Showing 101 - 120 results of 1,102 for search '"forgery"', query time: 0.15s Refine Results
  1. 101

    An efficient technique for detecting document forgery in hyperspectral document images by Naglaa F. EL Abady, Hala H. Zayed, Mohamed Taha

    Published 2023-12-01
    “…In document forensics, identifying ink mismatches is crucial for detecting forgeries and determining document authenticity. However, identifying and separating specific inks from paper can be challenging. …”
    Get full text
    Article
  2. 102
  3. 103

    Seam-Carving forgery detection based on expanded Markov features by Guo-rui SHENG, Tie-gang GAO, Li FAN, Lin GAO, Fu-sheng YANG, Shun ZHANG

    Published 2014-06-01
    Subjects: “…image forensics; image forgery;Seam-Carving;Markov feature;image resizing…”
    Get full text
    Article
  4. 104
  5. 105
  6. 106

    Video forgery detection using HOG features and compression properties by Subramanyam, A. V., Emmanuel, Sabu

    Published 2013
    “…In this paper, we propose a novel video forgery detection technique to detect the spatial and temporal copy paste tampering. …”
    Get full text
    Get full text
    Conference Paper
  7. 107
  8. 108
  9. 109

    Medievalist forgery? Editions, adaptations, and translations of Kudrun in the nineteenth century by Boyle, M

    Published 2024
    “…This ‘terms of art’ essay considers whether, and how far, the term forgery can usefully be applied to the study of translations and adaptations in the context of Anglo-German nineteenth-century medievalism, with a particular focus on the reception of the thirteenth-century epic, Kudrun. …”
    Journal article
  10. 110

    Prelude to forgery: Baldwin of Bury meets Pope Alexander II by Savill, B

    Published 2017
    “…That is, the hitherto overlooked failure of that the genuine papal document to find any acceptance in 1070s England necessitated Bury’s recourse to royal forgery. The implications of this go well beyond Bury. …”
    Journal article
  11. 111
  12. 112

    Overview of cross site request forgery and client-side protection by Yaakob, Razali, Joozdani, Mohsen, Abdullah @ Selimun, Mohd Taufik, Abdullah, Azizol

    Published 2013
    “…In this paper we would present how Cross Site Request forgery attack works. In additional we present our approach to mitigate Cross Site Request forgery by PCSRF Framework (Prevent Cross Site Request forgery) on Firefox. …”
    Get full text
    Article
  13. 113

    Copy-Move Forgery Detection using Integrated DWT and SURF by Alamro, Loai, Yusoff, Nooraini

    Published 2017
    “…In this study, we propose a combination of two feature extraction methods namely Discrete Wavelet Transform (DWT) and Speeded Up Robust Features (SURF) to detect a copy-move forgery in digital media.Copy-move is one of the most popular kinds of digital image tempering, in which one or more parts of a digital image are copied and pasted into different locations.DWT is used to reduce image dimension and SURF is superior in extracting the key features from the image.The method has been tested with BMP and JPG images consisting of genuine and counterfeited images.Furthermore, the method has also been tested with copied-moved images applied with a number of various geometric transformation attacks including rotation, translation, scaling or set of them.The experiments results prove that the proposed method is superior with overall accuracy 95% when compared with the existing method.The copy-move attacks in the digital image have been successfully detected.…”
    Get full text
    Article
  14. 114
  15. 115
  16. 116
  17. 117
  18. 118
  19. 119

    Document Falsification/Forgery from the View of Islamic Jurisprudence and Malaysian Law by Wan Abdul Fattah Wan Ismail, Ahmad Syukran Baharuddin, Lukman Abdul Mutalib, Muneer Ali Abdul Rab al-Qubaty

    Published 2019-12-01
    “…Although the scholars of Islamic jurisprudence discussed the importance of document and its strength as a mean of proof, they did not discuss the issue of forgery unless slightly compared with the scholars of law. …”
    Get full text
    Article
  20. 120