Showing 1,001 - 1,020 results of 1,172 for search '"forgery"', query time: 0.14s Refine Results
  1. 1001

    A Novel Finger Vein Recognition Method Based on Aggregation of Radon-Like Features by Qiong Yao, Dan Song, Xiang Xu, Kun Zou

    Published 2021-03-01
    “…Finger vein (FV) biometrics is one of the most promising individual recognition traits, which has the capabilities of uniqueness, anti-forgery, and bio-assay, etc. However, due to the restricts of imaging environments, the acquired FV images are easily degraded to low-contrast, blur, as well as serious noise disturbance. …”
    Get full text
    Article
  2. 1002

    Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy by Yu-Hsiu Lin, Chih-Hsien Hsia, Bo-Yan Chen, Yung-Yao Chen

    Published 2019-04-01
    “…Embedding secure data in digital images has broad security uses, e.g., image authentication, prevention of forgery attacks, and intellectual property protection. …”
    Get full text
    Article
  3. 1003

    Analysis and Hardware Architecture on FPGA of a Robust Audio Fingerprinting Method Using SSM by Ignacio Algredo-Badillo, Brenda Sánchez-Juárez, Kelsey A. Ramírez-Gutiérrez, Claudia Feregrino-Uribe, Francisco López-Huerta, Johan J. Estrada-López

    Published 2022-07-01
    “…The significant volume of sharing of digital media has recently increased due to the pandemic, raising the number of unauthorized uses of these media, such as emerging unauthorized copies, forgery, the lack of copyright, and electronic fraud, among others. …”
    Get full text
    Article
  4. 1004

    Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography by Tao Liu, Shubhangi Vairagar, Sushadevi Adagale, T. Karthick, Catherine Esther Karunya, John Blesswin A, Selva Mary G

    Published 2024-02-01
    “…Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. …”
    Get full text
    Article
  5. 1005

    A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments by Farrukh Aslam Khan, Nur Al Hasan Haldar, Aftab Ali, Mohsin Iftikhar, Tanveer A. Zia, Albert Y. Zomaya

    Published 2017-01-01
    “…This paper presents a centralized approach for the detection of abnormalities, as well as intrusions, such as forgery, insertions, and modifications in the ECG data. …”
    Get full text
    Article
  6. 1006

    Deepfake detection method based on patch-wise lighting inconsistency by Wenxuan WU, Wenbo ZHOU, Weiming ZHANG, Nenghai YU

    Published 2023-02-01
    “…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
    Get full text
    Article
  7. 1007

    SSM: Stylometric and semantic similarity oriented multimodal fake news detection by Muhammad Imran Nadeem, Kanwal Ahmed, Zhiyun Zheng, Dun Li, Muhammad Assam, Yazeed Yasin Ghadi, Fatemah H. Alghamedy, Elsayed Tag Eldin

    Published 2023-05-01
    “…Fourthly, images are analyzed for forgery. Lastly, the extracted features are fused for final classification. …”
    Get full text
    Article
  8. 1008

    LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network by Mahmood A. Al-Shareeda, Mohammed Anbar, Murtadha A. Alazzawi, Selvakumar Manickam, Ahmed Shakir Al-Hiti

    Published 2020-01-01
    “…The security analysis indicates that the LSWBVM satisfies the security requirements, such as: identity privacy preserving, tractability and revocability; and secure non-forgery under the random oracle model in an adaptively chosen message attack. …”
    Get full text
    Article
  9. 1009

    Perspectives on Harmful Algal Blooms (HABs) and the Cyberbiosecurity of Freshwater Systems by David G. Schmale, Andrew P. Ault, Andrew P. Ault, Walid Saad, Durelle T. Scott, Judy A. Westrick

    Published 2019-06-01
    “…In doing so, we can evaluate risks and research needs for cyber-attacks on HAB-monitoring networks including data injection attacks, automated system hijacking attacks, node forgery attacks, and attacks on learning algorithms. …”
    Get full text
    Article
  10. 1010

    A Modern Writing Instrument Used as a Weapon for Committing Bank Cheque Fraud by Vivekkumar Mangilal Chayal, Rakesh Rawal, Deepak R. Handa, Vijay Verma, Narendrakumar Mangilal Chayal, Himanshu A. Pandya

    Published 2019-12-01
    “…This technique to retrieve the original disappeared writings done with a ReWrite-erasable ink pen is very easy, simple, rapid, non-destructive, eco-friendly, convenient and sensitive to detect manipulations done in forgery and in suspect documents. Detection of ghost strokes under VSC-6000/HS with different functions, like fluorescence spotlight and specific (300 to 365 nm) UV range will provide a new avenue by, which the forensic document scientist can identify the erased writing that might otherwise go undetected with other more frequently used methods.…”
    Get full text
    Article
  11. 1011

    Document Liveness Challenge Dataset (DLC-2021) by Dmitry V. Polevoy, Irina V. Sigareva, Daria M. Ershova, Vladimir V. Arlazarov, Dmitry P. Nikolaev, Zuheng Ming, Muhammad Muzzamil Luqman, Jean-Christophe Burie

    Published 2022-06-01
    “…The tasks of such systems are not only ID document data recognition and extraction but also fraud prevention by detecting document forgery or by checking whether the document is genuine. …”
    Get full text
    Article
  12. 1012

    Investigation of Complaints Received from Affiliated Centres in the Treatment Supervision Department of the Iran University of Medical Sciences in 2020 by Fatemeh Najafipour Moghadam, Hossein Farzaneh, Javad Tabaeeian, Roghaieh Noee Dehshal, Saeed Bagheri

    Published 2022-10-01
    “…Results: Of the total number of complaints received in 2020 with 2121, the cases included complaints about the provision of care and medical services 809cases, tariff 301 cases, health and infection control 222 cases, the activity of unauthorized persons 194 cases, visit services 125 cases, defects, respectively, Technical equipment 76 cases, lack of licenses 76 cases, admission and clearance services 69 cases, induced demand 66 cases, drugs 64 cases,  how to deal 63 cases, center closure and non-service 20 cases, forgery and misuse 18 cases, illegal advertising 10 cases, manpower shortage 8 cases. …”
    Get full text
    Article
  13. 1013

    Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT by Yilin Yuan, Fan Yang, Xiao Wang, Yimin Tian, Zichen Li

    Published 2024-01-01
    “…The proposed scheme can withstand forgery attack, replace attack, and replay attack, demonstrating strong security. …”
    Get full text
    Article
  14. 1014

    EDI-C: Reputation-Model-Based Collaborative Audit Scheme for Edge Data Integrity by Fan Yang, Yi Sun, Qi Gao, Xingyuan Chen

    Published 2023-12-01
    “…To address the above issues, based on homomorphic hash and sampling algorithms, this paper proposes an efficient and lightweight multi-replica integrity verification algorithm, which has significantly less storage cost and computational cost and can resist forgery and replay and replace attacks. Based on the verification algorithm, this paper further proposes a multi-replica edge data integrity collaborative audit scheme EDI-C based on the reputation model. …”
    Get full text
    Article
  15. 1015

    Detection of AI-Created Images Using Pixel-Wise Feature Extraction and Convolutional Neural Networks by Fernando Martin-Rodriguez, Rocio Garcia-Mojon, Monica Fernandez-Barciela

    Published 2023-11-01
    “…This paper is about another kind of forgery detection. The purpose of this research is to detect photorealistic AI-created images versus real photos coming from a physical camera. …”
    Get full text
    Article
  16. 1016

    Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code by Theophilus Wellem, Yessica Nataliani, Ade Iriani

    Published 2022-09-01
    “…Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific security features. …”
    Get full text
    Article
  17. 1017

    Analysis of the Implementation of Article 22 Paragraph (2) of ATR/BPN Ministerial Regulation Number 6 of 2018 on Complete Systematic Land Registration (PTSL): Limitations and Chall... by Fida Nabilah Taufiq, M. Hamidi Masykur, Supriyadi

    Published 2024-02-01
    “…The identified challenges include disputes related to data forgery, conflicts among heirs, discrepancies in land measurement processes, and land occupation by individuals other than the direct owners. …”
    Get full text
    Article
  18. 1018

    The Exact Security of PMAC with Two Powering-Up Masks by Yusuke Naito

    Published 2019-06-01
    “…Regarding the MAC security (unforgeability), a hash collision for MAC queries, or guessing a tag offers the lower bound Ω(q2m /2n + qv/2n) for qm MAC queries and qv verification queries (forgery attempts). The tight upper bound of the PRF-security O(q2/2n) of PMAC was given by Gaži et el. …”
    Get full text
    Article
  19. 1019

    Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions by Giuseppe Emanuele Lio, Sara Nocentini, Lorenzo Pattelli, Eleonora Cara, Diederik Sybolt Wiersma, Ulrich Rührmair, Francesco Riboli

    Published 2023-02-01
    “…Among the results of this study, the sensitivity analysis shows that a positional perturbation of scatterers on the order of 30 nm, that is, far below the wavelength of the probing laser light of 632 nm wavelength, is sufficient to invalidate the PUF response and thus detect forgery attempt. These results support and quantify the high adversarial efforts required to clone optical PUFs, even for 2D layouts.…”
    Get full text
    Article
  20. 1020

    Authenticity, and Approval Framework for Bus Transportation Based on Blockchain 2.0 Technology by Tariq J. S. Khanzada, Muhammad Farrukh Shahid, Ahmad Mutahhar, Muhammad Ahtisham Aslam, Rehab Bahaaddin Ashari, Sarmad Jamal, Mustafa Nooruddin, Shahbaz Siddiqui

    Published 2023-10-01
    “…However, in urban bus transportation, the ITS faces security threats, such as data forgery and manipulation. To counter these challenges, a blockchain-based framework for bus transportation approval is proposed, ensuring data integrity and security. …”
    Get full text
    Article