期刊文献+

用于假币溯源的海量电子物证快速处理方法 被引量:2

Method to Fast Dispose Mass Electronic-evidence Data for Counterfeit Currency Tracing
下载PDF
导出
摘要 目的假币犯罪扰乱经济秩序,损害百姓利益,给很多行业的安全稳健运行造成了极大威胁。使用彩色打印机等数字印刷设备的打印类假币犯罪,由于其操作简单、成本低、隐蔽性强、打印质量好等特点,正逐渐增多,发案区域呈扩散蔓延态势。打印假币的电子版是打击打印假币犯罪的关键,打掉假币电子版的源头,才能从根本上遏制打印假币犯罪的蔓延趋势。方法使用专业设备采集假币犯罪嫌疑人手机、个人电脑、U盘等电子设备及存储介质中的数据,首先计算这些电子类物证文件的哈希值,然后用计算机编程方法从大量数据中筛选查重,找出哈希值相同的文件,对筛选的少量结果分析,可以快速地追踪电子版假币的源头。结果对采集到的犯罪嫌疑人的数量庞大的电子文档材料,使用本文的方法快速筛选剔除了无用信息,支持了后续的寻找打印版假币的电子版源工作,为打击犯罪提供了重要依据。结论针对打印类假币犯罪的场景,本文的海量电子物证处理方法速度快效率高,具有重要的应用价值。 Objective Counterfeit currency crimes tend to a growing trend. Although the large denomination of RMB is primarily the imitated target, the small ones of it have become increasingly arising, too. Because of the simple operation, low cost, concealment, print of quality and other characteristics, color printers or other digital printing equipment are the preferential choice for the criminals to fabricate the counterfeit currency. Therefore, the relational electronic version of the printed counterfeit money is the key clue to fight against counterfeit currency crimes. This paper attampts to establish a fast method to discover the valuable information from mass electronic-evidential data for counterfeit currency tracing. Methods With special equipment, the data were collected from cell phones, laptops, PCs, USB flash drives and other devices that were used to fake genuine currency by the suspects. The hash value, drawn from the above collected data, was calculated. A computer program was devised to find out the duplicate data of same hash value and merge into a file cluster. Through analyzing the screened file cluster, the source of electronic version of counterfeit currency was to trace back. Results The source of electronic version of counterfeit currency can be quickly tracked through picking out the key information and eliminating the useless one from the enormous electronic files. With the established method here, a specially momentous case has been given the crucial clue by exhumation of the source of evidence from different suspects. Conclusion The method to get hash value by fast disposing a large amount of electronic evidential data is of high efficiency and swift speed for analyzing the source of counterfeit currency.
出处 《刑事技术》 2016年第3期240-243,共4页 Forensic Science and Technology
基金 公安部技术研究计划面上项目(No.2015JB004) 中央公益性科研院所基本科研业务费项目(No.2016JB016)
关键词 假币溯源 哈希值 电子物证 筛选 counterfeit currency tracing hash electronic material screening
  • 相关文献

参考文献9

  • 1王彦学.论“情报导侦”之意涵[EB/OL].[2014]http://opinion.cpd.com.cn/n20833671/n21145748/c21172438/content.html.
  • 2潘隽,范卫红,等.反假与防伪[M].北京:中国金融出版社,2009:141-143.
  • 3Bae HJ,Bae S,Park C,et al.Biomimetics:biomimetic microfingerprints for anti-counterfeiting strategies[J].Advanced Materials,2015,27(12):2123-2123.
  • 4敖莉,舒继武,李明强.重复数据删除技术[J].软件学报,2010,21(5):916-929. 被引量:119
  • 5付印金,肖侬,刘芳.重复数据删除关键技术研究进展[J].计算机研究与发展,2012,49(1):12-20. 被引量:64
  • 6Stanek J,Sorniotti A,Androulaki E,et al.A secure data deduplication scheme for cloud storage.Financial Cryptography and Data Security,2014:99-118.
  • 7X-Ways Forensics[EB/OL].[2015-08-10],http://www.x-ways.net/winhex/manual.pdf.
  • 8梁鲁宁,林雷祥,苏丽,孙华清,文东宇.机制版假币票面上印刷疵点的检验[J].刑事技术,2012,37(6):31-34. 被引量:11
  • 9John Zeng Wang.Forensic technology of the 21st century:Portability,digitability,and quantitability[C]//第二届国际法庭科学大会论文集.2011:22-23.

二级参考文献89

  • 1Bhagwat D,Pollack K,Long DDE,Schwarz T,Miller EL,P-ris JF.Providing high reliability in a minimum redundancy archival storage system.In:Proc.of the 14th Int'l Symp.on Modeling,Analysis,and Simulation of Computer and Telecommunication Systems (MASCOTS 2006).Washington:IEEE Computer Society Press,2006.413-421.
  • 2Zhu B,Li K.Avoiding the disk bottleneck in the data domain deduplication file system.In:Proc.of the 6th Usenix Conf.on File and Storage Technologies (FAST 2008).Berkeley:USENIX Association,2008.269-282.
  • 3Bhagwat D,Eshghi K,Mehra P.Content-Based document routing and index partitioning for scalable similarity-based searches in a large corpus.In:Berkhin P,Caruana R,Wu XD,Gaffney S,eds.Proc.of the 13th ACM SIGKDD Int'l Conf.on Knowledge Discovery and Data Mining (KDD 2007).New York:ACM Press,2007.105-112.
  • 4You LL,Pollack KT,Long DDE.Deep store:An archival storage system architecture.In:Proc.of the 21st Int'l Conf.on Data Engineering (ICDE 2005).Washington:IEEE Computer Society Press,2005.804-815.
  • 5Quinlan S,Dorward S.Venti:A new approach to archival storage.In:Proc.of the 1st Usenix Conf.on File and Storage Technologies (FAST 2002).Berkeley:USENIX Association,2002.89-102.
  • 6Sapuntzakis CP,Chandra R,Pfaff B,Chow J,Lam MS,Rosenblum M.Optimizing the migration of virtual computers.In:Proc.of the 5th Symp.on Operating Systems Design and Implementation (OSDI 2002).New York:ACM Press,2002.377-390.
  • 7Rabin MO.Fingerprinting by random polynomials.Technical Report,CRCT TR-15-81,Harvard University,1981.
  • 8Rivest R.The MD5 message-digest algorithm.1992.http://www.python.org/doc/current/lib/module-md5.html.
  • 9U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-1:Secure Hash Standard.1995.http://www.itl.nist.gov/fipspubs/fip180-1.htm.
  • 10U.S.National Institute of Standards and Technology (NIST).Federal Information Processing Standards (FIPS) Publication 180-2:Secure Hash Standard.2002.http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf.

共引文献161

同被引文献14

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部