Showing 21 - 40 results of 45 for search '"forgery"', query time: 0.04s Refine Results
  1. 21
  2. 22

    BMNet: Enhancing Deepfake Detection Through BiLSTM and Multi-Head Self-Attention Mechanism by Demao Xiong, Zhan Wen, Cheng Zhang, Dehao Ren, Wenzao Li

    Published 2025-01-01
    “…When forgery techniques can generate highly realistic videos, traditional convolutional neural network (CNN)-based detection models often struggle to capture subtle forgery features and temporal dependencies. …”
    Get full text
    Article
  3. 23

    Verification of a static (off-line) signature using a convolutional neural network by U. Yu. Akhundjanov, V. V. Starovoitov

    Published 2022-06-01
    “…This article is devoted to the development of a method for detecting forgery of handwritten signatures. The signature still remains one of the most common methods of identification. …”
    Get full text
    Article
  4. 24

    Document Verification System Using Image Processing: A Case Study of Kabale Municipality. by Ojara, Walter

    Published 2024
    “…In this project, we propose a novel approach to document verification using image processing techniques to combat such document forgery which has compromised the revenue collection to the expectation. …”
    Get full text
    Thesis
  5. 25

    Essence and elements of crimes in the sphere of official activity by S. Ye. Ablamskyi, M. O. Kolesnyk

    Published 2023-07-01
    “…Such crimes may include a variety of actions, such as forgery, abuse of power, bribery, extortion, negligence, etc. …”
    Get full text
    Article
  6. 26

    Kensington ou Tintin au pays des Runologues by Christophe Bord

    Published 2011-09-01
    “…The following pages present a survey of the century-old, fairly heated debate over the most famous runic forgery of all time known as the Kensington inscription, from the name of the place where it was found at the very end of the nineteenth century by a Swedish farmer in the “Scandinavian” state of Minnesota.Although crushing new evidence speaking against the authenticity of the monument surfaced a few years ago, a group of unwavering believers are still championing the cause of what they see as irrefutable proof of Scandinavian presence in the heart of the New World a century ahead of Columbus. …”
    Get full text
    Article
  7. 27

    CROSSING STROKES EXAMINATION FROM CROMATICITY DIAGRAM by Roshan Giri, Shanker Prasad Chimouriya, Bal Ram Ghimire

    Published 2023-04-01
    “…This work is very helpful to questioned document examiners to examine forgery in document.…”
    Get full text
    Article
  8. 28

    Forensic Examination of Money and Securities by V. S. Sezonov

    Published 2020-09-01
    “…The characteristic features of forgery are given, which should be paid attention to during the inspection. …”
    Get full text
    Article
  9. 29

    Notary independence in the course of notarial acts by M. Ye. Vasylenko

    Published 2023-07-01
    “…It has been generalised that ensuring the appropriate level of notary independence in the course of notarial acts is important: firstly, for notaries themselves, since in this case they are able to perform their activities free from any influence, which is an additional guarantee of ensuring the regime of legality in their work; secondly, for users of notaries’ services, since notary independence is a guarantee of observance of the rights and freedoms of individuals and legal entities, and is also a preventive measure against any unlawful acts (fraud, document forgery, etc.).…”
    Get full text
    Article
  10. 30

    The concept of the document in Forensic science by V. S. Sezonov

    Published 2022-03-01
    “…The tasks of forensic documentation are: 1) development of forensic classification of documents, which will be based on various criteria; 2) development of methods for detecting the subject of forgery; 3) development of methods for rebuilding the information content of the document or its holder. …”
    Get full text
    Article
  11. 31

    Bejlisova aféra. Antisemitismus a ruský politický život v letech 1911-1913 by Zbyněk Vydra

    Published 2006-01-01
    “…Therefore it risked the trial against Beilis, which ended in October 1913 with a liberation verdict, in spite of manipulation and forgery of evidence. The affair demonstrated how unbalanced the tsarist Jewish-policy was and proved the authorities unprepared for the methods of modern political struggle. …”
    Get full text
    Article
  12. 32

    Research on cloud dynamic public key information security based on elliptic curve and primitive Pythagoras by Zhenlong Man, Jianmeng Liu, Fan Zhang, Xiangfu Meng

    Published 2025-02-01
    “…The algorithm in this paper is applied to network transmission, which can effectively prevent data eavesdropping, tampering and forgery, ensure communication security.…”
    Get full text
    Article
  13. 33

    Physician Kitasato Shibasaburō: Achievements and posthumous veneration in Shintō by V. A. Gorshkov-Cantacuzene

    Published 2024-10-01
    “…Although the former had done so a few days earlier, as a result of misunderstanding and forgery, the honor of the discovery was given to A. …”
    Get full text
    Article
  14. 34

    The genesis of forensic research of documents as the branch of forensic technology by V. S. Sezonov

    Published 2020-06-01
    “…The history of the falsification of various documents for illegal purposes accompanies the entire history of human civilization, so the study of the evolution of methods of documenting information and related methods of forgery is one of the methods of improving forensic knowledge. …”
    Get full text
    Article
  15. 35

    Toward efficient authentication for space-air-ground integrated Internet of things by Baokang Zhao, Puguang Liu, Xiaofeng Wang, Ilsun You

    Published 2019-07-01
    “…While space-air-ground integrated Internet of things is promising to be very useful in many aspects, its deployment and application should overcome severe security threats, for example, interceptions, identity forgery, data tampering, and so on. Authentication is an essential step to protect the Internet of things security, and mutual authentication (i.e. two-way authentication) is especially important to ensure the security of both communication parties simultaneously. …”
    Get full text
    Article
  16. 36

    Problematic issues related to forensic examination of written language and handwriting in pre-trial investigation by O. O. Yukhno, H. V. Smirnov

    Published 2023-12-01
    “…The article investigates the peculiarities of forensic methods of examination of written language and handwriting objects to be taken into account by officials who, in particular, conduct pre-trial investigation of criminal offences committed with the use of ordinary or forged written documents, handwriting forgery, and other criminal methods of their use with a view to qualitative preparation and conduct of relevant handwriting and authenticity examinations. …”
    Get full text
    Article
  17. 37

    Application of expert opinion in investigation and proof of criminal offences against justice by V. V. Grytsenko

    Published 2024-12-01
    “…Another typical method used in the investigation of criminal offences against justice is the technical examination of a document, which is aimed at confirming/refuting the fact of its forgery. The author believes that further research on the issues raised should be aimed at identifying typical mistakes made by the inquiry and investigation authorities which affect the ability to solve expert tasks in this category of criminal offences.…”
    Get full text
    Article
  18. 38

    The Fake Diary of a Historical Figure: Klementyna Tańska-Hoffmanowa’s Journal of Countess Françoise Krasińska (1825) by Magdalena Ożarska

    Published 2016-03-01
    “…In my paper, I wish to discuss the Journal’s precarious balance between historical fact and fiction as well as examining the ways in which this autobiographical forgery is enacted. …”
    Get full text
    Article
  19. 39

    Rancang Bangun Website Akademik dengan Penyimpanan Sertifikat Digital Menggunakan Teknologi Blockchain by Windra Swastika, Hermawan Wirasantosa, Oesman Hendra Kelana

    Published 2022-02-01
    “…Certificates must be created and stored with good methods and security to prevent changes in content or even forgery. Blockchain technology is technology that allows secure storage processes at a low cost. …”
    Get full text
    Article
  20. 40

    Blockchain-Based Value-Added Tax System: A Systematic Review by Vahideh Ghanooni Shishavan, Shaban Elahi, Sadegh Dorri Nogoorani, Ali Yazdian Varjani

    Published 2024-06-01
    “…By identifying existing challenges in electronic invoices, such as transaction forgery, the long process of issuing electronic invoices, and hacking of the central database, blockchain technology, with its features like decentralization, tamper-proofness, transparency, and automation, emerges as a suitable solution. …”
    Get full text
    Article