Journal articles on the topic 'Online forgery'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Online forgery.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Bhatia, Shalini, Pratik Bhatia, Dheeraj Nagpal, and Sandhya Nayak. "Online Signature Forgery Prevention." International Journal of Computer Applications 75, no. 13 (2013): 21–29. http://dx.doi.org/10.5120/13172-0849.
Full textGaharwar, Gaurav, V. V. Nath, and Raina Gaharwar. "Neuro-Fuzzy Based First Responder for Image Forgery Identification." Oriental journal of computer science and technology 9, no. 1 (2016): 12–16. http://dx.doi.org/10.13005/ojcst/901.03.
Full textSarhan, M. Musa1. "DIGITAL FORGERY." International Journal of Advances In Scientific Research and Engineering (IJASRE) 3, no. 4 (2017): 26–29. https://doi.org/10.5281/zenodo.581732.
Full textParashar, Amrita, Dr Arvind Kumar Upadhyay, and Dr Kamlesh Gupta. "A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image." ECS Transactions 107, no. 1 (2022): 11791–98. http://dx.doi.org/10.1149/10701.11791ecst.
Full textHoumani, Nesma, Sonia Garcia-Salicetti, and Bernadette Dorizzi. "On measuring forgery quality in online signatures." Pattern Recognition 45, no. 3 (2012): 1004–18. http://dx.doi.org/10.1016/j.patcog.2011.08.019.
Full textChetry, Bhimraj Prasai, and Biswajit Kar. "Kruskal Wallis and mRMR Feature Selection based Online Signature Verification System using Multiple SVM and KNN." International Journal of Experimental Research and Review 42 (August 30, 2024): 298–311. http://dx.doi.org/10.52756/ijerr.2024.v42.026.
Full textC, Raghavendra, Ratnam Dodda, Madhu Sake, and Satyanarayana Nimmala. "Advancements in CNN-Based Techniques for Robust Image Forgery Detection: Challenges and Future Directions." E3S Web of Conferences 616 (2025): 02009. https://doi.org/10.1051/e3sconf/202561602009.
Full textChen, Guorong, Chongling Du, Yuan Yu, Hong Hu, Hongjun Duan, and Huazheng Zhu. "A Deepfake Image Detection Method Based on a Multi-Graph Attention Network." Electronics 14, no. 3 (2025): 482. https://doi.org/10.3390/electronics14030482.
Full textE, Arun, Deepak S, Prakash T, and K. Ashok kumar. "Video Forgery Detection with Deep Learning Using RESNET and CNN Algorithm." International Research Journal of Computer Science 11, no. 04 (2024): 234–41. http://dx.doi.org/10.26562/irjcs.2024.v1104.17.
Full textGUO, JINHONG KATHERINE, DAVID DOERMANN, and AZRIEL ROSENFELD. "FORGERY DETECTION BY LOCAL CORRESPONDENCE." International Journal of Pattern Recognition and Artificial Intelligence 15, no. 04 (2001): 579–641. http://dx.doi.org/10.1142/s0218001401001088.
Full textShaik, Bushra, Jyothi Manohar Katikireddy, Vamsidhar Kambham, and K. Sravani. "Offline Signature Verification Using Image Processing." E3S Web of Conferences 391 (2023): 01074. http://dx.doi.org/10.1051/e3sconf/202339101074.
Full textS, Gayathri K., and Deepthi P. S. "An Overview of Copy Move Forgery Detection Approaches." Computer Science & Engineering: An International Journal 12, no. 6 (2022): 81–94. http://dx.doi.org/10.5121/cseij.2022.12609.
Full textXia, Xinghua, and Shuang Wang. "Research on online signature verification based on anomaly detection." Journal of Physics: Conference Series 2031, no. 1 (2021): 012042. http://dx.doi.org/10.1088/1742-6596/2031/1/012042.
Full textWu, Haiwei, Jiantao Zhou, Jinyu Tian, Jun Liu, and Yu Qiao. "Robust Image Forgery Detection Against Transmission Over Online Social Networks." IEEE Transactions on Information Forensics and Security 17 (2022): 443–56. http://dx.doi.org/10.1109/tifs.2022.3144878.
Full textBakhteev, D. V. "Features of Signature Verification By a Person as a Primary Criteria for Developing an Artificial Intelligence System." Siberian Law Review 17, no. 4 (2020): 514–22. http://dx.doi.org/10.19073/2658-7602-2020-17-4-514-522.
Full textBakhteev, D. V. "Features of Signature Verification By a Person as a Primary Criteria for Developing an Artificial Intelligence System." Siberian Law Review 17, no. 4 (2020): 514–22. http://dx.doi.org/10.19073/2658-7602-2020-17-4-514-522.
Full textNidhi, Gajimwar Ashmi Dahiwale Isha Walde Shyamal Dhabarde Prof. Monika Walde. "Automated Image Forgery Detection With Python." International Journal of Advanced Innovative Technology in Engineering 9, no. 3 (2024): 133–38. https://doi.org/10.5281/zenodo.12516039.
Full textManoj Chavan. "Handwritten online signature verification and Forgery Detection for Online Handwritten Signature using Hybrid Wavelet Transform-1 with HMM classifier." Journal of Electrical Systems 20, no. 4s (2024): 2471–78. http://dx.doi.org/10.52783/jes.2800.
Full textSohaib, Muhammad, and Samabia Tehseen. "Forgery detection of low quality deepfake videos." Neural Network World 33, no. 2 (2023): 85–99. http://dx.doi.org/10.14311/nnw.2023.33.006.
Full textCHA, SUNG-HYUK, CHARLES C. TAPPERT, MICHAEL GIBBONS, and YI-MIN CHEE. "AUTOMATIC DETECTION OF HANDWRITING FORGERY USING A FRACTAL NUMBER ESTIMATE OF WRINKLINESS." International Journal of Pattern Recognition and Artificial Intelligence 18, no. 07 (2004): 1361–71. http://dx.doi.org/10.1142/s0218001404003642.
Full textGautam, Shikha, and Anand Singh Jalal. "An Image Forgery Detection Approach Based on Camera's Intrinsic Noise Properties." International Journal of Computer Vision and Image Processing 8, no. 1 (2018): 92–101. http://dx.doi.org/10.4018/ijcvip.2018010106.
Full textKurniasih, Nuning. "Literasi Media Sosial: Upaya Pencegahan Pemalsuan Identitas Digital." JPM: Jurnal Pengabdian Masyarakat 4, no. 1 (2023): 7–13. http://dx.doi.org/10.47065/jpm.v4i1.1051.
Full textAlisultanova, Izaura A., and Deni Kh Dzhabrailov. "WEB APPLICATION SECURITY AND METHODS FOR PREVENTING HACKER ATTACKS." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 3/3, no. 156 (2025): 35–42. https://doi.org/10.36871/ek.up.p.r.2025.03.03.005.
Full textGadekar,, Supriya S. "Roadmap for Digital Image Forgery Detection Using Deep Learning." Tuijin Jishu/Journal of Propulsion Technology 44, no. 5 (2023): 1732–48. http://dx.doi.org/10.52783/tjjpt.v44.i5.2849.
Full textPatil, Sonal Pramod, and K. N. Jariwala. "Improving the Efficiency of Image and Video Forgery Detection Using Hybrid Convolutional Neural Networks." International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 29, Supp01 (2021): 101–17. http://dx.doi.org/10.1142/s0218488521400067.
Full textHaval Sadiq, Bareen. "Image Splicing Forgery Detection using Standard Division-Local Binary Pattern Features." Academic Journal of Nawroz University 12, no. 3 (2023): 35–41. http://dx.doi.org/10.25007/ajnu.v12n3a1839.
Full textCherniavskyi, Serhii, Viktoria Babanina, Inna Vartyletska, and Oleksandr Mykytchyk. "Peculiarities of The Economic Crimes Committed with the Use of Information Technologies." European Journal of Sustainable Development 10, no. 1 (2021): 420. http://dx.doi.org/10.14207/ejsd.2021.v10n1p420.
Full textDAVID, Mihail, and Igor SOROCEANU. "Negative effects of legal forgery on legal sciences." Anale ştiinţifice ale Academiei "Ştefan cel Mare" a MAI al Republicii Moldova. Ştiinţe juridice=Scientific Annals of the Academy "Stefan cel Mare" of MIA of the Republic of Moldova. Legal Sciences 17 (September 6, 2023): 228–38. https://doi.org/10.5281/zenodo.8321004.
Full textManoj Chavan. "Handwritten Online Signature Verification and Forgery Detection Using Hybrid Wavelet Transform-2 with HMM Classifier." Journal of Electrical Systems 20, no. 4s (2024): 2463–70. http://dx.doi.org/10.52783/jes.2799.
Full textY. F. Al_Sahlani, Ahmed, and Songfeng Lu. "Lightweight Communication Overhead Authentication Scheme Using Smart Card." Indonesian Journal of Electrical Engineering and Computer Science 1, no. 3 (2016): 597. http://dx.doi.org/10.11591/ijeecs.v1.i3.pp597-606.
Full textRabpreet, Singh Keer Rabpreet Singh Keer. "Handwriting generation using recurrent neural networks (LSTM)." International Journal of Scientific Development and Research 8, no. 9 (2023): 1085–109. https://doi.org/10.5281/zenodo.10446335.
Full textZhang, Yihui. "Empowering college students with personal privacy protection and anti-fraud on the internet: A comprehensive learning approach." Applied and Computational Engineering 74, no. 1 (2024): 7–12. http://dx.doi.org/10.54254/2755-2721/74/20240421.
Full textV K, Vishwanath. "Advanced Algorithms for Offline Signature Recognition and Enhanced Forgery Detection Mechanisms." International Journal for Research in Applied Science and Engineering Technology 12, no. 10 (2024): 573–77. http://dx.doi.org/10.22214/ijraset.2024.64585.
Full textManoj Chavan. "Comparative Analysis of Handwritten Online Signature Verification and Forgery Detection Using Hybrid Wavelet Transform-1 and 2 with HMM Classifier." Journal of Electrical Systems 20, no. 4s (2024): 2453–62. http://dx.doi.org/10.52783/jes.2798.
Full textLu, Jiaxin, Hengnian Qi, Xiaoping Wu, Chu Zhang, and Qizhe Tang. "Research on Authentic Signature Identification Method Integrating Dynamic and Static Features." Applied Sciences 12, no. 19 (2022): 9904. http://dx.doi.org/10.3390/app12199904.
Full textYassen A. AlKarem, Wijdan, Eman Thabet Khalid, and Khawla H. Ali. "Handwritten Signature Verification Method Using Convolutional Neural Network." Iraqi Journal for Electrical and Electronic Engineering 20, no. 2 (2024): 77–84. http://dx.doi.org/10.37917/ijeee.20.2.7.
Full textIbtisam, Ibtisam, Sharifah Mumtazah Syed Ahmad, Syamsiah Bt Mashohor, and Marsyita Bt Hanafi. "A Review of Online Signature Recognition system." Fusion: Practice and Applications 18, no. 1 (2025): 130–44. https://doi.org/10.54216/fpa.180111.
Full textWardhana, Andhika Wisnu, and Henki Bayu Seta. "Analisis Keamanan Sistem Pembelajaran Online Menggunakan Metode ISSAF pada Website Universitas XYZ." Informatik : Jurnal Ilmu Komputer 17, no. 3 (2021): 226. http://dx.doi.org/10.52958/iftk.v17i3.3653.
Full textDamini, Singh*1 Neeti Misra2 &. Farman Ali3. "ANALYSIS OF DMAT A/C & ONLINE TRADING OF INDIABULLS LTD. IN DEHRADUN." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES 6, no. 4 (2019): 481–84. https://doi.org/10.5281/zenodo.2657670.
Full textSafitri, Nandila Puspavidya. "Application of the Precautionary Principle of Notary in Making Authentic Deed Against the Use of False Identity." As-Syar'i: Jurnal Bimbingan & Konseling Keluarga 6, no. 2 (2024): 2165–79. http://dx.doi.org/10.47467/as.v6i2.6986.
Full textMehta, Rachna, Karan Aggarwal, Deepika Koundal, Adi Alhudhaif, and Kemal Polat. "Markov features based DTCWS algorithm for online image forgery detection using ensemble classifier in the pandemic." Expert Systems with Applications 185 (December 2021): 115630. http://dx.doi.org/10.1016/j.eswa.2021.115630.
Full textKim, Seong-Kyu. "Blockchain Smart Contract to Prevent Forgery of Degree Certificates: Artificial Intelligence Consensus Algorithm." Electronics 11, no. 14 (2022): 2112. http://dx.doi.org/10.3390/electronics11142112.
Full textI, Gusti Ayu Andara Yadnya Sangaswary, Kasta Arya Wijaya Ketut, and Ayu Sriasih Wesna Putu. "Authentication of Electronic Signatures in Online Business Transactions." International Journal of Social Science and Human Research 08, no. 05 (2025): 2664–69. https://doi.org/10.5281/zenodo.15347797.
Full textAhmed, Ahmed. "Development of an Approach for Image Forgery Detection Using Machine Learning Algorithms." Journal of Intelligent Systems and Internet of Things 12, no. 2 (2024): 166–77. http://dx.doi.org/10.54216/jisiot.120212.
Full textVishal, Vadgama. "A Novel Approach for E-Payment Using Virtual Password System." International Journal on Cryptography and Information Security(IJCIS) 1, no. 1 (2020): 1–11. https://doi.org/10.5281/zenodo.3901134.
Full textYagvalya, Gaurav. "A Novel Method of Fake Signature Detection Using Deep Learning Techniques." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem33985.
Full textGuo, Jianbang, Peng Sun, and Sang-Bing Tsai. "A Study on the Optimization Simulation of Big Data Video Image Keyframes in Motion Models." Wireless Communications and Mobile Computing 2022 (March 16, 2022): 1–12. http://dx.doi.org/10.1155/2022/2508174.
Full textSatybaldy, Abylay, Anushka Subedi, and Mariusz Nowostawski. "A Framework for Online Document Verification Using Self-Sovereign Identity Technology." Sensors 22, no. 21 (2022): 8408. http://dx.doi.org/10.3390/s22218408.
Full textLiu, Rui, Jun Song, Zhiming Huang, and Jianping Pan. "EQRC: A secure QR code-based E-coupon framework supporting online and offline transactions1." Journal of Computer Security 28, no. 5 (2020): 577–605. http://dx.doi.org/10.3233/jcs-191416.
Full textAl-Rawy, Mahmoud, and Atilla Elci. "Secure i-Voting Scheme with Blockchain Technology and Blind Signature." Journal of Digital Science, no. 1 (December 22, 2019): 3–14. http://dx.doi.org/10.33847/2686-8296.1.1_1.
Full text