-
941
The Struggle of Princes Ostrozhsky and Yaroslavichi for Investiture in the Turov and Pinsk Eparchy
Published 2024-12-01“…Princes Ostrozhsky themselves had an interest in the probable forgery while looking for good reasons for appropriating prerogatives in the field of patronage over the local clergy. …”
Get full text
Article -
942
СЕЛЯНСТВО ТА ФАЛЬШИВОМОНЕТНИЦТВО В РОСІЙСЬКІЙ ТА АВСТРО-УГОРСЬКІЙ ІМПЕРІЯХ У ХІХ-ХХ СТ
Published 2020-08-01“…The purpose of the study is to determine the role of the peasantry in the processes associated with the forgery and sale of counterfeit money, based on previously unpublished archival sources and newspapers. …”
Get full text
Article -
943
Efficient and safe software defined network topology discovery protocol
Published 2023-12-01“…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
Get full text
Article -
944
An enhanced light weight face liveness detection method using deep convolutional neural network
Published 2025-06-01“…Biometric authentication and face recognition hold significant application potential, albeit susceptible to forgery, termed as face spoofing attacks. These attacks, encompassing 2D and 3D modalities, pose challenges through fake photos, warped images, video displays, and 3D masks. …”
Get full text
Article -
945
Diversity of Physicians’ Handwriting and Name Stamp in Chemotherapy Prescriptions: Potential Target for Fraud
Published 2018-02-01“…Backgrounds: Verification and authentication of the paper-based handwritten prescriptions is of great importance for antineoplastic medications that are good targets for forgery and fraud. Pharmacists usually investigate handwriting, signature and name stamp of prescribers to verify prescriptions in Iran. …”
Get full text
Article -
946
Discursive strategies for managing coronavirus fake news (rumors) by analyzing some pages in Telegram
Published 2022-09-01“…Rumors, like fraud and forgery, manipulate the system of fact-finding and cause the material content of truth to be replaced by the material of false content in the semantic process. …”
Get full text
Article -
947
書與烏托邦 The Book and Utopia
Published 2009-12-01“…Generally speaking, in Utopia, the book’s destiny is burning, mutilation, abandonment, forgery, customization, instrumentalization, and so on. …”
Get full text
Article -
948
Cloud storage data integrity audit based on an index–stub table
Published 2020-04-01“…When a user’s outsource data need to be frequently updated to avoid forgery attacks due to the similar index value of data block being reused, the design and maintenance of the 2D table become cumbersome. …”
Get full text
Article -
949
Evaluating the effectiveness of student-record systems in conflict-affected universities in northwest Syria relative to student transition and mobility
Published 2022-01-01“…In a world where robust efficient digitised systems are central international recognition, many students still favoured hardcopy documents, not least as a requirement of employment to help mitigate forgery. Hardcopy systems did not provide students with direct access to essential documentation, creating delays and costs, and the need for in-person transaction in an area of continued insecurity with Government universities actively obstructing transition to non-government universities. …”
Get full text
Article -
950
Efficient and Secure Blockchain System for Digital Content Trading
Published 2021-01-01“…Blockchain is attracting attention as a new solution for problems such as illegal copying, profit distribution, and forgery and falsification in the digital content trading environment, which has become an essential asset in the information age. …”
Get full text
Article -
951
A Novel Finger Vein Recognition Method Based on Aggregation of Radon-Like Features
Published 2021-03-01“…Finger vein (FV) biometrics is one of the most promising individual recognition traits, which has the capabilities of uniqueness, anti-forgery, and bio-assay, etc. However, due to the restricts of imaging environments, the acquired FV images are easily degraded to low-contrast, blur, as well as serious noise disturbance. …”
Get full text
Article -
952
Tendencia en las vulnerabilidades CSRF entre 2018 y 2024
Published 2024-07-01“…El objetivo de la investigación fue analizar las vulnerabilidades de ataques Cross-site Request Forgery (CSRF), se revisó datos estadísticos recientes y reportes internacionales. …”
Get full text
Article -
953
Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy
Published 2019-04-01“…Embedding secure data in digital images has broad security uses, e.g., image authentication, prevention of forgery attacks, and intellectual property protection. …”
Get full text
Article -
954
Analysis and Hardware Architecture on FPGA of a Robust Audio Fingerprinting Method Using SSM
Published 2022-07-01“…The significant volume of sharing of digital media has recently increased due to the pandemic, raising the number of unauthorized uses of these media, such as emerging unauthorized copies, forgery, the lack of copyright, and electronic fraud, among others. …”
Get full text
Article -
955
Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography
Published 2024-02-01“…Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. …”
Get full text
Article -
956
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
Get full text
Article -
957
SSM: Stylometric and semantic similarity oriented multimodal fake news detection
Published 2023-05-01“…Fourthly, images are analyzed for forgery. Lastly, the extracted features are fused for final classification. …”
Get full text
Article -
958
Perspectives on Harmful Algal Blooms (HABs) and the Cyberbiosecurity of Freshwater Systems
Published 2019-06-01“…In doing so, we can evaluate risks and research needs for cyber-attacks on HAB-monitoring networks including data injection attacks, automated system hijacking attacks, node forgery attacks, and attacks on learning algorithms. …”
Get full text
Article -
959
A Modern Writing Instrument Used as a Weapon for Committing Bank Cheque Fraud
Published 2019-12-01“…This technique to retrieve the original disappeared writings done with a ReWrite-erasable ink pen is very easy, simple, rapid, non-destructive, eco-friendly, convenient and sensitive to detect manipulations done in forgery and in suspect documents. Detection of ghost strokes under VSC-6000/HS with different functions, like fluorescence spotlight and specific (300 to 365 nm) UV range will provide a new avenue by, which the forensic document scientist can identify the erased writing that might otherwise go undetected with other more frequently used methods.…”
Get full text
Article -
960
Document Liveness Challenge Dataset (DLC-2021)
Published 2022-06-01“…The tasks of such systems are not only ID document data recognition and extraction but also fraud prevention by detecting document forgery or by checking whether the document is genuine. …”
Get full text
Article