-
1
Peintures romaines antiques, restauration et falsification
Published 2013-02-01Subjects: Get full text
Article -
2
The Head Pendant from the Marchetti Collection: Phoenicio-Punic Glass or Modern Forgery?
Published 2025-01-01Subjects: Get full text
Article -
3
Copy-Move Forgery Verification in Images Using Local Feature Extractors and Optimized Classifiers
Published 2023-09-01Subjects: “…copy move forgery detection…”
Get full text
Article -
4
A Novel Audio Copy Move Forgery Detection Method With Classification of Graph-Based Representations
Published 2025-01-01Subjects: “…Audio forgery…”
Get full text
Article -
5
An efficient convolution neural network method for copy-move video forgery detection
Published 2025-01-01Subjects: Get full text
Article -
6
-
7
Frauds, Myths, and Mysteries : science and pseudoscience in archaeology /
Published 2006Subjects: “…Forgery of antiquities. 9656…”
Publisher description
Table of contents only
View in OPAC
Book -
8
The Canonization of Ibn Mâjah: Authenticity vs. Utility in the Formation of the Sunni Ḥadîth Canon
Published 2011-07-01Subjects: Get full text
Article -
9
Scientific investigation of copies, fakes and forgeries (Paul Craddock,ed.)
Published 2010-11-01Subjects: Get full text
Article -
10
-
11
Lip forgery detection via spatial-frequency domain combination
Published 2022-12-01Subjects: “…DeepFake forgery…”
Get full text
Article -
12
R.H. MARIJNISSEN, The Masters' and the Forgers' Secrets
Published 2010-04-01Subjects: Get full text
Article -
13
David A. Scott, Authenticity, Restoration, Forgery
Published 2018-05-01Subjects: Get full text
Article -
14
New cryptanalysis of the authenticated cipher model JAMBU
Published 2017-07-01Subjects: Get full text
Article -
15
-
16
New forgery attack on the authenticated cipher SCREAM and iSCREAM
Published 2016-01-01Subjects: Get full text
Article -
17
Robust deepfake detection method based on siamese network
Published 2024-04-01Subjects: “…forgery forensics…”
Get full text
Article -
18
Cryptanalysis of some chaos-based keyed hash functions
Published 2011-01-01Subjects: Get full text
Article -
19
-
20
Security analysis on a kind of group signatures
Published 2003-01-01Subjects: Get full text
Article