Showing 1,021 - 1,040 results of 1,172 for search '"forgery"', query time: 0.19s Refine Results
  1. 1021

    "Del sacar de otras pinturas". Consideración de las copias pictóricas a la luz de los tratados y otros textos del Renacimiento: reputación teórica "versus" repercusión práctica... by Miquel Àngel Herrero-Cortell

    Published 2018-10-01
    “…This peak arose due to the impulse of the various purposes for which those copies served: as part of the learning processes of the craft of painting; as an instrumental system for fixing and disseminating models; as expeditious mechanism for workshops; and as a form of serialization or repetition of fortunate models, sometimes even committing plagiarism or forgery. This paper focuses on a confrontation between theoretical reputation –copies were apparently neglected or obviated in the artistic and pictorial treatises–, and its real practical impact, which meant different approaches and ways to understand such practice, depending on their final purposes. …”
    Get full text
    Article
  2. 1022

    Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System by Keiichi Iwamura, Ahmad Akmal Aminuddin Mohd Kamal

    Published 2022-01-01
    “…</italic> to realize the detection and identification of shares forgery (cheating) in asymmetric secret sharing suitable for a cloud system. …”
    Get full text
    Article
  3. 1023

    Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain by Windra Swastika, Hermawan Wirasantosa, Oesman Hendra Kelana

    Published 2022-02-01
    “…Certificates must be created and stored with good methods and security to prevent changes in content or even forgery. Blockchain technology is technology that allows secure storage processes at a low cost. …”
    Get full text
    Article
  4. 1024
  5. 1025

    Cascaded Two-Stream Attention Networks for Traceability Analysis of Copy-Move Images by JI Yanqing, ZHANG Yujin

    Published 2023-08-01
    “…Copy-move is a common way of the image forgery. Traditional methods are committed to locating tam-pering regions of copy-move tampering images, but the accurate distinction between the source and target of the copy-move image has become a bottleneck in the field of image forensics. …”
    Get full text
    Article
  6. 1026

    Fusion of Neuro-Signals and Dynamic Signatures for Person Authentication by Pradeep Kumar, Rajkumar Saini, Barjinder Kaur, Partha Pratim Roy, Erik Scheme

    Published 2019-10-01
    “…Verification performance was measured using detection error tradeoff (DET) curves and half total error rate (HTER) security matrices using true positive rate (TPR) and false acceptance rate (FAR), resulting in 3.75% FAR and 1.87% HTER with 100% TPR for forgery attempts.…”
    Get full text
    Article
  7. 1027

    Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security by Sunil Prajapat, Pankaj Kumar, Sandeep Kumar, Ashok Kumar Das, Sachin Shetty, M. Shamim Hossain

    Published 2024-01-01
    “…Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated verifier signature schemes. …”
    Get full text
    Article
  8. 1028

    Entropy-Based Semi-Fragile Watermarking of Remote Sensing Images in the Wavelet Domain by Jordi Serra-Ruiz, Amna Qureshi, David Megías

    Published 2019-08-01
    “…Experimental results show how the scheme can be applied to detect forgery attacks, and JPEG2000 compression of the images can be applied without removing the authentication mark. …”
    Get full text
    Article
  9. 1029

    Weak keys in the rekeying paradigm : application to COMET and mixFeed by Khairallah, Mustafa

    Published 2020
    “…In the case of mixFeed, we enhance the forgery adversarial advantage in the single-key setting with a factor of 2^67 compared to what the designers claim. …”
    Get full text
    Journal Article
  10. 1030

    Aluminum nanostructures with strong visible-range SERS activity for versatile micropatterning of molecular security labels by Lay, Chee Leng, Koh, Charlynn Sher Lin, Wang, Jing, Lee, Yih Hong, Jiang, Ruibin, Yang, Yijie, Yang, Zhe, Phang, In Yee, Ling, Xing Yi

    Published 2019
    “…Our work demonstrates the versatility of Al-based structures in low-cost modern chemical nano-analytics and forgery protection.…”
    Get full text
    Get full text
    Journal Article
  11. 1031

    A study of a late antique corpus of biographies [Historia Augusta] by Baker, R

    Published 2014
    “…Finally, it shows that words and phrases, once thought peculiar to the corpus and the holy grail of the forgery argument, are intertextual links to earlier texts.…”
    Thesis
  12. 1032

    Raspberry Pi-Based Finger Vein Recognition System Using PCANet by Quek, Ee Wen

    Published 2018
    “…Compared with other biometrics, it is more secure, anti-forgery and hygiene. Thus, it successfully utilized in many authentications nowadays. …”
    Get full text
    Monograph
  13. 1033

    An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification by Sulaiman, Dawlat Mustafa, Abdulazeez, Adnan Mohsin, Zebari, Dilovan Asaad, Zeebaree, Diyar Qader, Mostafa, Salama A., Saleem Sadiq, Shereen

    Published 2023
    “…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
    Get full text
    Article
  14. 1034

    An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification by Sulaiman, Dawlat Mustafa, Abdulazeez, Adnan Mohsin, Asaad Zebar, Dilovan, Zeebaree, Diyar Qader, Mostafa, Salama A., Saleem Sadiq, Shereen

    Published 2022
    “…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
    Get full text
    Article
  15. 1035

    An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification by Mustafa Sulaiman, Dawlat, Abdulazeez, Adnan Mohsin, Asaad Zebari, Dilovan, Qader Zeebaree, Diyar, A. Mostaf, Salama, Saleem Sadiq, Shereen

    Published 2023
    “…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
    Get full text
    Article
  16. 1036

    An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification by Sulaiman, Dawlat Mustafa, Abdulazeez, Adnan Mohsin, Asaad Zebar, Dilovan, Diyar Qader Zeebaree, Diyar Qader Zeebaree, A. Mostafa, Salama, Saleem Sadiq, Shereen

    Published 2023
    “…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
    Get full text
    Article
  17. 1037

    Offline signature verification based on improved extracted features using neural network by Hussein, Karrar Neamah

    Published 2014
    “…In this thesis, we present off line signature recognition and verification system which is based on image processing, New improved method for features extraction is proposed and artificial neural network are both used to attend the objective designed for this thesis, Two separate sequential neural networks are designed, one for signature recognition, and another for verification (i.e. for detecting forgery). Verification network parameters which are produced individually for every signature are controlled by a recognition network. …”
    Get full text
    Thesis
  18. 1038

    EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers by Luis Hernández-Álvarez, Elena Barbierato, Stefano Caputo, Lorenzo Mucchi, Luis Hernández Encinas

    Published 2022-12-01
    “…In our final proposal, we elaborate on a hybrid system resistant to random forgery attacks using an Isolation Forest and a Random Forest classifiers, obtaining a final accuracy of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>82.3</mn><mo>%</mo></mrow></semantics></math></inline-formula>, a precision of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>91.1</mn><mo>%</mo></mrow></semantics></math></inline-formula> and a recall of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>75.3</mn><mo>%</mo></mrow></semantics></math></inline-formula>.…”
    Get full text
    Article
  19. 1039

    Impeccable Keccak by Ivan Gavrilan, Felix Oberhansl, Alexander Wagner, Emanuele Strieder, Andreas Zankl

    Published 2024-03-01
    “…Previous works have shown, that even imprecise fault injections on the signature generation are sufficient for universal forgery. This led the SPHINCS+ team to promote the usage of hardware countermeasures against such attacks. …”
    Get full text
    Article
  20. 1040

    Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme by Shahjahan Ali, Parma Nand, Shailesh Tiwari

    Published 2022-03-01
    “…Either communication may be broadcast or unicast both are sensitive to different types ofassaults, for example message forgery, (DOS) denial of service, Sybil assault, Greyhole, Blackhole & Wormhole assault. …”
    Get full text
    Article