-
21
A dual benchmarking study of facial forgery and facial forensics
Published 2024-12-01Subjects: Get full text
Article -
22
-
23
Provably secure and efficient certificateless sequential multi-signature scheme in random oracle model
Published 2014-11-01Subjects: Get full text
Article -
24
FI-SURF algorithm for image copy-flip-move forgery detection
Published 2015-05-01Subjects: Get full text
Article -
25
Les faux, les copies, les restaurations intensives, les erreurs d’attribution dans les arts du métal : un champ d’application de l’archéométrie ?
Published 2009-04-01Subjects: Get full text
Article -
26
Provably secure certificateless aggregate signature scheme in wireless roaming authentication
Published 2017-07-01Subjects: Get full text
Article -
27
Dispute over precedence and protocol: Hagiography and forgery in 19th-century Ethiopia
Published 2016-12-01Subjects: Get full text
Article -
28
Image recoloring detection based on inter-channel correlation
Published 2022-10-01Subjects: Get full text
Article -
29
-
30
FBI-Net: Frequency-Based Image Forgery Localization via Multitask Learning With Self-Attention
Published 2022-01-01Subjects: Get full text
Article -
31
Image inpainting forensics method based on dual branch network
Published 2022-12-01Subjects: Get full text
Article -
32
Fast copy-move forgery detection algorithm based on group SIFT
Published 2020-03-01Subjects: “…copy-move forgery detection…”
Get full text
Article -
33
New certificateless aggregate signature scheme with universal designated verifier
Published 2017-11-01Subjects: Get full text
Article -
34
Seam-Carving forgery detection based on expanded Markov features
Published 2014-06-01Subjects: Get full text
Article -
35
Research progress of digital image forensic techniques based on deep learning
Published 2021-10-01Subjects: Get full text
Article -
36
Modal-Guided Multi-Domain Inconsistency Learning for Face Forgery Detection
Published 2024-12-01Subjects: Get full text
Article -
37
Cryptanalysis of IAR-CTR and IAR-CFB and a fixing method
Published 2025-01-01Subjects: Get full text
Article -
38
Internet source address verification method based on synchronization and dynamic filtering in address domain
Published 2020-10-01Subjects: Get full text
Article -
39
-
40
The structure of the forensic characteristics of offences under Article 200 of the Criminal Code of Ukraine
Published 2023-07-01Subjects: Get full text
Article