Search

Your search keyword '"FORGERY"' showing total 11,146 results

Search Constraints

Start Over You searched for: Descriptor "FORGERY" Remove constraint Descriptor: "FORGERY" Language english Remove constraint Language: english
11,146 results on '"FORGERY"'

Search Results

1. The interplay of manufacturer encroachment and blockchain adoption to combat counterfeits in a platform supply chain.

2. Enhancing accuracy in forgery signature detection: Deep learning approaches with support vector machines.

3. Classification and detection of Counterfeit Indian Currency using novel deep learning architecture and prediction accuracy comparison with VGG 19.

4. ESRL: efficient similarity representation learning for deepfake detection.

5. A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments.

6. MTFDN: An image copy‐move forgery detection method based on multi‐task learning.

7. An MSDCNN-LSTM framework for video frame deletion forensics.

8. Enhancing Signature Verification Using Triplet Siamese Similarity Networks in Digital Documents.

9. Banknote identification based on characteristic differences.

10. Centenary Paper: The Celestial Knights of San Millán: Forgery and Allegory in Twelfth-Century Spain.

11. Existence Is Not Relativistically Invariant—Part 1: Meta-ontology.

12. IMTNet: Improved Multi-Task Copy-Move Forgery Detection Network with Feature Decoupling and Multi-Feature Pyramid.

13. Liability for the Offence of Counterfeiting Famous Trade Marks.

14. Optimizing Aspect Term Extraction and Sentiment Classification through Attention Mechanism and Sparse Attention Techniques.

15. A Novel Image Forgery Identification via Hybrid Deep Belief Network Optimization with EFP-AEHO.

16. Copy–move forgery detection in digital image forensics: A survey.

17. Enhancing security for document exchange using authentication and GAN encryption.

18. Detection and localization of multiple inter-frame forgeries in digital videos.

19. An Anti-Forensics Video Forgery Detection Method Based on Noise Transfer Matrix Analysis.

20. Generated or Not Generated (GNG): The Importance of Background in the Detection of Fake Images.

21. A survey on digital image forensic methods based on blind forgery detection.

22. Highly tunable emission properties of solid-state supramolecular compounds based on Eu mixed-lanthanide complexes and cucurbit[6]uril.

23. Comment and improvement on the "semi-quantum ring signature protocol based on multi-particle GHZ state".

24. Recurrent neural network and long short-term memory models for audio copy-move forgery detection: a comprehensive study.

25. A dynamic C-V2X anonymous authentication and group key agreement protocol.

26. Adverse effects from counterfeit and mislabeled medicine containing tapentadol and carisoprodol.

27. Detecting image manipulation with ELA-CNN integration: a powerful framework for authenticity verification.

28. An efficient digital image forgery detection using Pelican search optimisation-based DCNN.

29. CFDMI-SEC: An optimal model for copy-move forgery detection of medical image using SIFT, EOM and CHM.

30. A generative adversarial network‐based client‐level handwriting forgery attack in federated learning scenario.

31. Secured tracing for group signatures from attribute‐based encryption.

32. Improving the generalization of face forgery detection via single domain augmentation.

34. LBRT: Local-Information-Refined Transformer for Image Copy–Move Forgery Detection.

35. Determining the Number of Confirmation Blocks in a Two-Level Blockchain with Proof-of-Proof Consensus Protocol for Different Consensus Types in Mainchain/Sidechain to Prevent Double Spend Attack. I. PoS in Mainchain and PoW in Sidechain.

36. Drug Sourcing Matters: Protecting Patients Facing Drug Importation, White and Brown Bagging.

37. Smuggling as a Material Critique of Borders.

38. Real‐time object‐removal tampering localization in surveillance videos by employing YOLO‐V8.

39. Frequency-constrained transferable adversarial attack on image manipulation detection and localization.

40. Image Splicing Forgery Detection Model Using Hybrid Boosting Machine.

41. An optimal secure and reliable certificateless proxy signature for industrial internet of things.

42. Worldwide Illicit and Counterfeit Alcoholic Spirits: Problem, Detection, and Prevention.

43. Combating lookalike product through adapting advertising appeals to consumer value: Strategic implications to brand imitation management.

44. Is the counterfeit currency mechanism strictly enforced by banks and regulatory authorities?

45. A world of counterfeits: Knowledge to decide.

46. Efficient Approach for the Localization of Copy-Move Forgeries Using PointRend with RegNetX.

47. Detecting Unknown Shilling Attacks in Recommendation Systems.

48. Hybrid machine learning techniques for image forensics.

49. Fake logo detection using CNN.

50. Tamper image detection using error level analysis and convolutional neural networks.

Catalog

Books, media, physical & digital resources