Forgery

View this topic in
Forgery is the process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive. Copies, studio replicas, and reproductions are not considered forgeries, though they may later become forgeries through knowing and willful misrepresentations. (Wikipedia.org)






Conferences related to Forgery

Back to Top

2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)

2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize state­of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.


2019 IEEE International Symposium on Information Theory (ISIT)

Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.


More Conferences

Periodicals related to Forgery

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals

Most published Xplore authors for Forgery

Back to Top

Xplore Articles related to Forgery

Back to Top

Security Analysis on "A Chaotic Fragile Watermarking Technique with Precise Localization"

[{u'author_order': 1, u'authorUrl': u'https://ieeexplore.ieee.org/author/37672497500', u'full_name': u'Miao Yu', u'id': 37672497500}, {u'author_order': 2, u'authorUrl': u'https://ieeexplore.ieee.org/author/37674722900', u'full_name': u'Wuyi Zhang', u'id': 37674722900}, {u'author_order': 3, u'authorUrl': u'https://ieeexplore.ieee.org/author/37067748600', u'full_name': u'Dongyun Wang', u'id': 37067748600}] 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009

Security holes resulting from the independence of pixels in the existing fragile watermarking technique with pixel-precise localization have been pointed out. In this paper, the security of an algorithm with precise localization is analyzed. Vector quantization (VQ) attack, collage attack and oracle attack are implemented on the algorithm. Theoretical analysis and simulation results show that the algorithm has poor security, ...


Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems

[{u'author_order': 1, u'affiliation': u'Dept. of Inf. Manage., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan', u'authorUrl': u'https://ieeexplore.ieee.org/author/37275979000', u'full_name': u'Tzong-Chen Wu', u'id': 37275979000}, {u'author_order': 2, u'affiliation': u'Dept. of Inf. Manage., Nat. Taiwan Univ. of Sci. & Technol., Taipei, Taiwan', u'authorUrl': u'https://ieeexplore.ieee.org/author/37365179400', u'full_name': u'Chien-Lung Hsu', u'id': 37365179400}] IEEE Transactions on Vehicular Technology, 2003

Shieh et al. proposed two multisignature schemes for message recovery -the parallel multisignature scheme and the serial multisignature scheme - for authenticating delegates in mobile code systems. In this paper, we will show that Shieh et al.'s multisignature schemes are vulnerable to insider forgery attacks hence cannot achieve the security requirements they claimed.


Phase based detection of JPEG counter forensics

[{u'author_order': 1, u'affiliation': u'Electrical Engineering Dept., Assiut University, Egypt', u'authorUrl': u'https://ieeexplore.ieee.org/author/37340666100', u'full_name': u'Gamal Fahmy', u'id': 37340666100}, {u'author_order': 2, u'affiliation': u'Electrical Engineering Dept., Kuwait University, Kuwait', u'authorUrl': u'https://ieeexplore.ieee.org/author/37645291500', u'full_name': u'Abdullah Alqallaf', u'id': 37645291500}, {u'author_order': 3, u'affiliation': u'Institut fur Neuroinformatik, Ruhr-Universitt Bochum, Germany', u'authorUrl': u'https://ieeexplore.ieee.org/author/37269966700', u'full_name': u'Rolf Wurtz', u'id': 37269966700}] 2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2015

Many recent techniques for forgery detection tried to counter noise dithering, which is considered to be the most successful technique for removing footprints of JPEG editing in countering forensics. In this paper we propose a novel idea of detecting any noise dithering that is typically adopted in removing footprints in counter anti forensics of images. This technique is based on ...


The Security Requirement for off-line E-cash system based on IC Card

[{u'author_order': 1, u'affiliation': u'KISA (Korea Information Security Agency) Information Security Technology Division 78, Garak-Dong, Songpa-Gu, Seoul, Korea', u'authorUrl': u'https://ieeexplore.ieee.org/author/37290673200', u'full_name': u'Haeryong Park', u'id': 37290673200}, {u'author_order': 2, u'authorUrl': u'https://ieeexplore.ieee.org/author/37286478900', u'full_name': u'Kilsoo Chun', u'id': 37286478900}, {u'author_order': 3, u'authorUrl': u'https://ieeexplore.ieee.org/author/37555397700', u'full_name': u'Seungho Ahn', u'id': 37555397700}] 11th International Conference on Parallel and Distributed Systems (ICPADS'05), 2005

An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. ...


SIGMA - A Malaysian signatures’ database

[{u'author_order': 1, u'affiliation': u'Univ. Tenaga Nasional, Kajang', u'full_name': u'S.M.S. Ahmad'}, {u'author_order': 2, u'full_name': u'A. Shakil'}, {u'author_order': 3, u'full_name': u'A.R. Ahmad'}, {u'author_order': 4, u'full_name': u'M. Agil'}, {u'author_order': 5, u'full_name': u'M. Balbed'}, {u'author_order': 6, u'full_name': u'R.M. Anwar'}] 2008 IEEE/ACS International Conference on Computer Systems and Applications, 2008

This poster presents a database of Malaysian signatures named SIGMA describing the strategies adopted in compiling it and its technical details. The database consists of over 6,000 genuine signature samples and over 2,000 forged signature samples of Malaysian nationals. The signature samples are collected simultaneously in both online and offline mode thereby eliminating the variation which is inevitable if the ...


More Xplore Articles

Educational Resources on Forgery

Back to Top

eLearning

No eLearning Articles are currently tagged "Forgery"

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Forgery"

IEEE-USA E-Books

  • Camera-Based Image Forgery Detection

    Recently, an increased number of studies in image authentication and image forgery detection have appeared that are based on indicators arising from the acquisition process of the data, namely due to the inherent characteristics of the camera used to produce the image. This chapter focuses on different aspects of image forgery based on effects and cues found in the image that are due to the acquisition process. These aspects include: image authentication, image forgery detection and image signature. These studies are termed as camera-based image forgery detection methods. The chapter describes the camera structure and the three major components: optics, sensors and imaging pipeline. For each component, its basic mechanism, its role in the acquisition process and its effects on the final acquired image are detailed. The chapter presents a specific camera-based image forgery technique as a case study for the approaches.

  • 10 What-If Machines

    Fictional what-ifs come in all shapes and sizes. Many are ephemeral brain farts that are as disposable as they are whimsical. What if Neo had chosen the blue pill? What if plants could talk? What if animals wanted us to eat them? What if we needed stamps to send email? What if Steve Jobs was an alien who merely returned to his home planet? What if Donald Trump turned the Whitehouse into a casino? Other what-ifs, born of exactly the same slice'n' dice attitude to reality, turn out to be made of weightier stuff and provoke fascinating debates. What if animals brought a class action suit against the human race? What if the ancient Romans had invented the atom bomb? What if the USSR had won the cold war? What if the Axis powers had won World War II and divided up the United States among themselves? This last what-if is the provocative basis for Philip K. Dick's Hugo Award—winning novel, The Man in the High Castle.1 Written in 1962 and set in the same year, the book explores an alternate reality in which the allies lost World War II after the Nazis dropped the first atomic bomb on Washington, DC. The political counterfactuals of the novel concern the machinations of Nazi Germany, which now controls the Eastern states of America, and of Japan, which controls the Pacific states, with the Rocky Mountain states serving as a neutral buffer.

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.

  • Anti-Forensics of Multimedia Data and Countermeasures

    This chapter focuses on the specific case of anti-forensics of image and video content. It first reviews the anti-forensic techniques proposed in the literature so far. Next, the chapter analyzes one particular example, namely, the antiforensics of JPEG compression fingerprints. It shows how this anti- forensic technique can be detected with anti-forensic countermeasures. It presents a simple and effective anti-forensic technique to eliminate statistical fingerprints of JPEG compression, which is by far the most popular coding tool for images. The chapter now focuses on the JPEG compression technique, and discusses its side effects in terms of visible noise on the tampered image. Finally, it explains how anti-forensic techniques can be evaluated with respect to forensic detectors, and illustrates how the interplay between the forger and the forensic analyst can be cast in a game- theoretical framework.

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.



Standards related to Forgery

Back to Top

No standards are currently tagged "Forgery"


Jobs related to Forgery

Back to Top