Search

Your search keyword '"FORGERY"' showing total 935 results

Search Constraints

Start Over You searched for: Descriptor "FORGERY" Remove constraint Descriptor: "FORGERY" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
935 results on '"FORGERY"'

Search Results

1. CNN-based Approach for Robust Detection of Copy-Move Forgery in Images.

2. Comparison of color features on copy-move forgery detection problem using HSV color space.

3. جريمة تزوير التقارير والشهادات الطبية، وفقا للنظام السعودي (دراسة تحليلية تطبيقية).

4. Suspected North Carolina counterfeit pill-involved deaths, 2020–2022.

5. Highly Efficient Three‐Photon Excited Red Emission in the Yb3+‐Er3+ Upconversion System at Low Excitation Intensities for Non‐Invasive Anti‐Counterfeiting.

6. The ringed residual u-net with non-natural regions feature for image splicing forgery detection and localization.

7. Borrowed Feathers: The Spurious Older Scots Ending to Chaucer's Parliament of Fowls in Bodleian Library MS Arch. Selden. B. 24.

8. Smuggling as a Material Critique of Borders.

9. Altered Handwritten Text Detection in Document Images Using Deep Learning.

10. Altered Handwritten Text Detection in Document Images Using Deep Learning.

11. Copy-Move forgery detection using EOA, DWT and DCT.

12. Detecting video forgery: A machine learning approach for consistency analysis of video frames.

13. Botticelli-style tempera portrait on tile: Imaging and specific on-site spectroscopic analysis and cleaning examination.

14. An enterprise network model for understanding and disrupting illicit counterfeit electronic part supply chains.

15. درجة تعرض الشباب السعودي للقوة الناعمة الكورية دراسة على عينة من طلبة جامعة امللك عبد العزيز.

16. Forensic examination of security features of the CDC‐issued COVID‐19 vaccination card and suggested improvements to minimize counterfeiting.

17. Anti‐Counterfeiting Application of Persistent Luminescence Materials and Its Research Progress.

18. Synthetic images aid the recognition of human-made art forgeries.

19. Face Forgery Detection with Long-Range Noise Features and Multilevel Frequency-Aware Clues.

20. A rational hierarchical (t,n)-threshold quantum secret sharing scheme.

21. Local attention and long-distance interaction of rPPG for deepfake detection.

22. Clustering-based data integrity verification approach for multi-replica in a fog environment.

23. A Blockchain-Enabled Group Covert Channel against Transaction Forgery.

24. MCDC‐Net: Multi‐scale forgery image detection network based on central difference convolution.

25. GAN-based medical image small region forgery detection via a two-stage cascade framework.

26. Audio forgery detection and localization with super-resolution spectrogram and keypoint-based clustering approach.

27. Classification Analysis of Copy Papers Using Infrared Spectroscopy and Machine Learning Modeling.

28. "Pressed OXY M30 Pills, Great Press, Potent, Fast Shipping!!!": Availability of Counterfeit and Pharmaceutical Oxycodone Pills on One Major Cryptomarket.

29. Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption.

30. Decentralized Anonymous IoT Data Sharing with Key-Private Proxy Re-Encryption.

31. Robust dense‐field based copy‐move forgery localization using generic radial harmonic Fourier moment invariants.

32. Automated identification of copy‐move forgery using Hessian and patch feature extraction techniques.

33. Dynamic feature analysis of handwritten electronic signatures based on Fourier transform.

34. Forged soft tissues revealed in the oldest fossil reptile from the early Permian of the Alps.

35. High-performance image forgery detection via adaptive SIFT feature extraction for low-contrast or small or smooth copy–move region images.

36. Substances in Counterfeit Prescription Pills Seized by Law Enforcement, 2017-2022.

37. Counterfeiting Periodicals in Seventeenth-Century Europe: Engravings, Music, and Binding of the Dutch Mercure galant in the Austrian National Library (1678–1679).

38. Modeling of intelligent hyperparameter tuned deep learning based copy move image forgery detection technique.

39. Non-overlapping block-level difference-based image forgery detection and localization (NB-localization).

40. An Irreducible Death-Drive or an Emancipative Event: Trauma and PTSD Recovery form Žižek-Badiou's Perspective.

41. A Secure and Efficient Scheme Based on Unlinkability and Anonymous Traceable Protocol for Cloud-Assisted IoT Environment.

42. Deep Learning Approach for Detecting Fake Images Using Texture Variation Network.

43. DETECTION OF IMAGE FORGERY USING DEEP LEARNING THROUGH CONVOLUTIONAL NEURAL NETWORKS.

44. Multi-region minutiae depth value-based efficient forged finger print analysis.

45. A provable secure and lightweight ECC-based authenticated key agreement scheme for edge computing infrastructure in smart grid.

46. Video face forgery detection via facial motion-assisted capturing dense optical flow truncation.

47. Enhancing Educational Certificate Verification With Blockchain and IPFS: A Decentralized Approach Using Hyperledger Fab.

48. Model verification for population detection of counterfeits.

49. METAPHYSICAL TURMOIL.

50. SI-Net: spatial interaction network for deepfake detection.

Catalog

Books, media, physical & digital resources