標(biāo)題: Titlebook: Computational Forensics; Third International Zeno J. M. H. Geradts,Katrin Y. Franke,Cor J. Veen Conference proceedings 2009 Springer-Verla [打印本頁] 作者: Opiate 時間: 2025-3-21 19:12
書目名稱Computational Forensics影響因子(影響力)
作者: acclimate 時間: 2025-3-21 20:27 作者: MANIA 時間: 2025-3-22 03:34
Computational Forensics978-3-642-03521-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Insufficient 時間: 2025-3-22 08:26
Random elements in linear spaces,(trace). This paper aims at presenting forensic automatic speaker recognition (FASR) methods that provide a coherent way of quantifying and presenting recorded voice as biometric evidence. In such methods, the biometric evidence consists of the quantified degree of similarity between speaker-depende作者: constellation 時間: 2025-3-22 11:52
Stochastic Cooling of Particle Beamsages. These types of messages can easily be adjusted, such that meta data referring to names and addresses is at least unreliable. In this paper, we propose a method to identify authors of short informal messages solely based on the text content. The method uses compression distances between texts a作者: conformity 時間: 2025-3-22 16:52
Stochastic Cooling of Particle Beamsmaximum entropy spectral analysis. The purpose of this study is to improve the efficiency of inkjet printer model identification based on spur mark comparison in the field of forensic document analysis. Experiments were performed using two spur gears in different color inkjet printer models, and eig作者: conformity 時間: 2025-3-22 20:56 作者: 旁觀者 時間: 2025-3-22 21:12
https://doi.org/10.1007/978-1-4615-4115-8nly found types of forensic evidence. The similarity between twins’ prints is critical establish to the reliability of fingerprint identification. We present a quantitative analysis of the discriminability of twin fingerprints on a new data set (227 pairs of identical twins and fraternal twins) rece作者: 衰老 時間: 2025-3-23 03:33 作者: Criteria 時間: 2025-3-23 05:55 作者: Rinne-Test 時間: 2025-3-23 13:11 作者: 無情 時間: 2025-3-23 14:28
Stochastic Integrals and the ITO Formula,gy that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator’s view on (parts of) 作者: 擔(dān)憂 時間: 2025-3-23 18:56 作者: parsimony 時間: 2025-3-24 00:48 作者: Mast-Cell 時間: 2025-3-24 05:38
Stochastic Differential Equations of several individuals. The task of signature verification is a problem of determining genuine-class membership of a questioned (test) signature. We take a 3-step, writer independent approach: 1) Determine the prior parameter distributions for means of both “genuine vs. genuine” and “forgery vs. kn作者: 連詞 時間: 2025-3-24 09:41 作者: overhaul 時間: 2025-3-24 12:48 作者: Collar 時間: 2025-3-24 17:35
Stochastic Calculus: Principles and Results,ts attempt to identify such forgeries manually, they use among others line orientation as a feature. This paper describes an automatic mean for measuring the line justification and helping the specialist to find suspicious lines. The goal is to use this method as one of several screening tools for s作者: 浪費物質(zhì) 時間: 2025-3-24 22:44
Application to Optimal Stopping,ting colors in images of documents. After determining the background color, samples from the image that are representative of the colors to be separated are mapped to a feature space. Given the clusters of samples of either color the support vector machine (SVM) method is used to find an optimal sep作者: 傾聽 時間: 2025-3-25 02:23 作者: grotto 時間: 2025-3-25 03:32
Conference proceedings 2009 The 16 revised full papers presented were carefully reviewed and are organized in topical sections on speech and linguistics, fingerprints, handwriting, documents, printers, multimedia and visualization. This volume is interesting to researchers and professionals who deal with forensic problems usi作者: 支架 時間: 2025-3-25 08:48
Stochastic Cooling of Particle Beams Our method clearly outperformed the other methods. In 65% of the cases the author could be correctly identified, while in 88% of the cases the true author was in the top 5 of the produced ranked list.作者: 排名真古怪 時間: 2025-3-25 14:19
Stochastic Differential Equationsh the new system has been constructed, outline recent innovations in the computational search procedure and also report on the real-world experience of UK police forces who have been using a commercial version of the system.作者: 心神不寧 時間: 2025-3-25 17:57
Some Mathematical Preliminaries,writing analysis are reviewed in light of the concerns expressed by the judiciary and National Research Council. A future potential role for computer-assisted handwriting analysis in the courts is identified.作者: HARD 時間: 2025-3-25 20:02 作者: occurrence 時間: 2025-3-26 04:08 作者: Intuitive 時間: 2025-3-26 07:29 作者: 迎合 時間: 2025-3-26 09:58 作者: legacy 時間: 2025-3-26 12:41
Automatic Line Orientation Measurement for Questioned Document Examinationcanning large document collections for the potential presence of forgeries. This method extracts the text-lines, measures their orientation angle and decides the validity of these measured angles based on previously trained parameters.作者: RODE 時間: 2025-3-26 17:23 作者: constellation 時間: 2025-3-26 22:49 作者: 寬宏大量 時間: 2025-3-27 03:14 作者: 油膏 時間: 2025-3-27 08:55 作者: surrogate 時間: 2025-3-27 10:48
Some Mathematical Preliminaries,case of short – i.e., less than 10 minutes in duration – digital audio recordings. We also present a matching procedure based on the correlation coefficient, as a more robust alternative to squared error matching.作者: 不持續(xù)就爆 時間: 2025-3-27 14:52
Using the ENF Criterion for Determining the Time of Recording of Short Digital Audio Recordingscase of short – i.e., less than 10 minutes in duration – digital audio recordings. We also present a matching procedure based on the correlation coefficient, as a more robust alternative to squared error matching.作者: Moderate 時間: 2025-3-27 21:40
Stochastic Cooling of Particle Beams times the number of teeth showed a proper estimation within a deviation of one tooth. However, the estimation failed for shorter data strings because the order in maximum entropy analysis was determined inappropriately. The presented results provide information on the number of spur gear teeth from shorter data strings than in a previous study.作者: 支架 時間: 2025-3-28 00:44
Guidelines for Computer Implementation,nfrared (NIR) mode and estimations of point spread function (PSF). As estimating PSF we used cepstrum which is inverse Fourier transform of logarithm spectrum. The proposed method provided the clear image of the spur marks.作者: Bernstein-test 時間: 2025-3-28 05:57
https://doi.org/10.1007/978-1-4615-4115-8the general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.作者: 征稅 時間: 2025-3-28 08:46
Stochastic Differential EquationsC among a random set of . samples (.PRC) and (iii) PRC between a specific sample among . others (specific .PRC). Experimental results show that the theoretical estimates of fingerprint individuality using our model consistently follow the empirical values based on the NIST4 database.作者: Default 時間: 2025-3-28 11:38
Some Mathematical Preliminaries,eovirtual environment. Behind this background the concept of the space-time cube is adopted to allow for visual analysis of repeat burglary victimisation. Since these procedures require incorporating temporal elements into virtual 3D environments, basic methods for 4D crime scene visualisation are outlined in this paper.作者: 調(diào)味品 時間: 2025-3-28 16:22 作者: Lice692 時間: 2025-3-28 19:20 作者: URN 時間: 2025-3-29 01:52 作者: 勤勞 時間: 2025-3-29 06:54
Detecting the Spur Marks of Ink-Jet Printed Documents Using a Multiband Scanner in NIR Mode and Imagnfrared (NIR) mode and estimations of point spread function (PSF). As estimating PSF we used cepstrum which is inverse Fourier transform of logarithm spectrum. The proposed method provided the clear image of the spur marks.作者: 分發(fā) 時間: 2025-3-29 10:11
A Computational Discriminability Analysis on Twin Fingerprintsthe general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.作者: 量被毀壞 時間: 2025-3-29 15:13
Probability of Random Correspondence for FingerprintsC among a random set of . samples (.PRC) and (iii) PRC between a specific sample among . others (specific .PRC). Experimental results show that the theoretical estimates of fingerprint individuality using our model consistently follow the empirical values based on the NIST4 database.作者: 蜿蜒而流 時間: 2025-3-29 18:10 作者: consent 時間: 2025-3-29 22:11
Multimedia Forensics Is Not Computer Forensicsrensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.作者: 最低點 時間: 2025-3-30 00:44 作者: 傳授知識 時間: 2025-3-30 07:36
Application to Mathematical Finance,deo files were recorded with various resolutions, and the resulting video files were encoded with different codecs. Depending on video characteristics (e.g. codec quality settings, recording resolution), it is possible to correctly identify cameras based on these videos.作者: Parley 時間: 2025-3-30 09:20 作者: 與野獸博斗者 時間: 2025-3-30 13:17
Application to Optimal Stopping,arating line between the clusters in feature space. Deconvolution image processing parameters are determined from the separating line. A number of examples of applications in forensic casework are presented.作者: Altitude 時間: 2025-3-30 17:49
Random elements in linear spaces,dence given the estimated within-source and between-sources variabilities. This paper reports on the first ENFSI evaluation campaign through a fake case, organized by the Netherlands Forensic Institute (NFI), as an example, where an automatic method using the Gaussian mixture models (GMMs) and the B作者: 無王時期, 時間: 2025-3-30 23:40 作者: synovium 時間: 2025-3-31 02:19 作者: Statins 時間: 2025-3-31 08:15
A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inferenceble signatures for enrollment is small. On the NISDCC dataset, when enrolling 4 genuine signatures, the new method yielded a 12.1% average error rate, a significant improvement over a previously described Bayesian method.作者: FRONT 時間: 2025-3-31 09:38
Zeno J. M. H. Geradts,Katrin Y. Franke,Cor J. Veen作者: Immortal 時間: 2025-3-31 16:23
Statistical Evaluation of Biometric Evidence in Forensic Automatic Speaker Recognition(trace). This paper aims at presenting forensic automatic speaker recognition (FASR) methods that provide a coherent way of quantifying and presenting recorded voice as biometric evidence. In such methods, the biometric evidence consists of the quantified degree of similarity between speaker-depende作者: reflection 時間: 2025-3-31 18:55
Forensic Authorship Attribution Using Compression Distances to Prototypesages. These types of messages can easily be adjusted, such that meta data referring to names and addresses is at least unreliable. In this paper, we propose a method to identify authors of short informal messages solely based on the text content. The method uses compression distances between texts a