Showing 1,161 - 1,172 results of 1,172 for search '"forgery"', query time: 0.10s Refine Results
  1. 1161

    AN IMPROVED ACTION KEY FRAMES EXTRACTION ALGORITHM FOR COMPLEX COLOUR VIDEO SHOT SUMMARIZATION by Manar Mizher, Ang Mei Choo, Siti Sheikh Abdullah, Kok Ng

    Published 2019-02-01
    “…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. The extracted key frames should be sufficient key frames that preserve main actions in a video with compact representation. …”
    Get full text
    Article
  2. 1162

    Benchmarking desktop and mobile handwriting across COTS devices: The e-BioSign biometric database. by Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez, Aythami Morales, Javier Ortega-Garcia

    Published 2017-01-01
    “…Data was collected in two sessions for 65 subjects, and includes dynamic information of the signature, the full name and alpha numeric sequences. Skilled forgeries were also performed for signatures and full names. …”
    Get full text
    Article
  3. 1163

    The Art of Copying: Five strategies for Transforming Originals in the Art Museum by Hans Dam Christensen

    Published 2017-09-01
    “…This strategy frames, for example, artists’ citations of other works and forgeries. Both show that copy practices often lead to new originals, in principle, ad infinitum. …”
    Get full text
    Article
  4. 1164

    El diálogo textual entre La Aulularia de Plauto y El avaro de Molière by Daniela Soledad González

    Published 2018-05-01
    “…En particular, una especie de la imitación denominada forgerie. La causa de la existencia de esta relación de hipertextualidad entre las obras es, principalmente, la arquetipicidad propia del mundo antiguo, lo cual se aviene con el hecho de que Molière perteneció al movimiento literario denominado Neoclacisismo.…”
    Get full text
    Article
  5. 1165

    An Improved Action Key Frames Extraction Algorithm for Complex Colour Video Shot Summarization by Mizher, Manar Abduljabbar Ahmad, Ang, Mei Choo, Sheikh Abdullah, Siti Norul Huda, Kok, Weng Ng

    Published 2019
    “…Key frame extraction is one of the critical techniques in computer vision fields such as video search, video identification and video forgeries detection. The extracted key frames should be sufficient key frames that preserve main actions in a video with compact representation. …”
    Get full text
    Article
  6. 1166

    Amplitude SAR Imagery Splicing Localization by Edoardo Daniele Cannas, Nicolo Bonettini, Sara Mandelli, Paolo Bestagini, Stefano Tubaro

    Published 2022-01-01
    “…The drawback of these opportunities is that such images might be exposed to forgeries and manipulations by malicious users, raising new concerns about their integrity and trustworthiness. …”
    Get full text
    Article
  7. 1167

    Cryptanalysis of lightweight symmetric-key cryptographic algorithms by Tan, Quan Quan

    Published 2024
    “…Using these differential characteristics, we construct differential-based distinguishers for round-reduced ASCON permutation, build forgeries for ASCON-128 authenticated encryption scheme, and form a collision attack on ASCON-HASH. …”
    Get full text
    Thesis-Doctor of Philosophy
  8. 1168

    El Hombre Fósil de Miramar by Mariano Bonomo

    Published 2002-12-01
    “…Subsequently, investigations at Miramar intensified in an atmosphere of strong polemic, which ranged from the defense of a human presence in tertiary periods to the complete rejection of the fossil finds on the grounds that they were frauds and forgeries. The expeditions to Miramar were the subjects of numerous newspaper articles. …”
    Get full text
    Article
  9. 1169

    Dickson polynomial-based secure group authentication scheme for Internet of Things by Salman Ali Syed, Selvakumar Manickam, Mueen Uddin, Hamed Alsufyani, Mohammad Shorfuzzaman, Shitharth Selvarajan, Gouse Baig Mohammed

    Published 2024-02-01
    “…Also, the proposed secure group authentication scheme developed based on Dickson polynomials is resistant to replay, man-in-the-middle, tampering, side channel and signature forgeries, impersonation, and ephemeral key secret leakage attacks. …”
    Get full text
    Article
  10. 1170

    The seals of Adam Sędziwój Czarnkowski, the general starost of Grand Poland by Marcin Hlebionek

    Published 2011-12-01
    “…Its design emerged probably around the first half of the sixteenth century and had something to do with the case of forgeries (czarnkowskie falsyfikaty). However, the images on the seal can be also interpreted as referring to the aspirations of the magnate who, according to a legend, had royal ancestors and began to think of himself as a prince as well.…”
    Get full text
    Article
  11. 1171

    Remarks on the Question of the So-Called Monastic Schools of Architecture by Ernő Marosi

    Published 2021-04-01
    “…It seems that contrary to partly surviving hypotheses and forgeries in old art historical literature, no royal court and also no monastic order was practically involved in architecture or building praxis, including schools of architecture. …”
    Get full text
    Article
  12. 1172