Forgery

View this topic in
Forgery is the process of making, adapting, or imitating objects, statistics, or documents with the intent to deceive. Copies, studio replicas, and reproductions are not considered forgeries, though they may later become forgeries through knowing and willful misrepresentations. (Wikipedia.org)






Conferences related to Forgery

Back to Top

ICASSP 2017 - 2017 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.

  • ICASSP 2015 - 2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.

  • ICASSP 2014 - 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    ICASSP 2014 will be the world s largest and most comprehensive technical conference focused on the many facets of signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and oral/poster sessions on the most up-to-date topics in signal processing research.

  • ICASSP 2013 - 2013 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.

  • ICASSP 2012 - 2012 IEEE International Conference on Acoustics, Speech and Signal Processing

    The latest research results on both theories and applications on signal processing will be presented and discussed among participants from all over the world. Video/Speech Signal processing used in human interface between Robots and Personal users will be highlighted.

  • ICASSP 2011 - 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)

    The ICASSP meeting is the world s largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions on: Audio and electroacoustics Bio imaging and signal processing Design and implementation of signal processing systems Image and multidimensional signal processing Industry technology tracks Information forensics and security.

  • ICASSP 2010 - 2010 IEEE International Conference on Acoustics, Speech and Signal Processing

    TBA

  • ICASSP 2009 - 2009 IEEE International Conference on Acoustics, Speech and Signal Processing

    The 34th ICASSP will be held in Taiwan April 19-24, 2009. The ICASSP meeting is the world's largest and most comprehensive technical conference focused on signal processing and its applications. The conference will feature world-class speakers, tutorials, exhibits, and over 50 lecture and poster sessions.


2013 IEEE International Conference on Multimedia and Expo (ICME)

To promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2012 IEEE International Conference on Multimedia and Expo (ICME)

    IEEE International Conference on Multimedia & Expo (ICME) has been the flagship multimedia conference sponsored by four IEEE Societies. It exchanges the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.

  • 2011 IEEE International Conference on Multimedia and Expo (ICME)

    Speech, audio, image, video, text processing Signal processing for media integration 3D visualization, animation and virtual reality Multi-modal multimedia computing systems and human-machine interaction Multimedia communications and networking Multimedia security and privacy Multimedia databases and digital libraries Multimedia applications and services Media content analysis and search Hardware and software for multimedia systems Multimedia standards and related issues Multimedia qu

  • 2010 IEEE International Conference on Multimedia and Expo (ICME)

    A flagship multimedia conference sponsored by four IEEE societies, ICME serves as a forum to promote the exchange of the latest advances in multimedia technologies, systems, and applications from both the research and development perspectives of the circuits and systems, communications, computer, and signal processing communities.


2013 International Conference on Machine Learning and Cybernetics (ICMLC)

Statistical Machine Learning, Intelligent & fuzzy control, Pattern Recognition , Ensemble method, Evolutionary computation, Fuzzy & rough set, Data & web mining , Intelligent Business Computing , Biometrics , Bioinformatics , Information retrieval, Cybersecurity, Web intelligence and technology, Semantics & ontology engineering, Social Networks & Ubiquitous Intelligence, Multicriteria decision making, Soft Computing, Intelligent Systems, Speech, Image & Video Processing, Decision Support System

  • 2012 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Pattern Recognition, Biometrics, Inductive learning, Evolutionary computation, Bioinformatics, Data mining, Information retrieval, Intelligent agent, Financial engineering, Rough Set, Applications.

  • 2011 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics.

  • 2010 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat

  • 2009 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat

  • 2008 International Conference on Machine Learning and Cybernetics (ICMLC)

    Adaptive systems, Neural net and support vector machine, Business intelligence, Hybrid and nonlinear system, Biometrics, Fuzzy set theory, fuzzy control and system, Bioinformatics, Knowledge management, Data and web mining, Information retrieval, Intelligent agent, Intelligent and knowledge based system, Financial engineering, Rough and fuzzy rough set, Inductive learning, Networking and information security, Geoinformatics, Evolutionary computation, Pattern Recognition, Ensemble method, Logistics, Informat


2013 Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP)

Multimedia technologies with an increasing level of intelligence are emerging to enable theprocess of creating a global information infrastructure that will interconnect heterogeneouscomputer networks and various forms of information technologies around the world. Theconference is intended as an international forum for researchers and professionals in all areas ofinformation hiding and multimedia signal processing. We invite submissions of papers presentinga high-quality original research and development for the conference tracks: (1) Information Hidingand Security, (2) Multimedia Signal Processing and Networking, and (3) Bio-inspired MultimediaTechnologies and Systems.


2012 5th International Congress on Image and Signal Processing (CISP)

CISP is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Pattern recognition, Remote sensing, filters, Signal modeling, etc.

  • 2011 4th International Congress on Image and Signal Processing (CISP)

    CISP 11 is a premier international forum for scientists and researchers to present the state of the art of image and signal processing. Specific topics include Image restoration, Feature extraction, Image and video databases, Pattern recognition, Remote sensing, Filter design & digital filters, Signal modeling, identification & prediction, etc.

  • 2010 3rd International Congress on Image and Signal Processing (CISP)

    CISP 10 is a premier international forum for scientists and researchers to present the state of the art of multimedia and signal processing. It is co-located with the 3rd International Conference on BioMedical Engineering and Informatics (BMEI 2010) to promote interactions biomedical research and signal processing.


More Conferences

Periodicals related to Forgery

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Information Forensics and Security, IEEE Transactions on

Research on the fundamental contributions and the mathematics behind information forensics, information seurity, surveillance, and systems applications that incorporate these features.


Information Theory, IEEE Transactions on

The fundamental nature of the communication process; storage, transmission and utilization of information; coding and decoding of digital and analog communication transmissions; study of random interference and information-bearing signals; and the development of information-theoretic techniques in diverse areas, including data communication and recording systems, communication networks, cryptography, detection systems, pattern recognition, learning, and automata.




Xplore Articles related to Forgery

Back to Top

Abuse-freeness Electronic Payment Protocol

Kai Fan; Yue Wang; Hui Li 2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011

Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party ...


The CRC-NTMAC for noisy message authentication

Y. Liu; C. Boncelet MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

The paper introduces a novel message authentication code based on the recently proposed NTMAC structure, called CRC-NTMAC, for noisy message authentication. As with the NTMAC, the CRC-NTMAC can tolerate a small number of errors, which might be caused by a noisy communication channel. The CRC-NTMAC replaces the truncated conventional MACs by cyclic redundancy check (CRC) codes in its constructions as ...


Design and analysis of DBMAC, an error localizing message authentication code

G. Di Crescenzo; R. Ge; G. R. Arce Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, 2004

The paper introduces a new construct of message authentication codes called DBMAC. It can not only provide the message authentication functionality but also localize a few errors in the message. DBMAC uses a conventional MAC in its construction such that it inherits the conventional MACs resistance to forgeries. Furthermore, the division and butterfly structure gives the capability of localizing a ...


Forward Secure Proxy Blind Signature Scheme

Kai Fan; Yue Wang; Hui Li 2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011

There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature scheme. The security ...


Provably Secure Identity-Based Aggregate Signature Scheme

Jayaprakash Kar 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length. The proposed scheme can be implimentated on Wireless Sensor Networks application. Security of the proposed scheme is based on difficulty of ...


More Xplore Articles

Educational Resources on Forgery

Back to Top

eLearning

Abuse-freeness Electronic Payment Protocol

Kai Fan; Yue Wang; Hui Li 2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011

Abuse-freeness is one of the most interesting new problems in the electronic payment security today. It is an effective supplementary for the fairness. It is confused for researchers how to get real abuse-freeness in electronic payment. An abuse-freeness electronic payment protocol for real goods is proposed in this paper. The protocol has the abuse-freeness by introducing a trusted third party ...


The CRC-NTMAC for noisy message authentication

Y. Liu; C. Boncelet MILCOM 2005 - 2005 IEEE Military Communications Conference, 2005

The paper introduces a novel message authentication code based on the recently proposed NTMAC structure, called CRC-NTMAC, for noisy message authentication. As with the NTMAC, the CRC-NTMAC can tolerate a small number of errors, which might be caused by a noisy communication channel. The CRC-NTMAC replaces the truncated conventional MACs by cyclic redundancy check (CRC) codes in its constructions as ...


Design and analysis of DBMAC, an error localizing message authentication code

G. Di Crescenzo; R. Ge; G. R. Arce Global Telecommunications Conference, 2004. GLOBECOM '04. IEEE, 2004

The paper introduces a new construct of message authentication codes called DBMAC. It can not only provide the message authentication functionality but also localize a few errors in the message. DBMAC uses a conventional MAC in its construction such that it inherits the conventional MACs resistance to forgeries. Furthermore, the division and butterfly structure gives the capability of localizing a ...


Forward Secure Proxy Blind Signature Scheme

Kai Fan; Yue Wang; Hui Li 2011 Third International Conference on Intelligent Networking and Collaborative Systems, 2011

There is no forward security in any proxy blind signature schemes today. The lack of forward security will impact the system security tremendously if the key is stolen. To avoid such a security problem this paper proposes a forward secure proxy blind signature scheme which employs the key evolution mechanism in a newly proposed proxy blind signature scheme. The security ...


Provably Secure Identity-Based Aggregate Signature Scheme

Jayaprakash Kar 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

This paper proposes an efficient and secure identity based online and off-line aggregate signature scheme with random oracles. An aggregate signature privides a technique for combining n differents signatures of n different messages into one signature of constant length. The proposed scheme can be implimentated on Wireless Sensor Networks application. Security of the proposed scheme is based on difficulty of ...


More eLearning Resources

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Forgery"

IEEE-USA E-Books

  • Index

    Digital forensics and multimedia forensics are rapidly growing disciplines whereby electronic information is extracted and interpreted for use in a court of law. These two fields are finding increasing importance in law enforcement and the investigation of cybercrime as the ubiquity of personal computing and the internet becomes ever-more apparent. Digital forensics involves investigating computer systems and digital artefacts in general, while multimedia forensics is a sub-topic of digital forensics focusing on evidence extracted from both normal computer systems and special multimedia devices, such as digital cameras.&nbsp_place_holder; This book focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation. Both fields are expertly attended to by contributions from researchers and forensic practitioners specializ ng in diverse topics such as forensic authentication, forensic triage, forensic photogrammetry, biometric forensics, multimedia device identification, and image forgery detection among many others. Key features: - Brings digital and multimedia forensics together with contributions from academia, law enforcement, and the digital forensics industry for extensive coverage of all the major aspects of digital forensics of multimedia data and devices - Provides comprehensive and authoritative coverage of digital forensics of multimedia data and devices - Offers not only explanations of techniques but also real-world and simulated case studies to illustrate how digital and multimedia forensics techniques work - Includes a companion website hosting continually updated supplementary materials ranging from extended and updated coverage of standards to best practice guides, test datasets and more case studies

  • Printer and Scanner Forensics

    This chapter exhibits the technologies on device source identification and document forgery detection. It presents three examples on printer identification, scanner identification and document forgery detection for details. First, the chapter provides an overview of printer and scanner forensics and compares print forensics and digital image forensics. Next, it presents the difference between laser printers and inkjet printers, as well as a flowchart of printer forensics and forensic algorithms that are based on hardware defects and intrinsic character features. The chapter then shows algorithms used for scanner forensics and a flowchart of scanner forensics. Algorithms for photocopier forensics are discussed. The chapter further introduces some tampering methods and presents flowcharts and algorithms for detecting document forgery. It provides three sample algorithms: for printer forensics, scanner forensics and tampering detection. It finally illustrates details of the algorithms that should clarify how the algorithms work.

  • How to Insure That Data Acquired to Verify Treaty Compliance Are TrustworthyThis chapter first appeared in the Proceedings of the IEEE, vol. 76, no. 5, May 1988.

    In a series of papers [6-8] this author has documented the evolution at the Sandia National Laboratories of a solution to the problem of how to make it possible for two mutually distrusting (and presumed deceitful) parties, the host and the monitor, to both trust a data acquisition system whose function it is to inform the monitor, and perhaps third parties, whether the host has or has not violated the terms of a treaty. The even more important question of what data will adequately show compliance (or noncompliance) and of how this data can be gathered in a way that adequately insures against deception will not be discussed here. We start by assuming that such a data acquisition system exists, and that the opportunities for deception that are the subject of this chapter lie only in the manipulation of the data itself, that is, forgery, modification, retransmission, etc. The national interests of the various participants, host, monitor and third parties, at first appear to be mutually exclusive and irreconcilable, however we will arrive at the conclusion that it is possible to simultaneously satisfy the interests of all parties. The technical device on which this resolution depends is the concatenation of two or more private authentication channels to create a system in which each participant need only trust that part of the whole that he contributed. In the resulting scheme, no part of the data need be kept secret from any participant at any time; no party, nor collusion of fewer than all of the parties can utter an undetectable forgery; no unilateral action on the part of any party can lessen the confidence of the others as to the authenticity of the data and finally third parties, that is, arbiters, can be logically persuaded of the authenticity of data. Thus, finally after nearly two decades of development a complete technical solution is in hand for the problem of trustworthy verification of treaty compliance.

  • Camera-Based Image Forgery Detection

    Recently, an increased number of studies in image authentication and image forgery detection have appeared that are based on indicators arising from the acquisition process of the data, namely due to the inherent characteristics of the camera used to produce the image. This chapter focuses on different aspects of image forgery based on effects and cues found in the image that are due to the acquisition process. These aspects include: image authentication, image forgery detection and image signature. These studies are termed as camera-based image forgery detection methods. The chapter describes the camera structure and the three major components: optics, sensors and imaging pipeline. For each component, its basic mechanism, its role in the acquisition process and its effects on the final acquired image are detailed. The chapter presents a specific camera-based image forgery technique as a case study for the approaches.

  • Content Security

    As content management systems (CMS) are widely used for building public???facing platforms, they are naturally exposed to a wide variety of security threats. Site defacing, information theft, injection attacks, and scripting attacks are some of the most common threats faced by popular CMS portals. This chapter looks at various content security aspects and presents the details of achieving course???grained and fine???grained security measures and content???related security policies. It focuses on common security vulnerabilities such as cross???site scripting (XSS), injection attacks, denial???of???service attacks, cross???site request forgery (CSRF), and click???jacking along with measures to prevent them. The chapter also looks at core content security concerns such as authentication, authorization, single sign???on (SSO), permission model, and security testing scenarios. It describes various security best practices such as layer???wise security, account management, transport???level security CMS hardening, and others. The chapter concludes with a discussion of a security testing case study for a CMS application.

  • Digital Image Forensics with Statistical Analysis

    A large number of forensic methods have been developed in the past decade to answer a broad range of forensic questions. Most image forensic tools can be divided into only two simple categories: semantics-based detection and non- semantics-based detection. This chapter first focuses on the non-semantics- based detection techniques as majority of existing image forensic tools fall into this category. The non-semantics-based detection tools mostly rely on the modelling of statistical patterns of the image using signal-level information. The chapter introduces several recently developed techniques to address two critical topics in the field of multimedia security: detecting region duplication and exposing splicing forgery. It talks about a method for reliable detection of duplicated image regions and an effective image splicing detection algorithm. More realistic case studies for these two techniques are demonstrated. These techniques are further extended to expose forgeries in audio and video signal.



Standards related to Forgery

Back to Top

No standards are currently tagged "Forgery"


Jobs related to Forgery

Back to Top