Conferences related to Authenticity

Back to Top

2019 41st Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

The conference program will consist of plenary lectures, symposia, workshops andinvitedsessions of the latest significant findings and developments in all the major fields ofbiomedical engineering.Submitted papers will be peer reviewed. Accepted high quality paperswill be presented in oral and postersessions, will appear in the Conference Proceedings and willbe indexed in PubMed/MEDLINE & IEEE Xplore


2019 IEEE 17th International Conference on Industrial Informatics (INDIN)

Industrial information technologies


2019 IEEE International Conference on Industrial Technology (ICIT)

The scope of the conference will cover, but will not be limited to, the following topics: Robotics; Mechatronics; Industrial Automation; Autonomous Systems; Sensing and artificial perception, Actuators and Micro-nanotechnology; Signal/Image Processing and Computational Intelligence; Control Systems; Electronic System on Chip and Embedded Control; Electric Transportation; Power Electronics; Electric Machines and Drives; Renewable Energy and Smart Grid; Data and Software Engineering, Communication; Networking and Industrial Informatics.


2019 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)

International Geosicence and Remote Sensing Symposium (IGARSS) is the annual conference sponsored by the IEEE Geoscience and Remote Sensing Society (IEEE GRSS), which is also the flagship event of the society. The topics of IGARSS cover a wide variety of the research on the theory, techniques, and applications of remote sensing in geoscience, which includes: the fundamentals of the interactions electromagnetic waves with environment and target to be observed; the techniques and implementation of remote sensing for imaging and sounding; the analysis, processing and information technology of remote sensing data; the applications of remote sensing in different aspects of earth science; the missions and projects of earth observation satellites and airborne and ground based campaigns. The theme of IGARSS 2019 is “Enviroment and Disasters”, and some emphases will be given on related special topics.


2019 IEEE Photonics Society Summer Topical Meeting Series (SUM)

The Topical Meetings of the IEEE Photonics Society are the premier conference series for exciting, new areas in photonic science, technology, and applications; creating the opportunity to learn about emerging fields and to interact with the research and technology leaders in an intimate environment.


More Conferences

Periodicals related to Authenticity

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Communications Surveys & Tutorials, IEEE

Each tutorial reviews currents communications topics in network management and computer and wireless communications. Available tutorials, which are 2.5 to 5 hours in length contains the original visuals and voice-over by the presenter. IEEE Communications Surveys & Tutorials features two distinct types of articles: original articles and reprints. The original articles are exclusively written for IEEE Communications Surveys & Tutorials ...


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Control Systems Technology, IEEE Transactions on

Serves as a compendium for papers on the technological advances in control engineering and as an archival publication which will bridge the gap between theory and practice. Papers will highlight the latest knowledge, exploratory developments, and practical applications in all aspects of the technology needed to implement control systems from analysis and design through simulation and hardware.


More Periodicals


Xplore Articles related to Authenticity

Back to Top

The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics Technology

2013 IEEE 37th Annual Computer Software and Applications Conference, 2013

The authors propose a new method in which the fact that a pottery or porcelain product is actually produced by the brand-holder company or by the ceramic artist (authenticity) can be easily verified, and at the same time, production of counterfeit products becomes difficult. The artifact-metrics are used in this method and as the material used in the method is ...


Blind Identification Method for Authenticity of Infinite Light Source Images

2010 Fifth International Conference on Frontier of Computer Science and Technology, 2010

In this paper, a blind identification for authenticity of infinite light source images was proposed. The inconsistency in light source direction resulted from image forgery is used to identify image authenticity. According to the error function of the actual light intensity and calculated light intensity and the constraint function of infinite light source to light beam, Hestenes-Powell multiplier method is ...


Authenticity of digital records in practice

2015 Digital Heritage, 2015

The ability of citizens to access their government's information fully and in a timely manner is one of the cornerstones of democracy. Citizens' rights and government accountability depend on how information - how records - are created, managed, and preserved. One of the critical aspects of government records is the ability to attest to their authenticity over time and across ...


Object addition, removal and video authenticity testing

2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016

This research focuses on the process for adding, removing objects from videos and on the video authenticity testing. A new process is developed for adding an object in a video. A Graphical User Interface is designed to demonstrate the addition of object. Seam carving is one of the best existing techniques for object removal from an image. Even though seam ...


Fabric authenticity method using fast Fourier transformation detection

International Conference on Electrical, Control and Computer Engineering 2011 (InECCE), 2011

The authenticity or originality of sport jersey cloth fabric in market nowadays is difficult to distinguish. This is a critical issue that leads to the difficulty for customer to know whether they are purchase the original fabric or the fake one. The purpose of this paper is to develop a prototype for Fabric Authenticity System to judge the originality of ...


More Xplore Articles

Educational Resources on Authenticity

Back to Top

IEEE-USA E-Books

  • The New Verification Method of Authenticity for Pottery and Porcelain Products: Application of the Artifact-Metrics Technology

    The authors propose a new method in which the fact that a pottery or porcelain product is actually produced by the brand-holder company or by the ceramic artist (authenticity) can be easily verified, and at the same time, production of counterfeit products becomes difficult. The artifact-metrics are used in this method and as the material used in the method is transparent, the patterns and color tone created by the master artisan or ceramic artist are not affected. As the material is applied on to the product in the process of enameling or glazing, no additional work process is required for the master artisan or ceramic artist must take. Furthermore, because the method does not require UV rays or radioactive rays in registration and verification of products, potential hazards to the human body or product are eliminated, and no special skill is required in verification of authenticity. In this report, the authors indicate high feasibility of this method by showing results of the elementary experiments.

  • Blind Identification Method for Authenticity of Infinite Light Source Images

    In this paper, a blind identification for authenticity of infinite light source images was proposed. The inconsistency in light source direction resulted from image forgery is used to identify image authenticity. According to the error function of the actual light intensity and calculated light intensity and the constraint function of infinite light source to light beam, Hestenes-Powell multiplier method is used to calculate the light source direction of different objects and their background in infinite light source images. The image authenticity is determined based on the consistency between the light source direction of the object and its background. Experimental results showed that the authenticity of infinite light source images could be identified by the inconsistency in light source direction and the detection rate can reach 83.7%. The performance in terms of detection rate and time complexity of the proposed blind identification is superior to that of the existed method.

  • Authenticity of digital records in practice

    The ability of citizens to access their government's information fully and in a timely manner is one of the cornerstones of democracy. Citizens' rights and government accountability depend on how information - how records - are created, managed, and preserved. One of the critical aspects of government records is the ability to attest to their authenticity over time and across space. This paper presents selected findings of research into how records professionals approach the issue of authenticity of digital records for which they are responsible. While much research has been and continues to be conducted into the protection of authenticity in the context of requirements for digital preservation, little research has been done until now on the practice and beliefs of practitioners.

  • Object addition, removal and video authenticity testing

    This research focuses on the process for adding, removing objects from videos and on the video authenticity testing. A new process is developed for adding an object in a video. A Graphical User Interface is designed to demonstrate the addition of object. Seam carving is one of the best existing techniques for object removal from an image. Even though seam carving will resize the image, it will be done without removing any of the primary objects in the image. This technique is used for object removal for this research. Video authenticity technique is to test videos to identify whether it is original or fake. Histogram and entropy techniques are used for checking video authenticity.

  • Fabric authenticity method using fast Fourier transformation detection

    The authenticity or originality of sport jersey cloth fabric in market nowadays is difficult to distinguish. This is a critical issue that leads to the difficulty for customer to know whether they are purchase the original fabric or the fake one. The purpose of this paper is to develop a prototype for Fabric Authenticity System to judge the originality of jersey cloth fabric based on its pattern structure. Besides this, this study aimed to identify the image processing technique which is Fourier analysis to differentiate the authentic and artificial fabric. As a result, the originality of the fabric can be detected based on the fabric pattern structure itself by looking on its Fourier spectrum.

  • Authenticity detection as a binary text categorization problem: Application to Hadith authentication

    Authentication of Hadiths (sayings of Prophet Muhammad) is very important field for religious scholars as well as historians. Authenticity verification is traditionally conducted by studying how trustworthy is each person in the narration chain. In this study, we propose a novel approach completely based on the content of each Hadith. For each category of hadiths (authentic and non-authentic), we create a binary relation in which the hadiths correspond to the objects of the relation and the words correspond to its attributes. Keywords for each category are then obtained in a hierarchical ordering of importance using the hyper rectangular decomposition. Classification is done by feeding the extracted keywords to a logistic regression classifier. The method has been validated on a database of about 1600 hadiths. Results show that classification accuracy increases with the number of annotators who agreed on the authenticity of each hadith. These findings suggest that our method successfully extracts relevant keywords and can be combined with other traditional methods.

  • Design of authenticity evaluation metric for Android applications

    For enforcing security, Android platform uses authorizing system which grants permission per application at install-time. With authorized privilege, user applications can modify and delete user's personal information. Therefore, inspection of granted permiss ion usage can be used to detect security vulnerabilities. ISO/IEC 25 010 defines software product security characteristic and provides g uidelines to evaluate software product quality. Among sub-characte ristics of security, Authenticity is related to Android permission sys tem. In this paper, we present authenticity metric for android application. This metric can quantify the permission usage of applicatio n and measured information can be used to classify the malware applications. To verify the applicability of metric, we perform evaluat ion to benign and malware application and compare its results.

  • Detection of ENF discontinuities using PLL for audio authenticity

    A Phase Locked Loop (PLL) based method for determining audio authenticity is proposed in this work. Assuming that the power grid signal is embedded in an audio signal, certain pre-processing techniques are applied in order to obtain the Electrical Network Frequency (ENF). A PLL is then used to estimate the time-varying phase of the ENF signal. Postprocessing is carried out so as to improve system performance. Finally, an automatic decision on the authenticity of the audio is conducted by quantifying the frequency variations of the VCO output. The performance of the proposed method is evaluated on digitally edited and original audio signals, with promising results (achieving an accuracy of 96%).

  • A serious game in the Stoa of Attalos: Edutainment, heritage values and authenticity

    Among the most current tools aimed at enhancing heritage experiences are serious games (SG), video games designed with an educational objective. What seems to be missing is a SG targeted to raise public's awareness of the fundamentals of Conservation Theory and Practice: the heritage values system and the concept of authenticity. This report will elaborate on a proposal for a Serious Game focused on disseminating the aforementioned concepts through interaction with the 3D model of the Stoa of Attalos in the Ancient Agora in Athens. The digitization pipeline for the production of a realistic model, thus contributing to the authenticity, will also be described.

  • Unequal authenticity protection of video multicasting

    Multicast video authentication is important to verify the authenticity of video data transmitted over the network. In this paper, we focus on unequal authenticity protection for video multicasting. A two-stage authentication strategy, which is composed of hash-based authentication and FEC-based correction, is proposed to resist the pollution attack. Different from the traditional methods, the FEC parameters instead of the rate are derived via a RD optimization procedure. In addition, we also analyze the issues of security strength, authentication rate, and hash length for the proposed method. The analyses show that our method with unequal hash length indeed achieves better RD performance. Simulation results further demonstrate the effectiveness of the proposed method.



Standards related to Authenticity

Back to Top

IEEE Standard for Information Technology: Hardcopy Device and System Security

This standard defines security requirements (all aspects of security including but not limited to authentication, authorization, privacy, integrity, device management, physical security and information security) for manufacturers, users, and others on the selection, installation, configuration and usage of hardcopy devices (HCDs) and systems; including printers, copiers, and multifunction devices (MFDs). This standard identifies security exposures for these HCDs and systems, ...