-
1001
A Novel Finger Vein Recognition Method Based on Aggregation of Radon-Like Features
Published 2021-03-01“…Finger vein (FV) biometrics is one of the most promising individual recognition traits, which has the capabilities of uniqueness, anti-forgery, and bio-assay, etc. However, due to the restricts of imaging environments, the acquired FV images are easily degraded to low-contrast, blur, as well as serious noise disturbance. …”
Get full text
Article -
1002
Visual IoT Security: Data Hiding in AMBTC Images Using Block-Wise Embedding Strategy
Published 2019-04-01“…Embedding secure data in digital images has broad security uses, e.g., image authentication, prevention of forgery attacks, and intellectual property protection. …”
Get full text
Article -
1003
Analysis and Hardware Architecture on FPGA of a Robust Audio Fingerprinting Method Using SSM
Published 2022-07-01“…The significant volume of sharing of digital media has recently increased due to the pandemic, raising the number of unauthorized uses of these media, such as emerging unauthorized copies, forgery, the lack of copyright, and electronic fraud, among others. …”
Get full text
Article -
1004
Secure multimedia communication: advanced asymmetric key authentication with grayscale visual cryptography
Published 2024-02-01“…Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. …”
Get full text
Article -
1005
A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments
Published 2017-01-01“…This paper presents a centralized approach for the detection of abnormalities, as well as intrusions, such as forgery, insertions, and modifications in the ECG data. …”
Get full text
Article -
1006
Deepfake detection method based on patch-wise lighting inconsistency
Published 2023-02-01“…The rapid development and widespread dissemination of deepfake techniques has caused increased concern.The malicious application of deepfake techniques also poses a potential threat to the society.Therefore, how to detect deepfake content has become a popular research topic.Most of the previous deepfake detection algorithms focused on capturing subtle forgery traces at pixel level and have achieved some results.However, most of the deepfake algorithms ignore the lighting information before and after generation, resulting in some lighting inconsistency between the original face and the forged face, which provided the possibility of using lighting inconsistency to detect deepfake.A corresponding algorithm was designed from two perspectives: introducing lighting inconsistency information and designing a network structure module for a specific task.For the introduction of lighting task, a new network structure was derived by designing the corresponding channel fusion method to provide more lighting inconsistency information to the network feature extraction layer.In order to ensure the portability of the network structure, the process of feature channel fusion was placed before the network extraction information, so that the proposed method can be fully planted to common deepfake detection networks.For the design of the network structure, a deepfake detection method was proposed for lighting inconsistency based on patch-similarity from two perspectives: network structure and loss function design.For the network structure, based on the characteristic of inconsistency between the forged image tampering region and the background region, the extracted features were chunked in the network feature layer and the feature layer similarity matrix was obtained by comparing the patch-wise cosine similarity to make the network focus more on the lighting inconsistency.On this basis, based on the feature layer similarity matching scheme, an independent ground truth and loss function was designed for this task in a targeted manner by comparing the input image with the untampered image of this image for patch-wise authenticity.It is demonstrated experimentally that the accuracy of the proposed method is significantly improved for deepfake detection compared with the baseline method.…”
Get full text
Article -
1007
SSM: Stylometric and semantic similarity oriented multimodal fake news detection
Published 2023-05-01“…Fourthly, images are analyzed for forgery. Lastly, the extracted features are fused for final classification. …”
Get full text
Article -
1008
LSWBVM: A Lightweight Security Without Using Batch Verification Method Scheme for a Vehicle Ad Hoc Network
Published 2020-01-01“…The security analysis indicates that the LSWBVM satisfies the security requirements, such as: identity privacy preserving, tractability and revocability; and secure non-forgery under the random oracle model in an adaptively chosen message attack. …”
Get full text
Article -
1009
Perspectives on Harmful Algal Blooms (HABs) and the Cyberbiosecurity of Freshwater Systems
Published 2019-06-01“…In doing so, we can evaluate risks and research needs for cyber-attacks on HAB-monitoring networks including data injection attacks, automated system hijacking attacks, node forgery attacks, and attacks on learning algorithms. …”
Get full text
Article -
1010
A Modern Writing Instrument Used as a Weapon for Committing Bank Cheque Fraud
Published 2019-12-01“…This technique to retrieve the original disappeared writings done with a ReWrite-erasable ink pen is very easy, simple, rapid, non-destructive, eco-friendly, convenient and sensitive to detect manipulations done in forgery and in suspect documents. Detection of ghost strokes under VSC-6000/HS with different functions, like fluorescence spotlight and specific (300 to 365 nm) UV range will provide a new avenue by, which the forensic document scientist can identify the erased writing that might otherwise go undetected with other more frequently used methods.…”
Get full text
Article -
1011
Document Liveness Challenge Dataset (DLC-2021)
Published 2022-06-01“…The tasks of such systems are not only ID document data recognition and extraction but also fraud prevention by detecting document forgery or by checking whether the document is genuine. …”
Get full text
Article -
1012
Investigation of Complaints Received from Affiliated Centres in the Treatment Supervision Department of the Iran University of Medical Sciences in 2020
Published 2022-10-01“…Results: Of the total number of complaints received in 2020 with 2121, the cases included complaints about the provision of care and medical services 809cases, tariff 301 cases, health and infection control 222 cases, the activity of unauthorized persons 194 cases, visit services 125 cases, defects, respectively, Technical equipment 76 cases, lack of licenses 76 cases, admission and clearance services 69 cases, induced demand 66 cases, drugs 64 cases, how to deal 63 cases, center closure and non-service 20 cases, forgery and misuse 18 cases, illegal advertising 10 cases, manpower shortage 8 cases. …”
Get full text
Article -
1013
Multi-replicas integrity checking scheme with supporting probability audit for cloud-based IoT
Published 2024-01-01“…The proposed scheme can withstand forgery attack, replace attack, and replay attack, demonstrating strong security. …”
Get full text
Article -
1014
EDI-C: Reputation-Model-Based Collaborative Audit Scheme for Edge Data Integrity
Published 2023-12-01“…To address the above issues, based on homomorphic hash and sampling algorithms, this paper proposes an efficient and lightweight multi-replica integrity verification algorithm, which has significantly less storage cost and computational cost and can resist forgery and replay and replace attacks. Based on the verification algorithm, this paper further proposes a multi-replica edge data integrity collaborative audit scheme EDI-C based on the reputation model. …”
Get full text
Article -
1015
Detection of AI-Created Images Using Pixel-Wise Feature Extraction and Convolutional Neural Networks
Published 2023-11-01“…This paper is about another kind of forgery detection. The purpose of this research is to detect photorealistic AI-created images versus real photos coming from a physical camera. …”
Get full text
Article -
1016
Academic Document Authentication using Elliptic Curve Digital Signature Algorithm and QR Code
Published 2022-09-01“…Paper-based documents or printed documents such as recommendation letters, academic transcripts, and diplomas are prone to forgery. Several methods have been used to protect them, such as watermarking, security holograms, or using paper with specific security features. …”
Get full text
Article -
1017
Analysis of the Implementation of Article 22 Paragraph (2) of ATR/BPN Ministerial Regulation Number 6 of 2018 on Complete Systematic Land Registration (PTSL): Limitations and Chall...
Published 2024-02-01“…The identified challenges include disputes related to data forgery, conflicts among heirs, discrepancies in land measurement processes, and land occupation by individuals other than the direct owners. …”
Get full text
Article -
1018
The Exact Security of PMAC with Two Powering-Up Masks
Published 2019-06-01“…Regarding the MAC security (unforgeability), a hash collision for MAC queries, or guessing a tag offers the lower bound Ω(q2m /2n + qv/2n) for qm MAC queries and qv verification queries (forgery attempts). The tight upper bound of the PRF-security O(q2/2n) of PMAC was given by Gaži et el. …”
Get full text
Article -
1019
Quantifying the Sensitivity and Unclonability of Optical Physical Unclonable Functions
Published 2023-02-01“…Among the results of this study, the sensitivity analysis shows that a positional perturbation of scatterers on the order of 30 nm, that is, far below the wavelength of the probing laser light of 632 nm wavelength, is sufficient to invalidate the PUF response and thus detect forgery attempt. These results support and quantify the high adversarial efforts required to clone optical PUFs, even for 2D layouts.…”
Get full text
Article -
1020
Authenticity, and Approval Framework for Bus Transportation Based on Blockchain 2.0 Technology
Published 2023-10-01“…However, in urban bus transportation, the ITS faces security threats, such as data forgery and manipulation. To counter these challenges, a blockchain-based framework for bus transportation approval is proposed, ensuring data integrity and security. …”
Get full text
Article