Conferences related to Authenticity

Back to Top

2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore

2019 IEEE 17th International Conference on Industrial Informatics (INDIN)

Industrial information technologies

2019 IEEE International Conference on Industrial Technology (ICIT)

The scope of the conference will cover, but will not be limited to, the following topics: Robotics; Mechatronics; Industrial Automation; Autonomous Systems; Sensing and artificial perception, Actuators and Micro-nanotechnology; Signal/Image Processing and Computational Intelligence; Control Systems; Electronic System on Chip and Embedded Control; Electric Transportation; Power Electronics; Electric Machines and Drives; Renewable Energy and Smart Grid; Data and Software Engineering, Communication; Networking and Industrial Informatics.

2019 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)

International Geosicence and Remote Sensing Symposium (IGARSS) is the annual conference sponsored by the IEEE Geoscience and Remote Sensing Society (IEEE GRSS), which is also the flagship event of the society. The topics of IGARSS cover a wide variety of the research on the theory, techniques, and applications of remote sensing in geoscience, which includes: the fundamentals of the interactions electromagnetic waves with environment and target to be observed; the techniques and implementation of remote sensing for imaging and sounding; the analysis, processing and information technology of remote sensing data; the applications of remote sensing in different aspects of earth science; the missions and projects of earth observation satellites and airborne and ground based campaigns. The theme of IGARSS 2019 is “Enviroment and Disasters”, and some emphases will be given on related special topics.

2019 IEEE Photonics Society Summer Topical Meeting Series (SUM)

The Topical Meetings of the IEEE Photonics Society are the premier conference series for exciting, new areas in photonic science, technology, and applications; creating the opportunity to learn about emerging fields and to interact with the research and technology leaders in an intimate environment.

More Conferences

Periodicals related to Authenticity

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)

Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...

Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...

Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...

Control Systems Technology, IEEE Transactions on

Serves as a compendium for papers on the technological advances in control engineering and as an archival publication which will bridge the gap between theory and practice. Papers will highlight the latest knowledge, exploratory developments, and practical applications in all aspects of the technology needed to implement control systems from analysis and design through simulation and hardware.

More Periodicals

Xplore Articles related to Authenticity

Back to Top

The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics Technology

[{u'author_order': 1, u'full_name': u'Masaki Fujikawa'}, {u'author_order': 2, u'full_name': u'Fumihiko Oda'}, {u'author_order': 3, u'full_name': u'Kengo Moriyasu'}, {u'author_order': 4, u'full_name': u'Shingo Fuchi'}, {u'author_order': 5, u'full_name': u'Yoshikazu Takeda'}] 2013 IEEE 37th Annual Computer Software and Applications Conference, 2013

The authors propose a new method in which the fact that a pottery or porcelain product is actually produced by the brand-holder company or by the ceramic artist (authenticity) can be easily verified, and at the same time, production of counterfeit products becomes difficult. The artifact-metrics are used in this method and as the material used in the method is ...

Blind Identification Method for Authenticity of Infinite Light Source Images

[{u'author_order': 1, u'authorUrl': u'', u'full_name': u'Haipeng Chen', u'id': 37678115300}, {u'author_order': 2, u'authorUrl': u'', u'full_name': u'Xuanjing Shen', u'id': 37597240300}, {u'author_order': 3, u'authorUrl': u'', u'full_name': u'Yingda Lv', u'id': 37666834100}] 2010 Fifth International Conference on Frontier of Computer Science and Technology, 2010

In this paper, a blind identification for authenticity of infinite light source images was proposed. The inconsistency in light source direction resulted from image forgery is used to identify image authenticity. According to the error function of the actual light intensity and calculated light intensity and the constraint function of infinite light source to light beam, Hestenes-Powell multiplier method is ...

Authenticity of digital records in practice

[{u'author_order': 1, u'affiliation': u'School of Library, Archival and Information Studies, University of British Columbia, Vancouver, Canada', u'authorUrl': u'', u'full_name': u'Corinne Rogers', u'id': 37085657146}] 2015 Digital Heritage, 2015

The ability of citizens to access their government's information fully and in a timely manner is one of the cornerstones of democracy. Citizens' rights and government accountability depend on how information - how records - are created, managed, and preserved. One of the critical aspects of government records is the ability to attest to their authenticity over time and across ...

Object addition, removal and video authenticity testing

[{u'author_order': 1, u'affiliation': u'Department of Computer and Information Science, Gannon University, Erie PA 16541, USA', u'authorUrl': u'', u'full_name': u'Bassam Almatrafi', u'id': 37086201326}, {u'author_order': 2, u'affiliation': u'Department of Computer and Information Science, Gannon University, Erie PA 16541, USA', u'authorUrl': u'', u'full_name': u'Sreela Sasi', u'id': 37355635400}] 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016

This research focuses on the process for adding, removing objects from videos and on the video authenticity testing. A new process is developed for adding an object in a video. A Graphical User Interface is designed to demonstrate the addition of object. Seam carving is one of the best existing techniques for object removal from an image. Even though seam ...

Fabric authenticity method using fast Fourier transformation detection

[{u'author_order': 1, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'authorUrl': u'', u'full_name': u'Norislina Ismail', u'id': 37722081500}, {u'author_order': 2, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'authorUrl': u'', u'full_name': u'W. Md. Syahrir', u'id': 38556705600}, {u'author_order': 3, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'authorUrl': u'', u'full_name': u'Jasni M. Zain', u'id': 37426503800}, {u'author_order': 4, u'affiliation': u'Faculty of Computer Systems & Software Engineering, Universiti Malaysia Pahang, Kuantan, 26300, Malaysia', u'authorUrl': u'', u'full_name': u'Hai Tao', u'id': 37711724800}] International Conference on Electrical, Control and Computer Engineering 2011 (InECCE), 2011

The authenticity or originality of sport jersey cloth fabric in market nowadays is difficult to distinguish. This is a critical issue that leads to the difficulty for customer to know whether they are purchase the original fabric or the fake one. The purpose of this paper is to develop a prototype for Fabric Authenticity System to judge the originality of ...

More Xplore Articles

Educational Resources on Authenticity

Back to Top


No eLearning Articles are currently tagged "Authenticity"


  • Authenticity Beats Eloquence

    Most experts stress the need for practice before making a presentation, but this chapter provides an anecdote illustrating the possible dangers of overpreparing and studied eloquence and losing on authenticity. Rehearsing before making a presentation probably does the most good for the most people. A quick flip through the slides just before the talk is fine, but frantic last-minute cramming will just get the presenter even more keyed up without really helping. This chapter suggests that if a person is not quite ready to face the audience, the bathroom mirror is always handy. After talking to the mirror, the person should relax. The chapter also suggests the following points for making the presentation: speaking up, standing tall, avoiding rhetoric, engaging audience, and staying in charge. The three rules of public speaking are being forthright; being brief; and being seated.

  • Native Stagings: Pirate Acts and the Complex of Authenticity

    This chapter contains sections titled: Staging the Native, Exclusive Indigeneity, Export Redemption, Authenticity's Complex, On Innovation and Adulteration, Augmenting Experience, Authentic Mutations

  • 2 Violence, Propriety, Authenticity: A Symbolic Economy of the Dark Web

    On a Tor-based market forum for customers of a counterfeit American currency vendor, one satisfied customer proclaimed, “I like the sparkly 20 [counterfeit dollar bill] because I do something to them that makes it look legit:) I also make the green eagle look legit. All by hand;).”

  • Risk-Adaptive Engine for Secure ADS-B Broadcasts (2015-01-2520)

    Automatic Dependent Surveillance Broadcast (ADS-B) [1] is a technology that can be viewed either as a complement or as an alternative to current radar- based surveillance techniques. Despite its many benefits, this technology suffers from the security flaw of having its messages sent as clear text broadcasts, which makes it vulnerable to several kinds of attacks affecting the authenticity and integrity of ADS-b messages - a problem we addressed with a security framework presented in previous work [2]. In this paper, we propose to enhance that initial work by using keyed-hash message authentication code [3] (HMAC) to ensure the authenticity and integrity of ADS-B messages. The proposed improvements include changing the structure of the security-related data and, more importantly, adding a cognitive risk adaptive module. These improvements resulted in four main contributions. First, the new structure of the security-related data is more resilient to messages being lost or scrambled. Second, the risk-adaptive cognitive engine facilitates the physical risk assessment of the ADS-B attacks, based on the collected data describing the aircraft and its surrounding environment. Third, air traffic controllers using the framework have better support for optimizing the use of the air space and minimizing disruptions. Fourth, the framework improves adaptability of ATC surveillance operations by leveraging the collected physical data from the aircraft.

  • 7 Facebook and the Dark Web: A Collision

    <tonious> “I2P: Who needs the IETF?”—From jrandom's collected I2P quotations Facebook's Tor hidden service, found at https://facebookcorewwwi.onion, is lightning in a bottle. It is at the intersection of all three legitimacies analyzed in this book: state delegation of rules and regulations to a standards body (in this case, the Internet Engineering Task Force [IETF]); corporate propriety (DigiCert, Facebook); nonprofit propriety (the Tor Project); hacker legitimacy (the [now disgraced] hacker wunderkind Jacob Appelbaum); and Dark Web authenticity (the notoriety of Silk Road). Thus, Facebook on Tor is an association of state-delegated power, respect of resources, and authenticity. It is also a symbol of the blurred lines between the Dark Web and the Clear Web, a collision of legitimation and delegitimation.

  • The CD-ROM That Would Not Be

    On July 3, 2015, the Internet awoke to a weird story. Someone had recovered a long-lost prototype of the “Super NES CD-ROM.” Pictures were posted, news sites reported all kinds of things, and authenticity was discussed, questioned, proved, and disproved, all at the same time.

  • Query Answer Authentication

    In data publishing, the owner delegates the role of satisfying user queries to a third-party publisher. As the servers of the publisher may be untrusted or susceptible to attacks, we cannot assume that they would always process queries correctly, hence there is a need for users to authenticate their query answers. This book introduces various notions that the research community has studied for defining the correctness of a query answer. In particular, it is important to guarantee the completeness, authenticity and minimality of the answer, as well as its freshness. We present authentication mechanisms for a wide variety of queries in the context of relational and spatial databases, text retrieval, and data streams. We also explain the cryptographic protocols from which the authentication mechanisms derive their security properties. Table of Contents: Introduction / Cryptography Foundation / Relational Queries / Spatial Queries / Text Search Queries / Data Streams / Conclusion

  • Network Security and Privacy for Cyber‐Physical Systems

    Cyber‐physical systems (CPSs) are expected to collect, process, and exchange data that regularly contain sensitive information. CPSs may, for example, involve a person in the privacy of her home or convey business secrets in production plants. Hence, confidentiality, integrity, and authenticity are of utmost importance for secure and privacy‐preserving CPSs. In this chapter, we present and discuss emerging security and privacy issues in CPSs and highlight challenges as well as opportunities for building and operating these systems in a secure and privacy‐preserving manner. We focus on issues that are unique to CPSs, for example, resulting from the resource constraints of the involved devices and networks, the limited configurability of these devices, and the expected ubiquity of the data collection of CPSs. The covered issues impact the security and privacy of CPSs from local networks to Cloud‐based environments.

Standards related to Authenticity

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...