Academic literature on the topic 'Online forgery'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Online forgery.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Online forgery"

1

Bhatia, Shalini, Pratik Bhatia, Dheeraj Nagpal, and Sandhya Nayak. "Online Signature Forgery Prevention." International Journal of Computer Applications 75, no. 13 (2013): 21–29. http://dx.doi.org/10.5120/13172-0849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaharwar, Gaurav, V. V. Nath, and Raina Gaharwar. "Neuro-Fuzzy Based First Responder for Image Forgery Identification." Oriental journal of computer science and technology 9, no. 1 (2016): 12–16. http://dx.doi.org/10.13005/ojcst/901.03.

Full text
Abstract:
Image forgery is always been sought after field of digital forensics, as it becomes very convenient now to edit/forge any image with many desktop based and online tools available. Also, to prove authenticity of any image in the court of law, there is a need of algorithm which can used to check forgery of any image, irrespective of its forgery type. Proposed model in the paper aims to provide neuro-fuzzy based algorithm which utilizes capabilities of best algorithms for each type and provides accurate result about the forgery in the image. It also provides analysis about type of forgery in the
APA, Harvard, Vancouver, ISO, and other styles
3

Sarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.

Full text
Abstract:
<em>Forgery is the criminal act that provides misleading information about a product or service. It is the process of making, adapting, or imitating documents or objects with the intent to deceive. Digital forgery (or digital tampering) is the process of manipulating documents or images for the intent of financial, social or political gain. This paper provides a brief introduction to the digital forgery.</em>
APA, Harvard, Vancouver, ISO, and other styles
4

Parashar, Amrita, Dr Arvind Kumar Upadhyay, and Dr Kamlesh Gupta. "A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image." ECS Transactions 107, no. 1 (2022): 11791–98. http://dx.doi.org/10.1149/10701.11791ecst.

Full text
Abstract:
Image manipulation can cause many ethical, economical, and political issues for everyone. It can be used to create fake information, fake ids, fake online profiles, fake news. A proper technique for image detection and verification is thus, a hot research area, which helps the affected people to overcome the forgery attacks. Due to the increased interaction among people through social networking sites, image forgery is prevalent and it is an essential activity to detect any forged image. This paper’s main objective is to identify fraud or tampered images effectively. By using the methods of co
APA, Harvard, Vancouver, ISO, and other styles
5

Houmani, Nesma, Sonia Garcia-Salicetti, and Bernadette Dorizzi. "On measuring forgery quality in online signatures." Pattern Recognition 45, no. 3 (2012): 1004–18. http://dx.doi.org/10.1016/j.patcog.2011.08.019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chetry, Bhimraj Prasai, and Biswajit Kar. "Kruskal Wallis and mRMR Feature Selection based Online Signature Verification System using Multiple SVM and KNN." International Journal of Experimental Research and Review 42 (August 30, 2024): 298–311. http://dx.doi.org/10.52756/ijerr.2024.v42.026.

Full text
Abstract:
Signature verification is a very important research area. Signature has been widely accepted as a person authentication method for centuries. It is mostly used in financial transactions, document authentication and agreements. It is more susceptible to being forged than any other biometrics. Online signature verification is used in real-time applications like e-commerce, online resource access, online financial transactions, physical access into a restricted area and many more. In order to achieve high efficiency in online signature verification systems, feature extraction and feature selectio
APA, Harvard, Vancouver, ISO, and other styles
7

C, Raghavendra, Ratnam Dodda, Madhu Sake, and Satyanarayana Nimmala. "Advancements in CNN-Based Techniques for Robust Image Forgery Detection: Challenges and Future Directions." E3S Web of Conferences 616 (2025): 02009. https://doi.org/10.1051/e3sconf/202561602009.

Full text
Abstract:
In response to the rise of manipulated images online, which are often obscured by compression and resizing, effective forgery detection systems have become essential. These systems address both social challenges on platforms like Facebook and legal issues stemming from image manipulation. A common form of image tampering, known as copy-move forgery, involves duplicating a part of an image and pasting it elsewhere within the same image. This study presents a novel approach utilizing block processing and feature extraction to tackle the detection challenges posed by such forgeries. By analyzing
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Guorong, Chongling Du, Yuan Yu, Hong Hu, Hongjun Duan, and Huazheng Zhu. "A Deepfake Image Detection Method Based on a Multi-Graph Attention Network." Electronics 14, no. 3 (2025): 482. https://doi.org/10.3390/electronics14030482.

Full text
Abstract:
Deep forgery detection plays a crucial role in addressing the challenges posed by the rapid spread of deeply generated content that significantly erodes public trust in online information and media. Deeply forged images typically present subtle but significant artifacts in multiple regions, such as in the background, lighting, and localized details. These artifacts manifest as unnatural visual distortions, inconsistent lighting, or irregularities in subtle features that break the natural coherence of the real image. To address these features of forged images, we propose a novel and efficient d
APA, Harvard, Vancouver, ISO, and other styles
9

E, Arun, Deepak S, Prakash T, and K. Ashok kumar. "Video Forgery Detection with Deep Learning Using RESNET and CNN Algorithm." International Research Journal of Computer Science 11, no. 04 (2024): 234–41. http://dx.doi.org/10.26562/irjcs.2024.v1104.17.

Full text
Abstract:
Video forgery is continuously increasing in the digital world due to breaches of information security, consequently establishing a scenario for image and video content monitoring for forgery identification. The spread of fake videos raises security risks and anarchy in society. The reason for video forgery is to the augmentation in the malware, which has facilitated user (anyone) to upload, download, or share objects online comprising audio, images, or video. With the development of technology and ease of creation of fake content, the manipulation of media is carried out on a large scale in re
APA, Harvard, Vancouver, ISO, and other styles
10

GUO, JINHONG KATHERINE, DAVID DOERMANN, and AZRIEL ROSENFELD. "FORGERY DETECTION BY LOCAL CORRESPONDENCE." International Journal of Pattern Recognition and Artificial Intelligence 15, no. 04 (2001): 579–641. http://dx.doi.org/10.1142/s0218001401001088.

Full text
Abstract:
Signatures may be stylish or unconventional and have many personal characteristics that are challenging to reproduce by anyone other than the original author. For this reason, signatures are used and accepted as proof of authorship or consent on personal checks, credit purchases and legal documents. Currently signatures are verified only informally in many environments, but the rapid development of computer technology has stimulated great interest in research on automated signature verification and forgery detection. In this paper, we focus on forgery detection of offline signatures. Although
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Online forgery"

1

Frank, Isabella. "“Less Is More, Forget The Mass” : An Explorative Study on Product Transformation Strategies for Subscription-first Newspapers." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240668.

Full text
Abstract:
The competitive market of the newspaper industry has undergone considerable changes driven by new technology, the internet and changing audience behavior. The industry is facing two current crises, the decline in print and advertising revenues, and at the same time, the growth of free online content. One of the major challenges for traditional newspapers is to find new ways to increase digital revenues to make-up for these losses. This study uses qualitative interviews and readership data collected from a large traditional publisher to explore how the newspaper can reshape the customer value p
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Online forgery"

1

Hunter, James a. Viridian Gate Online: Doom Forge. Shadow Alley Press Inc, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunter, James. Viridian Gate Online : Doom Forge: A litRPG Adventure. Independently published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pitts, Joelle E., Laura Bonella, Jason M. Coleman, and Adam Wathen, eds. Library Services for Online Patrons. ABC-CLIO, LLC, 2019. http://dx.doi.org/10.5040/9798400679278.

Full text
Abstract:
A practical blueprint for improving online services for library patrons who learn, study, and research online.|This practical and holistic approach to offering library resources and services to online patrons addresses multiple areas of service to online patrons, including reference, instruction, access, and marketing.|Academic libraries are wonderful resources for university students and faculty on campus, and public libraries thrive on providing targeted in-person services such as storytime, makerspaces, and adult programming. It can be easy, however, to forget about the large population of
APA, Harvard, Vancouver, ISO, and other styles
4

Strick van Linschoten, Alex, and Felix Kuehn, eds. The Taliban Reader. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190908744.001.0001.

Full text
Abstract:
Who are the Taliban? Are they a militant movement? Are they religious scholars? The fact that these and other questions are still raised with frequency is testimony to the way the movement has been studied, often at arm’s length and with scant use of primary sources. The Taliban Reader forges a new path, bringing together an extensive range of largely unseen sources in a guide to the Afghan Islamist movement from a unique insider perspective. Ideal for students, journalists and scholars alike, this book is the result of an unprecedented, decade-long effort to encourage the emergence of partici
APA, Harvard, Vancouver, ISO, and other styles
5

Jacobs, Brittany. Pimp Your Content - Forget Followers and Find Buyers: Your Guide to Strategically Getting Paid Online. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Online Shopping Tracker: -Christmas Shopping Organizer for Online Purchases-Keep Track of Every Gift Ordered-Never Forget a Needed Purchase for the Holiday Season-. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Journals, Glenda's. They May Forget What You Said but They Will Not Forget How You Made Them Feel: An Online Shopping Tracker for Teachers. Independently Published, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lee, M. T. Online Shopping Tracker Santas Beach: -Christmas Shopping Organizer for Online Purchases-Keep Track of Every Gift Ordered-Never Forget a Needed Purchase for the Holiday Season-. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mark, Thomas. Password Journal, Password Keeper, Online Organizer: Cheap Gift, Perfect If You Often Forget Login Data, Beaufitully Designed Cover. Independently Published, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Planners, Swear Word. Don't F@#king Forget Them: Discreet Internet Password Vault - Store Online Usernames, Passwords - Funny Coworker Gag Gift - Swear Word Design. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Online forgery"

1

Ma, Chunbo, Jun Ao, and Jianhua Li. "Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery." In Online Communities and Social Computing. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-73257-0_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hassaïne, Abdelâali, and Somaya Al-Maadeed. "An Online Signature Verification System for Forgery and Disguise Detection." In Neural Information Processing. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34478-7_67.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Shuyi, Bing Liu, and Guido Zuccon. "How to Forget Clients in Federated Online Learning to Rank?" In Lecture Notes in Computer Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-56063-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Henderson, Sarah, and Ben Trupia-Melluish. "Investigating Student Engagement with Digital Interactive Learning Tools at Level One: Actual and Perceived Value of These Resources." In Creativity and Critique in Digital Learning and Teaching. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-68086-1_5.

Full text
Abstract:
Abstract The often-cited Chinese teacher and philosopher, Confucius, noted ‘I hear and I forget, I see and I remember, I do and I understand’ (The Open University, 2019). In responding to an article by Hilliard and Stuart (Internet and Higher Education 41(1):11–24, 2019), Ramanau attached importance to personal interaction for hybrid learners and noted that a greater proportion of online activities leads to a more interactive learning experience (Ramanau in Designing Online Learning for Interactivity. The Scholarship Centre for innovation in online Legal and Business education (SCiLAB), 2020).
APA, Harvard, Vancouver, ISO, and other styles
5

Gaume, Nicolas. "The New Pact: How Online Worlds Forge a New Form of Alliance between Players and Designers." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04052-8_59.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gautam, Shikha, and Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties." In Cyber Warfare and Terrorism. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2466-4.ch044.

Full text
Abstract:
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two ste
APA, Harvard, Vancouver, ISO, and other styles
7

Gautam, Shikha, and Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties." In Digital Forensics and Forensic Investigations. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3025-2.ch008.

Full text
Abstract:
Digital images are found everywhere from cell phones to the pages of online news sites. With the rapid growth of the Internet and the popularity of digital image capturing devices, images have become major source of information. Now-a-days fudge of images has become easy due to powerful advanced photo-editing software and high-resolution cameras. In this article, the authors present a method for detecting forgery, which is detected by estimating camera's intrinsic noise properties. Differences in noise parameters of the image are used as evidence of Image tampering. The method works in two ste
APA, Harvard, Vancouver, ISO, and other styles
8

Nagar, Nitin, and Ugrasen Suman. "Prevention, Detection, and Recovery of CSRF Attack in Online Banking System." In Online Banking Security Measures and Data Protection. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0864-9.ch011.

Full text
Abstract:
Online banking system has created an enormous impact on IT, Individuals, and networking worlds. Online banking systems and its exclusive architecture have numerous features and advantages over traditional banking system. However, these new uniqueness create new vulnerabilities and attacks on an online banking system. Cross-site scripting request forgery or XSS attack is among the top vulnerabilities, according to recent studies. This exposure occurs, when a user uses the input from an online banking application without properly looking into them which allows an attacker to execute malicious sc
APA, Harvard, Vancouver, ISO, and other styles
9

Ramakrisnan, Prasanna, Mohd Farhan Shah Ahmad Rusli, and Mike Soon Tai Gan Hou. "Blockchain Framework for Sustainable and Secure Online Learning Platform." In Digital Transformation and Sustainability in Higher Education. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-5077-6.ch003.

Full text
Abstract:
Online learning platforms have reshaped higher education, with digital certificates becoming a key qualification method. However, these certificates are vulnerable to forgery and falsification. This chapter examines the use of blockchain frameworks to enhance the security and verification of digital certificates at Universiti Teknologi MARA (UiTM), Malaysia. Blockchain technology, with its secure and decentralized nature, utilizes a distributed ledger to prevent tampering and unauthorized changes. By employing cryptographic hashes and interconnected blocks, the framework ensures transparency a
APA, Harvard, Vancouver, ISO, and other styles
10

Gupta, Brij B., Somya Rajan Sahoo, Prashant Chugh, Vijay Iota, and Anupam Shukla. "Defending Multimedia Content Embedded in Online Social Networks (OSNs) Using Digital Watermarking." In Handbook of Research on Multimedia Cyber Security. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2701-6.ch005.

Full text
Abstract:
In global internet usage, increasing multimedia message, which includes video, audio, images, and text documents, on the web raised a lot of consequences related to copyright. For copyright protection, authentication purpose and forgery detection digital watermarking is the robust way in social network content protection. In this technique, the privacy information is embedded inside the multimedia content like image and video. The protected content embedded inside multimedia content is called watermark-enabled information. To make more effective the process of watermarking, the content encrypt
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Online forgery"

1

Chen, Jiaxin, Xin Liao, Zhenxing Qian, and Zheng Qin. "Multi-domain Probability Estimation Network for Forgery Detection over Online Social Network Shared Images." In 2024 IEEE International Conference on Multimedia and Expo (ICME). IEEE, 2024. http://dx.doi.org/10.1109/icme57554.2024.10687645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bennet, M. Anto, R. Kaushik Krishna, G. Sankar Babu, and B. S. Jayavignesh. "Performance analysis of forgery detection of JPEG image compression." In 2015 Online International Conference on Green Engineering and Technologies (IC-GET). IEEE, 2015. http://dx.doi.org/10.1109/get.2015.7453773.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Haiwei, Jiantao Zhou, Jinyu Tian, and Jun Liu. "Robust Image Forgery Detection over Online Social Network Shared Images." In 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2022. http://dx.doi.org/10.1109/cvpr52688.2022.01308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Muramatsu, Daigo. "Random forgery attacks against DTW-based online signature verification algorithm." In the 2011 ACM Symposium. ACM Press, 2011. http://dx.doi.org/10.1145/1982185.1982192.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sreelakshmy I J and Jesna Anver. "An improved method for copy-move forgery detection in digital forensic." In 2016 Online International Conference on Green Engineering and Technologies (IC-GET). IEEE, 2016. http://dx.doi.org/10.1109/get.2016.7916684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sung Wook Lee, Jae Ik Lee, and Dong-Guk Han. "A study of the threat of forgery of certificates issued online." In 2013 International Carnahan Conference on Security Technology (ICCST). IEEE, 2013. http://dx.doi.org/10.1109/ccst.2013.6922060.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Muramatsu, Daigo, and Yasushi Yagi. "Attacks using random forgery against DTW-based online signature verification algorithm." In 2012 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2012. http://dx.doi.org/10.1109/icsmc.2012.6377913.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Chang, Won-Du, and Jungpil Shin. "DPW Approach for Random Forgery Problem in Online Handwritten Signature Verification." In 2008 Fourth International Conference on Networked Computing and Advanced Information Management (NCM). IEEE, 2008. http://dx.doi.org/10.1109/ncm.2008.118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Utakrit, Nattakant, and Pornwilai Sukmak. "DISTANCE EDUCATION EXAMINATION ON FORGERY ATTRIBUTES OF ONLINE DEGREE FOR SALE: INFORMATION ASSURANCE ASPECT." In International Technology, Education and Development Conference. IATED, 2016. http://dx.doi.org/10.21125/iceri.2016.1961.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dapeng Zhang, Shinkichi Inagaki, Naoki Kanada, and Tatsuya Suzuki. "Online signature verification system with anti-forgery provision based on segmentation and structure learning of HMM." In 2010 IEEE International Conference on Systems, Man and Cybernetics - SMC. IEEE, 2010. http://dx.doi.org/10.1109/icsmc.2010.5641912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!