-
921
A propaganda document in support of the 19th century Caliphate of Ḥamdallāhi: Nūḥ b. al-Ṭāhir al-Fulānī’s “Letter on the appearance of the twelfth caliph” (Risāla fī ẓuhūr al-khalī...
Published 2016-12-01“…This document, briefly introduced by Felix Dubois in the late 19th century, has been neglected by scholars, who have discarded it because it includes an obvious forgery. The letter comprises extensive quotes from the Tārīkh al-Fattāsh, allegedly written in the early 16th century by the Timbuktu-based scholar Maḥmūd Kaʻti but actually composed by Nūḥ b. al-Ṭāhir himself. …”
Get full text
Article -
922
Design of a CANFD to SOME/IP Gateway Considering Security for In-Vehicle Networks
Published 2021-11-01“…The results show that the designed gateway can ensure a CAN/CANFD to SOME/IP protocol conversion with a low system resource overhead and a low latency while effectively resisting hacker attacks such as frame forgery, tampering, and sniffing.…”
Get full text
Article -
923
Evaluation of problems arising in emergency services from the perspectives of medical and criminal law: The example of Türkiye
Published 2024-11-01“…The crimes attributed to these professionals vary but primarily include involuntary manslaughter, misuse of public duty, forgery of documents, and reckless injury. Discussion: In Türkiye, there is a notable prevalence of investigations conducted in emergency services and criminal cases involving healthcare professionals in this field. …”
Get full text
Article -
924
Improvements in the randomness and security of digital currency using the photon sponge hash function through Maiorana–McFarland S-box replacement
Published 2024-10-01“…Trading digital currencies via the Internet may be vulnerable to theft and forgery due to the development of hacker programs. …”
Get full text
Article -
925
Application of Fuzzy Logic in a Secure Beacon–Based Guidance System for Public Transportation
Published 2022-09-01“…To defend the scheme against possible attacks based on beacon forgery or user tracking, the proposal includes different forms of authentication for data sent from beacons and data sent from the mobile application. …”
Get full text
Article -
926
Application of expert opinion in investigation and proof of criminal offences against justice
Published 2024-12-01“…Another typical method used in the investigation of criminal offences against justice is the technical examination of a document, which is aimed at confirming/refuting the fact of its forgery. The author believes that further research on the issues raised should be aimed at identifying typical mistakes made by the inquiry and investigation authorities which affect the ability to solve expert tasks in this category of criminal offences.…”
Get full text
Article -
927
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
Get full text
Article -
928
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System
Published 2023-12-01“…An attacker may attempt to compromise the security, such as forgery, replay, and impersonation attacks. To ensure secure communication, various authentication solutions have been introduced for TMIS. …”
Get full text
Article -
929
A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain
Published 2021-03-01“…The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. …”
Get full text
Article -
930
A Security Transmission and Storage Solution about Sensing Image for Blockchain in the Internet of Things
Published 2020-02-01“…However, during the transmission process of IoT data, security issues, such as data theft and forgery, are prone to occur. In addition, most existing data storage solutions are centralized, i.e., data are stored and maintained by a centralized server. …”
Get full text
Article -
931
Watermarking for combating deepfakes
Published 2023“…Over the recent years, great concerns have been aroused around the topic of Deefake due to its amazing ability in making a forgery image look like a genuine one. Many approaches have been developed to alleviate such risks. …”
Get full text
Final Year Project (FYP) -
932
ANALISIS SEKUEN NUKLEOTIDA FRAGMEN 12S RIBOSOMAL MITOKONDRIAL DEOKSIRIBONUKLEOTIDA (MT-12S RDNA) YANG BERASAL DARI DAGING BABI DAN SAPI
Published 2014“…This leads to cases of forgery and pork adulteration which has a similar physical characteristic with beef. …”
Thesis -
933
Designing and developing mobile application for college resident / Muhammad Amirul Aizat Mohd Rosdi
Published 2020“…Unfortunately, some problems occurs while residents using the procedures which are coupon forgery and thieving activity and it is time consuming in managing the record. …”
Get full text
Thesis -
934
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks
Published 2012“…The models are capable of preventing the attacks by detecting and discarding the forgery control frames belonging to the attackers. …”
Get full text
Article -
935
Security Improvement of Unicast Management Frames In Ieee 802.11 Mac Layer
Published 2007“…The lack of protection on management frames causes an intruder to launch different types of attack on the WLAN such as forgery, session hijacking, denial of service and man-in-the-middle attack, which can lead to expose the whole WLAN. …”
Get full text
Thesis -
936
State-of-the-art in techniques of text digital watermarking: challenges and limitations
Published 2016“…During the last decade, digital watermarking technology has also been utilized as an alternative to prevent media forgery and tampering or falsification to ensure both copyright and authentication. …”
Get full text
Article -
937
Forensic discrimination of blue pen inks: emergence of hybrid pen inks
Published 2021“…Pens are frequently used to make alterations to documents during forgery. Comparing to conventional inks, hybrid pen ink brings a different challenge to forensic document examiners in differentiating ink entries on a questioned document. …”
Get full text
Article -
938
The Fake Diary of a Historical Figure: Klementyna Tańska-Hoffmanowa’s Journal of Countess Françoise Krasińska (1825)
Published 2016-03-01“…In my paper, I wish to discuss the Journal’s precarious balance between historical fact and fiction as well as examining the ways in which this autobiographical forgery is enacted. …”
Get full text
Article -
939
Non-Volatile Terpenoids and Lipophilic Flavonoids from <i>Achillea erba-rotta</i> Subsp. <i>moschata</i> (Wulfen) I. Richardson
Published 2023-01-01“…As a consequence, its authentication in aromatized products is impossible beyond sensory analysis allowing forgery. To address these issues, we phytochemically characterized a sample of musk yarrow from the Italian Eastern Alps, identifying, in addition to widespread phytochemicals (taraxasterol, apigenin), the guaianolides <b>3</b>, <b>8</b>, <b>9</b>; the seco-caryophyllane <b>6</b>; and the polymethoxylated lipophilic flavonoids <b>1</b>, <b>4</b>, and <b>5</b>. …”
Get full text
Article -
940
Fiddling the Twiddle Constants - Fault Injection Analysis of the Number Theoretic Transform
Published 2023-03-01“…We also propose novel existential forgery attacks targeting deterministic and probabilistic signing procedure of Dilithium, followed by a novel verification bypass attack targeting its verification procedure. …”
Get full text
Article