Academic literature on the topic 'Electronic forgery'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Electronic forgery.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Electronic forgery"
Sezonov, Viktor, Mykhailo Fialka, Eduard Poltavski, Nataliia Prokopenko, and Maryna Fomenko. "Forensic Examination of Electronic Documents." Law, State and Telecommunications Review 14, no. 2 (2022): 81–93. http://dx.doi.org/10.26512/lstr.v14i2.40965.
Full textDjamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 3 (2025): 65–70. https://doi.org/10.37547/tajpslc/volume07issue03-11.
Full textDjamshedovich, Sadullaev Jaxongir. "Analysis of objective and subjective elements of the crime of document forgery, selling, or using forged documents." American Journal of Political Science Law and Criminology 7, no. 4 (2025): 23–28. https://doi.org/10.37547/tajpslc/volume07issue04-05.
Full textChervinska, Lyubov Volodymyrivna. "On the Problem of Normative Definition of the Concept of «Official Document» in the Criminal Code of Ukraine." Alʹmanah prava, no. 15 (September 1, 2024): 654–59. https://doi.org/10.33663/2524-017x-2024-15-654-659.
Full textLin, Yih-Kai, and Ting-Yu Yen. "A Meta-Learning Approach for Few-Shot Face Forgery Segmentation and Classification." Sensors 23, no. 7 (2023): 3647. http://dx.doi.org/10.3390/s23073647.
Full textTrček, Denis. "Minimising the risk of electronic document forgery." Computer Standards & Interfaces 19, no. 2 (1998): 161–67. http://dx.doi.org/10.1016/s0920-5489(98)00010-5.
Full textSarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Full textZulki Zulkifli Noor. "Proof of the Legal Power of Electronic Certificates Against Criminal Acts of Forgery." Journal of Law, Politic and Humanities 4, no. 6 (2024): 2571–75. https://doi.org/10.38035/jlph.v4i6.846.
Full textXue, Ziyu, Xiuhua Jiang, Qingtong Liu, and Zhaoshan Wei. "Global–Local Facial Fusion Based GAN Generated Fake Face Detection." Sensors 23, no. 2 (2023): 616. http://dx.doi.org/10.3390/s23020616.
Full textKadam, Kalyani, Swati Ahirrao, and Ketan Kotecha. "AHP validated literature review of forgery type dependent passive image forgery detection with explainable AI." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 5 (2021): 4489. http://dx.doi.org/10.11591/ijece.v11i5.pp4489-4501.
Full textDissertations / Theses on the topic "Electronic forgery"
Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.
Full textLe, Riche Pierre (Pierre Jacques). "Handwritten signature verification : a hidden Markov model approach." Thesis, Stellenbosch : Stellenbosch University, 2000. http://hdl.handle.net/10019.1/51784.
Full textHamid, Lars-Eric, and Simon Möller. "How Secure is Verisure’s Alarm System?" Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-295618.
Full textBooks on the topic "Electronic forgery"
Mulford, Robert. Bank check compliance and liability protection. Thomson/Pratt, 2002.
Find full textMulford, Robert. Bank check compliance and liability protection: Administrator manual. Thomson/Pratt, 2003.
Find full textMulford, Robert. Bank check compliance and liability protection: Student manual. Thomson/Pratt, 2003.
Find full textWiggli, Oscar. Partition forgée: Sculptures et compositions musicales. Editions Iroise, 1995.
Find full textAutotestcon 2001 (37th 2001 Valley Forge, Pa.). 2001 IEEE Autotestcon proceedings: IEEE Systems Readiness Technology Conference : Revolutionary ideas in test : [August 20-23, 2001, Valley Forge Convention Center, Valley Forge, Pennsylvania]. IEEE, 2001.
Find full textInternational Association of Aquatic and Marine Science Libraries and Information Centers. Conference. Electronic information and publications: Looking to the electronic future, let's not forget the archival past : proceedings of the 24th Annual Conference of the International Association of Aquatic and Marine Science Libraries and Information Centers (IAMSLIC) and the 17th Polar Libraries Colloquy (PLC). Edited by Markham James W. 1939-, Duda Andrea L, Andrews Martha, and Polar Libraries Colloquy (17th : 1998 : Reykjavík, Iceland). IAMSLIC, 1999.
Find full textDeception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military. Storming Media, 2002.
Find full textMulford, Robert, and Barkley Clark. Bank Check Compliance Liability and Protection: Check Processing Staff Edition. A.S. Pratt/Sheshunoff, 2003.
Find full textBook chapters on the topic "Electronic forgery"
Sheng, YunZhong, HangJun Wang, and GuangQun Zhang. "Comparison and Analysis of Copy-Move Forgery Detection Algorithms for Electronic Image Processing." In Advances in Mechanical and Electronic Engineering. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-31528-2_54.
Full textSapra, Prince, and Vaishali Kikan. "Analysis of various copy-move forgery detection techniques." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-73.
Full textRehman, Kaleemur, and Saiful Islam. "A Keypoint-Based Technique for Detecting the Copy Move Forgery in Digital Images." In Micro-Electronics and Telecommunication Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-99-9562-2_66.
Full textMannepalli, Kasiprasad, Swetha Danthala, Panyam Narahari Sastry, Durgaprasad Mannepalli, and Bathula Murali Krishna. "Investigation of forgery in speech recordings using similarities of pitch chroma and spectral flux." In Recent Trends in Communication and Electronics. CRC Press, 2021. http://dx.doi.org/10.1201/9781003193838-92.
Full textHari Nagarubini, K., K. Suthendran, and E. Muthu Kumaran. "Beyond the pixel: examining forgery techniques and detection methods in digital forensics." In Advances in Electronics, Computer, Physical and Chemical Sciences. CRC Press, 2025. https://doi.org/10.1201/9781003616252-32.
Full textBoges, Daniya J., Marco Agus, Pierre Julius Magistretti, and Corrado Calì. "Forget About Electron Micrographs: A Novel Guide for Using for Quantitative Analysis of Dense Reconstructions." In Volume Microscopy. Springer US, 2020. http://dx.doi.org/10.1007/978-1-0716-0691-9_14.
Full textHemalatha, R., and R. Amutha. "Risk Detection and Assessment in Digital Signature." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-9317-5.ch018.
Full textMbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Cloud Technology. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6539-2.ch040.
Full textMbale, Jameson. "The University Library Electronic Identities Authentication System (UL-EIDA)." In Advances in Library and Information Science. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-4631-5.ch010.
Full textBoman Inga-Lill and Bartfai Aniko. "Support in Everyday Activities with a Home-based Electronic Memory Aid for Persons with Memory Impairments." In Assistive Technology Research Series. IOS Press, 2009. https://doi.org/10.3233/978-1-60750-042-1-369.
Full textConference papers on the topic "Electronic forgery"
GuorenYao, Gaoming Yang, Xintian Liu, and Lei Chen. "Two-Stream Manipulation Trace Network for Face Forgery Detection." In 2025 8th International Conference on Advanced Electronic Materials, Computers and Software Engineering (AEMCSE). IEEE, 2025. https://doi.org/10.1109/aemcse65292.2025.11042665.
Full textZhang, Chenghao. "Federated learning-based cross-domain face forgery detection for consumer IOT systems." In 4th International Conference on Electronic Information Engineering and Data Processing (EIEDP 2025), edited by Azlan Bin Mohd Zain and Lei Chen. SPIE, 2025. https://doi.org/10.1117/12.3067515.
Full textBiswas, Subir, Md Ariful Islam, Jayanti Rout, Minati Mishra, and Debendra Muduli. "Passive Image Forgery Detection Through Ensemble Learning with ELA." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827508.
Full textKashyap, Nandini, Prince Yadav, Nikita, and Ms Anukriti Kaushal. "Deep Learning Strategies for Effective Image Forgery Detection and Localization." In 2024 International Conference on Computer, Electronics, Electrical Engineering & their Applications (IC2E3). IEEE, 2024. https://doi.org/10.1109/ic2e362166.2024.10827254.
Full textLiu, Yutong. "A Method for Face Expression Forgery Detection Based on Reconstruction Error." In 2024 6th International Conference on Electronics and Communication, Network and Computer Technology (ECNCT). IEEE, 2024. http://dx.doi.org/10.1109/ecnct63103.2024.10704368.
Full textChen, Oscal Tzyh-Chiang, Wei-Jei Lin, and Cheng-Tai Tsai. "Consistent Learning of Multiple Paths Using Frequency-Aware Clues for Face Forgery Detection." In 2024 International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan). IEEE, 2024. http://dx.doi.org/10.1109/icce-taiwan62264.2024.10674230.
Full textParthiban, S., V. C. Bharathi, A. Anbumani, S. Ananthi, and R. Sathya. "Enhanced Forgery Detection of Fake Face in Forensic Investigation using Convolution Neural Network." In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2024. http://dx.doi.org/10.1109/icosec61587.2024.10722521.
Full textThorstensen, Eivind Bruun, Atle Helge Qvale, Vebjørn Andresen, Roy Johnsen, and Paal Bratland. "Effect of Heat Treatment and Manufacturing Method on the Susceptibility to Hydrogen Induced Stress Cracking of UNS N06625." In CONFERENCE 2024. AMPP, 2024. https://doi.org/10.5006/c2024-20899.
Full textJohnsen, Roy, Linn C. Gjelseng, Martin A. Heimsæther, Anders Jernberg, and Atle H. Qvale. "Influence of Manufacturing Process and Resulting Microstructure on HISC Susceptibility of 25Cr Duplex Stainless Steel Pipe." In CORROSION 2019. NACE International, 2019. https://doi.org/10.5006/c2019-13410.
Full textKhanna, Nitin, George T. C. Chiu, Jan P. Allebach, and Edward J. Delp. "Scanner identification with extension to forgery detection." In Electronic Imaging 2008, edited by Edward J. Delp III, Ping Wah Wong, Jana Dittmann, and Nasir D. Memon. SPIE, 2008. http://dx.doi.org/10.1117/12.772048.
Full textReports on the topic "Electronic forgery"
Salter and Weston. L51534 A Study of New Joining Processes for Pipelines. Pipeline Research Council International, Inc. (PRCI), 1987. http://dx.doi.org/10.55274/r0010083.
Full textHefetz, Abraham, and Justin O. Schmidt. Use of Bee-Borne Attractants for Pollination of Nonrewarding Flowers: Model System of Male-Sterile Tomato Flowers. United States Department of Agriculture, 2003. http://dx.doi.org/10.32747/2003.7586462.bard.
Full text