Academic literature on the topic 'Electronic forgery'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic forgery.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic forgery"

1

Sezonov, Viktor, Mykhailo Fialka, Eduard Poltavski, Nataliia Prokopenko, and Maryna Fomenko. "Forensic Examination of Electronic Documents." Law, State and Telecommunications Review 14, no. 2 (2022): 81–93. http://dx.doi.org/10.26512/lstr.v14i2.40965.

Full text
Abstract:
[Purpose] The purpose of the study is to reveal the concept and essence of forensic prevention of crimes of forgery of electronic documents, to identify problems in the use of information to establish a system of countering crime and document management. [Methodology] The following approaches were used in the work: system-structural, dialectical, empirical. Forgery of electronic documents and their use is investigated not only within the framework of a single criminal case but also by a set of crimes committed depending on the mechanism that is the main one in the structure of criminal technologies. [Findings] Lack of skills and knowledge about the latest forms of documents, methods of their forgery and use in the field of forensic investigations determine the reasons for the development of this condition. The analysis of investigative and judicial practice shows that cases of forgery of electronic documents are moved to separate proceedings due to the inability to fix the person who committed the crime. In some cases, court procedures are returned for additional investigation, since investigators cannot establish mechanisms for falsification tools and bring appropriate charges. [Practical Implications] The practical significance lies in the formation of proposals for improving or making changes to the legislation, effectively improving the activities of law enforcement agencies involved in countering or combating the forgery of documents.
APA, Harvard, Vancouver, ISO, and other styles
2

Djamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 3 (2025): 65–70. https://doi.org/10.37547/tajpslc/volume07issue03-11.

Full text
Abstract:
Document forgery represents one of the most pervasive and multifaceted crimes across jurisdictions, affecting areas such as contract law, property rights, financial transactions, and public trust in government-issued records. This study analyzes the objective (actus reus) and subjective (mens rea) elements of document forgery, selling of forged documents, and using forged documents, drawing on an extensive body of international legal scholarship, case law, and statutory frameworks. We discuss the conceptual foundations of forgery, the delineation between material and intellectual falsification, the significance of intent to deceive, and the punishments enforced. The article also explores emerging forms of forgery in electronic domains (e.g., digital signatures, manipulated images, and cyber-facilitated document falsification) and explains the forensic methodologies used to detect and prosecute these offenses. Ultimately, we highlight that while the objective elements require a demonstrable alteration or creation of a false document with legal significance, the subjective elements demand specific intent or knowledge of falsity aimed at deceiving a targeted party. The implications for legislative policy, prosecutorial practice, and emerging technologies in crime detection are discussed at length, drawing upon dozens of referenced scholarly works and statutory provisions.
APA, Harvard, Vancouver, ISO, and other styles
3

Djamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 4 (2025): 23–28. https://doi.org/10.37547/tajpslc/volume07issue04-05.

Full text
Abstract:
Document forgery represents one of the most pervasive and multifaceted crimes across jurisdictions, affecting areas such as contract law, property rights, financial transactions, and public trust in government-issued records. This study analyzes the objective (actus reus) and subjective (mens rea) elements of document forgery, selling of forged documents, and using forged documents, drawing on an extensive body of international legal scholarship, case law, and statutory frameworks. We discuss the conceptual foundations of forgery, the delineation between material and intellectual falsification, the significance of intent to deceive, and the punishments enforced. The article also explores emerging forms of forgery in electronic domains (e.g., digital signatures, manipulated images, and cyber-facilitated document falsification) and explains the forensic methodologies used to detect and prosecute these offenses. Ultimately, we highlight that while the objective elements require a demonstrable alteration or creation of a false document with legal significance, the subjective elements demand specific intent or knowledge of falsity aimed at deceiving a targeted party. The implications for legislative policy, prosecutorial practice, and emerging technologies in crime detection are discussed at length, drawing upon dozens of referenced scholarly works and statutory provisions.
APA, Harvard, Vancouver, ISO, and other styles
4

Chervinska, Lyubov Volodymyrivna. "On the Problem of Normative Definition of the Concept of «Official Document» in the Criminal Code of Ukraine." Alʹmanah prava, no. 15 (September 1, 2024): 654–59. https://doi.org/10.33663/2524-017x-2024-15-654-659.

Full text
Abstract:
der Articles 357 «Forgery of Documents, Seals, Stamps and Forms, Sale or Use of Forged Documents, Seals, Stamps», 358 «Forgery of Documents, Seals, Stamps and Forms, Sale or Use of Forged Documents, Seals, Stamps», 366 «Official Forgery» of the Criminal Code of Ukraine. The author analyzes the legal regulation of circulation of official documents of Ukraine and establishes the legislator’s approach to determining the content of a document, an official document, and its subtypes — paper and electronic official documents. The study of the regulatory consolidation and doctrinal development of the features of an official document demonstrates that there are differences in the regulatory consolidation of the features of an official document in various legal acts, including the Criminal Code of Ukraine. At the same time, the «set» of features of the concept of «official document» in the Criminal Code of Ukraine is the most complete compared to the features of this concept in other legal acts. It is proposed to distinguish two groups of features of an official document as the subject matter of criminal offenses under Articles 357, 358, 366 of the Criminal Code of Ukraine: officialdom and content. The official nature of the document implies, first of all, the existence of the subject of its issuance, which must be authorized to draw up and/ or issue or certify an official document in accordance with the procedure provided for by the legislation of Ukraine, as well as the existence of a legally prescribed form of the document (paper or electronic), which also includes mandatory details of the document specified by regulatory legal acts. The content of an official document implies that the document must contain information recorded on any material carriers that confirms or certifies certain events, phenomena or facts that have caused or may cause legal consequences or can be used as evidence documents in law enforcement activities. Key words: document, official document, forgery, forgery in office, criminal offense, subject matter of a criminal offense, criminal liability, official document, document content, legal consequences, electronic document.
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Yih-Kai, and Ting-Yu Yen. "A Meta-Learning Approach for Few-Shot Face Forgery Segmentation and Classification." Sensors 23, no. 7 (2023): 3647. http://dx.doi.org/10.3390/s23073647.

Full text
Abstract:
The technology for detecting forged images is good at detecting known forgery methods. It trains neural networks using many original and corresponding forged images created with known methods. However, when encountering unseen forgery methods, the technology performs poorly. Recently, one suggested approach to tackle this problem is to use a hand-crafted generator of forged images to create a range of fake images, which can then be used to train the neural network. However, the aforementioned method has limited detection performance when encountering unseen forging techniques that the hand-craft generator has not accounted for. To overcome the limitations of existing methods, in this paper, we adopt a meta-learning approach to develop a highly adaptive detector for identifying new forging techniques. The proposed method trains a forged image detector using meta-learning techniques, making it possible to fine-tune the detector with only a few new forged samples. The proposed method inputs a small number of the forged images to the detector and enables the detector to adjust its weights based on the statistical features of the input forged images, allowing the detection of forged images with similar characteristics. The proposed method achieves significant improvement in detecting forgery methods, with IoU improvements ranging from 35.4% to 127.2% and AUC improvements ranging from 2.0% to 48.9%, depending on the forgery method. These results show that the proposed method significantly improves detection performance with only a small number of samples and demonstrates better performance compared to current state-of-the-art methods in most scenarios.
APA, Harvard, Vancouver, ISO, and other styles
6

Trček, Denis. "Minimising the risk of electronic document forgery." Computer Standards & Interfaces 19, no. 2 (1998): 161–67. http://dx.doi.org/10.1016/s0920-5489(98)00010-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.

Full text
Abstract:
<em>Forgery is the criminal act that provides misleading information about a product or service. It is the process of making, adapting, or imitating documents or objects with the intent to deceive. Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of financial, social or political gain. This paper provides a brief introduction to the digital forgery.</em>
APA, Harvard, Vancouver, ISO, and other styles
8

Zulki Zulkifli Noor. "Proof of the Legal Power of Electronic Certificates Against Criminal Acts of Forgery." Journal of Law, Politic and Humanities 4, no. 6 (2024): 2571–75. https://doi.org/10.38035/jlph.v4i6.846.

Full text
Abstract:
his study aims to analyze the legal force of electronic certificates in relation to the crime of forgery. Electronic certificates as one of the digital legal instruments are recognized in Law Number 11 of 2008 concerning Electronic Information and Transactions (UU ITE), providing a strong legal basis for their recognition and validity in the evidence process. However, in its application, there are various challenges, especially related to data security and the risk of forgery. Through a normative legal approach, this study examines various laws and regulations as well as relevant case studies to evaluate how electronic certificates can be used as valid evidence in court. The results of the study show that although electronic certificates have legal force, there are still gaps in regulation and implementation that can be exploited by criminals to commit forgery. Therefore, increased regulation and supervision are needed to ensure the reliability of electronic certificates in the legal process.
APA, Harvard, Vancouver, ISO, and other styles
9

Xue, Ziyu, Xiuhua Jiang, Qingtong Liu, and Zhaoshan Wei. "Global–Local Facial Fusion Based GAN Generated Fake Face Detection." Sensors 23, no. 2 (2023): 616. http://dx.doi.org/10.3390/s23020616.

Full text
Abstract:
Media content forgery is widely spread over the Internet and has raised severe societal concerns. With the development of deep learning, new technologies such as generative adversarial networks (GANs) and media forgery technology have already been utilized for politicians and celebrity forgery, which has a terrible impact on society. Existing GAN-generated face detection approaches rely on detecting image artifacts and the generated traces. However, these methods are model-specific, and the performance is deteriorated when faced with more complicated methods. What’s more, it is challenging to identify forgery images with perturbations such as JPEG compression, gamma correction, and other disturbances. In this paper, we propose a global–local facial fusion network, namely GLFNet, to fully exploit the local physiological and global receptive features. Specifically, GLFNet consists of two branches, i.e., the local region detection branch and the global detection branch. The former branch detects the forged traces from the facial parts, such as the iris and pupils. The latter branch adopts a residual connection to distinguish real images from fake ones. GLFNet obtains forged traces through various ways by combining physiological characteristics with deep learning. The method is stable with physiological properties when learning the deep learning features. As a result, it is more robust than the single-class detection methods. Experimental results on two benchmarks have demonstrated superiority and generalization compared with other methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Kadam, Kalyani, Swati Ahirrao, and Ketan Kotecha. "AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4489. http://dx.doi.org/10.11591/ijece.v11i5.pp4489-4501.

Full text
Abstract:
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to create, modify the images and videos, are significant concerns. A lot of earlier work of forgery detection was focused on traditional methods to solve the forgery detection. Recently, Deep learning algorithms have accomplished high-performance accuracies in the image processing domain, such as image classification and face recognition. Experts have applied deep learning techniques to detect a forgery in the image too. However, there is a real need to explain why the image is categorized under forged to understand the algorithm’s validity; this explanation helps in mission-critical applications like forensic. Explainable AI (XAI) algorithms have been used to interpret a black box’s decision in various cases. This paper contributes a survey on image forgery detection with deep learning approaches. It also focuses on the survey of explainable AI for images.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic forgery"

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Full text
Abstract:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Scale Invariant Feature Transform (DSIFT) has been improved by using a different method to estimate the canonical orientation of each circular block. The Fitting Function Rotation Invariant Descriptor (FFRID) has been developed by using the least squares method to fit the parameters of a quadratic function on each block curvatures. In the segmentation approach, three different methods were tested: the SLIC superpixels, the Bag of Words Image and the Rolling Guidance filter with the multi-thresholding method. We also developed the Segment Gradient Orientation Histogram (SGOH) to describe the gradient of irregularly shaped blocks (segments). The experimental results illustrate that our proposed algorithms can detect forgery in images containing copy-move objects with different types of transformation (translation, rotation, scaling, distortion and combined transformation). Moreover, the proposed methods are robust to post-processing (i.e. blurring, brightness change, colour reduction, JPEG compression, variations in contrast and added noise) and can detect multiple duplicated objects. In addition, we developed a new method to estimate the similarity threshold for each image by optimizing a cost function based probability distribution. This method can detect CMF better than using a fixed threshold for all the test images, because our proposed method reduces the false positive and the time required to estimate one threshold for different images in the dataset. Finally, we used the hysteresis to decrease the number of false matches and produce the best possible result.
APA, Harvard, Vancouver, ISO, and other styles
2

Le, Riche Pierre (Pierre Jacques). "Handwritten signature verification : a hidden Markov model approach." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51784.

Full text
Abstract:
Thesis (MEng)--University of Stellenbosch, 2000.<br>ENGLISH ABSTRACT: Handwritten signature verification (HSV) is the process through which handwritten signatures are analysed in an attempt to determine whether the person who made the signature is who he claims to be. Banks and other financial institutions lose billions of rands annually to cheque fraud and other crimes that are preventable with the aid of good signature verification techniques. Unfortunately, the volume of cheques that are processed precludes a thorough HSV process done in the traditional manner by human operators. It is the aim of this research to investigate new methods to compare signatures automatically, to eventually speed up the HSV process and improve on the accuracy of existing systems. The new technology that is investigated is the use of the so-called hidden Markov models (HMMs). It is only quite recently that the computing power has become commonly available to make the real-time use of HMMs in pattern recognition a possibility. Two demonstration programs, SigGrab and Securitlheque, have been developed that make use of this technology, and show excellent improvements over other techniques and competing products. HSV accuracies in excess of99% can be attained.<br>AFRIKAANSE OPSOMMING: Handgeskrewe handtekening verifikasie (HHV) is die proses waardeur handgeskrewe handtekeninge ondersoek word in 'n poging om te bevestig of die persoon wat die handtekening gemaak het werklik is wie hy voorgee om te wees. Banke en ander finansiele instansies verloor jaarliks biljoene rande aan tjekbedrog en ander misdrywe wat voorkom sou kon word indien goeie metodes van handtekening verifikasie daargestel kon word. Ongelukkig is die volume van tjeks wat hanteer word so groot, dat tradisionele HHV deur menslike operateurs 'n onbegonne taak is. Dit is die doel van hierdie navorsmg om nuwe metodes te ondersoek om handtekeninge outomaties te kan vergelyk en so die HHV proses te bespoedig en ook te verbeter op die akkuraatheid van bestaande stelsels. Die nuwe tegnologie wat ondersoek is is die gebruik van die sogenaamde verskuilde Markov modelle (VMMs). Dit is eers redelik onlangs dat die rekenaar verwerkingskrag algemeen beskikbaar geraak het om die intydse gebruik van VMMs in patroonherkenning prakties moontlik te maak. Twee demonstrasieprogramme, SigGrab en SecuriCheque, is ontwikkel wat gebruik maak van hierdie tegnologie en toon uitstekende verbeterings teenoor ander tegnieke en kompeterende produkte. 'n Akkuraatheid van 99% of hoer word tipies verkry.
APA, Harvard, Vancouver, ISO, and other styles
3

Hamid, Lars-Eric, and Simon Möller. "How Secure is Verisure’s Alarm System?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295618.

Full text
Abstract:
Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. After an initial threat modeling, followedby penetration testing it turns out that the alarm system is not assecure as Verisure markets. We could find several security flawsin the system. Some of them let an attacker block the system,and others yield full control without the user’s knowledge. Thereare also a couple of vulnerabilities that could be exploited bypeople without any special knowledge regarding hacking or thesystem in general.<br>Säkerhet är en mycket viktig del i dagens samhälle. Verisure är ledande inom hemmalarmsystem med 30 års erfarenhet. I det här projektet utvärderar vi hur säkert deras larmsystem är från ett mjukvaruperspektiv. Systemet köptes i januari 2020. Efter en inledande hotmodellering och följande penetrationstester visar det sig att larmsystemet inte är lika säkert som Verisure marknadsför. Vi kunde under projektets gång hitta flera säkerhetsbrister i systemet. Några av dessa gör att en angripare kan blockera systemet och andra ger full kontroll utan användarnas vetskap. Det finns också ett par sårbarheter som kan utnyttjas av människor utan någon speciell kunskap om hacking eller systemet i allmänhet.<br>Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic forgery"

1

Mulford, Robert. Bank check compliance and liability protection. Thomson/Pratt, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mulford, Robert. Bank check compliance and liability protection: Administrator manual. Thomson/Pratt, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mulford, Robert. Bank check compliance and liability protection: Student manual. Thomson/Pratt, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tanner, Marcus. Croatia: A nation forged in war. Yale University Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wiggli, Oscar. Partition forgée: Sculptures et compositions musicales. Editions Iroise, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Association of Aquatic and Marine Science Libraries and Information Centers. Conference. Electronic information and publications: Looking to the electronic future, let's not forget the archival past : proceedings of the 24th Annual Conference of the International Association of Aquatic and Marine Science Libraries and Information Centers (IAMSLIC) and the 17th Polar Libraries Colloquy (PLC). Edited by Markham James W. 1939-, Duda Andrea L, Andrews Martha, and Polar Libraries Colloquy (17th : 1998 : Reykjavík, Iceland). IAMSLIC, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mulford, Robert, and Barkley Clark. Bank Check Compliance Liability and Protection: Check Processing Staff Edition. A.S. Pratt/Sheshunoff, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tanner, Marcus. Croatia: A Nation Forged in War. Yale University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic forgery"

1

Sheng, YunZhong, HangJun Wang, and GuangQun Zhang. "Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing." In Advances in Mechanical and Electronic Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31528-2_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sapra, Prince, and Vaishali Kikan. "Analysis of various copy-move forgery detection techniques." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rehman, Kaleemur, and Saiful Islam. "A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images." In Micro-Electronics and Telecommunication Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9562-2_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mannepalli, Kasiprasad, Swetha Danthala, Panyam Narahari Sastry, Durgaprasad Mannepalli, and Bathula Murali Krishna. "Investigation of forgery in speech recordings using similarities of pitch chroma and spectral flux." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hari Nagarubini, K., K. Suthendran, and E. Muthu Kumaran. "Beyond the pixel: examining forgery techniques and detection methods in digital forensics." In Advances in Electronics, Computer, Physical and Chemical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003616252-32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boges, Daniya J., Marco Agus, Pierre Julius Magistretti, and Corrado Calì. "Forget About Electron Micrographs: A Novel Guide for Using for Quantitative Analysis of Dense Reconstructions." In Volume Microscopy. Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0691-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hemalatha, R., and R. Amutha. "Risk Detection and Assessment in Digital Signature." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-9317-5.ch018.

Full text
Abstract:
Nowadays people are living in a digital era in which all aspects of our lives depend on computers, networks, software applications and other electronic devices. Due to the technological development the security tasks and threat intelligence is a challenging task. Information theft is one of the most expensive segments of cybercrime. It is essential to protect information from cyber threats. In business, the digital signature plays an important role in authorizing the digital data. The receiver or some third party can verify this binding. In larger business, the signing process supports regulating the business. It uses asymmetric cryptography, which provides a layer of validation and security to the message communication through a non-secure channel. There are some risks in digital signature like forgery, fraud, and exclusions. This chapter discusses how to identify the risks and methods practices to mitigate the risks in adopting digital signature. Reasonable risk analysis can enhance the chance of successful electronic business.
APA, Harvard, Vancouver, ISO, and other styles
8

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch040.

Full text
Abstract:
World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged ahead and now are busy building appropriate cloud computing security infrastructures. Despite progress in this area, very little has been done to expand the university libraries in the sub-Saharan region using cloud computing technologies. Even less has been done in these developing countries to plan and develop the building of library computing security infrastructures. It was in view of this deficit that the University of Namibia's (UNAM) University Library electronic Identities Authentication (UL-eIDA) system was conceived to build a cloud computing security framework model suitable for the sub-Saharan region.
APA, Harvard, Vancouver, ISO, and other styles
9

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch010.

Full text
Abstract:
World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged ahead and now are busy building appropriate cloud computing security infrastructures. Despite progress in this area, very little has been done to expand the university libraries in the sub-Saharan region using cloud computing technologies. Even less has been done in these developing countries to plan and develop the building of library computing security infrastructures. It was in view of this deficit that the University of Namibia’s (UNAM) University Library electronic Identities Authentication (UL-eIDA) system was conceived to build a cloud computing security framework model suitable for the sub-Saharan region.
APA, Harvard, Vancouver, ISO, and other styles
10

Boman Inga-Lill and Bartfai Aniko. "Support in Everyday Activities with a Home-based Electronic Memory Aid for Persons with Memory Impairments." In Assistive Technology Research Series. IOS Press, 2009. https://doi.org/10.3233/978-1-60750-042-1-369.

Full text
Abstract:
In previous studies we have found that a set of electronic memory aids in a training apartment in a hospital and in two prototype apartments could help persons with memory impairments after acquired brain injury to carry out everyday activities. In this study we have examined the possibilities of a newly developed electronic memory aid with a wireless design and individually spoken reminders as support to carry out everyday activities in the participant's own home. A multiple baseline AB design was used. Five participants with memory impairments after acquired brain injury got reminders for three activities each that they usually forget to carry out during B phase. There were automatic computer registrations of completed activities during the A and the B phase. Assessments of functioning and quality of life were conducted before and after the intervention and at follow-up after 2 months. Four participants improved in completing most of the self-chosen activities when the electronic memory aid was used. Performance and satisfaction with performance and quality of life improved, but there was no memory function improvement. The participants wanted to keep the electronic memory aids after the intervention, even if there were problems with the technology during the intervention. The current flexible wireless design with individually adjusted sensors and reminders proved to be useful. The results indicate that it is important to put high demands on the technical reliability of electronic memory aids. The reliability of the electronic memory aid should first be tested by people without disabilities in multiple home environments, taking into account the complexity of real-world behaviour that is often missing in laboratory environments. There is also a need to increase collaboration with engineers to develop appropriate electronic memory aids that can bridge the gap between the user's expectations and desires and the user's abilities and disabilities.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic forgery"

1

GuorenYao, Gaoming Yang, Xintian Liu, and Lei Chen. "Two-Stream Manipulation Trace Network for Face Forgery Detection." In 2025 8th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2025. https://doi.org/10.1109/aemcse65292.2025.11042665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Chenghao. "Federated learning-based cross-domain face forgery detection for consumer IOT systems." In 4th International Conference on Electronic Information Engineering and Data Processing (EIEDP 2025), edited by Azlan Bin Mohd Zain and Lei Chen. SPIE, 2025. https://doi.org/10.1117/12.3067515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Biswas, Subir, Md Ariful Islam, Jayanti Rout, Minati Mishra, and Debendra Muduli. "Passive Image Forgery Detection Through Ensemble Learning with ELA." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Nandini, Prince Yadav, Nikita, and Ms Anukriti Kaushal. "Deep Learning Strategies for Effective Image Forgery Detection and Localization." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yutong. "A Method for Face Expression Forgery Detection Based on Reconstruction Error." In 2024 6th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT). IEEE, 2024. http://dx.doi.org/10.1109/ecnct63103.2024.10704368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Oscal Tzyh-Chiang, Wei-Jei Lin, and Cheng-Tai Tsai. "Consistent Learning of Multiple Paths Using Frequency-Aware Clues for Face Forgery Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Parthiban, S., V. C. Bharathi, A. Anbumani, S. Ananthi, and R. Sathya. "Enhanced Forgery Detection of Fake Face in Forensic Investigation using Convolution Neural Network." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thorstensen, Eivind Bruun, Atle Helge Qvale, Vebjørn Andresen, Roy Johnsen, and Paal Bratland. "Effect of Heat Treatment and Manufacturing Method on the Susceptibility to Hydrogen Induced Stress Cracking of UNS N06625." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20899.

Full text
Abstract:
Abstract This paper presents results obtained from examining the effect of heat treatment and production method on the hydrogen induced stress cracking (HISC) susceptibility of UNS N06625 (Alloy 625). Five different versions of Alloy 625 were examined: Hot forged material heat treated at 920 °C, 1010 °C and 1100 °C respectively, material produced by hot isostatic pressing (HIP) and material that has been solution annealed and strain hardened (cold worked) at a temperature below secondary phase formation. The different versions of Alloy 625 were initially characterized by identifying the critical pitting temperature (CPT) by use of a modified ASTM G48 Method C test. Resistance to Hydrogen Embrittlement (HE) has been examined by use of stepwise loading of tensile specimens in a hydrogen charging environment in Cortest™ proof rings, followed by fractography characterization and microstructural examination by use of Optical Light Microscope (OLM) and Scanning Electron Microscope (SEM). The hot forged and the HIP’ed versions of Alloy 625 that subsequently were heat treated, were found to be susceptible to HISC. The evaluation was based on a decrease in strength and ductility, as well as brittle fracture surfaces and secondary cracking on the samples’ outer surface. Among the hot forged and heat-treated versions, the samples heat treated at 1010°C were found to be the most susceptible to HISC, while (solution) heat treatment at 1100°C resulted in the lowest HISC susceptibility amongst the hot forged and heat-treated qualities. The solution annealed (1150 °C) and cold worked version showed a higher resistance to HISC, as no reduction in fracture strength, nor any secondary cracking were observed. The amount of grain boundary precipitations was found to be the main factor influencing the HISC susceptibility, where an increased amount of grain boundary precipitations led to higher susceptibility. The effect of grain size on the HISC susceptibility of samples charged with hydrogen were also considered, and the results indicate that larger grains have a beneficial effect on the ductility.
APA, Harvard, Vancouver, ISO, and other styles
9

Johnsen, Roy, Linn C. Gjelseng, Martin A. Heimsæther, Anders Jernberg, and Atle H. Qvale. "Influence of Manufacturing Process and Resulting Microstructure on HISC Susceptibility of 25Cr Duplex Stainless Steel Pipe." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13410.

Full text
Abstract:
Abstract In this paper, the hydrogen induced stress cracking (HISC) susceptibility of 25Cr duplex stainless-steel tubulars produced through hot extrusion with- and without subsequent cold drawing, forging and centrifugal casting have been examined. Two different test methods have been used; i) Stepwise (slow) Load Increase, and ii) Slow Strain Rate Testing. Samples pre-charged with hydrogen and samples without hydrogen were included in the test program. Pre-charged samples were also polarized cathodically during testing under stress. The microstructure was characterised, including measurements of austenite spacing. After testing, the samples were examined in an optical microscope for secondary cracks. In addition, the fracture surfaces were examined in a scanning electron microscope for characterization of fracture morphology. Reduction in area was calculated for all samples. Finally, hydrogen content was measured with a melt extraction technique. The outcome from a similar test with HIP and forged material were compared with the results from this test. The ranking of production methods regarding resistance against HISC from this test was as follows: Hot extruded pipes &amp;gt; hot extruded pipes with subsequent cold drawing &amp;gt; forged pipes &amp;gt; centrifugal cast pipes. The two test methods – Stepwise Load Increase and Slow Strain Rate Testing – gave consistent test results.
APA, Harvard, Vancouver, ISO, and other styles
10

Khanna, Nitin, George T. C. Chiu, Jan P. Allebach, and Edward J. Delp. "Scanner identification with extension to forgery detection." In Electronic Imaging 2008, edited by Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon. SPIE, 2008. http://dx.doi.org/10.1117/12.772048.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic forgery"

1

Salter and Weston. L51534 A Study of New Joining Processes for Pipelines. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0010083.

Full text
Abstract:
Over many decades it has been accepted that the most economical way to produce a pipeline is to join together the standard lengths of pipe as quickly as possible, using a highly mobile task force of welders and other technicians, leaving tie-ins, crossings, etc. to smaller specialist crews. The work pattern which evolved almost invariably involved several crews of welders strung out along the pipelines, progress being controlled by the rate at which the leading pair could complete the weld root. The spread from this first crew to final inspection could be a considerable distance, acceptable on land but not acceptable offshore (a rapidly increasing need which reached a peak in the 1970's). This operation, involving costly lay barges, demanded even higher throughput rates to be achieved from a more compact working spread. In common with most manufacturing technologies, there was an increasing dissatisfaction with a system which relied entirely on the skill of a limited number of highly paid men who had little incentive to change their working practices. Increasingly there came reports of the development of new approaches to joining line-pipe, ranging from the mechanization of arc welding to entirely different forms of joining, for example, electron beam welding or mechanical joining. The investment in some of these developments is reported to be several million dollars. The review of present pipelining practice shows that only a handful has been put to practical use, and in the western world, probably only one, an arc welding variant, has been used to produce more than a few hundred miles of pipeline. The information available on these developments is sparse and is scattered amongst a range of companies and research agencies. A literature review and research study to collect together as much of this information as is available, assemble it into a coherent and useable form and identify those developments which show the most promise to fulfill future needs. The main body of the report, which reviews development of the welding processes has been divided into three main joining categories, Fusion Welding, Forge Welding and Mechanical Interference Joining. Within each category each process is considered separately in terms of process principles, general applications, application to pipeline welding, equipment for pipe welding, consumables, process tolerance and skill requirements, weld quality and inspection, process economics, limitations and future developments. This study and comprehensive report compares the economics of the various alternatives. For each process an estimate has been made of the procedural and development costs involved as well as personnel needs and likely production rates.
APA, Harvard, Vancouver, ISO, and other styles
2

Hefetz, Abraham, and Justin O. Schmidt. Use of Bee-Borne Attractants for Pollination of Nonrewarding Flowers: Model System of Male-Sterile Tomato Flowers. United States Department of Agriculture, 2003. http://dx.doi.org/10.32747/2003.7586462.bard.

Full text
Abstract:
The use of bee natural product for enhancing pollination is especially valuable in problematic crops that are generally avoided by bees. In the present research we attempted to enhance bee visitation to Male Sterile (M-S) tomato flowers generally used in the production of hybrid seeds. These flowers that lack both pollen and nectar are unattractive to bees that learn rapidly to avoid them. The specific objects were to elucidate the chemical composition of the exocrine products of two bumble bee species the North American Bombus impatiens and the Israeli B. terrestris. Of these, to isolate and identify a bee attractant which when sprayed on M-S tomato flowers will enhance bee visitation, and to provide a procedure of the pheromone application regime. During the research we realized that our knowledge of B. impatiens is too little and we narrowed the objective to learning the basic social behavior of the bees and the pattern of foraging in a flight chamber and how it is affected by biogenic amines. Colonies of B. impatiens are characterized by a high number of workers and a relatively small number of queens. Size differences between queens and workers are pronounced and the queen seems to have full control over egg laying. Only about 9% of the workers in mature colonies had mature oocytes, and there were no signs of a "competition phase" as we know in B. terrestris. Queens and workers differ in their exocrine bouquet. Queen's Dufour's gland possesses a series of linear, saturated and unsaturated hydrocarbons whereas that of workers contains in addition a series of wax-type esters. Bees were trained to either visit or avoid artificially scented electronic flowers in a flight chamber. Since bee also learned to avoid scented non-rewarding flowers we attempted to interfere with this learning. We tested the effect of octopamine, a biogenic amine affecting bee behavior, on the choice behavior of free-flying bumblebees. Our results show that octopamine had no significant effect on the bees' equilibrium choice or on the overall rate of the behavioral change in response to the change in reward. Rather, octopamine significantly affected the time interval between the change in reward status and the initiation of behavioral change in the bee. In B. terrestris we studied the foraging pattern of the bees on tomato flowers in a semi commercial greenhouse in Yad Mordechai. Bee learned very quickly to avoid the non- rewarding M-S flowers, irrespective of their arrangement in the plot, i.e., their mixing with normal, pollen bearing flowers. However, bees seem to "forget" this information during the night since the foraging pattern repeats itself the next morning. Several exocrine products were tested as visitation enhancers. Among these, tarsal gland extracts are the most attractive. The compounds identified in the tarsal gland extract are mostly linear saturated hydrocarbons with small amounts of unsaturated ones. Application was performed every second day on leaves in selected inflorescences. Bee visitation increased significantly in the treated inflorescences as compared to the control, solvent treated. Treatment of the anthers cone was more effective than on the flower petals or the surrounding leaves. Methanol proved to be a non-flower-destructive solvent. We have shown that bumble bees (B. terrestris) can be manipulated by bee-borne attractants to visit non-rewarding flowers. We have further demonstrated that the bees learning ability can be manipulated by applying exogenously octopamine. Both methods can be additively applied in enhancing pollination of desired crops. Such manipulation will be especially useful in tomato cultivation for hybrid seed production.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!