检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:曾锦华 邱秀莲 卞新伟 施少培 ZENG Jinhua;QIU Xiulian;BIAN Xinwei;SHI Shaopei(Academy of Forensic Science,Shanghai 200063,China;Shanghai Forensic Service Platform,Shanghai 200063,China;East China University of Political Science and Law,Shanghai 200042,China)
机构地区:[1]司法鉴定科学研究院,上海200063 [2]上海市司法鉴定专业技术服务平台,上海200063 [3]华东政法大学,上海200042
出 处:《刑事技术》2022年第6期573-578,共6页Forensic Science and Technology
基 金:上海市科委技术标准项目(21DZ2200100);中央级科研院所公益研究基金(GY2020G-8、GY2021G-3)。
摘 要:随着声学和光学传感器技术的快速发展及其在手机等移动智能设备上的广泛应用,传统的基于元数据分析、成像分析、处理痕迹分析、图像信号分析等技术手段的图像真实性鉴定已形成相对成熟的综合鉴定方案,然而,针对手机中个性化相机程序拍摄照片的真实性鉴定问题,仍缺乏系统的技术研究和方法指导。本文系统研究手机水印相机程序拍摄照片的图像数据特点,并以市面上流行的两款水印相机为例详细研究手机水印相机程序拍摄照片的真实性鉴定的检验内容和鉴定方法。研究结果表明,文件属性和元数据信息检验在解决上述问题中发挥着重要作用,但又与传统的检验内容存在差异。检验过程中,应充分关注手机操作系统特性以及水印相机程序特性以实现客观科学的个性化相机程序拍摄图像的真实性鉴定。Mobile smart devices,e.g.,the mobile phones,are always built with the acoustic and optical sensors representing their rapid developing and wide applying mainstream technologies so that the relevant image authentication has got to comparatively mature and comprehensive solutions about those involving metadata,imaging artifices,processing signs and image signals.However,the ever-personalized camera programs are available and popular in mobile phones,bringing in problems occurring for forensic authentication of images taken under related handling.Here,forensic authentication was put into the images imposed by watermarking camera programs set up with mobile phones.Two popular watermarking camera programs(developed by Shanghaibased Tencent Technology Co.,Ltd.and Beijing Xiaohei Technology Co.,Ltd.)were used to explore the feasible examination materials and methods for the purpsoe of forensic authentication.Through scrutiny into the features of the original images imposed by watermarking cameras and the conditions of watermarking,an exampling case was carried out on how to undertake the concrete examination process of such the kind of forensic image authentication and have the effectiveness verified.Evidently,the file attributes and metadata information did play an important role for such an authentication although some differences were present from the traditional examination materials.For example,the“Photoshop”information in the metadata of images hints the existence of editing operation traditionally,yet being taken as a normal phenomenon and reasonable presence for the images imposed by watermarking camera programs.Therefore,in order to achieve the objective and scientifi c opinions with examination,much attention should be paid to the characteristics of mobile phones’operating systems and watermarking camera programs,the two key materials for forensic authentication of images imposed by personalized camera programs built in mobile phones.
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.220.204.192