1,574 research outputs found

    Detecting Forgery: Forensic Investigation of Documents

    Get PDF
    Detecting Forgery reveals the complete arsenal of forensic techniques used to detect forged handwriting and alterations in documents and to identify the authorship of disputed writings. Joe Nickell looks at famous cases such as Clifford Irving\u27s autobiography of Howard Hughes and the Mormon papers of document dealer Mark Hoffman, as well as cases involving works of art. Detecting Forgery is a fascinating introduction to the growing field of forensic document examination and forgery detection. Seldom does a book about forgery come along containing depth of subject matter in addition to presenting clear and understandable information. This book has both, plus a readability that is accessible to those studying questioned documents as well as seasoned experts. -- Journal of Forensic Identification The author\u27s expertise in historical documents is unmistakably evident throughout the book. Once I began reading, I found it hard to put down. -- Journal of Questioned Document Examination Guides the reader through various methods and techniques of identifying fakes and phone manuscripts. -- Manchester (KY) Enterprisehttps://uknowledge.uky.edu/upk_legal_studies/1000/thumbnail.jp

    Scientific Documentary Evidence in Criminal Trials

    Get PDF

    OCR Graph Features for Manipulation Detection in Documents

    Full text link
    Detecting manipulations in digital documents is becoming increasingly important for information verification purposes. Due to the proliferation of image editing software, altering key information in documents has become widely accessible. Nearly all approaches in this domain rely on a procedural approach, using carefully generated features and a hand-tuned scoring system, rather than a data-driven and generalizable approach. We frame this issue as a graph comparison problem using the character bounding boxes, and propose a model that leverages graph features using OCR (Optical Character Recognition). Our model relies on a data-driven approach to detect alterations by training a random forest classifier on the graph-based OCR features. We evaluate our algorithm's forgery detection performance on dataset constructed from real business documents with slight forgery imperfections. Our proposed model dramatically outperforms the most closely-related document manipulation detection model on this task

    Modern technologies for technical follow-up of documents

    Get PDF
    The relevance of the study of modern document research technologies is determined by the growing pace of innovative and technical progress, which produces high-tech achievements that are used not only for rational purposes, but also for the purpose of high-quality falsification of documents to achieve illegitimate and selfish goals. The purpose of this article was to study the latest methods of document forgery and existing technologies for their detection with the aim of assessing the level of development of modern expert research in this field. In order to achieve the above-mentioned result, a complex methodological approach was used in the study of this topic, which consists in the consistent application of methods of scientific knowledge, analysis of the acquired knowledge, their systematization and generalization with the aim of building a system model of the modern process of technical documentation research, as well as the application of comparison and evaluation methods in order to identify weaknesses in the use of existing technologies, the method of scientific forecasting of development prospects in this field. As a result of the study, the general theoretical, methodological and procedural provisions governing the document examination process were highlighted, the known and most used methods of falsification of documents were defined, the methodology for establishing the characteristic features of various types of forgeries and the technical means used for their detection were studied, and the available in this field were outlined problems and prospects for overcoming them. The knowledge gained in this way logically contributes to the formation of fundamental information baggage, which should be used in expert work to achieve the most accurate and justified results. The conducted research has a high applied value, as it focuses on the most optimal and effective modern examination technologies in the field of document circulation, highlighting their characteristic features and advantages, emphasizing the growing need to use the latest technological advances in the examination of document

    Receipt Dataset for Fraud Detection

    Get PDF
    International audienceThe aim of this paper is to introduce a new dataset initially created to work on fraud detection in documents. This dataset is composed of 1969 images of receipts and the associated OCR result for each. The article details the dataset and its interest for the document analysis community. We indeed share this dataset with the community as a benchmark for the evaluation of fraud detection approaches

    Method for Effective PDF Files Manipulation Detection

    Get PDF
    Käesoleva magistritöö eesmärgiks on lihtsustada PDF failides tehtud muudatuste tuvastamise protsessi kasutades faili lähtekoodi enne, kui liigutakse edasi teiste meetodite juurde nagu näiteks pilditöötlus. Lähtekoodi analüüs on mõeldud esimeseks sammuks, mis võimaldab säästa palju uurijate aega ning pakkuda rohkem tõestusmaterjali muudatuste tegemise kohta asitõendiks oleva digitaalse faili kohta. Magistritöö tulemusel valmib põhjalik ja efektiivne metoodika PDF failide terviklikkuse uurimiseks ja analüüsimiseks. Püstitatud eesmärgi saavutamiseks õpitakse kõigepealt tundma PDF faili ehitust mõistmaks faili struktuuri ja komponente. Seejärel tehakse ridamisi muudatusi faili lähtekoodis, mis võimaldab süveneda faili varjatud külgedesse ja leida haavatavaid kohti ning millest saadav informatsioon on abiks metoodika aluste paika panemisel. Failide enamlevinud muutmise tüüpide uurimisel saadakse kogum andmeid, millede suhtes hakatakse võrdlema uurimise all olevaid faile ning seeläbi testitakse faili tõepärasust. Lisaks otsitakse vabavaralisi tarkvarasid, millega antud ülesannet lahendada. Töö lõpetatakse kontrollkatsetega, sealhulgas hinnatakse saadud tulemusi ja märgitakse ära tuleviku tegevussuunad antud valdkonnas.The aim of this thesis is to ease the process of detecting manipulations in PDF files by addressing its source code, before having to use other methods such as image processing or text-line examination. It is intended to be a previous step to tackle, which can save a lot of time to examiners and provide them with more proof of manipulations regarding digital file evidence. The result is the construction of a solid and effective method for PDF file investigation and analysis to determine its integrity. To achieve this goal, a study of PDF file anatomy will be conducted firstly, in order to become familiar with the structure and composition of this file format. Afterwards, a series of manipulations performed directly against the file source code will deepen in its secrets and vulnerabilities, and will therefore help in setting the foundations for the method. Finally, a study on the most common types of file manipulations will lead to a set of layouts to which compare the files under investigation and thus, test its veracity, complemented with a quest for specialised open source tools to accomplish this task; a set of validation experiments will complete the work, evaluating the obtained results and stating future lines of work in this field

    Signature Identification in the Light of Science and Experience

    Get PDF
    The Daubert case encourages judges to ask whether forensic identification expertise is valid, not merely whether it is accepted among practitioners. The example of DNA has shown what real science can do, and has highlighted the shortcomings of other forms of forensic science. The combined effect of Daubert and DNA has contributed to skepticism about forensic identification techniques. This skepticism may lead to exclusion of evidence or to procedural limits aimed at making the expertise more trustworthy or preventing it from having undue weight. I will discuss these two alternatives in the context of the specific forensic problem of signature authentication expertise of forensic document examiners (FDEs), after first considering general principles applicable to experience-based expertise
    corecore