Showing Results for
- Academic Journals (88)
Search Results
- 88
Academic Journals
- 88
- 1From:Journal of Internet Law (Vol. 13, Issue 4)In 1990, Sir Tim Berners-Lee, proposed a hypertext system that provided one of the building blocks of the Internet as we understand it today; Microsoft released Windows 3.0, and the first commercial Internet dialup...
- 2From:SAMJ South African Medical Journal (Vol. 103, Issue 1) Peer-ReviewedThe legal vulnerability of healthcare workers in foreign countries where justice operates in unfamiliar ways has never been better illustrated than by the shocking case of one of the doyens of haematology and oncology...
- 3From:Electronics (Basel) (Vol. 9, Issue 9) Peer-ReviewedInternet of Things (IoT) image sensors, social media, and smartphones generate huge volumes of digital images every day. Easy availability and usability of photo editing tools have made forgery attacks, primarily...
- 4From:Informatica (Vol. 41, Issue 1) Peer-ReviewedThe paper proposes a new approach as a combination of the multiscale analysis and the Zernike moment based for detecting tampered image with the formation of copy-move forgeries. Although the traditional Zernike moment...
- 5From:Advanced Materials & Processes (Vol. 173, Issue 4) Peer-ReviewedThe Reserve Bank of Australia (RBA) and CSIRO's 20-year bank project resulted in the polymer banknote--the first ever of its kind, and the most secure form of currency in the world. The project commenced in 1968 and...
- 6From:BioMed Research International (Vol. 2021) Peer-ReviewedCloud computing has evolved in various application areas such as medical imaging and bioinformatics. It raises the issues of privacy and tampering in the images especially related to the medical field and bioinformatics...
- 7From:Reference & Research Book News (Vol. 24, Issue 1)9780061458453 Unholy business; a true tale of faith, greed, and forgery in the holy land. Burleigh, Nina. Collins 2008 271 pages $27.50 Hardcover CC140 A veteran journalist based in New York,...
- 8From:British Medical Journal (Vol. 325, Issue 7372) Peer-ReviewedPaediatricians at North Staffordshire Hospital who were accused by parents of forging their signatures on clinical trial consent forms will not face prosecution, Staffordshirefordshire police have decided. Police...
- 9From:Papers of the Bibliographical Society of Canada (Vol. 37, Issue 2) Peer-ReviewedJoseph Rosenblum. Prince of Forgers. New Castle, DE.: Oak Knoll Press, 1998. xiv, 202 pp.; $39.95 U.S. (hardcover). ISBN 1-884718-51-5. The story of forger Vrain-Denis Lucas, were it invented by a novelist or...
- 10From:SAMJ South African Medical Journal (Vol. 103, Issue 1) Peer-ReviewedIn an ironic twist, the absence of clinical notes sufficient to properly rule on manslaughter and forgery charges brought in the United Arab Emirates (UAE) against 77-year-old veteran Cape Town oncologist Professor...
- 11From:PLoS ONE (Vol. 10, Issue 5) Peer-ReviewedAggregate signatures allow anyone to combine different signatures signed by different signers on different messages into a short signature. An ideal aggregate signature scheme is an identity-based aggregate signature...
- 12From:Medical Law Cases - for Doctors (Vol. 8, Issue 10) Peer-ReviewedPatients at times produce forged documents in court to prove their case. This is perhaps the first case where an X-ray clinic connived with the patient's husband in fabricating a document that was produced to support a...
- 13From:The Chronicle of Higher Education (Vol. 48, Issue 25)Byline: WACHIRA KIGOTHO Kenyan police officers have arrested 21 people said to be members of a syndicate that allegedly was making and selling fake diplomas at the Ministry of Education headquarters. Detectives...
- 14From:The FBI Law Enforcement Bulletin (Vol. 66, Issue 2)The Alcohol and Tobacco Enforcement Section of the Wisconsin Dept. of Revenue in its efforts to prevent the state's underage drinking problem developed a training program that teaches agents and liquor retailers how to...
- 15From:Shakespeare Studies (Vol. 45) Peer-ReviewedON JANUARY 13, 1580 "a man was drawn to St. Thomas of Watring's, & there hanged, headed, & quartered, for begging by a license, whereunto the Queen's hand was counterfeited." (1) For imitating the monarch's hand, the...
- 16From:Mathematical Problems in EngineeringPeer-ReviewedNowadays, determining if an image appeared somewhere on the web or in a magazine or is authentic or not has become crucial. Image forensics methods based on features have demonstrated so far to be very effective in...
- 17From:International Journal of Interactive Multimedia and Artificial Intelligence (Vol. 5, Issue 5) Peer-ReviewedThis paper describes a quick and simple method to detect brush editing in JPEG images. The novelty of the proposed method is based on detecting the discarded coefficients during the quantization of the image. Another...
- 18From:The Scientific World Journal (Vol. 14) Peer-ReviewedWide availability of image processing software makes counterfeiting become an easy and low-cost way to distort or conceal facts. Driven by great needs for valid forensic technique, many methods have been proposed to...
- 19From:Security and Communication Networks (Vol. 2018) Peer-ReviewedThis paper proposes a blind authentication scheme to identify duplicated regions for copy-move forgery based on perceptual hashing and package clustering algorithms. For all fixed-size image blocks in suspicious images,...
- 20From:International Journal of Computing and Digital Systems (Vol. 11, Issue 1) Peer-ReviewedThis article introduces a novel approach for forgery detection of documents based on the spectroscopy of documents' matters. The proposed approach uses concepts from network science to generate a weighted network of...