensics , 2009, (306): 95-106.
|
[12] |
Shang S, Memon N, Kong X.Detecting documents forged by printing and copying[J]. EURASIP Journal on Advances in Signal Processing, 2014, 140.
|
[13] |
Chiang P J, Khanna N, Mikkilineni A K, et al.Printer and Scanner Forensics[J]. IEEE Signal Processing Magazine, 2009, 26(2):72-83.
|
[14] |
Ali G N, Mikkilineni A K, Chiang P J, et al.Intrinsic and Extrinsic Signatures for Information Hiding and Secure Printing with Electrophotographic Devices[C]//NIP19: International Conference on Digital Printing Technologies, New Orleans, 2009:511-514.
|
[15] |
Wu Y, Kong X, You X, et al.Printer Forensics Based on Page Document's Geometric Distortion[C]//International Conference on Image Processing, Cairo, 2009:2909-2912.
|
[16] |
Bulan O, Mao J, Sharma G.Geometric Distortion Signatures for Printer Identification[C]//Proceeding of the International Conference on Acoustics, Speech and Signal Processing. Taipei, 2009:1401-1404.
|
[17] |
沈林杰, 孔祥维, 尤新刚. 基于字符图像质量评价的打印机取证[J]. 东南大学学报:自然科学版, 2007, 37(Sl): 92-95.
|
[18] |
Kong X, You X, Wang B, et al.Laser Printer Source Forensics for Arbitrary Chinese Characters[C]//Proceeding of International Conference on Security and Management Las Vegas, 2010:356-360.
|
[19] |
Oliver J, Chen J.Use of Signature Analysis to Discriminate Digital Printing Technologies[C], International Conference on Digital Printing Technologies, San Diego, 2002:218-222.
|
[20] |
王宁, 韩国强, 顾国生. 打印文件鉴别打印机型的文字图像模糊识别[J]. 计算机应用研究, 2008, 25(3):953-956.
|
[21] |
邓伟, 罗小巧, 鄢煜尘, 等. 基于打印字符分析的打印文件检验研究[J]. 计算机应用研究, 2011, 28(2):4763-4769.
|
[22] |
王锦生. 喷墨打印机打印文件检验[J]. 刑事技术, 1998, (4):21-23.
|
[23] |
Yoshinori A, Atsushi Y, Yoshiyasu H.Improvement of Inkjet Printer Spur Gear Teeth Number Estimation by Fixing the Order in Maximum Entropy Spectral Analysis[C]//The 4th International Workshop on Computational Forensics, Berlin, 2011, (6540): 101-113.
|
[24] |
Yoshinori A, Atsushi Y, Yoshiyasu H.Estimation of Inkjet Printer Spur Gear Teeth Number from Pitch Data String of Limited Length[C]//The 3rd International Workshop on Computational Forensics, The Hague, 2009:25-32.
|
[25] |
Wang C, Kong X, Shang S, et al.Photocopier Forensics Based on Arbitrary Text Characters[C]//SPIE-IS&T Electronic Imaging - Media Watermarking, Security, and Forensics, Burlingame, 2013: 86650G.
|
[26] |
Gou H, Swaminathan A, Wu M.Robust Scanner Identification Based on Noise Features[C]//The 9th International Conference on Security, Steganography and Watermarking of Multimedia Contents, San Jose, 2007, 6505:S5050-S5060.
|
[27] |
Khanna N, Chiu G T C, Allebach J P, et al. Scanner Identification with Extension to Forgery Detection[C]//The 10th International Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X. San Jose, 2008, (6819): G8190-G8190.
|
[28] |
Dirik A E, Sencar H T, Memon N.Flatbed Scanner Identification Based on Dust and Scratches Over Scanner Platen[C]//International Conference on Acoustics, Speech and Signal Processing, Piscataway, 2009:1385-1388.
|
[29] |
Shang S, Kong X, You X.Copy Paper Brand Source Identification using Commodity Scanners[J]. Information Technology Journal, 2011, 10(11):2112-2118.
|
[30] |
Beusekom J V, Shafait F, Breuel T M.Document Inspection using Text-line Alignment[C]//International Workshop on Document Analysis Systems, Boston, 2010:263-270.
|
[31] |
Beusekom J V, Shafait F, Breuel T M.Text-line Examination for Document Forgery Detection[J]. International Journal on Document Analysis and Recognition. 2013, 16(2):189-207.
|
[32] |
Beusekom J V, Shafait F.Distortion Measurement for Automatic Document Verification[C]//International Conference on Document Analysis and Recognition, Los Alamitos, 2011:289-293.
|
[33] |
Kee E, Farid H.Printer Profiling for Forensics and Ballistics[C]//ACM Workshop on Multimedia and Security Workshop, Oxford, 2008:3-10.
|
[34] |
孔祥维, 吴玉宝. 一种利用半色调信息检测文档真实性的打印文档取证方法: 中国, 201010154461.6[P], 2012-11-05.
|
[35] |
Khanna N, Chiu G T C, Allebach J P, et al. Scanner Identification with Extension to Forgery Detection[C]//International Conference on Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, 2008, 6819: G8190-G8190.
|
[36] |
Bertrand R, Gomez-Kramer P, Terrades O R, et al.A System Based on Intrinsic Features for Fraudulent Document Detection[C]//International Conference on Document Analysis and Recognition, Piscataway, 2013:106-110.
|
[37] |
姚洪波,孟正,李希,等. 基于P2P的远程控制系统设计与实现[J]. 信息网络安全,2014,(3):32-38.
|
[38] |
杨大利,朱一凡,马婧雯. 基于LAMP技术的服务器安全配置方案研究[J]. 信息网络安全,2014,(3):39-45.
|
[39] |
包佳敏,胡爱群. Android系统文件监听技术的研究[J]. 信息网络安全,2014,(3):46-51.
|
[40] |
徐国天. 远程控制木马通信协议及线索调查方法研究[J]. 信息网络安全,2014,(3):52-56.
|
[41] |
焦娜. 一种基于Android平台的安全图片传输技术[J]. 信息网络安全,2014,(3):57-61.
|
[42] |
王家波,赵泽茂,李林. 位置服务中一种基于假轨迹的轨迹隐私保护方法[J]. 信息网络安全,2014,(3):62-67.
|
[43] |
吴乐华,孙贤鲁,孟槟,等. 基于Android手机软件认证的U盘锁系统[J]. 信息网络安全,2014,(3):68-73.
|
[44] |
徐浚诚,游林. 异构WSN中基于参考值的可恢复隐私保护数据融合[J]. 信息网络安全,2014,(3):74-79.
|
[45] |
李增鹏,马春光,李迎涛. 基于层次分析涉密信息系统风险评估[J]. 信息网络安全,2014,(3):80-86.
|
[46] |
史记,曾昭龙,杨从保,等. Fuzzing测试技术综述[J]. 信息网络安全,2014,(3):87-91.
|
[47] |
李建,周化钢,彭越,等. 以用户为中心的可信终端身份管理模型[J]. 信息网络安全,2014,(4):1-6.
|
[48] |
战晓苏,权乐,江凌. “舒特”攻击行动描述与效能评估探要[J]. 信息网络安全,2014,(4):7-12.
|
[49] |
张涛,牛伟颖,孟正,等. 基于Windows内核模式下进程监控的用户权限控制系统设计与实现[J]. 信息网络安全,2014,(4):13-19.
|
[50] |
张驰,罗森林. 基于端口和编号的漏洞代码匹配方法研究[J]. 信息网络安全,2014,(4):20-24.
|
[51] |
陈震,刘洪健. 基于倒排列表的网流索引检索与压缩方法[J]. 信息网络安全,2014,(4):25-30.
|