Search

Your search keyword '"FORGERY"' showing total 12,376 results

Search Constraints

Start Over You searched for: Descriptor "FORGERY" Remove constraint Descriptor: "FORGERY"
12,376 results on '"FORGERY"'

Search Results

1. The interplay of manufacturer encroachment and blockchain adoption to combat counterfeits in a platform supply chain.

2. Exploring Diverse Techniques in Image and Video Forgery

3. A Comparative Analysis of Digital Image Forgery Detection Methods

4. Review of recent advances on health benefits, microbial transformations, and authenticity identification of Citri reticulatae Pericarpium bioactive compounds.

5. Disrupting J‐Aggregation in Triazatruxene Dimers to Develop Responsive Luminescent Inks for Anti‐Counterfeiting Applications.

6. Fine-Grained Multimodal DeepFake Classification via Heterogeneous Graphs.

7. ФАРМАЦЕВТИЧНИ ГРИЖИ ПРИ ОТПУСКАНЕТО НА ЛЕКАРСТВА БЕЗ РЕЦЕПТА, ПРЕДНАЗНАЧЕНИ ЗА ДЕЦА.

8. Detection of colorization based image forgeries using convolutional autoencoder method.

9. Adaptive thresholding pattern for fingerprint forgery detection.

10. DWT and LBP hybrid feature based deep learning technique for image splicing forgery detection.

11. A Programmable 2D/3D Anti‐Counterfeiting System via Shape Memory Polymer with Surface Wrinkle and Fluorescence.

12. Multi-feature fusion based face forgery detection with local and global characteristics.

13. The impact of counterfeit components and LRUs in the navy surface warfare supply chain: A systems dynamics approach.

14. A threshold changeable dynamic quantum secret sharing scheme with cheating identification.

15. Verifiable dynamic quantum secret sharing based on generalized Hadamard gate.

16. Quantum secret sharing with (m, n) threshold: QFT and identity authentication.

17. WATCHER: Wavelet-Guided Texture-Content Hierarchical Relation Learning for Deepfake Detection.

18. SA3WT: Adaptive Wavelet-Based Transformer with Self-Paced Auto Augmentation for Face Forgery Detection.

19. Leveraging Blockchain Technology to Establish a Transparent and Counterfeit-Resistant Pharmaceutical Supply Chain.

20. علم الطبقات وأثره في الكشف عن تدليس الرواة.

21. CECL-Net: Contrastive Learning and Edge-Reconstruction-Driven Complementary Learning Network for Image Forgery Localization.

22. Learning Compressed Artifact for JPEG Manipulation Localization Using Wide-Receptive-Field Network.

23. Deep Learning Methods for Copy Move Image Forgery Detection: A Review.

24. ESRL: efficient similarity representation learning for deepfake detection.

25. A novel blockchain-enabled zero-trust-based authentication scheme in power IoT environments.

26. MTFDN: An image copy‐move forgery detection method based on multi‐task learning.

27. An MSDCNN-LSTM framework for video frame deletion forensics.

28. Cryptanalysis of a quantum identity-based signature and its improvement.

29. Colonizing Frank Moore Cross: The Dead Sea Scrolls in 1950s Popular Media.

30. Enhancing Signature Verification Using Triplet Siamese Similarity Networks in Digital Documents.

31. 车联网基于稀疏用户环境的LBS 隐私保护方案.

32. Banknote identification based on characteristic differences.

33. Centenary Paper: The Celestial Knights of San Millán: Forgery and Allegory in Twelfth-Century Spain.

34. Existence Is Not Relativistically Invariant—Part 1: Meta-ontology.

35. Transtextual Reading of Gilan's Holy Shrine Painting and Reverse Glass Painting in the Zand and Qajar Period with Emphasize on Forgery and Transposition Relation.

36. A Rapid, Non-Destructive Method to Detect Counterfeit Integrated Circuits Using a Resonant Cavity System.

37. Hierarchical Progressive Image Forgery Detection and Localization Method Based on UNet.

38. Liability for the Offence of Counterfeiting Famous Trade Marks.

39. IMTNet: Improved Multi-Task Copy-Move Forgery Detection Network with Feature Decoupling and Multi-Feature Pyramid.

40. Optimizing Aspect Term Extraction and Sentiment Classification through Attention Mechanism and Sparse Attention Techniques.

41. A Novel Image Forgery Identification via Hybrid Deep Belief Network Optimization with EFP-AEHO.

42. Enhancing accuracy in forgery signature detection: Deep learning approaches with support vector machines.

43. Classification and detection of Counterfeit Indian Currency using novel deep learning architecture and prediction accuracy comparison with VGG 19.

44. Hybrid machine learning techniques for image forensics.

45. Battling counterfeit masks during the COVID-19 outbreak: quality inspection vs. blockchain adoption.

46. The imitation game.

47. Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach.

48. Trade signs in antiquity.

49. Should brand‐owners adopt blockchain to combat deceptive counterfeits when competing with copycats? Impact of consumers' anticipated regret.

50. Measuring Line Length

Catalog

Books, media, physical & digital resources