What to Know About Documentation Forgery

What to Know About Documentation Forgery

Documentation forgery is one of today’s most common practices. You would think with the internet and credit cards that it would crack down a little bit, but this trend continues to pervade. As long as currency can be produced in the form of paper and it exists, there will always be some form of tomfoolery because this enables people who tamper with money and for whatever strange reason; they always find a way to make it undetectable. Nowadays, technology and the use of laser printers usually make this fraudulence possible, but there are many ways to put a stop or at least slow down this epidemic.

201202091402260For starters, tracking the main source would be the most important. In fact, document forensics technology; have come up with techniques that can trace manufactured currency back to the individual that owns the specific printer being used. And what they do is analyze the counterfeit bill in ways they can detect subtle nuances that only certain machines can produce. By doing that they can determine the brand and model of the device. Meaning, if a printer, such as a HP Hewlett Laser Jet, printed a certain feature in a character that has been skewed in the counterfeit bill that the naked eye didn’t notice and this high-tech technology had the ability of noticing, it would mean a huge crack down this funny money. Well that is what this document forensics, in fact, did. They used their vector machines which produce algorithms, to seek out differences in different printing techniques.

According to the EURSAP Journal, there vector machines reached a 94.8% average accuracy, when they tested for foreground text, noise, and the background of the bill in its relation to a specific machine. There techniques involve methods that make this possible which I will briefly break down for you. In laser printing you have what is called an electroencephalographic-basically a picture produced from a certain device- process that consists of six steps: Charging, exposure, developing, transferring, fusing, and cleaning. After that process is done the optoelectronics device – the part of the printer that generates the picture, transforms it, and then transmits it on to the given document- produces the final product. The algorithm distinguished documents printed, and this allowed document forensics to decipher between ink jet printers, laser printers, and electrostatic copiers. Pretty cool right.

Capture

By doing these algorithms, we see the difference between the given images and it allows us to detect details which are minute, but are only produced by certain computers.  If you look at the Figure 1 you will notice how (a) which is laser-printed, has somewhat of a glossy shiny appearance. (b) Which is a ink-jet , while not a big difference, has lower quality than the laser-printed “the”. Example (c) Is the money maker and actually is the scanned copy of the document and you will notice that it is not as low quality as the ink-jet, but not quite as high quality as the laser-printer because of the degradation – breaking down – caused by scanning the document. They made scientific computations in interpreting what kinds of altering tools were used in making the letters appear real by implementing formulas that give them a spot on analysis of how it was accomplished. This is primarily what document forensics’ need in tracing culprits. It has its draw backs when the resolution is not fully optimal, but besides that it’s a good system.

When these techniques emerge they are going to be ground breaking and virtually make it impossible to get away with such document fraud.  In fact this would go past detecting money. This system will be able to detect fake passports, driver’s licenses, and a whole plethora of documents which have fooled people into thinking they were authentic.

Forginal
I wrote this blog because fraudulence of this nature has presided for sometime without proper impunity. Many people use this form of deception to get by and cheat the system and despite their reasons, it disadvantages the other person. I sympathize with those who have legitimate reasons and that may feel that they do not have a choice, but in all fairness, if this is how the world operated than everyone can use that excuse. Making decisions based on desperation and feelings of despair are not always acceptable. Especially when it pertains to tampering with your year of birth or anything that pertains to you that is not true that can have severe consequences for the rest that it affects.
Forginal

Published byForginal

I wrote this blog because fraudulence of this nature has presided for sometime without proper impunity. Many people use this form of deception to get by and cheat the system and despite their reasons, it disadvantages the other person. I sympathize with those who have legitimate reasons and that may feel that they do not have a choice, but in all fairness, if this is how the world operated than everyone can use that excuse. Making decisions based on desperation and feelings of despair are not always acceptable. Especially when it pertains to tampering with your year of birth or anything that pertains to you that is not true that can have severe consequences for the rest that it affects.

No Comments

Post a Comment