Search

Your search keyword '"FORGERY"' showing total 459 results

Search Constraints

Start Over You searched for: Descriptor "FORGERY" Remove constraint Descriptor: "FORGERY" Publisher springer nature Remove constraint Publisher: springer nature
459 results on '"FORGERY"'

Search Results

1. ESRL: efficient similarity representation learning for deepfake detection.

2. A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments.

3. An MSDCNN-LSTM framework for video frame deletion forensics.

4. Existence Is Not Relativistically Invariant—Part 1: Meta-ontology.

5. Copy–move forgery detection in digital image forensics: A survey.

6. Enhancing security for document exchange using authentication and GAN encryption.

7. Detection and localization of multiple inter-frame forgeries in digital videos.

8. A survey on digital image forensic methods based on blind forgery detection.

9. Comment and improvement on the "semi-quantum ring signature protocol based on multi-particle GHZ state".

10. Recurrent neural network and long short-term memory models for audio copy-move forgery detection: a comprehensive study.

11. A dynamic C-V2X anonymous authentication and group key agreement protocol.

12. Improving the generalization of face forgery detection via single domain augmentation.

13. Determining the Number of Confirmation Blocks in a Two-Level Blockchain with Proof-of-Proof Consensus Protocol for Different Consensus Types in Mainchain/Sidechain to Prevent Double Spend Attack. I. PoS in Mainchain and PoW in Sidechain.

14. Frequency-constrained transferable adversarial attack on image manipulation detection and localization.

15. An optimal secure and reliable certificateless proxy signature for industrial internet of things.

16. Detecting Unknown Shilling Attacks in Recommendation Systems.

17. Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis.

18. Deep learning-based efficient and robust image forgery detection.

19. Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3.

20. One-class learning for face anti-spoofing via pseudo-negative sampling.

21. A two-stage fake face image detection algorithm with expanded attention.

22. A generalized novel image forgery detection method using generative adversarial network.

23. Gabor Filter and Centre Symmetric-Local Binary Pattern based technique for forgery detection in images.

24. A hybrid SWT-SVD based multiresolution features for robust image copy-move forgery detection.

25. Mechanism of implicit moral decision in the context of non-deceptive counterfeit luxury consumption.

26. Image forgery detection in forensic science using optimization based deep learning models.

27. Counterfeit detection of bulk Baijiu based on fluorescence hyperspectral technology and machine learning.

28. An Interpretable Screening Approach Derived Through XGBoost Regression for the Discovery of Hypolipidemic Contributors in Chinese Hawthorn Leaf and its Counterfeit Malus Doumeri Leaf.

29. MSA-Net: Multi-scale attention network for image splicing localization.

30. Clustering-based data integrity verification approach for multi-replica in a fog environment.

31. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

32. Local attention and long-distance interaction of rPPG for deepfake detection.

33. DIFLD: domain invariant feature learning to detect low-quality compressed face forgery images.

34. Copy-Move Video Forgery Detection Techniques: A Systematic Survey with Comparisons, Challenges and Future Directions.

35. Passive Image Forgery Detection Techniques: A Review, Challenges, and Future Directions.

36. Block-level double JPEG compression detection for image forgery localization.

37. Understanding digital image anti-forensics: an analytical review.

38. Enhanced copy-move forgery detection using deep convolutional neural network (DCNN) employing the ResNet-101 transfer learning model.

39. Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach.

40. High-performance image forgery detection via adaptive SIFT feature extraction for low-contrast or small or smooth copy–move region images.

41. Cross-scale condition aggregation and iterative refinement for copy-move forgery detection.

42. Non-overlapping block-level difference-based image forgery detection and localization (NB-localization).

43. Development, detection and decipherment of obfuscated fingerprints in humans: Implications for forensic casework.

44. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid.

45. Video face forgery detection via facial motion-assisted capturing dense optical flow truncation.

46. Blockchain-Enabled land management systems.

47. Counterfeits on dark markets: a measurement between Jan-2014 and Sep-2015.

48. Evaluate the Performance of Deep CNN Algorithm based on Parameters and Various Geometrical Attacks.

49. SI-Net: spatial interaction network for deepfake detection.

50. A comprehensive survey on state-of-the-art video forgery detection techniques.

Catalog

Books, media, physical & digital resources