Showing 921 - 940 results of 1,106 for search '"forgery"', query time: 0.15s Refine Results
  1. 921

    A propaganda document in support of the 19th century Caliphate of Ḥamdallāhi: Nūḥ b. al-Ṭāhir al-Fulānī’s “Letter on the appearance of the twelfth caliph” (Risāla fī ẓuhūr al-khalī... by Mauro Nobili

    Published 2016-12-01
    “…This document, briefly introduced by Felix Dubois in the late 19th century, has been neglected by scholars, who have discarded it because it includes an obvious forgery. The letter comprises extensive quotes from the Tārīkh al-Fattāsh, allegedly written in the early 16th century by the Timbuktu-based scholar Maḥmūd Kaʻti but actually composed by Nūḥ b. al-Ṭāhir himself. …”
    Get full text
    Article
  2. 922

    Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks by Zheng Zuo, Shichun Yang, Bin Ma, Bosong Zou, Yaoguang Cao, Qiangwei Li, Sida Zhou, Jichong Li

    Published 2021-11-01
    “…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
    Get full text
    Article
  3. 923

    Evaluation of problems arising in emergency services from the perspectives of medical and criminal law: The example of Türkiye by Zeynep Esra Tarakçıoğlu, Bora Özdemir, Mehmet Necmeddin Sutaşır

    Published 2024-11-01
    “…The crimes attributed to these professionals vary but primarily include involuntary manslaughter, misuse of public duty, forgery of documents, and reckless injury. Discussion: In Türkiye, there is a notable prevalence of investigations conducted in emergency services and criminal cases involving healthcare professionals in this field. …”
    Get full text
    Article
  4. 924

    Improvements in the randomness and security of digital currency using the photon sponge hash function through Maiorana–McFarland S-box replacement by Mohammed Asmaa A., Rahma Abdul Monem S., AbdulWahab Hala Bahjat

    Published 2024-10-01
    “…Trading digital currencies via the Internet may be vulnerable to theft and forgery due to the development of hacker programs. …”
    Get full text
    Article
  5. 925

    Application of Fuzzy Logic in a Secure Beacon–Based Guidance System for Public Transportation by Molina-Gil Jezabel, Caballero-Gil Pino, Quesada-Arencibia Alexis, de Blasio Gabriele Salvatore

    Published 2022-09-01
    “…To defend the scheme against possible attacks based on beacon forgery or user tracking, the proposal includes different forms of authentication for data sent from beacons and data sent from the mobile application. …”
    Get full text
    Article
  6. 926

    Application of expert opinion in investigation and proof of criminal offences against justice by V. V. Grytsenko

    Published 2024-12-01
    “…Another typical method used in the investigation of criminal offences against justice is the technical examination of a document, which is aimed at confirming/refuting the fact of its forgery. The author believes that further research on the issues raised should be aimed at identifying typical mistakes made by the inquiry and investigation authorities which affect the ability to solve expert tasks in this category of criminal offences.…”
    Get full text
    Article
  7. 927

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  8. 928

    Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System by C. Madan Kumar, Ruhul Amin, M. Brindha

    Published 2023-12-01
    “…An attacker may attempt to compromise the security, such as forgery, replay, and impersonation attacks. To ensure secure communication, various authentication solutions have been introduced for TMIS. …”
    Get full text
    Article
  9. 929

    A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain by Chin-Ling Chen, Zi-Yi Lim, Hsien-Chou Liao, Yong-Yuan Deng

    Published 2021-03-01
    “…The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. …”
    Get full text
    Article
  10. 930

    A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things by Yunfa Li, Yifei Tu, Jiawa Lu, Yunchao Wang

    Published 2020-02-01
    “…However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. …”
    Get full text
    Article
  11. 931

    Watermarking for combating deepfakes by Li, Rui

    Published 2023
    “…Over the recent years, great concerns have been aroused around the topic of Deefake due to its amazing ability in making a forgery image look like a genuine one. Many approaches have been developed to alleviate such risks. …”
    Get full text
    Final Year Project (FYP)
  12. 932

    ANALISIS SEKUEN NUKLEOTIDA FRAGMEN 12S RIBOSOMAL MITOKONDRIAL DEOKSIRIBONUKLEOTIDA (MT-12S RDNA) YANG BERASAL DARI DAGING BABI DAN SAPI by , IRHAMNA PUTRI RAHMAWATI, , Drh. Sidna Artanto, M.Biotech.

    Published 2014
    “…This leads to cases of forgery and pork adulteration which has a similar physical characteristic with beef. …”
    Thesis
  13. 933

    Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi by Mohd Rosdi, Muhammad Amirul Aizat

    Published 2020
    “…Unfortunately, some problems occurs while residents using the procedures which are coupon forgery and thieving activity and it is time consuming in managing the record. …”
    Get full text
    Thesis
  14. 934

    A new security model to prevent denial-of-service attacks and violation of availability in wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, Subramaniam, Shamala

    Published 2012
    “…The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. …”
    Get full text
    Article
  15. 935

    Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer by Malekzadeh, Mina

    Published 2007
    “…The lack of protection on management frames causes an intruder to launch different types of attack on the WLAN such as forgery, session hijacking, denial of service and man-in-the-middle attack, which can lead to expose the whole WLAN. …”
    Get full text
    Thesis
  16. 936

    State-of-the-art in techniques of text digital watermarking: challenges and limitations by Al-Maweri, Nasr Addin Ahmed Salem, Ali, Roslizah, Wan Adnan, Wan Azizun, Ramli, Abd Rahman, Syed Ahmad Abdul Rahman, Sharifah Mumtazah

    Published 2016
    “…During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. …”
    Get full text
    Article
  17. 937

    Forensic discrimination of blue pen inks: emergence of hybrid pen inks by Gannetion, Linthini, Mohamad Noor, Siti Nur Musliha, Lim, Poh Ying, Chang, Kah Haw, Lim Abdullah, Ahmad Fahmi

    Published 2021
    “…Pens are frequently used to make alterations to documents during forgery. Comparing to conventional inks, hybrid pen ink brings a different challenge to forensic document examiners in differentiating ink entries on a questioned document. …”
    Get full text
    Article
  18. 938

    The Fake Diary of a Historical Figure: Klementyna Tańska-Hoffmanowa’s Journal of Countess Françoise Krasińska (1825) by Magdalena Ożarska

    Published 2016-03-01
    “…In my paper, I wish to discuss the Journal’s precarious balance between historical fact and fiction as well as examining the ways in which this autobiographical forgery is enacted. …”
    Get full text
    Article
  19. 939

    Non-Volatile Terpenoids and Lipophilic Flavonoids from <i>Achillea erba-rotta</i> Subsp. <i>moschata</i> (Wulfen) I. Richardson by Stefano Salamone, Nicola Aiello, Pietro Fusani, Antonella Rosa, Mariella Nieddu, Giovanni Appendino, Federica Pollastro

    Published 2023-01-01
    “…As a consequence, its authentication in aromatized products is impossible beyond sensory analysis allowing forgery. To address these issues, we phytochemically characterized a sample of musk yarrow from the Italian Eastern Alps, identifying, in addition to widespread phytochemicals (taraxasterol, apigenin), the guaianolides <b>3</b>, <b>8</b>, <b>9</b>; the seco-caryophyllane <b>6</b>; and the polymethoxylated lipophilic flavonoids <b>1</b>, <b>4</b>, and <b>5</b>. …”
    Get full text
    Article
  20. 940

    Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform by Prasanna Ravi, Bolin Yang, Shivam Bhasin, Fan Zhang, Anupam Chattopadhyay

    Published 2023-03-01
    “…We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. …”
    Get full text
    Article