Showing 1,141 - 1,160 results of 1,172 for search '"forgery"', query time: 0.19s Refine Results
  1. 1141

    Targeted and Non-Targeted HPLC Analysis of Coffee-Based Products as Effective Tools for Evaluating the Coffee Authenticity by Jitka Klikarová, Lenka Česlová

    Published 2022-11-01
    “…Thus, this review summarizes the results of targeted and non-targeted HPLC analysis of coffee-based products over the last 10 years as an effective tool for determining coffee composition, which can help to reveal potential forgeries and non-compliance with good manufacturing practice, and subsequently protects consumers from buying overpriced low-quality product. …”
    Get full text
    Article
  2. 1142

    Multispectral Analysis of Miniature Nuragic Bronze Flasks by Carlo Nocco, Francesca Assunta Pisu, Daniele Chiriu, Anna Depalmas, Sergio Augusto Barcellos Lins, Antonio Brunetti

    Published 2021-08-01
    “…The abscence of Zn, a clear marker of forgeries, was not detected by XRF. In two of the flasks, an unusual Sn content above 20%, was detected. …”
    Get full text
    Article
  3. 1143

    Palmprint False Acceptance Attack with a Generative Adversarial Network (GAN) by Fei Wang, Lu Leng, Andrew Beng Jin Teoh, Jun Chu

    Published 2020-11-01
    “…In RA, the reconstructed images often have insufficient naturalness due to the presence of remarkable counterfeit appearance, thus their forgeries can be easily detected by machine or human. …”
    Get full text
    Article
  4. 1144

    Visual User-Generated Content Verification in Journalism: An Overview by Sohail Ahmed Khan, Ghazaal Sheikhi, Andreas L. Opdahl, Fazle Rabbi, Sergej Stoppel, Christoph Trattner, Duc-Tien Dang-Nguyen

    Published 2023-01-01
    “…In addition, different types of visual content forgeries and detection approaches proposed by the computer science research community are explained. …”
    Get full text
    Article
  5. 1145

    Non-destructive comparative evaluation of fossil amber using terahertz time-domain spectroscopy. by Phillip Barden, Christine E Sosiak, Jonpierre Grajales, John Hawkins, Louis Rizzo, Alexander Clark, Samuel Gatley, Ian Gatley, John Federici

    Published 2022-01-01
    “…We also demonstrate a process for imaging amber inclusions using terahertz transmission and find that terahertz spectroscopy can be used to identify some synthetic amber forgeries.…”
    Get full text
    Article
  6. 1146

    L’Empire des sens : sensualité, significations et circulations de la nouvelle culture matérielle by Ariane Fennetaux

    Published 2017-12-01
    “…The physical properties of cotton and china, mostly unknown to Europeans before the 17th century, complicated the grammar and vocabulary needed to distinguish between different goods, especially when fakes, imitations and forgeries became widespread. But most importantly the material properties of cotton and china relied on technical expertise on the part of Indian and Chinese craftsmen which for a long time defied Europe’s best efforts to imitate them. …”
    Get full text
    Article
  7. 1147

    What the Machine Saw: some questions on the ethics of computer vision and machine learning to investigate human remains trafficking by Damien Huffer, Cristina Wood, Shawn Graham

    Published 2019-03-01
    “…The categories used to 'train' the machine are self-determined by the researchers, but to what extent can current image classifying methods be broken to create false positives or false negatives when attempting to classify images taken from social media sales records as either old authentic items or recent forgeries made using remains sourced from unknown locations? …”
    Get full text
    Article
  8. 1148

    Studying the Dynamics of the Rumor Spread Model with Fractional Piecewise Derivative by Badr Saad T. Alkahtani, Sara Salem Alzaid

    Published 2023-08-01
    “…Unfortunately, the rise of internet forgeries has facilitated the dissemination of false or distorted information by unscrupulous individuals, particularly on sensitive matters, to serve their own interests. …”
    Get full text
    Article
  9. 1149

    It Is Not against the Law, if No-One Can See You: Online Social Organisation of Artefact-Hunting in Former Yugoslavia by Samuel Andrew Hardy

    Published 2021-08-01
    “…This study uses open-source intelligence to analyse the illicit excavation and illicit trafficking of archaeological goods (and forgeries) across the Balkan-Eastern Mediterranean region(s) of Bosnia and Herzegovina, Croatia, Kosovo, Montenegro, North Macedonia, Serbia and Slovenia. …”
    Get full text
    Article
  10. 1150

    The Use of Cytochrome b Gene as a Specific Marker of the Rat Meat (Rattus norvegicus) on Meat and Meat Products by C. Sumantri, E. Andreas, A. Primasari, H. Nuraini

    Published 2012-04-01
    “…One way that is often used to detect forgeries by using cytochrome b gene as a marker. The purpose of this study was to create a specific primer derived from cytochrome b sequences in rat (Rattus norvegicus) as the DNA marker to detect any contamination of rat meat on fresh livestock meat and its processed meat products. …”
    Get full text
    Article
  11. 1151

    Exploiting Intermediate Value Leakage in Dilithium: A Template-Based Approach by Alexandre Berzati, Andersson Calle Viera, Maya Chartouny, Steven Madec, Damien Vergnaud, David Vigilant

    Published 2023-08-01
    “…By gathering signatures and being able to make the correct predictions for each index, and then using linear algebra methods, this paper demonstrates that one can recover part of the secret key that is sufficient to produce universal forgeries. While our paper deeply discusses the theoretical attack path, it also demonstrates the validity of the assumption regarding the required leakage model from practical experiments with the reference implementation on an ARM Cortex-M4. …”
    Get full text
    Article
  12. 1152

    Leveraging Electric Network Frequency Estimation for Audio Authentication by Christos Korgialas, Constantine Kotropoulos, Konstantinos N. Plataniotis

    Published 2024-01-01
    “…These findings provide compelling evidence for the efficacy of the proposed ENF estimation schemes as reliable prerequisites for detecting audio forgeries.…”
    Get full text
    Article
  13. 1153

    Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation by Maharage Nisansala Sevwandi Perera, Takeshi Koshiba

    Published 2020-11-01
    “…We propose a new group signature scheme from lattices with VLR, which achieves stronger security than the previous related works. To avoid signature forgeries, we suggest a new zero-knowledge proof system that requires signers to validate themselves. …”
    Get full text
    Article
  14. 1154

    Can people identify original and manipulated photos of real-world scenes? by Sophie J. Nightingale, Kimberley A. Wade, Derrick G. Watson

    Published 2017-07-01
    “…The prevalence of manipulated photos in our everyday lives invites an important, yet largely unanswered, question: Can people detect photo forgeries? Previous research using simple computer-generated stimuli suggests people are poor at detecting geometrical inconsistencies within a scene. …”
    Get full text
    Article
  15. 1155

    A Hybrid Features for Signature Recognition Using Neural Network by Shaymaa R. Saleh, Zamen F. Jabr, Abeer N. Fasial

    Published 2019-04-01
    “…If the extracted features from a signature's image doesn't robust this will cause to higher verification error-rates especially for skilled forgeries in hacker the system. In this paper, we present a new offline handwritten signature recognition system based on combination of global with Statistical and GLCM (Grey Level Co-occurrence Matrix) features using neural network as classifier tool. …”
    Get full text
    Article
  16. 1156

    True or False? Defining the Fake in Chinese Porcelain by Stacey Pierson

    “…Ultimately, truly deceptive fakes, like forgeries, are an increasing problem across the arts, not just in Chinese porcelain, but this article demonstrates that the production of fake Chinese porcelain was deceptive in several different ways and such porcelains were made in a very particular context that is revealed when the subject of ‘fake’ porcelain is positioned within a historical stylistic framework.…”
    Get full text
    Article
  17. 1157

    “Foundations of a great metaphysical style”: unraveling Giorgio de Chirico’s early palette by Abed Haddad, Corina E. Rogge, Ana Martins, Desirae Dijkema

    Published 2022-05-01
    “…Abstract Properly situating Giorgio de Chirico’s metaphysical works within his lifetime is complicated due to incomplete provenances, his practice of deliberately falsifying dates, and the known existence of forgeries. De Chirico’s palette may have altered over time, due to shifts in his personal taste, changes in availability of materials, and innovations in paints; elucidating his palette and variations thereof during his metaphysical period (1911–1919) offers analytical insights that complement traditional connoisseurship when attempting to correctly position a given work within his lifetime. …”
    Get full text
    Article
  18. 1158

    Deepfake detection using deep feature stacking and meta-learning by Gourab Naskar, Sk Mohiuddin, Samir Malakar, Erik Cuevas, Ram Sarkar

    Published 2024-02-01
    “…This paper aims to address the problem of deepfake detection by identifying deepfake forgeries in video sequences. In this paper, a solution to the said problem is presented, which at first uses a stacking based ensemble approach, where features obtained from two popular deep learning models, namely Xception and EfficientNet-B7, are combined. …”
    Get full text
    Article
  19. 1159

    A Blockchain-based Conceptual Model to Address Educational Certificate Verification Challenges in Tanzania by Said Hamisi Said, Mussa Ally Dida, Efraim Michael Kosia, Ramadhani S. Sinde

    Published 2023-10-01
    “…These challenges undermine certificate verification, impose a significant setback in the fight against forgeries, and create loopholes. It was conceptually demonstrated that these issues can be resolved through the proposed blockchain-based solution. …”
    Get full text
    Article
  20. 1160

    User Identification System Using 2D Resized Spectrogram Features of ECG by Gyu-Ho Choi, Eun-Sang Bak, Sung-Bum Pan

    Published 2019-01-01
    “…Studies have been actively conducted on biometrics technology applying electrocardiogram (ECG) signals, which are more robust against forgeries and alterations than fingerprint and face authentication. …”
    Get full text
    Article