Showing 1,081 - 1,100 results of 1,172 for search '"forgery"', query time: 0.23s Refine Results
  1. 1081

    Embodiment and Self-Experience in Iranian Cinema: A phenomenological Study of Six Films from the 1980s to the 2010s by Erfan Naseri, Ehsan Aqababaee, Masoud Kianpur, Alireza Sayyad

    Published 2022-09-01
    “…The body and the self were recovered in the collective intersubjective frame and the nature of the technique was revealed in the forgery of the subjects. In the 2000s, the embodiment of the subjects was drawn into the realm of confrontation/transition; the embodied action of the woman passed through the absurd body of the man and left her in an abandoned world. …”
    Get full text
    Article
  2. 1082

    Sottoscrizioni autografe nelle più antiche carte del monastero di S. Liberatore alla Maiella. Contributo alla storia del rapporto tra scrittura e alfabetismo in Abruzzo nel secolo... by Mariano Dell'Omo

    Published 2005-06-01
    “…</p> <p>The investigation concerning 33 documents edited – except no. 1 (forgery) –, dated between 935 and 1000, shows a total of 104 signatures in the original, and 7 in the copy. …”
    Get full text
    Article
  3. 1083

    The History of Medical Ethics in India by Angel Prabakar

    Published 2022-11-01
    “…According to the Indian Medical Association (IMA), about 45 percent of those who practice medicine in India have no formal training.[25] IMA also reported that close to 700,000 doctors employed at some of the biggest hospitals, who are currently diagnosing, treating, and operating, have neither the training nor experience to do so. A large-scale forgery ring, broken up in 2011, revealed that buyers could pay as little as 100 US dollars for a medical degree from a non-existent college. …”
    Get full text
    Article
  4. 1084

    Offline signature verification using a single master signature for building a signer's profile by Abulfatah, G. M., Ahma, M. N.

    Published 2017
    “…Using these comparison measures and thresholds devised for seen forgeries, an EER of 15% for seen forgeries and FARs of less than 3% and 1% for unseen and random forgeries respectively has been achieved.…”
    Article
  5. 1085

    Offline signature verification using a single master signature for building a signer’s profile by Abulfatah, G. M., Ahma, M. N.

    Published 2017
    “…Using these comparison measures and thresholds devised for seen forgeries, an EER of 15% for seen forgeries and FARs of less than 3% and 1% for unseen and random forgeries respectively has been achieved.…”
    Article
  6. 1086

    Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model by du Preez JA, Coetzer J, Herbst BM

    Published 2004-01-01
    “…Using a database of 924 signatures from 22 writers, our system achieves an equal error rate (EER) of 18% when only high-quality forgeries (skilled forgeries) are considered and an EER of 4.5% in the case of only casual forgeries. …”
    Get full text
    Article
  7. 1087

    Optical measurements of paintings and the creation of an artwork database for authenticity. by Seonhee Hwang, Hyerin Song, Soon-Woo Cho, Chang Eun Kim, Chang-Seok Kim, Kyujung Kim

    Published 2017-01-01
    “…After measuring surface properties of paintings, we could observe the results from the genuine works and the forgeries have the distinctive characteristics. The forgeries could be distinguished maximally 76.5% with obtained RGB spectra by FORS and 100% by topographic analysis. …”
    Get full text
    Article
  8. 1088

    Verifying on-line handwritten signature using neural networks approach by Siraj, Fadzilah, Zakaria, Azizi, Wan Ishak, Wan Hussain

    Published 2000
    “…Although the cashier sometimes can spot the forgeries, it is not cost effective to check the forgeries manually. …”
    Get full text
    Book Section
  9. 1089

    Recent Advances in Passive Digital Image Security Forensics: A Brief Review by Xiang Lin, Jian-Hua Li, Shi-Lin Wang, Alan-Wee-Chung Liew, Feng Cheng, Xiao-Sa Huang

    Published 2018-02-01
    “…In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. …”
    Get full text
    Article
  10. 1090

    Investigation of craquelure patterns in oil paintings using precise 3D morphological analysis for art authentication. by Soojung Kim, Sang Min Park, Seongjin Bak, Gyeong Hun Kim, Chang-Seok Kim, Joonja Jun, Chang Eun Kim, Kyujung Kim

    Published 2022-01-01
    “…The forgeries were produced by an expert from original oil paintings with cracks that occur owing to paint drying, canvas aging, and physical damage. …”
    Get full text
    Article
  11. 1091

    Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms by Yuan Chen, Qingkuan Dong, Yannan Li, Qiqi Lai, Zhedong Wang

    Published 2019-03-01
    “…It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. …”
    Get full text
    Article
  12. 1092

    Online Signature Verification Using Fourier Descriptors by Berrin Yanikoglu, Alisher Kholmatov

    Published 2009-01-01
    “…We also propose to use the pen-up duration information in identifying forgeries. The best results obtained on the SUSIG-Visual subcorpus and the MCYT-100 database are 6.2% and 12.1% error rate on skilled forgeries, respectively. …”
    Get full text
    Article
  13. 1093

    Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization by David C. L. Ngo, Andrew B. J. Teoh, Yip Wai Kuan

    Published 2007-01-01
    “…Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of 0% and 9.4% for random and skilled forgeries for stolen token (worst case) scenario, and 0% for both forgeries in the genuine token (optimal) scenario.…”
    Get full text
    Article
  14. 1094

    TIMIT-TTS: A Text-to-Speech Dataset for Multimodal Synthetic Media Detection by Davide Salvi, Brian Hosler, Paolo Bestagini, Matthew C. Stamm, Stefano Tubaro

    Published 2023-01-01
    “…This is an important limitation when authenticating manipulated videos, because sophisticated forgeries may be difficult to detect without exploiting cross-modal inconsistencies (e.g., across the audio and visual tracks). …”
    Get full text
    Article
  15. 1095

    DYNAMIC HANDWRITTEN SIGNATURE IDENTIFICATION USING SPIKING NEURAL NETWORK by Vladislav Kutsman, Oleh Kolesnytskyj

    Published 2021-09-01
    “…In the results of experimental studies of the software implementation of the proposed system, it’s EER = 3.9% was found when identifying skilled forgeries and EER = 0.17% when identifying random forgeries.…”
    Get full text
    Article
  16. 1096

    A conceptual examination of the effect of problem representation on mindset and fraud risk assessment in the Nigerian deposit money banks by Odukoya, Olusoji Olumide, Samsudin, Rose Shamsiah, Popoola, Oluwatoyin Muse Johnson

    Published 2019
    “…The study’s main objective is to evolve a functional and effective mechanism for minimizing the incidence of fraud and forgeries within the Nigerian deposit money banks. …”
    Get full text
    Article
  17. 1097

    A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics by Ivan Castillo Camacho, Kai Wang

    Published 2021-04-01
    “…With this review it can be observed that even if image forgeries are becoming easy to create, there are several options to detect each kind of them. …”
    Get full text
    Article
  18. 1098

    Artefacts of a fabricated past by Dunning, A

    Published 2024
    “…The Bodleian holds a number of objects that most observers would now describe as forgeries, but is every fake a lie?…”
    Conference item
  19. 1099

    Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and <inline-formula><graphic file="1687-6180-2007-059125-i1.gif"/></inline-formula... by Wai Kuan Yip, Teoh Andrew BJ, Ngo David CL

    Published 2007-01-01
    “…Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of <inline-formula><graphic file="1687-6180-2007-059125-i4.gif"/></inline-formula> and <inline-formula><graphic file="1687-6180-2007-059125-i5.gif"/></inline-formula> for random and skilled forgeries for stolen token (worst case) scenario, and <inline-formula><graphic file="1687-6180-2007-059125-i6.gif"/></inline-formula> for both forgeries in the genuine token (optimal) scenario.…”
    Get full text
    Article
  20. 1100

    A Signature Recognition Technique With a Powerful Verification Mechanism Based on CNN and PCA by Gibrael Abosamra, Hadi Oqaibi

    Published 2024-01-01
    “…In this paper, we embed a signature verification mechanism in a previously introduced architecture for signature recognition to detect in-distribution and out-of-distribution random forgeries. In the previous architecture, a CNN was trained on the genuine user training dataset and then used as a feature extraction module. …”
    Get full text
    Article