Suggested Topics within your search.
Suggested Topics within your search.
QA75 Electronic computers. Computer science
13
History of art
5
TK Electrical engineering. Electronics Nuclear engineering
4
Cloud computing
3
Cloud-computing
3
Q Science (General)
3
Anthropology
2
Authentication
2
Buffer Overflow
2
Classification (of information)
2
Criticism & exegesis of sacred texts
2
Cross-Site Request Forgery
2
Cross-Site Scripting
2
Data aggregation
2
Data aggregation problems
2
Data storage
2
Datacenter
2
Deep learning
2
Detection methods
2
Digital storage
2
Forgery
2
Gateways (computer networks)
2
Heterogeneous networks
2
History
2
Information classification
2
Internet of things
2
Internet protocols
2
Machine learning
2
Multisource data
2
Protocol adaptation layers
2
-
1
-
2
-
3
-
4“... Document forgery offenses represent an assault, threat or danger to the legal traffic (law...”
Get full text
Article -
5“... forgery of images and two methods to detect resampling of images. To detect copy-move forgery of an image...”
Get full text
Others -
6A New Copy Move Forgery Detection Method Resistant to Object Removal with Uniform Background Forgery“... proposed in the literature to determine authenticity of images. However, a specific type of forgery called...”
Get full text
Article -
7“... In addition to forgery crimes which attack the legal traffic, its smooth, normal and safe...”
Get full text
Article -
8
-
9by Fabio Colonnese“... and scientific, where forgery can be paradoxically used to tell the truth....”
Published 2021-09-01
Get full text
Article -
10
-
11by Aimee Murphy“... in this way can enhance the agenda of fakes and forgeries circulating in the art world, highlighting the need...”
Published 2021-09-01
Get full text
Article -
12by T. F. MoiseevaSubjects: “...signature forgery detection...”
Published 2017-09-01
Get full text
Article -
13by Karol Bartkiewicz, Antonín Černoch, Grzegorz Chimczak, Karel Lemr, Adam Miranowicz, Franco NoriGet full text
Published 2017-03-01
Article -
14
-
15by Qingzhong Liu, Andrew Sung, Lei Chen, Ming Yang, Zhongxue Chen, Yanxin Liu, Jing ZhangSubjects: “...forgery detection; audio forensics; aac; same bitrate...”
Published 2015-08-01
Get full text
Article -
16
-
17
-
18
-
19
-
20