Showing 941 - 960 results of 1,106 for search '"forgery"', query time: 0.18s Refine Results
  1. 941

    The Struggle of Princes Ostrozhsky and Yaroslavichi for Investiture in the Turov and Pinsk Eparchy by Andrey A. Bondarenko

    Published 2024-12-01
    “…Princes Ostrozhsky themselves had an interest in the probable forgery while looking for good reasons for appropriating prerogatives in the field of patronage over the local clergy. …”
    Get full text
    Article
  2. 942

    СЕЛЯНСТВО ТА ФАЛЬШИВОМОНЕТНИЦТВО В РОСІЙСЬКІЙ ТА АВСТРО-УГОРСЬКІЙ ІМПЕРІЯХ У ХІХ-ХХ СТ by А. С. А. С. Бойко-Гагарін

    Published 2020-08-01
    “…The purpose of the study is to determine the role of the peasantry in the processes associated with the forgery and sale of counterfeit money, based on previously unpublished archival sources and newspapers. …”
    Get full text
    Article
  3. 943

    Efficient and safe software defined network topology discovery protocol by Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO

    Published 2023-12-01
    “…The network topology discovery in OpenFlow-based software-defined networks is mainly achieved by utilizing the OpenFlow discovery protocol (OFDP).However, it has been observed in existing research that OFDP exhibits low updating efficiency and is susceptible to network topology pollution attacks.To address the efficiency and safety concerns of the network topology discovery protocol, an in-depth investigation was conducted on the mechanism and safety of OFDP network topology discovery.The characteristics of network topology establishment and updating in OFDP were analyzed, and an improved protocol named Im-OFDP (improved OpenFlow discovery protocol) based on the minimum vertex covering problem in graph theory was proposed.In Im-OFDP, the switch port table and network link table were initially established using prior information obtained from OFDP network topology discovery.Subsequently, a graph model of the network topology was constructed, and the minimum vertex covering algorithm in graph theory was employed to select specific switches for the reception and forwarding of topology discovery link layer discovery protocol (LLDP) packets.Multi-level flow tables were designed based on the network topology structure, and these flow entries were installed on the selected switches by the controller to process LLDP packets.To address security issues, dynamic check code verification in LLDP packets was employed to ensure the safety of network links.Additionally, a network equipment information maintenance mechanism was established based on known network topologies to ensure the safety of the network equipment.Experimental results demonstrate a significant reduction in the number of network topology discovery messages, bandwidth overhead, and CPU overhead through the deployment of Im-OFDP.Moreover, the response time for node failures and link recovery time after mode failure is substantially reduced.Im-OFDP also effectively mitigates various network topology pollution attacks, such as link fabrication and switch forgery attacks.Overall, Im-OFDP has the capability to enhance the efficiency and safety of SDN topology discovery.…”
    Get full text
    Article
  4. 944

    An enhanced light weight face liveness detection method using deep convolutional neural network by Swapnil R. Shinde, Anupkumar M. Bongale, Deepak Dharrao, Sudeep D. Thepade

    Published 2025-06-01
    “…Biometric authentication and face recognition hold significant application potential, albeit susceptible to forgery, termed as face spoofing attacks. These attacks, encompassing 2D and 3D modalities, pose challenges through fake photos, warped images, video displays, and 3D masks. …”
    Get full text
    Article
  5. 945

    Diversity of Physicians’ Handwriting and Name Stamp in Chemotherapy Prescriptions: Potential Target for Fraud by Asiyeh Amouei, Molouk Hadjibabaie, Ava Mansouri, Aarefeh Jafarzadeh kohneloo, Maryam Taghizadeh-Ghehi

    Published 2018-02-01
    “…Backgrounds: Verification and authentication of the paper-based handwritten prescriptions is of great importance for antineoplastic medications that are good targets for forgery and fraud. Pharmacists usually investigate handwriting, signature and name stamp of prescribers to verify prescriptions in Iran. …”
    Get full text
    Article
  6. 946

    Discursive strategies for managing coronavirus fake news (rumors) by analyzing some pages in Telegram by Mohammad Hatefi

    Published 2022-09-01
    “…Rumors, like fraud and forgery, manipulate the system of fact-finding and cause the material content of truth to be replaced by the material of false content in the semantic process. …”
    Get full text
    Article
  7. 947

    書與烏托邦 The Book and Utopia by Liyun Hu

    Published 2009-12-01
    “…Generally speaking, in Utopia, the book’s destiny is burning, mutilation, abandonment, forgery, customization, instrumentalization, and so on. …”
    Get full text
    Article
  8. 948

    Cloud storage data integrity audit based on an index–stub table by Hai-chun ZHAO, Xuan-xia YAO, Xue-feng ZHENG

    Published 2020-04-01
    “…When a user’s outsource data need to be frequently updated to avoid forgery attacks due to the similar index value of data block being reused, the design and maintenance of the 2D table become cumbersome. …”
    Get full text
    Article
  9. 949

    Evaluating the effectiveness of student-record systems in conflict-affected universities in northwest Syria relative to student transition and mobility by Muhammed Assaf, Abdulkarim Lakmes, Mohamad Gazy Alobaidy, Feras Shabou, Wael Ahmad, Miassar Alhasan, Fuad Trayek, Leonie Ansems De Vries

    Published 2022-01-01
    “…In a world where robust efficient digitised systems are central international recognition, many students still favoured hardcopy documents, not least as a requirement of employment to help mitigate forgery. Hardcopy systems did not provide students with direct access to essential documentation, creating delays and costs, and the need for in-person transaction in an area of continued insecurity with Government universities actively obstructing transition to non-government universities. …”
    Get full text
    Article
  10. 950

    Efficient and Secure Blockchain System for Digital Content Trading by Gabin Heo, Dana Yang, Inshil Doh, Kijoon Chae

    Published 2021-01-01
    “…Blockchain is attracting attention as a new solution for problems such as illegal copying, profit distribution, and forgery and falsification in the digital content trading environment, which has become an essential asset in the information age. …”
    Get full text
    Article
  11. 951

    A Novel Finger Vein Recognition Method Based on Aggregation of Radon-Like Features by Qiong Yao, Dan Song, Xiang Xu, Kun Zou

    Published 2021-03-01
    “…Finger vein (FV) biometrics is one of the most promising individual recognition traits, which has the capabilities of uniqueness, anti-forgery, and bio-assay, etc. However, due to the restricts of imaging environments, the acquired FV images are easily degraded to low-contrast, blur, as well as serious noise disturbance. …”
    Get full text
    Article
  12. 952

    Tendencia en las vulnerabilidades CSRF entre 2018 y 2024 by Daniel Bonilla Mosquera, Juan Fernando Gonzalez Lopez, Henry Raúl González Brito, Yaimí Trujillo Casañola

    Published 2024-07-01
    “…El objetivo de la investigación fue analizar las vulnerabilidades de ataques Cross-site Request Forgery (CSRF), se revisó datos estadísticos recientes y reportes internacionales. …”
    Get full text
    Article
  13. 953

    Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy by Yu-Hsiu Lin, Chih-Hsien Hsia, Bo-Yan Chen, Yung-Yao Chen

    Published 2019-04-01
    “…Embedding secure data in digital images has broad security uses, e.g., image authentication, prevention of forgery attacks, and intellectual property protection. …”
    Get full text
    Article
  14. 954

    Analysis and Hardware Architecture on FPGA of a Robust Audio Fingerprinting Method Using SSM by Ignacio Algredo-Badillo, Brenda Sánchez-Juárez, Kelsey A. Ramírez-Gutiérrez, Claudia Feregrino-Uribe, Francisco López-Huerta, Johan J. Estrada-López

    Published 2022-07-01
    “…The significant volume of sharing of digital media has recently increased due to the pandemic, raising the number of unauthorized uses of these media, such as emerging unauthorized copies, forgery, the lack of copyright, and electronic fraud, among others. …”
    Get full text
    Article
  15. 955

    Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography by Tao Liu, Shubhangi Vairagar, Sushadevi Adagale, T. Karthick, Catherine Esther Karunya, John Blesswin A, Selva Mary G

    Published 2024-02-01
    “…Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. …”
    Get full text
    Article
  16. 956

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  17. 957

    SSM: Stylometric and semantic similarity oriented multimodal fake news detection by Muhammad Imran Nadeem, Kanwal Ahmed, Zhiyun Zheng, Dun Li, Muhammad Assam, Yazeed Yasin Ghadi, Fatemah H. Alghamedy, Elsayed Tag Eldin

    Published 2023-05-01
    “…Fourthly, images are analyzed for forgery. Lastly, the extracted features are fused for final classification. …”
    Get full text
    Article
  18. 958

    Perspectives on Harmful Algal Blooms (HABs) and the Cyberbiosecurity of Freshwater Systems by David G. Schmale, Andrew P. Ault, Andrew P. Ault, Walid Saad, Durelle T. Scott, Judy A. Westrick

    Published 2019-06-01
    “…In doing so, we can evaluate risks and research needs for cyber-attacks on HAB-monitoring networks including data injection attacks, automated system hijacking attacks, node forgery attacks, and attacks on learning algorithms. …”
    Get full text
    Article
  19. 959

    A Modern Writing Instrument Used as a Weapon for Committing Bank Cheque Fraud by Vivekkumar Mangilal Chayal, Rakesh Rawal, Deepak R. Handa, Vijay Verma, Narendrakumar Mangilal Chayal, Himanshu A. Pandya

    Published 2019-12-01
    “…This technique to retrieve the original disappeared writings done with a ReWrite-erasable ink pen is very easy, simple, rapid, non-destructive, eco-friendly, convenient and sensitive to detect manipulations done in forgery and in suspect documents. Detection of ghost strokes under VSC-6000/HS with different functions, like fluorescence spotlight and specific (300 to 365 nm) UV range will provide a new avenue by, which the forensic document scientist can identify the erased writing that might otherwise go undetected with other more frequently used methods.…”
    Get full text
    Article
  20. 960

    Document Liveness Challenge Dataset (DLC-2021) by Dmitry V. Polevoy, Irina V. Sigareva, Daria M. Ershova, Vladimir V. Arlazarov, Dmitry P. Nikolaev, Zuheng Ming, Muhammad Muzzamil Luqman, Jean-Christophe Burie

    Published 2022-06-01
    “…The tasks of such systems are not only ID document data recognition and extraction but also fraud prevention by detecting document forgery or by checking whether the document is genuine. …”
    Get full text
    Article