Showing 121 - 140 results of 296 for search '"Forgery"', query time: 0.07s Refine Results
  1. 121
  2. 122

    AN IMITATION (FOURRÉE) OF ROMAN REPUBLICAN DENARIUS SERRATUS FROM THE «L-1» EXCAVATION AREA IN OLBIA PONTICA (UKRAINE) by Dmitriy N. KHMELEVSKIY, Valeriy V. KRUTILOV, Maria V Novichenkova

    Published 2021-07-01
    Subjects: “…olbia pontica, upper city, citadel, northern black sea region, 1st century bc, imitations of roman republican denarii, ancient counterfeits, coin forgeries, plated coins, fourrée serrati, coin imitations, geto-dacian coin minting, burebista…”
    Get full text
    Article
  3. 123

    Self-Supervised Feature Disentanglement for Deepfake Detection by Bo Yan, Pan Liu, Yumin Yang, Yanming Guo

    Published 2025-06-01
    “…Existing deepfake detection methods heavily rely on specific training data distributions and struggle to generalize to unknown forgery techniques. To address the challenge, this paper focuses on two critical research gaps: (1) the lack of systematic mining of standard features across multiple forgery methods; (2) the unresolved distribution shift problem in the strong supervised learning paradigm. …”
    Get full text
    Article
  4. 124

    Learning spatial‐frequency interaction for generalizable deepfake detection by Tianbo Zhai, Kaiyin Lu, Jiajun Li, Yukai Wang, Wenjie Zhang, Peipeng Yu, Zhihua Xia

    Published 2024-12-01
    “…Abstract In recent years, face forgery detection has gained significant attention, resulting in considerable advancements. …”
    Get full text
    Article
  5. 125

    Holy ambassadors and false Epistles. From Savonarola’s Florence to Messina? by Giuseppe Campagna

    Published 2025-06-01
    “…«A forgery may speak the truth […]. But to establish the fact of forgery is not enough. …”
    Get full text
    Article
  6. 126

    Verification of a static (off-line) signature using a convolutional neural network by U. Yu. Akhundjanov, V. V. Starovoitov

    Published 2022-06-01
    “…This article is devoted to the development of a method for detecting forgery of handwritten signatures. The signature still remains one of the most common methods of identification. …”
    Get full text
    Article
  7. 127

    TSFF-Net: A deep fake video detection model based on two-stream feature domain fusion. by Hangchuan Zhang, Caiping Hu, Shiyu Min, Hui Sui, Guola Zhou

    Published 2024-01-01
    “…With the advancement of deep forgery techniques, particularly propelled by generative adversarial networks (GANs), identifying deepfake faces has become increasingly challenging. …”
    Get full text
    Article
  8. 128

    Forged Video Detection Using Deep Learning: A SLR by Maryam Munawar, Iram Noreen, Raed S. Alharthi, Nadeem Sarwar

    Published 2023-01-01
    “…The main limitations of the domain are copy-move forgery, object-based forgery, and frame-based forgery. …”
    Get full text
    Article
  9. 129

    Digital video passive forensics for its authenticity and source by CHEN Wei-bing1, YANG Gao-bo2, CHEN Ri-chao2, ZHU Ning-bo2

    Published 2011-01-01
    “…The characteristics of various video forgery operations and their influences to video passive forensics were analyzed.From two aspects of authenticity and source identifications,typical approaches in passive video forensics,such as those video forgery trails-based and video capturing device-based techniques,are summarized.The main problems ex-iting in current research field and some urgent topics for future research are also investigated in detail.…”
    Get full text
    Article
  10. 130

    Detecting Image Splicing Using Merged Features in Chroma Space by Bo Xu, Guangjie Liu, Yuewei Dai

    Published 2014-01-01
    “…The experimental results indicate that the proposed method can detect splicing forgeries with lower error rate compared to the previous literature.…”
    Get full text
    Article
  11. 131

    Efficacy and Abuse Potential of Opioid Analgesics and the Treatment of Chronic Noncancer Pain by Andrew C Darke, John H Stewart

    Published 1999-01-01
    “…Abuse by secondary recipients of opioids is well documented and arises as a result of diversion by primary recipients, double-doctoring, forgery and theft. The frequency of forgery and theft of different opioids appears to be largely related to the corresponding number of legitimate prescriptions. …”
    Get full text
    Article
  12. 132

    Validation of the academic misconduct questionnaire: exploring predictors of student misconduct by Ana Cristina Veríssimo, Joselina Barbosa, Milton Severo, Paula Mena Matos, Pedro Oliveira, Laura Ribeiro

    Published 2025-12-01
    “…First-year students were more likely to Not Reporting peer misconduct and less likely to disclose Fraud in Academic Work and Signature Forgery than those in more advanced years. Health students scored higher in most misbehaviours, especially compared to Economics/Law, Social Sciences and Arts/Humanities, while the latter two disclosed higher Signature Forgery. …”
    Get full text
    Article
  13. 133

    Authentication of an Indonesian ID Card with Simultaneous NFC and Face Recognition by Chairullah Chairullah, Yuwaldi Away, Maulisa Oktiana

    Published 2025-06-01
    “…Identity (ID) card forgery remains a significant issue in Indonesia, often leading to crimes such as identity theft and fraud. …”
    Get full text
    Article
  14. 134

    Document Verification System Using Image Processing: A Case Study of Kabale Municipality. by Ojara, Walter

    Published 2024
    “…In this project, we propose a novel approach to document verification using image processing techniques to combat such document forgery which has compromised the revenue collection to the expectation. …”
    Get full text
    Thesis
  15. 135

    Robust audio authenticity detection based on One-Class learning by LIANG Ziqi, ZHANG Xulong, WANG Jianzong, XIAO Jing

    Published 2025-05-01
    “…Deepfake technology poses a serious threat to social economy, political stability, and social security. Among them, voice forgery technology is widely used in harmful activities such as phone scams and public opinion manipulation. …”
    Get full text
    Article
  16. 136

    Preparation of Modified Kaolin Filler with Cesium and Its Application in Security Paper by Houssni El-Saied, Samya El-Sherbiny, Omnia Ali, Wafaa El-Saied, Said Rohyem

    Published 2013-01-01
    “…In this study, cesium was added intentionally during paper manufacture for protecting the papers against forgery and counterfeiting by sorbing cesium ions (Cs+) on kaolin, used as special filler in papermaking. …”
    Get full text
    Article
  17. 137

    NLP neural network copyright protection based on black box watermark by Long DAI, Jing ZHANG, Xuefeng FAN, Xiaoyi ZHOU

    Published 2023-02-01
    “…With the rapid development of natural language processing techniques, the use of language models in text classification and sentiment analysis has been increasing.However, language models are susceptible to piracy and redistribution by adversaries, posing a serious threat to the intellectual property of model owners.Therefore, researchers have been working on designing protection mechanisms to identify the copyright information of language models.However, existing watermarking of language models for text classification tasks cannot be associated with the owner’s identity, and they are not robust enough and cannot regenerate trigger sets.To solve these problems, a new model, namely black-box watermarking scheme for text classification tasks, was proposed.It was a scheme that can remotely and quickly verify model ownership.The copyright message and the key of the model owner were obtained through the Hash-based Message Authentication Code (HMAC), and the message digest obtained by HMAC can prevent forgery and had high security.A certain amount of text data was randomly selected from each category of the original training set and the digest was combined with the text data to construct the trigger set, then the watermark was embedded on the language model during the training process.To evaluate the performance of the proposed scheme, watermarks were embedded on three common language models on the IMDB’s movie reviews and CNews text classification datasets.The experimental results show that the accuracy of the proposed watermarking verification scheme can reach 100% without affecting the original model.Even under common attacks such as model fine-tuning and pruning, the proposed watermarking scheme shows strong robustness and resistance to forgery attacks.Meanwhile, the embedding of the watermark does not affect the convergence time of the model and has high embedding efficiency.…”
    Get full text
    Article
  18. 138

    Security analysis of the RSSP-II protocol and a novel security enhancement approach by FENG Tao, TIE Xiaoping, WU Yi, SHI Jianming

    Published 2025-06-01
    “…However, existing research revealed that RSSP-Ⅱ’s message authentication security layer (MASL) had security vulnerabilities like key recovery and forgery, which might endanger the train control system’s stable operation. …”
    Get full text
    Article
  19. 139

    Moorish Culture in Don Quixote by Abbès BAHOUS

    Published 2007-06-01
    “…Thus, told by Side Hamet Benengeli the Moorish historian, Don Quixote takes an Arabic look. In this claim pure forgery or partly tenable ? …”
    Get full text
    Article
  20. 140

    CSTAN: A Deepfake Detection Network with CST Attention for Superior Generalization by Rui Yang, Kang You, Cheng Pang, Xiaonan Luo, Rushi Lan

    Published 2024-11-01
    “…With the advancement of deepfake forgery technology, highly realistic fake faces have posed serious security risks to sensor-based facial recognition systems. …”
    Get full text
    Article