Forgery

View this topic in
Forgery is the process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive. Copies, studio replicas, and reproductions are not considered forgeries, though they may later become forgeries through knowing and willful misrepresentations. (Wikipedia.org)






Conferences related to Forgery

Back to Top

2019 IEEE International Conference on Image Processing (ICIP)

The International Conference on Image Processing (ICIP), sponsored by the IEEE SignalProcessing Society, is the premier forum for the presentation of technological advances andresearch results in the fields of theoretical, experimental, and applied image and videoprocessing. ICIP 2019, the 26th in the series that has been held annually since 1994, bringstogether leading engineers and scientists in image and video processing from around the world.


2019 IEEE International Conference on Systems, Man and Cybernetics (SMC)

2019 IEEE International Conference on Systems, Man, and Cybernetics (SMC2019) will be held in the south of Europe in Bari, one of the most beautiful and historical cities in Italy. The Bari region’s nickname is “Little California” for its nice weather and Bari's cuisine is one of Italian most traditional , based of local seafood and olive oil. SMC2019 is the flagship conference of the IEEE Systems, Man, and Cybernetics Society. It provides an international forum for researchers and practitioners to report up-to-the-minute innovations and developments, summarize state­of-the-art, and exchange ideas and advances in all aspects of systems science and engineering, human machine systems and cybernetics. Advances have importance in the creation of intelligent environments involving technologies interacting with humans to provide an enriching experience, and thereby improve quality of life.


2019 IEEE International Symposium on Information Theory (ISIT)

Information theory and coding theory and their applications in communications and storage, data compression, wireless communications and networks, cryptography and security, information theory and statistics, detection and estimation, signal processing, big data analytics, pattern recognition and learning, compressive sensing and sparsity, complexity and computation theory, Shannon theory, quantum information and coding theory, emerging applications of information theory, information theory in biology.


2019 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2020 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

ICASSP is the world’s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class presentations by internationally renowned speakers, cutting-edge session topics and provide a fantastic opportunity to network with like-minded professionals from around the world.


More Conferences

Periodicals related to Forgery

Back to Top

Circuits and Systems for Video Technology, IEEE Transactions on

Video A/D and D/A, display technology, image analysis and processing, video signal characterization and representation, video compression techniques and signal processing, multidimensional filters and transforms, analog video signal processing, neural networks for video applications, nonlinear video signal processing, video storage and retrieval, computer vision, packet video, high-speed real-time circuits, VLSI architecture and implementation for video technology, multiprocessor systems--hardware and software-- ...


Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Computer-Aided Design of Integrated Circuits and Systems, IEEE Transactions on

Methods, algorithms, and human-machine interfaces for physical and logical design, including: planning, synthesis, partitioning, modeling, simulation, layout, verification, testing, and documentation of integrated-circuit and systems designs of all complexities. Practical applications of aids resulting in producible analog, digital, optical, or microwave integrated circuits are emphasized.


Computers, IEEE Transactions on

Design and analysis of algorithms, computer systems, and digital networks; methods for specifying, measuring, and modeling the performance of computers and computer systems; design of computer components, such as arithmetic units, data storage devices, and interface devices; design of reliable and testable digital devices and systems; computer networks and distributed computer systems; new computer organizations and architectures; applications of VLSI ...


Consumer Electronics, IEEE Transactions on

The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes


More Periodicals

Most published Xplore authors for Forgery

Back to Top

Xplore Articles related to Forgery

Back to Top

Security Analysis on "A Chaotic Fragile Watermarking Technique with Precise Localization"

2009 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009

Security holes resulting from the independence of pixels in the existing fragile watermarking technique with pixel-precise localization have been pointed out. In this paper, the security of an algorithm with precise localization is analyzed. Vector quantization (VQ) attack, collage attack and oracle attack are implemented on the algorithm. Theoretical analysis and simulation results show that the algorithm has poor security, ...


Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems

IEEE Transactions on Vehicular Technology, 2003

Shieh et al. proposed two multisignature schemes for message recovery -the parallel multisignature scheme and the serial multisignature scheme - for authenticating delegates in mobile code systems. In this paper, we will show that Shieh et al.'s multisignature schemes are vulnerable to insider forgery attacks hence cannot achieve the security requirements they claimed.


Phase based detection of JPEG counter forensics

2015 IEEE International Conference on Electronics, Circuits, and Systems (ICECS), 2015

Many recent techniques for forgery detection tried to counter noise dithering, which is considered to be the most successful technique for removing footprints of JPEG editing in countering forensics. In this paper we propose a novel idea of detecting any noise dithering that is typically adopted in removing footprints in counter anti forensics of images. This technique is based on ...


The Security Requirement for off-line E-cash system based on IC Card

11th International Conference on Parallel and Distributed Systems (ICPADS'05), 2005

An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. ...


SIGMA - A Malaysian signatures’ database

2008 IEEE/ACS International Conference on Computer Systems and Applications, 2008

This poster presents a database of Malaysian signatures named SIGMA describing the strategies adopted in compiling it and its technical details. The database consists of over 6,000 genuine signature samples and over 2,000 forged signature samples of Malaysian nationals. The signature samples are collected simultaneously in both online and offline mode thereby eliminating the variation which is inevitable if the ...


More Xplore Articles

Educational Resources on Forgery

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Forgery"

IEEE-USA E-Books

  • Security Analysis on "A Chaotic Fragile Watermarking Technique with Precise Localization"

    Security holes resulting from the independence of pixels in the existing fragile watermarking technique with pixel-precise localization have been pointed out. In this paper, the security of an algorithm with precise localization is analyzed. Vector quantization (VQ) attack, collage attack and oracle attack are implemented on the algorithm. Theoretical analysis and simulation results show that the algorithm has poor security, and is vulnerable to collage attack and oracle attack.

  • Cryptanalysis of digital multisignature schemes for authenticating delegates in mobile code systems

    Shieh et al. proposed two multisignature schemes for message recovery -the parallel multisignature scheme and the serial multisignature scheme - for authenticating delegates in mobile code systems. In this paper, we will show that Shieh et al.'s multisignature schemes are vulnerable to insider forgery attacks hence cannot achieve the security requirements they claimed.

  • Phase based detection of JPEG counter forensics

    Many recent techniques for forgery detection tried to counter noise dithering, which is considered to be the most successful technique for removing footprints of JPEG editing in countering forensics. In this paper we propose a novel idea of detecting any noise dithering that is typically adopted in removing footprints in counter anti forensics of images. This technique is based on detecting phase variations for DCT coefficients, for decoded JPEG images. We try to measure the level of coherence of phase values for coefficients and detect thresholded variations that would indicate some editing or tampering of images. The proposed technique is robust against noise dithering due to the fact that local homogeneous regions inherit distinctive phase values. These phase values are inconsistent with embedded or dithered noise signals that are considered to be out of phase and can be easily detected in noisy environments. Our proposed technique is compared with literature techniques for performance in noisy applications.

  • The Security Requirement for off-line E-cash system based on IC Card

    An offline E-cash system is presented that offers appreciably greater security and better privacy than currently considered E-cash system with similar functionality. Most off-line E-cash systems use the temper-resistant IC card which controls an E-cash issued by the card issuer. Offline E-cash system based on IC card has the threats of overspending, double spending, forgery E-cash, altering/eavesdropping transaction contents, etc. To prevent the above threats, there have been a lot of technical discussions of the security requirements for theoretical offline E-cash protocols based on IC card. However, there has been little attention paid to the security requirements for practical offline E-cash system based on IC card including entity authentication, key management, implementation of cryptographic algorithm, etc. Thus, this paper describes the security requirements for cryptographic algorithms, integrity for implementation of cryptographic algorithm, authentication module, key management, and E-cash protocols

  • SIGMA - A Malaysian signatures’ database

    This poster presents a database of Malaysian signatures named SIGMA describing the strategies adopted in compiling it and its technical details. The database consists of over 6,000 genuine signature samples and over 2,000 forged signature samples of Malaysian nationals. The signature samples are collected simultaneously in both online and offline mode thereby eliminating the variation which is inevitable if the two modes are done at different times. This is particularly appealing to studies which are aimed at exploring the co- relationships between static signature features and their dynamic counterparts (that are derived from offline and online signature samples respectively). Furthermore, all forgeries in the database are 'skilledforgeries'. The collection of only Malaysian signatures makes the database very useful for designing a signature verification system that is optimized to verify Malaysian signatures.

  • Face pose analysis and estimation

    None

  • Reducing Forged Features Using Tampered and Inconsistent Image Detection Techniques in Digital Image Processing

    The fast advent and development of numerous low cost commercial image editing software, distortions in image are easy and its quick recognition and identification is very hard. This has resulted in digital image manipulations (also known as forgery and meddling) which alters the original image and hides or removes meaningful information and makes it tampered. All this is done with a malicious motivation to change the originality of image. Over the past decades a very promising field called as the field of digital forensics has emerged to help restore some trust to digital images. Restoring the traditional trustworthiness on digital photos plays prominent role as doctored photos are enhancing with growing frequency and sophistication these days .In this paper, we focus on image forensic detection on tampered pictures. The detection of a tampering in image is driven to provide authenticity and to maintain integrity of the image so that tampering is detected and minimized.

  • A New Type of Collusion Attacks against Threshold Proxy Signature Schemes

    In a (t, n) threshold proxy signature scheme, the original signer can delegate the signing power to n proxy signers such that any t or more out of n proxy signers can sign messages on behalf of the original signer, but t - 1 or less of the proxy signers cannot generate a proxy signature. In this paper, we classify the attacks against the threshold proxy signature schemes. In addition, we present a new type of collusion attacks. Xie's threshold proxy signature scheme is insecure against the new type of collusion attack. It seems that if the threshold proxy signature schemes only require some secret (t - 1)-degree polynomials to fulfil the proxy share generation and the signature generation, the threshold proxy signature schemes will always suffer from the type of collusion attacks.

  • Simultaneous forgery identification and localization in paintings using advanced correlation filters

    With the availability of high resolution digital technology, there has been increased interest in developing statistical and image processing techniques that can enhance the existing capabilities of analyzing works of art for authenticity. This work explores the merits of using advanced correlation filters in supplementing art experts efforts in identifying forgeries among disputed paintings. We show that by training the optimal trade-off synthetic discriminant function (OTSDF) filter on each section of a coarsely parceled image of an original painting, we are not only able to distinguish between a low-quality digitized representation of a painting and its forgery, but also specifically indicate where the differences occur and where the replica is particularly faithful to the original. This method is also valuable in determining whether an original painting has undergone any modifications, given that a representation of the initial version is available.

  • A Modified Strong Proxy Signature Scheme For Privacy Protection

    Now most of the proxy signature scheme can't protect original signer's privacy efficiently. Based on the current situation, as we cryptanalyzes the existing digital proxy signature scheme for privacy protection in this paper, we find a lack of security in the former ones and put forward a new modified scheme, which resolves security problem in original scheme. The improvement is much more perfect and adaptable. The modified scheme can completely prevent the forgery attack by original signer in the process of proxy signature and resist all known attack.



Standards related to Forgery

Back to Top

No standards are currently tagged "Forgery"