-
1141
Targeted and Non-Targeted HPLC Analysis of Coffee-Based Products as Effective Tools for Evaluating the Coffee Authenticity
Published 2022-11-01“…Thus, this review summarizes the results of targeted and non-targeted HPLC analysis of coffee-based products over the last 10 years as an effective tool for determining coffee composition, which can help to reveal potential forgeries and non-compliance with good manufacturing practice, and subsequently protects consumers from buying overpriced low-quality product. …”
Get full text
Article -
1142
Multispectral Analysis of Miniature Nuragic Bronze Flasks
Published 2021-08-01“…The abscence of Zn, a clear marker of forgeries, was not detected by XRF. In two of the flasks, an unusual Sn content above 20%, was detected. …”
Get full text
Article -
1143
Palmprint False Acceptance Attack with a Generative Adversarial Network (GAN)
Published 2020-11-01“…In RA, the reconstructed images often have insufficient naturalness due to the presence of remarkable counterfeit appearance, thus their forgeries can be easily detected by machine or human. …”
Get full text
Article -
1144
Visual User-Generated Content Verification in Journalism: An Overview
Published 2023-01-01“…In addition, different types of visual content forgeries and detection approaches proposed by the computer science research community are explained. …”
Get full text
Article -
1145
Non-destructive comparative evaluation of fossil amber using terahertz time-domain spectroscopy.
Published 2022-01-01“…We also demonstrate a process for imaging amber inclusions using terahertz transmission and find that terahertz spectroscopy can be used to identify some synthetic amber forgeries.…”
Get full text
Article -
1146
L’Empire des sens : sensualité, significations et circulations de la nouvelle culture matérielle
Published 2017-12-01“…The physical properties of cotton and china, mostly unknown to Europeans before the 17th century, complicated the grammar and vocabulary needed to distinguish between different goods, especially when fakes, imitations and forgeries became widespread. But most importantly the material properties of cotton and china relied on technical expertise on the part of Indian and Chinese craftsmen which for a long time defied Europe’s best efforts to imitate them. …”
Get full text
Article -
1147
What the Machine Saw: some questions on the ethics of computer vision and machine learning to investigate human remains trafficking
Published 2019-03-01“…The categories used to 'train' the machine are self-determined by the researchers, but to what extent can current image classifying methods be broken to create false positives or false negatives when attempting to classify images taken from social media sales records as either old authentic items or recent forgeries made using remains sourced from unknown locations? …”
Get full text
Article -
1148
Studying the Dynamics of the Rumor Spread Model with Fractional Piecewise Derivative
Published 2023-08-01“…Unfortunately, the rise of internet forgeries has facilitated the dissemination of false or distorted information by unscrupulous individuals, particularly on sensitive matters, to serve their own interests. …”
Get full text
Article -
1149
It Is Not against the Law, if No-One Can See You: Online Social Organisation of Artefact-Hunting in Former Yugoslavia
Published 2021-08-01“…This study uses open-source intelligence to analyse the illicit excavation and illicit trafficking of archaeological goods (and forgeries) across the Balkan-Eastern Mediterranean region(s) of Bosnia and Herzegovina, Croatia, Kosovo, Montenegro, North Macedonia, Serbia and Slovenia. …”
Get full text
Article -
1150
The Use of Cytochrome b Gene as a Specific Marker of the Rat Meat (Rattus norvegicus) on Meat and Meat Products
Published 2012-04-01“…One way that is often used to detect forgeries by using cytochrome b gene as a marker. The purpose of this study was to create a specific primer derived from cytochrome b sequences in rat (Rattus norvegicus) as the DNA marker to detect any contamination of rat meat on fresh livestock meat and its processed meat products. …”
Get full text
Article -
1151
Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach
Published 2023-08-01“…By gathering signatures and being able to make the correct predictions for each index, and then using linear algebra methods, this paper demonstrates that one can recover part of the secret key that is sufficient to produce universal forgeries. While our paper deeply discusses the theoretical attack path, it also demonstrates the validity of the assumption regarding the required leakage model from practical experiments with the reference implementation on an ARM Cortex-M4. …”
Get full text
Article -
1152
Leveraging Electric Network Frequency Estimation for Audio Authentication
Published 2024-01-01“…These findings provide compelling evidence for the efficacy of the proposed ENF estimation schemes as reliable prerequisites for detecting audio forgeries.…”
Get full text
Article -
1153
Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation
Published 2020-11-01“…We propose a new group signature scheme from lattices with VLR, which achieves stronger security than the previous related works. To avoid signature forgeries, we suggest a new zero-knowledge proof system that requires signers to validate themselves. …”
Get full text
Article -
1154
Can people identify original and manipulated photos of real-world scenes?
Published 2017-07-01“…The prevalence of manipulated photos in our everyday lives invites an important, yet largely unanswered, question: Can people detect photo forgeries? Previous research using simple computer-generated stimuli suggests people are poor at detecting geometrical inconsistencies within a scene. …”
Get full text
Article -
1155
A Hybrid Features for Signature Recognition Using Neural Network
Published 2019-04-01“…If the extracted features from a signature's image doesn't robust this will cause to higher verification error-rates especially for skilled forgeries in hacker the system. In this paper, we present a new offline handwritten signature recognition system based on combination of global with Statistical and GLCM (Grey Level Co-occurrence Matrix) features using neural network as classifier tool. …”
Get full text
Article -
1156
True or False? Defining the Fake in Chinese Porcelain
Get full text
Article -
1157
“Foundations of a great metaphysical style”: unraveling Giorgio de Chirico’s early palette
Published 2022-05-01“…Abstract Properly situating Giorgio de Chirico’s metaphysical works within his lifetime is complicated due to incomplete provenances, his practice of deliberately falsifying dates, and the known existence of forgeries. De Chirico’s palette may have altered over time, due to shifts in his personal taste, changes in availability of materials, and innovations in paints; elucidating his palette and variations thereof during his metaphysical period (1911–1919) offers analytical insights that complement traditional connoisseurship when attempting to correctly position a given work within his lifetime. …”
Get full text
Article -
1158
Deepfake detection using deep feature stacking and meta-learning
Published 2024-02-01“…This paper aims to address the problem of deepfake detection by identifying deepfake forgeries in video sequences. In this paper, a solution to the said problem is presented, which at first uses a stacking based ensemble approach, where features obtained from two popular deep learning models, namely Xception and EfficientNet-B7, are combined. …”
Get full text
Article -
1159
A Blockchain-based Conceptual Model to Address Educational Certificate Verification Challenges in Tanzania
Published 2023-10-01“…These challenges undermine certificate verification, impose a significant setback in the fight against forgeries, and create loopholes. It was conceptually demonstrated that these issues can be resolved through the proposed blockchain-based solution. …”
Get full text
Article -
1160
User Identification System Using 2D Resized Spectrogram Features of ECG
Published 2019-01-01“…Studies have been actively conducted on biometrics technology applying electrocardiogram (ECG) signals, which are more robust against forgeries and alterations than fingerprint and face authentication. …”
Get full text
Article