Showing 261 - 280 results of 296 for search '"Forgery"', query time: 0.07s Refine Results
  1. 261

    An enhanced light weight face liveness detection method using deep convolutional neural network by Swapnil R. Shinde, Anupkumar M. Bongale, Deepak Dharrao, Sudeep D. Thepade

    Published 2025-06-01
    “…Biometric authentication and face recognition hold significant application potential, albeit susceptible to forgery, termed as face spoofing attacks. These attacks, encompassing 2D and 3D modalities, pose challenges through fake photos, warped images, video displays, and 3D masks. …”
    Get full text
    Article
  2. 262

    Secure Data Transmission Using GS3 in an Armed Surveillance System by Francisco Alcaraz-Velasco, José M. Palomares, Fernando León-García, Joaquín Olivares

    Published 2025-06-01
    “…The security analysis confirms that GS3 detects tampering, replaying, forwarding, and forgery attacks. Moreover, GS3 has a key space of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><msup><mn>2</mn><mn>544</mn></msup></semantics></math></inline-formula> permutations, slightly larger than those of Chacha20 and Salsa20, with a faster solution than these methods. …”
    Get full text
    Article
  3. 263

    Practical Aspects of Using Artificial Intelligence Programs in the Analytical Work of the Department by Chupryna Leonid

    Published 2024-01-01
    “…Attention is focused on the signsthat indicate the forgery of voice, photo, video by artificial intelligence. …”
    Get full text
    Article
  4. 264

    MEViT: Generalization of Deepfake Detection With Meta-Learning EfficientNet Vision Transformer by Van-Nhan Tran, Hoanh-Su Le, Piljoo Choi, Suk-Hwan Lee, Ki-Ryong Kwon

    Published 2025-01-01
    “…With the rapid advances in deep generative models, the accessibility and sophistication of such manipulation technologies are increasing, making it more challenging to detect fake content. Different facial forgery techniques result in complex data distributions, and most existing deepfake detection approaches rely on convolutional neural networks (CNNs) that treat the task as a binary classification problem. …”
    Get full text
    Article
  5. 265

    Robust Authentication: Leveraging Hardware Fingerprints and AI to Enhance Security Against Spoofing by K. Nimmy, Kurunandan Jain, S. M. Sachin, P. A. Abekaesh, Parv Venkitasubramaniam

    Published 2025-01-01
    “…By integrating fingerprint biometrics, hardware fingerprints, and passwords, our novel MFA protocol significantly enhances security against spoofing and forgery attacks. Through security analysis, we demonstrate its effectiveness in preventing unauthorized access. …”
    Get full text
    Article
  6. 266

    Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain by Windra Swastika, Hermawan Wirasantosa, Oesman Hendra Kelana

    Published 2022-02-01
    “…Certificates must be created and stored with good methods and security to prevent changes in content or even forgery. Blockchain technology is technology that allows secure storage processes at a low cost. …”
    Get full text
    Article
  7. 267

    Two decades of dental malpractice litigations in Türkiye: a retrospective matched cohort study analyzing legal and clinical outcomes by Esra Yuce, Seymanur Kacdıoglu Yurt

    Published 2025-04-01
    “…The most common reason for malpractice claims was incorrect treatment (88%), followed by incomplete treatment (33%), misdiagnosis (32%), patient fault (21%), treatment delays (19%), lack of follow-up (16%), failure to obtain informed consent (10%), delays in diagnosis (3%), document forgery (3%), and infectious disease (2%). Conclusion This study highlights the importance of thorough planning, assessments, and preventive measures in dental practice, particularly in prosthodontics, oral surgery, and implantology, which involve invasive procedures, prolonged treatments, and high costs—factors that contribute to higher patient dissatisfaction and increased malpractice risks. …”
    Get full text
    Article
  8. 268

    Detection of Wormhole Attack in Vehicular Ad-hoc Network over Real Map using Machine Learning Approach with Preventive Scheme by Shahjahan Ali, Parma Nand, Shailesh Tiwari

    Published 2022-03-01
    “…Either communication may be broadcast or unicast both are sensitive to different types ofassaults, for example message forgery, (DOS) denial of service, Sybil assault, Greyhole, Blackhole & Wormhole assault. …”
    Get full text
    Article
  9. 269

    Hierarchical Feature Fusion and Enhanced Attention Mechanism for Robust GAN-Generated Image Detection by Weinan Zhang, Sanshuai Cui, Qi Zhang, Biwei Chen, Hui Zeng, Qi Zhong

    Published 2025-04-01
    “…Meanwhile, the AEM enhances the network’s ability to capture subtle forgery traces by incorporating attention mechanisms and filtering techniques, significantly boosting the model’s efficiency in processing complex information. …”
    Get full text
    Article
  10. 270

    Il vaso e i cocci. Note in margine a La llegenda del llibreter assassí de Barcelona by Francesco de Cristofaro

    Published 2013-12-01
    “…The article concludes with a swift overview of literary plagiarisms committed by Nodier, the presumed culprit of the forgery, from which the genealogy investigated by Miquel i Planas builds up: a culprit that, while committing several literary crimes, decides to write a jurisprudential treaty in order to systematize and sentence them.…”
    Get full text
    Article
  11. 271

    FORENSIC DOCUMENT EXAMINATION IN ECONOMIC CRIME INVESTIGATIONS by Artem Kovalenko, Mykola Zhdan, Oleksandr Shapovalov

    Published 2025-07-01
    “…The results of the study show that in criminal proceedings, documents are considered written (documentary) evidence when their content is of importance to the case, and physical evidence when their external characteristics – such as material, production method, security features, signs of forgery, damage, etc. – possess evidentiary value. …”
    Get full text
    Article
  12. 272

    A Lightweight Variant of Falcon for Efficient Post-Quantum Digital Signature by Aigerim Kerimbayeva, Maksim Iavich, Yenlik Begimbayeva, Sergiy Gnatyuk, Sakhybay Tynymbayev, Zhanerke Temirbekova, Olga Ussatova

    Published 2025-07-01
    “…Additionally, we present formal lemmas and theorems to ensure correctness and define theoretical bounds on forgery resistance. Although Falcon-M does not rely on a formal cryptographic trapdoor, we demonstrate that it achieves strong practical security based on assumptions related to the Short Integer Solution (SIS) problem. …”
    Get full text
    Article
  13. 273

    Deepfake Face Detection and Adversarial Attack Defense Method Based on Multi-Feature Decision Fusion by Shanzhong Lei, Junfang Song, Feiyang Feng, Zhuyang Yan, Aixin Wang

    Published 2025-06-01
    “…The rapid advancement in deep forgery technology in recent years has created highly deceptive face video content, posing significant security risks. …”
    Get full text
    Article
  14. 274

    REDUCING THE RISKS OF ILLICIT TRAFFICKING IN INDUSTRIAL PRODUCTS TO ACHIEVE SUSTAINABLE DEVELOPMENT GOALS by A. L. Lisovsky

    Published 2022-08-01
    “…In this regard, it is necessary to analyze the risks of existing mechanisms of protection against counterfeit products and develop measures to reduce them.The object of research in this article is labeling, which is the application of a special DataMatrix code to the packaging and the entry of this unit of goods into the database.The purpose of the article is to develop recommendations on the use of additional visual control tools on the material carriers of the DataMatrix code, protected from forgery, and to assess the probability of the level of risk reduction and the level of possible losses when using them.The novelty of this study was: identification and analysis of risks of possible threats to the security of the mandatory labeling system for various categories of goods; development of a risk register of possible threats to the security of the system with a grouping of qualitatively assessed and quantifiable risks; development and verification of a model for assessing the probability and possible losses for a group of quantifiable risks; assessment of the probability of risks and possible budget losses from non-payment of taxes and excise duties; assessment of the probability of risks and possible losses for a bona fide manufacturer and end user; formation of management measures aimed at reducing the likelihood of risks and reducing the consequences of the potential implementation of risks; assessment of the residual level of probability and exposure to risks when using additional means of visual control on the material carriers of the DataMatrix code; assessment of the residual level of probability and exposure to risks when using additional visual inspection tools on tangible media protected from counterfeiting in similar systems and Track&amp;Trace marking systems implemented in foreign countries.The results obtained can be applied by federal executive authorities in the formation of state policy in the field of increasing the level of security of Russians, significantly reduce the amount of counterfeit and low-quality analogues, effectively combat smuggling, protect legal businesses and consumers, and also allow the state to increase tax collection.…”
    Get full text
    Article
  15. 275

    Smart Grid System Based on Blockchain Technology for Enhancing Trust and Preventing Counterfeiting Issues by Ala’a Shamaseen, Mohammad Qatawneh, Basima Elshqeirat

    Published 2025-07-01
    “…Security validation confirmed resistance against digital signature forgery, invalid smart contracts, race conditions, and double-spending attacks. …”
    Get full text
    Article
  16. 276

    ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints by Mingfu Xue, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang, Jian Wang, Weiqiang Liu

    Published 2023-07-01
    “…Furthermore, it is demonstrated that ActiveGuard is robust against model fine‐tuning attack, pruning attack, and three types of fingerprint forgery attacks.…”
    Get full text
    Article
  17. 277

    Leveraging machine learning to proactively identify phishing campaigns before they strike by Kun Zhang, Haifeng Wang, Meiyi Chen, Xianglin Chen, Long Liu, Qiang Geng, Yu Zhou

    Published 2025-05-01
    “…Attackers use various deceptive techniques, including link manipulation, filter evasion, covert redirection, website forgery, and social engineering. This study introduces an advanced phishing detection framework using machine learning (ML) models. …”
    Get full text
    Article
  18. 278

    Efektivitas Sistem Barcode Dalam Pengamanan Akta Autentik by Kamilia Savira, Sjarif Fitriani Ahlan

    Published 2022-04-01
    “…This research is expected to provide a solution related to legal protection and certainty for interested parties in authentic deeds against deed forgery. This study uses a normative juridical method, the approach used is a statute approach. …”
    Get full text
    Article
  19. 279

    The utilisation of scientific crime investigation methods and forensic evidence in the criminal investigation process in Indonesia by Handar Subhandi Bakhtiar, Amir Ilyas, Abdul Kholiq, Handina Sulastrina Bakhtiar

    Published 2025-05-01
    “…Metro Jaya focused on theft (28.8%), forgery (23.5%), and transnational crime (15.3%), whereas Sulawesi Selatan prioritised narcotics cases (88.3%). …”
    Get full text
    Article
  20. 280

    Akibat Kekosongan Hukum Terhadap Non-Fungible Token Sebagai Pelanggaran Hak Kekayaan Intelektual by Gabriella Ivana, Andriyanto Adhi Nugroho

    Published 2022-11-01
    “…The results of this study conclude that due to the legal vacuum of digital art in NFT, it triggers the occurrence of violations that can harm certain individuals such as plagiarism, theft of works and even forgery and fraud. It is necessary to add regulations regarding all activities within the NFT itself, including the legal sanctions. …”
    Get full text
    Article