Academic literature on the topic 'Electronic forgery'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic forgery.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Electronic forgery"

1

Sezonov, Viktor, Mykhailo Fialka, Eduard Poltavski, Nataliia Prokopenko, and Maryna Fomenko. "Forensic Examination of Electronic Documents." Law, State and Telecommunications Review 14, no. 2 (2022): 81–93. http://dx.doi.org/10.26512/lstr.v14i2.40965.

Full text
Abstract:
[Purpose] The purpose of the study is to reveal the concept and essence of forensic prevention of crimes of forgery of electronic documents, to identify problems in the use of information to establish a system of countering crime and document management. [Methodology] The following approaches were used in the work: system-structural, dialectical, empirical. Forgery of electronic documents and their use is investigated not only within the framework of a single criminal case but also by a set of crimes committed depending on the mechanism that is the main one in the structure of criminal technol
APA, Harvard, Vancouver, ISO, and other styles
2

Djamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 3 (2025): 65–70. https://doi.org/10.37547/tajpslc/volume07issue03-11.

Full text
Abstract:
Document forgery represents one of the most pervasive and multifaceted crimes across jurisdictions, affecting areas such as contract law, property rights, financial transactions, and public trust in government-issued records. This study analyzes the objective (actus reus) and subjective (mens rea) elements of document forgery, selling of forged documents, and using forged documents, drawing on an extensive body of international legal scholarship, case law, and statutory frameworks. We discuss the conceptual foundations of forgery, the delineation between material and intellectual falsification
APA, Harvard, Vancouver, ISO, and other styles
3

Djamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 4 (2025): 23–28. https://doi.org/10.37547/tajpslc/volume07issue04-05.

Full text
Abstract:
Document forgery represents one of the most pervasive and multifaceted crimes across jurisdictions, affecting areas such as contract law, property rights, financial transactions, and public trust in government-issued records. This study analyzes the objective (actus reus) and subjective (mens rea) elements of document forgery, selling of forged documents, and using forged documents, drawing on an extensive body of international legal scholarship, case law, and statutory frameworks. We discuss the conceptual foundations of forgery, the delineation between material and intellectual falsification
APA, Harvard, Vancouver, ISO, and other styles
4

Chervinska, Lyubov Volodymyrivna. "On the Problem of Normative Definition of the Concept of «Official Document» in the Criminal Code of Ukraine." Alʹmanah prava, no. 15 (September 1, 2024): 654–59. https://doi.org/10.33663/2524-017x-2024-15-654-659.

Full text
Abstract:
der Articles 357 «Forgery of Documents, Seals, Stamps and Forms, Sale or Use of Forged Documents, Seals, Stamps», 358 «Forgery of Documents, Seals, Stamps and Forms, Sale or Use of Forged Documents, Seals, Stamps», 366 «Official Forgery» of the Criminal Code of Ukraine. The author analyzes the legal regulation of circulation of official documents of Ukraine and establishes the legislator’s approach to determining the content of a document, an official document, and its subtypes — paper and electronic official documents. The study of the regulatory consolidation and doctrinal development of the
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Yih-Kai, and Ting-Yu Yen. "A Meta-Learning Approach for Few-Shot Face Forgery Segmentation and Classification." Sensors 23, no. 7 (2023): 3647. http://dx.doi.org/10.3390/s23073647.

Full text
Abstract:
The technology for detecting forged images is good at detecting known forgery methods. It trains neural networks using many original and corresponding forged images created with known methods. However, when encountering unseen forgery methods, the technology performs poorly. Recently, one suggested approach to tackle this problem is to use a hand-crafted generator of forged images to create a range of fake images, which can then be used to train the neural network. However, the aforementioned method has limited detection performance when encountering unseen forging techniques that the hand-cra
APA, Harvard, Vancouver, ISO, and other styles
6

Trček, Denis. "Minimising the risk of electronic document forgery." Computer Standards & Interfaces 19, no. 2 (1998): 161–67. http://dx.doi.org/10.1016/s0920-5489(98)00010-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.

Full text
Abstract:
<em>Forgery is the criminal act that provides misleading information about a product or service. It is the process of making, adapting, or imitating documents or objects with the intent to deceive. Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of financial, social or political gain. This paper provides a brief introduction to the digital forgery.</em>
APA, Harvard, Vancouver, ISO, and other styles
8

Zulki Zulkifli Noor. "Proof of the Legal Power of Electronic Certificates Against Criminal Acts of Forgery." Journal of Law, Politic and Humanities 4, no. 6 (2024): 2571–75. https://doi.org/10.38035/jlph.v4i6.846.

Full text
Abstract:
his study aims to analyze the legal force of electronic certificates in relation to the crime of forgery. Electronic certificates as one of the digital legal instruments are recognized in Law Number 11 of 2008 concerning Electronic Information and Transactions (UU ITE), providing a strong legal basis for their recognition and validity in the evidence process. However, in its application, there are various challenges, especially related to data security and the risk of forgery. Through a normative legal approach, this study examines various laws and regulations as well as relevant case studies
APA, Harvard, Vancouver, ISO, and other styles
9

Xue, Ziyu, Xiuhua Jiang, Qingtong Liu, and Zhaoshan Wei. "Global–Local Facial Fusion Based GAN Generated Fake Face Detection." Sensors 23, no. 2 (2023): 616. http://dx.doi.org/10.3390/s23020616.

Full text
Abstract:
Media content forgery is widely spread over the Internet and has raised severe societal concerns. With the development of deep learning, new technologies such as generative adversarial networks (GANs) and media forgery technology have already been utilized for politicians and celebrity forgery, which has a terrible impact on society. Existing GAN-generated face detection approaches rely on detecting image artifacts and the generated traces. However, these methods are model-specific, and the performance is deteriorated when faced with more complicated methods. What’s more, it is challenging to
APA, Harvard, Vancouver, ISO, and other styles
10

Kadam, Kalyani, Swati Ahirrao, and Ketan Kotecha. "AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4489. http://dx.doi.org/10.11591/ijece.v11i5.pp4489-4501.

Full text
Abstract:
Nowadays, a lot of significance is given to what we read today: newspapers, magazines, news channels, and internet media, such as leading social networking sites like Facebook, Instagram, and Twitter. These are the primary wellsprings of phony news and are frequently utilized in malignant manners, for example, for horde incitement. In the recent decade, a tremendous increase in image information generation is happening due to the massive use of social networking services. Various image editing software like Skylum Luminar, Corel PaintShop Pro, Adobe Photoshop, and many others are used to creat
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Electronic forgery"

1

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Full text
Abstract:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
APA, Harvard, Vancouver, ISO, and other styles
2

Le, Riche Pierre (Pierre Jacques). "Handwritten signature verification : a hidden Markov model approach." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51784.

Full text
Abstract:
Thesis (MEng)--University of Stellenbosch, 2000.<br>ENGLISH ABSTRACT: Handwritten signature verification (HSV) is the process through which handwritten signatures are analysed in an attempt to determine whether the person who made the signature is who he claims to be. Banks and other financial institutions lose billions of rands annually to cheque fraud and other crimes that are preventable with the aid of good signature verification techniques. Unfortunately, the volume of cheques that are processed precludes a thorough HSV process done in the traditional manner by human operators. It
APA, Harvard, Vancouver, ISO, and other styles
3

Hamid, Lars-Eric, and Simon Möller. "How Secure is Verisure’s Alarm System?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295618.

Full text
Abstract:
Security is a very important part of today’s society.Verisure is the leader in home alarm systems with 30 years ofexperience. In this project, we aim to evaluate how secure theiralarm system is from a software perspective. The system wasbought in January 2020. After an initial threat modeling, followedby penetration testing it turns out that the alarm system is not assecure as Verisure markets. We could find several security flawsin the system. Some of them let an attacker block the system,and others yield full control without the user’s knowledge. Thereare also a couple of vulnerabilities tha
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Electronic forgery"

1

Mulford, Robert. Bank check compliance and liability protection. Thomson/Pratt, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mulford, Robert. Bank check compliance and liability protection: Administrator manual. Thomson/Pratt, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mulford, Robert. Bank check compliance and liability protection: Student manual. Thomson/Pratt, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Tanner, Marcus. Croatia: A nation forged in war. Yale University Press, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wiggli, Oscar. Partition forgée: Sculptures et compositions musicales. Editions Iroise, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Autotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

International Association of Aquatic and Marine Science Libraries and Information Centers. Conference. Electronic information and publications: Looking to the electronic future, let's not forget the archival past : proceedings of the 24th Annual Conference of the International Association of Aquatic and Marine Science Libraries and Information Centers (IAMSLIC) and the 17th Polar Libraries Colloquy (PLC). Edited by Markham James W. 1939-, Duda Andrea L, Andrews Martha, and Polar Libraries Colloquy (17th : 1998 : Reykjavík, Iceland). IAMSLIC, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military. Storming Media, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mulford, Robert, and Barkley Clark. Bank Check Compliance Liability and Protection: Check Processing Staff Edition. A.S. Pratt/Sheshunoff, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tanner, Marcus. Croatia: A Nation Forged in War. Yale University Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Electronic forgery"

1

Sheng, YunZhong, HangJun Wang, and GuangQun Zhang. "Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing." In Advances in Mechanical and Electronic Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31528-2_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sapra, Prince, and Vaishali Kikan. "Analysis of various copy-move forgery detection techniques." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Rehman, Kaleemur, and Saiful Islam. "A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images." In Micro-Electronics and Telecommunication Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9562-2_66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mannepalli, Kasiprasad, Swetha Danthala, Panyam Narahari Sastry, Durgaprasad Mannepalli, and Bathula Murali Krishna. "Investigation of forgery in speech recordings using similarities of pitch chroma and spectral flux." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-92.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hari Nagarubini, K., K. Suthendran, and E. Muthu Kumaran. "Beyond the pixel: examining forgery techniques and detection methods in digital forensics." In Advances in Electronics, Computer, Physical and Chemical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003616252-32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Boges, Daniya J., Marco Agus, Pierre Julius Magistretti, and Corrado Calì. "Forget About Electron Micrographs: A Novel Guide for Using for Quantitative Analysis of Dense Reconstructions." In Volume Microscopy. Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0691-9_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hemalatha, R., and R. Amutha. "Risk Detection and Assessment in Digital Signature." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-9317-5.ch018.

Full text
Abstract:
Nowadays people are living in a digital era in which all aspects of our lives depend on computers, networks, software applications and other electronic devices. Due to the technological development the security tasks and threat intelligence is a challenging task. Information theft is one of the most expensive segments of cybercrime. It is essential to protect information from cyber threats. In business, the digital signature plays an important role in authorizing the digital data. The receiver or some third party can verify this binding. In larger business, the signing process supports regulat
APA, Harvard, Vancouver, ISO, and other styles
8

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch040.

Full text
Abstract:
World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged a
APA, Harvard, Vancouver, ISO, and other styles
9

Mbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch010.

Full text
Abstract:
World-wide electronic university libraries, with wide accessibility, are considered to be essential units in both academic and nonacademic information utilization. Within this context, the developed world wasted no time improving and expanding their libraries by applying the technology leverage offered by cloud computing. As institutions from developed countries expanded the use of cloud technology for library applications, it became clear that this technology was highly vulnerable to security threats. Nevertheless, this did not retard advanced nations from proceeding. Undaunted, they forged a
APA, Harvard, Vancouver, ISO, and other styles
10

Boman Inga-Lill and Bartfai Aniko. "Support in Everyday Activities with a Home-based Electronic Memory Aid for Persons with Memory Impairments." In Assistive Technology Research Series. IOS Press, 2009. https://doi.org/10.3233/978-1-60750-042-1-369.

Full text
Abstract:
In previous studies we have found that a set of electronic memory aids in a training apartment in a hospital and in two prototype apartments could help persons with memory impairments after acquired brain injury to carry out everyday activities. In this study we have examined the possibilities of a newly developed electronic memory aid with a wireless design and individually spoken reminders as support to carry out everyday activities in the participant's own home. A multiple baseline AB design was used. Five participants with memory impairments after acquired brain injury got reminders for th
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Electronic forgery"

1

GuorenYao, Gaoming Yang, Xintian Liu, and Lei Chen. "Two-Stream Manipulation Trace Network for Face Forgery Detection." In 2025 8th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2025. https://doi.org/10.1109/aemcse65292.2025.11042665.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Chenghao. "Federated learning-based cross-domain face forgery detection for consumer IOT systems." In 4th International Conference on Electronic Information Engineering and Data Processing (EIEDP 2025), edited by Azlan Bin Mohd Zain and Lei Chen. SPIE, 2025. https://doi.org/10.1117/12.3067515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Biswas, Subir, Md Ariful Islam, Jayanti Rout, Minati Mishra, and Debendra Muduli. "Passive Image Forgery Detection Through Ensemble Learning with ELA." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kashyap, Nandini, Prince Yadav, Nikita, and Ms Anukriti Kaushal. "Deep Learning Strategies for Effective Image Forgery Detection and Localization." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yutong. "A Method for Face Expression Forgery Detection Based on Reconstruction Error." In 2024 6th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT). IEEE, 2024. http://dx.doi.org/10.1109/ecnct63103.2024.10704368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Oscal Tzyh-Chiang, Wei-Jei Lin, and Cheng-Tai Tsai. "Consistent Learning of Multiple Paths Using Frequency-Aware Clues for Face Forgery Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Parthiban, S., V. C. Bharathi, A. Anbumani, S. Ananthi, and R. Sathya. "Enhanced Forgery Detection of Fake Face in Forensic Investigation using Convolution Neural Network." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Thorstensen, Eivind Bruun, Atle Helge Qvale, Vebjørn Andresen, Roy Johnsen, and Paal Bratland. "Effect of Heat Treatment and Manufacturing Method on the Susceptibility to Hydrogen Induced Stress Cracking of UNS N06625." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20899.

Full text
Abstract:
Abstract This paper presents results obtained from examining the effect of heat treatment and production method on the hydrogen induced stress cracking (HISC) susceptibility of UNS N06625 (Alloy 625). Five different versions of Alloy 625 were examined: Hot forged material heat treated at 920 °C, 1010 °C and 1100 °C respectively, material produced by hot isostatic pressing (HIP) and material that has been solution annealed and strain hardened (cold worked) at a temperature below secondary phase formation. The different versions of Alloy 625 were initially characterized by identifying the critic
APA, Harvard, Vancouver, ISO, and other styles
9

Johnsen, Roy, Linn C. Gjelseng, Martin A. Heimsæther, Anders Jernberg, and Atle H. Qvale. "Influence of Manufacturing Process and Resulting Microstructure on HISC Susceptibility of 25Cr Duplex Stainless Steel Pipe." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13410.

Full text
Abstract:
Abstract In this paper, the hydrogen induced stress cracking (HISC) susceptibility of 25Cr duplex stainless-steel tubulars produced through hot extrusion with- and without subsequent cold drawing, forging and centrifugal casting have been examined. Two different test methods have been used; i) Stepwise (slow) Load Increase, and ii) Slow Strain Rate Testing. Samples pre-charged with hydrogen and samples without hydrogen were included in the test program. Pre-charged samples were also polarized cathodically during testing under stress. The microstructure was characterised, including measurements
APA, Harvard, Vancouver, ISO, and other styles
10

Khanna, Nitin, George T. C. Chiu, Jan P. Allebach, and Edward J. Delp. "Scanner identification with extension to forgery detection." In Electronic Imaging 2008, edited by Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon. SPIE, 2008. http://dx.doi.org/10.1117/12.772048.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Electronic forgery"

1

Salter and Weston. L51534 A Study of New Joining Processes for Pipelines. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0010083.

Full text
Abstract:
Over many decades it has been accepted that the most economical way to produce a pipeline is to join together the standard lengths of pipe as quickly as possible, using a highly mobile task force of welders and other technicians, leaving tie-ins, crossings, etc. to smaller specialist crews. The work pattern which evolved almost invariably involved several crews of welders strung out along the pipelines, progress being controlled by the rate at which the leading pair could complete the weld root. The spread from this first crew to final inspection could be a considerable distance, acceptable on
APA, Harvard, Vancouver, ISO, and other styles
2

Hefetz, Abraham, and Justin O. Schmidt. Use of Bee-Borne Attractants for Pollination of Nonrewarding Flowers: Model System of Male-Sterile Tomato Flowers. United States Department of Agriculture, 2003. http://dx.doi.org/10.32747/2003.7586462.bard.

Full text
Abstract:
The use of bee natural product for enhancing pollination is especially valuable in problematic crops that are generally avoided by bees. In the present research we attempted to enhance bee visitation to Male Sterile (M-S) tomato flowers generally used in the production of hybrid seeds. These flowers that lack both pollen and nectar are unattractive to bees that learn rapidly to avoid them. The specific objects were to elucidate the chemical composition of the exocrine products of two bumble bee species the North American Bombus impatiens and the Israeli B. terrestris. Of these, to isolate and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!