-
1081
Embodiment and Self-Experience in Iranian Cinema: A phenomenological Study of Six Films from the 1980s to the 2010s
Published 2022-09-01“…The body and the self were recovered in the collective intersubjective frame and the nature of the technique was revealed in the forgery of the subjects. In the 2000s, the embodiment of the subjects was drawn into the realm of confrontation/transition; the embodied action of the woman passed through the absurd body of the man and left her in an abandoned world. …”
Get full text
Article -
1082
Sottoscrizioni autografe nelle più antiche carte del monastero di S. Liberatore alla Maiella. Contributo alla storia del rapporto tra scrittura e alfabetismo in Abruzzo nel secolo...
Published 2005-06-01“…</p> <p>The investigation concerning 33 documents edited – except no. 1 (forgery) –, dated between 935 and 1000, shows a total of 104 signatures in the original, and 7 in the copy. …”
Get full text
Article -
1083
The History of Medical Ethics in India
Published 2022-11-01“…According to the Indian Medical Association (IMA), about 45 percent of those who practice medicine in India have no formal training.[25] IMA also reported that close to 700,000 doctors employed at some of the biggest hospitals, who are currently diagnosing, treating, and operating, have neither the training nor experience to do so. A large-scale forgery ring, broken up in 2011, revealed that buyers could pay as little as 100 US dollars for a medical degree from a non-existent college. …”
Get full text
Article -
1084
Offline signature verification using a single master signature for building a signer's profile
Published 2017“…Using these comparison measures and thresholds devised for seen forgeries, an EER of 15% for seen forgeries and FARs of less than 3% and 1% for unseen and random forgeries respectively has been achieved.…”
Article -
1085
Offline signature verification using a single master signature for building a signer’s profile
Published 2017“…Using these comparison measures and thresholds devised for seen forgeries, an EER of 15% for seen forgeries and FARs of less than 3% and 1% for unseen and random forgeries respectively has been achieved.…”
Article -
1086
Offline Signature Verification Using the Discrete Radon Transform and a Hidden Markov Model
Published 2004-01-01“…Using a database of 924 signatures from 22 writers, our system achieves an equal error rate (EER) of 18% when only high-quality forgeries (skilled forgeries) are considered and an EER of 4.5% in the case of only casual forgeries. …”
Get full text
Article -
1087
Optical measurements of paintings and the creation of an artwork database for authenticity.
Published 2017-01-01“…After measuring surface properties of paintings, we could observe the results from the genuine works and the forgeries have the distinctive characteristics. The forgeries could be distinguished maximally 76.5% with obtained RGB spectra by FORS and 100% by topographic analysis. …”
Get full text
Article -
1088
Verifying on-line handwritten signature using neural networks approach
Published 2000“…Although the cashier sometimes can spot the forgeries, it is not cost effective to check the forgeries manually. …”
Get full text
Book Section -
1089
Recent Advances in Passive Digital Image Security Forensics: A Brief Review
Published 2018-02-01“…In order to detect digital image forgeries, various kinds of digital image forensics techniques have been proposed in the last decade. …”
Get full text
Article -
1090
Investigation of craquelure patterns in oil paintings using precise 3D morphological analysis for art authentication.
Published 2022-01-01“…The forgeries were produced by an expert from original oil paintings with cracks that occur owing to paint drying, canvas aging, and physical damage. …”
Get full text
Article -
1091
Natural sd-RCCA Secure Public-key Encryptions from Hybrid Paradigms
Published 2019-03-01“…It is known that the encrypt-then-authenticate paradigm gives an RCCA secure DEM when the underlying MAC is regular (but not strong) secure, where forgeries for old messages might be possible. By further requiring that the validity of such forgeries can be verified only secretly, sd-RCCA secure DEMs is obtained. …”
Get full text
Article -
1092
Online Signature Verification Using Fourier Descriptors
Published 2009-01-01“…We also propose to use the pen-up duration information in identifying forgeries. The best results obtained on the SUSIG-Visual subcorpus and the MCYT-100 database are 6.2% and 12.1% error rate on skilled forgeries, respectively. …”
Get full text
Article -
1093
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and 2N Discretization
Published 2007-01-01“…Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of 0% and 9.4% for random and skilled forgeries for stolen token (worst case) scenario, and 0% for both forgeries in the genuine token (optimal) scenario.…”
Get full text
Article -
1094
TIMIT-TTS: A Text-to-Speech Dataset for Multimodal Synthetic Media Detection
Published 2023-01-01“…This is an important limitation when authenticating manipulated videos, because sophisticated forgeries may be difficult to detect without exploiting cross-modal inconsistencies (e.g., across the audio and visual tracks). …”
Get full text
Article -
1095
DYNAMIC HANDWRITTEN SIGNATURE IDENTIFICATION USING SPIKING NEURAL NETWORK
Published 2021-09-01“…In the results of experimental studies of the software implementation of the proposed system, it’s EER = 3.9% was found when identifying skilled forgeries and EER = 0.17% when identifying random forgeries.…”
Get full text
Article -
1096
A conceptual examination of the effect of problem representation on mindset and fraud risk assessment in the Nigerian deposit money banks
Published 2019“…The study’s main objective is to evolve a functional and effective mechanism for minimizing the incidence of fraud and forgeries within the Nigerian deposit money banks. …”
Get full text
Article -
1097
A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics
Published 2021-04-01“…With this review it can be observed that even if image forgeries are becoming easy to create, there are several options to detect each kind of them. …”
Get full text
Article -
1098
Artefacts of a fabricated past
Published 2024“…The Bodleian holds a number of objects that most observers would now describe as forgeries, but is every fake a lie?…”
Conference item -
1099
Secure Hashing of Dynamic Hand Signatures Using Wavelet-Fourier Compression with BioPhasor Mixing and <inline-formula><graphic file="1687-6180-2007-059125-i1.gif"/></inline-formula...
Published 2007-01-01“…Our results show that the proposed method could produce stable and distinguishable bit strings with equal error rates (EERs) of <inline-formula><graphic file="1687-6180-2007-059125-i4.gif"/></inline-formula> and <inline-formula><graphic file="1687-6180-2007-059125-i5.gif"/></inline-formula> for random and skilled forgeries for stolen token (worst case) scenario, and <inline-formula><graphic file="1687-6180-2007-059125-i6.gif"/></inline-formula> for both forgeries in the genuine token (optimal) scenario.…”
Get full text
Article -
1100
A Signature Recognition Technique With a Powerful Verification Mechanism Based on CNN and PCA
Published 2024-01-01“…In this paper, we embed a signature verification mechanism in a previously introduced architecture for signature recognition to detect in-distribution and out-of-distribution random forgeries. In the previous architecture, a CNN was trained on the genuine user training dataset and then used as a feature extraction module. …”
Get full text
Article