-
881
“Characterization of Blue Ballpoint Pens Using UV-Visible Spectroscopy and Pattern Recognition Techniques”
Published 2015“…Analysis of ink is important particularly in the investigation of forgery cases involving handwriting and signatures. …”
Get full text
Monograph -
882
Rancang Bangun Prototype Ciri Citra Kulit Luar Kayu Tanaman Karet menggunakan Metode Virtual Center Of Gravity
Published 2014-03-01“…Hasil penelitian ini menunjukkan bahwa dari maksimal 18 data pengujian yang terbagi menjadi maksimal 6 data valid image dan 12 data forgery image, dengan variasi pengujian sebanyak 5 kali pada setiap kategori diperoleh tingkat Accuracy terendah sebesar 77.78% dan tertinggi sebesar 85.19%. …”
Get full text
Article -
883
Системно-технічний аналіз технологій виготовлення термозбіжних етикеток
Published 2021-10-01“…Heat-shrinkable film has mechanical strength, elasticity and moisture-proof properties, easily changes linear dimensions under the influence of temperature, which allows it to take the form of packaged products, prevents unauthorized opening and forgery, and attracts buyers through original design solutions. …”
Get full text
Article -
884
Using Macroscopic, Microscopic, and FTIR Spectroscopy combined with Chemometrics to Authenticate Arabica Coffee from Antbush
Published 2024-04-01“…In other countries, including India and Africa, coffee forgery using antbush has been extensively established. …”
Get full text
Article -
885
Interpretations of Volga Bulgaria in contemporary Bulgarian historiography through the works of Gainetdin Akhmarov.
Published 2019-01-01“…Multiple citations of the historical forgery Djagfar Tarikhy, in the commentaries to the original text are indicative of these manipulations. …”
Get full text
Article -
886
Utility of Comprehensive GC×GC Gas Chromatography in Finding Varietal Markers among Volatile Compounds in Non-Aromatic Red Wines
Published 2022-10-01“…The presented approach that combines conventional GC-MS and advanced GC×GC-TOF-MS showed a great potential for tracking chemical markers of varietal origin and could be practically applied in managing wine production, quality and typicity, marketing, and protection from forgery.…”
Get full text
Article -
887
Subcutaneous coding via laser directed energy deposition (DED-LB) for unalterable component identification
Published 2024-08-01“…As a means of avoiding forgery, the development of non-detectable labels, or digital passports is necessary. …”
Get full text
Article -
888
Modern technologies for technical follow-up of documents
Published 2022-09-01“…The purpose of this article was to study the latest methods of document forgery and existing technologies for their detection with the aim of assessing the level of development of modern expert research in this field. …”
Get full text
Article -
889
Nahw Wajh Jadīd: al-Muḥāwala fī Tarsīkh Maqāṣid al-Sunna al-Nabawiyya bi Indūnīsiyā [Toward a New Perspective: An Attempt in Strenghtening Maqāṣid al-Sunnah in Indonesia]...
Published 2021-05-01“…Furthermore, added with the dark stories and dark histories in the past such as the phenomenon of hadith forgery, of course, it adds to the tension and the extent of the gap. …”
Get full text
Article -
890
Signature Identification using Digital Image Processing and Machine Learning Methods
Published 2023-06-01“…Identification of the signature is required to ensure ownership of a signature and to prevent things like forgery from happening to the owner of the signature. …”
Get full text
Article -
891
Hybridized Hierarchical Watermarking and Selective Encryption for Social Image Security
Published 2023-07-01“…The growth of social image sharing underscores potential security risks for illegal use, such as image forgery, malicious copying, piracy exposure, plagiarism, and misappropriation. …”
Get full text
Article -
892
Electrical Impedance of Upper Limb Enables Robust Wearable Identity Recognition against Variation in Finger Placement and Environmental Factors
Published 2021-10-01“…However, bio-recognition techniques using these existing physical features are always at risk of template forgery threats, such as fake fingerprints. Due to the risk of theft and duplication, studies have recently been attempted using the internal structure and biological characteristics of the human body, including our previous works on the ratiometric biological impedance feature. …”
Get full text
Article -
893
Literary history as bestseller: the life and opinions of a fraudulent philologue
Published 2024-05-01“… In this article we reveal the publishing ventures of Octav Minar (1886-1967), one of the Romanian authors that was disesteemed by fellow literary historians on account of his counterfeiting acts such as forgery, plagiarism, plastography or trick photography. …”
Get full text
Article -
894
Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism
Published 2023-07-01“…Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage. …”
Get full text
Article -
895
The genesis of forensic research of documents as the branch of forensic technology
Published 2020-06-01“…The history of the falsification of various documents for illegal purposes accompanies the entire history of human civilization, so the study of the evolution of methods of documenting information and related methods of forgery is one of the methods of improving forensic knowledge. …”
Get full text
Article -
896
Analyzing temporal coherence for deepfake video detection
Published 2024-03-01“…At the first level, to fully capture temporal coherence over the entire video, we devise an efficient temporal facial pattern (TFP) mechanism that explores the color variations of forgery-sensitive facial areas by providing global and local-successive temporal views. …”
Get full text
Article -
897
Security Enhanced CLS and CL-AS Scheme Without Pairings for VANETs
Published 2025-01-01“…We also illustrate the security & performance evaluation of our presented technique, and based upon the hardness assumption of the elliptic curve discrete logarithm problem, we have shown that the technique is safe against existential forgery on adaptive chosen message attack in the random oracle model. …”
Get full text
Article -
898
Toward efficient authentication for space-air-ground integrated Internet of things
Published 2019-07-01“…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
Get full text
Article -
899
A Novel Digital Signature Scheme for Advanced Asymmetric Encryption Techniques
Published 2023-04-01“…The analysis showed its robustness against private key recovery and forgery attacks. The implementation results of the proposed scheme showed promising performance in terms of complexity and robustness. …”
Get full text
Article -
900
Exploring opportunities and challenges of Blockchain-Based Electronic Medical records
Published 2022-06-01“…The results obtained reveal that the components of immutability and the impossibility of data forgery of patient records (based on data integration in Blockchain) have the most impact on the system. …”
Get full text
Article