-
1021
"Del sacar de otras pinturas". Consideración de las copias pictóricas a la luz de los tratados y otros textos del Renacimiento: reputación teórica "versus" repercusión práctica...
Published 2018-10-01“…This peak arose due to the impulse of the various purposes for which those copies served: as part of the learning processes of the craft of painting; as an instrumental system for fixing and disseminating models; as expeditious mechanism for workshops; and as a form of serialization or repetition of fortunate models, sometimes even committing plagiarism or forgery. This paper focuses on a confrontation between theoretical reputation –copies were apparently neglected or obviated in the artistic and pictorial treatises–, and its real practical impact, which meant different approaches and ways to understand such practice, depending on their final purposes. …”
Get full text
Article -
1022
Simple Approach to Realizing Verifiable Secret Sharing for Secure Cloud System
Published 2022-01-01“…</italic> to realize the detection and identification of shares forgery (cheating) in asymmetric secret sharing suitable for a cloud system. …”
Get full text
Article -
1023
Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain
Published 2022-02-01“…Certificates must be created and stored with good methods and security to prevent changes in content or even forgery. Blockchain technology is technology that allows secure storage processes at a low cost. …”
Get full text
Article -
1024
-
1025
Cascaded Two-Stream Attention Networks for Traceability Analysis of Copy-Move Images
Published 2023-08-01“…Copy-move is a common way of the image forgery. Traditional methods are committed to locating tam-pering regions of copy-move tampering images, but the accurate distinction between the source and target of the copy-move image has become a bottleneck in the field of image forensics. …”
Get full text
Article -
1026
Fusion of Neuro-Signals and Dynamic Signatures for Person Authentication
Published 2019-10-01“…Verification performance was measured using detection error tradeoff (DET) curves and half total error rate (HTER) security matrices using true positive rate (TPR) and false acceptance rate (FAR), resulting in 3.75% FAR and 1.87% HTER with 100% TPR for forgery attempts.…”
Get full text
Article -
1027
Designing High-Performance Identity-Based Quantum Signature Protocol With Strong Security
Published 2024-01-01“…Additionally, it is protected from attacks on forgery, inter-resending, and impersonation. The proposed scheme benefits from the traditional designated verifier signature schemes. …”
Get full text
Article -
1028
Entropy-Based Semi-Fragile Watermarking of Remote Sensing Images in the Wavelet Domain
Published 2019-08-01“…Experimental results show how the scheme can be applied to detect forgery attacks, and JPEG2000 compression of the images can be applied without removing the authentication mark. …”
Get full text
Article -
1029
Weak keys in the rekeying paradigm : application to COMET and mixFeed
Published 2020“…In the case of mixFeed, we enhance the forgery adversarial advantage in the single-key setting with a factor of 2^67 compared to what the designers claim. …”
Get full text
Journal Article -
1030
Aluminum nanostructures with strong visible-range SERS activity for versatile micropatterning of molecular security labels
Published 2019“…Our work demonstrates the versatility of Al-based structures in low-cost modern chemical nano-analytics and forgery protection.…”
Get full text
Get full text
Journal Article -
1031
A study of a late antique corpus of biographies [Historia Augusta]
Published 2014“…Finally, it shows that words and phrases, once thought peculiar to the corpus and the holy grail of the forgery argument, are intertextual links to earlier texts.…”
Thesis -
1032
Raspberry Pi-Based Finger Vein Recognition System Using PCANet
Published 2018“…Compared with other biometrics, it is more secure, anti-forgery and hygiene. Thus, it successfully utilized in many authentications nowadays. …”
Get full text
Monograph -
1033
An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification
Published 2023“…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
Get full text
Article -
1034
An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification
Published 2022“…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
Get full text
Article -
1035
An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification
Published 2023“…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
Get full text
Article -
1036
An Attention-Based Deep Regional Learning Model for Enhanced Finger Vein Identification
Published 2023“…Finger vein biometrics is one of the most promising ways to identify a person because it can provide uniqueness, protection against forgery, and bioassay. Due to the limitations of the imaging environments, however, the finger vein images that are taken can quickly become low-contrast, blurry, and very noisy. …”
Get full text
Article -
1037
Offline signature verification based on improved extracted features using neural network
Published 2014“…In this thesis, we present off line signature recognition and verification system which is based on image processing, New improved method for features extraction is proposed and artificial neural network are both used to attend the objective designed for this thesis, Two separate sequential neural networks are designed, one for signature recognition, and another for verification (i.e. for detecting forgery). Verification network parameters which are produced individually for every signature are controlled by a recognition network. …”
Get full text
Thesis -
1038
EEG Authentication System Based on One- and Multi-Class Machine Learning Classifiers
Published 2022-12-01“…In our final proposal, we elaborate on a hybrid system resistant to random forgery attacks using an Isolation Forest and a Random Forest classifiers, obtaining a final accuracy of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>82.3</mn><mo>%</mo></mrow></semantics></math></inline-formula>, a precision of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>91.1</mn><mo>%</mo></mrow></semantics></math></inline-formula> and a recall of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>75.3</mn><mo>%</mo></mrow></semantics></math></inline-formula>.…”
Get full text
Article -
1039
Impeccable Keccak
Published 2024-03-01“…Previous works have shown, that even imprecise fault injections on the signature generation are sufficient for universal forgery. This led the SPHINCS+ team to promote the usage of hardware countermeasures against such attacks. …”
Get full text
Article -
1040
Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme
Published 2022-03-01“…Either communication may be broadcast or unicast both are sensitive to different types ofassaults, for example message forgery, (DOS) denial of service, Sybil assault, Greyhole, Blackhole & Wormhole assault. …”
Get full text
Article