咨询与建议

限定检索结果

文献类型

  • 12 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 13 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 1 篇 材料科学与工程(可...
    • 1 篇 电子科学与技术(可...
    • 1 篇 计算机科学与技术...
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 核科学与技术
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 2 篇 法学
    • 2 篇 社会学
  • 2 篇 理学
    • 1 篇 数学
    • 1 篇 物理学
  • 1 篇 医学
    • 1 篇 临床医学

主题

  • 13 篇 forgery
  • 3 篇 detection
  • 2 篇 image
  • 2 篇 赝品
  • 2 篇 signature
  • 1 篇 艺术符号学
  • 1 篇 实例
  • 1 篇 copy-move
  • 1 篇 polyvinylchlorid...
  • 1 篇 approaches
  • 1 篇 paintings
  • 1 篇 packaging
  • 1 篇 descriptor
  • 1 篇 hanuman
  • 1 篇 film
  • 1 篇 resampling
  • 1 篇 brisk
  • 1 篇 arbitrated
  • 1 篇 polymer
  • 1 篇 note

机构

  • 1 篇 faculty of compu...
  • 1 篇 moscow state uni...
  • 1 篇 sichuan museum
  • 1 篇 information secu...
  • 1 篇 istituto di scie...
  • 1 篇 key laboratory o...
  • 1 篇 school of cybers...
  • 1 篇 school of comput...
  • 1 篇 department of ma...
  • 1 篇 laboratory of el...
  • 1 篇 east china norma...
  • 1 篇 shandong provinc...
  • 1 篇 tsinghua univers...

作者

  • 1 篇 安静
  • 1 篇 khaled elsayed
  • 1 篇 zheng shihui
  • 1 篇 wu lingwei(trans...
  • 1 篇 qi han
  • 1 篇 meiqin wang
  • 1 篇 张秀芳
  • 1 篇 wen kai
  • 1 篇 sun bin
  • 1 篇 hongli zhang
  • 1 篇 ngohe ekam paul ...
  • 1 篇 bell bitjoka geo...
  • 1 篇 g.pedrazzi
  • 1 篇 mahmoud emam
  • 1 篇 i.ortalli
  • 1 篇 匿名
  • 1 篇 cheng-lun shih
  • 1 篇 章辉
  • 1 篇 li zichen li zho...
  • 1 篇 alexey benda

语言

  • 9 篇 英文
  • 4 篇 中文
检索条件"主题词=Forgery"
13 条 记 录,以下是1-10 订阅
排序:
ITALIAN MONEY TESTED FOR forgery BY MOSSBAUER SPECTROSCOPY
收藏 引用
Nuclear Science and Techniques 1993年 第1期4卷 39-41页
作者: I.Ortalli G.Pedrazzi 蒋可玉 张秀芳 Istituto di Scienze Fisiche University of Parma 43100 Parma Italy East China Normal University Shanghai 200062 China Tsinghua University Beijing 100084 China
Italian money has been investigated by Mossbauer spectroscopy. The results indicated that the spectrum of a 10000 lire bank-note consisted of three magnetic sextets and two quadrupole doublets, the spectrum of a 50000... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Fast forgery Detection with the Intrinsic Resampling Properties
收藏 引用
Journal of Information Security 2010年 第1期1卷 11-22页
作者: Cheng-Chang Lien Cheng-Lun Shih Chih-Hsun Chou 不详
With the rapid progress of the image processing software, the image forgery can leave no visual clues on the tampered regions and make us unable to authenticate the image. In general, the image forgery technologies of... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Detection of Copy-Scale-Move forgery in Digital Images Using SFOP and MROGH
收藏 引用
国际计算机前沿大会会议论文集 2016年 第1期 83-85页
作者: Mahmoud Emam Qi Han Hongli Zhang School of Computer Science and Technology Harbin Institute of TechnologyHarbin150080China Department of Mathematics Faculty of ScienceMenoufia UniversityShebin El-koom32511Egypt
Social network platforms such as Twitter, Instagram and Facebook are one of the fastest and most convenient means for sharing digital images. Digital images are generally accepted as credible news but, it may undergo ... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A NEW forgery ATTACK ON MESSAGE RECOVERY SIGNATURES
收藏 引用
Journal of Electronics(China) 2000年 第3期17卷 234-237页
作者: Li Zichen Li Zhongxian Yang Yixian , Wu Weilin (PO Box 126, Information Security Center, Beijing Univ. of Posts and Telecom., Beijing 100876) Information Security Center Beijing Univ. of Posts and Telecom. Beijing
After extending the forgery attacks to Nyberg-Rueppel’s signatures with message recovery, Atsuko Miyaji in 1997 proposed two suitable message recovery signatures, (F1) and (F2). In this paper, another new forgery att... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis of PRIMATEs
收藏 引用
Science China(Information Sciences) 2020年 第1期63卷 130-139页
作者: Yanbin LI Meiqin WANG Wenqing LIU Wei WANG Key Laboratory of Cryptologic Technology and Information Security Ministry of EducationShandong University Shandong Provincial Key Laboratory of Computer Networks
PRIMATEs is a family of authenticated encryption design submitted to competition for authenticated encryption: security, applicability, and robustness. The three modes of operation in PRIMATEs family are: APE, HANUMAN... 详细信息
来源: 同方期刊数据库 同方期刊数据库 评论
Cryptanalysis on ‘an arbitrated quantum signature protocol based on the chained CNOT operations encryption’
收藏 引用
The Journal of China Universities of Posts and Telecommunications 2019年 第3期26卷 73-80页
作者: Wen Kai Zheng Shihui Sun Bin School of Cyberspace Security Beijing University of Posts and Telecommunications
Arbitrated quantum signature(AQS) is an important branch in quantum cryptography to authenticate quantum information, and cryptanalysis on AQS protocols helps to evaluate and improve security of AQS. Recently, it is d... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Towards a New Model for the Production of Civil Status Records Using Blockchain
收藏 引用
Journal of Information Security 2023年 第1期14卷 52-75页
作者: Tankou Tsomo Maurice Eddy Bell Bitjoka Georges Ngohe Ekam Paul Salomon Laboratory of Electrical Engineering Mechatronics and Signal Processing ENSPY1 University of Yaoundé 1 Yaoundé Cameroon
The work presented in this article focuses on document forgery. Document fraud is a generic term used to designate a fraud, a falsification of a document. The said falsification can be observed in several sectors of e... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Copy-Move Forgeries Detection and Localization Using Two Levels of Keypoints Extraction
收藏 引用
Journal of Computer and Communications 2019年 第9期7卷 1-18页
作者: Soad Samir Eid Emary Khaled Elsayed Hoda Onsi Faculty of Computers and Information Cairo University Giza Egypt
Copy-move offense is considerably used to conceal or hide several data in the digital image for specific aim, and onto this offense some portion of the genuine image is reduplicated and pasted in the same image. There... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Discussion on the Appraisal of Ancient Chinese Calligraphies and Paintings
收藏 引用
Contemporary Social Sciences 2019年 第5期4卷 110-120页
作者: Li Lin Wu Lingwei(Translator) Sichuan Museum 不详
Throughout Chinese history there have been many outstanding calligraphers and painters who have left behind numerous *** have also been endless copycats,forgeries and ghost-creations bringing much trouble and chaos to... 详细信息
来源: 维普期刊数据库 维普期刊数据库 同方期刊数据库 同方期刊数据库 评论
Optical document security /  2nd ed
收藏 引用
1998年
作者: 匿名
来源: 畅想之星图书光盘版(南... 评论