Showing 161 - 171 results of 171 for search '"forgery"', query time: 0.04s Refine Results
  1. 161

    Hellenistic and Roman gems and jewellery from south-western Turkey by Lafli, E., Henig, M.

    Published 2024-09-01
    “…The final two parts of the paper describe two forgeries and then the bezel of a finger‑ring and a clay bulla, both of which are of Hellenistic date…”
    Article
  2. 162

    TESTAMENT MANCYPACYJNY ANTONIUSA SILVANUSA by Aneta Skalec

    Published 2017-06-01
    “…It was then meticulously closed in order to protect it from forgeries. …”
    Get full text
    Article
  3. 163

    Synthetic dataset of ID and Travel Documents by Carlos Boned, Maxime Talarmain, Nabil Ghanmi, Guillaume Chiron, Sanket Biswas, Ahmad Montaser Awal, Oriol Ramos Terrades

    Published 2024-12-01
    “…In this paper we introduce a dataset, synthetically generated, that simulates the most common, and easiest, forgeries to be made by common users of ID documents and travel documents. …”
    Get full text
    Article
  4. 164

    La thermoluminescence comme prisme de l’étude du faux : application aux terres cuites chinoises by Armel Bouvier

    Published 2019-06-01
    “…Analytical results are often the same but still enable the detection of forgeries, even the most intelligent ones. The application of analysis techniques on works of art for more than 10 years in the CIRAM laboratory is useful to illustrate forgers’ crafting, along with the art market variations.…”
    Get full text
    Article
  5. 165

    ‘AERARIUM’ I PRZECHOWYWANIE AKTÓW PRAWNYCH by Elżbieta Loska

    Published 2016-12-01
    “…One of the reasons for this regulation was the prevention of forgeries. Any amendment to the text of a document after its deposition in the aerarium was treated as invalid. …”
    Get full text
    Article
  6. 166

    Le Chronicon Ovetense : transmission des textes dans le royaume de León, XIe-XIIIe siècles by David Gazel

    Published 2022-02-01
    “…Its content has been associated to the forgeries attributed to bishop Pelayo. However, a more detailed analysis shows that far away from being derived from his works, this text is one of his sources as well as one of Lucas de Tuy’s Chronicon Mundi and of Crónica Najerense, which have used information and textual variants lacking in Pelayo. …”
    Get full text
    Article
  7. 167

    True or False? Defining the Fake in Chinese Porcelain by Stacey Pierson

    Published 2019-06-01
    “…Ultimately, truly deceptive fakes, like forgeries, are an increasing problem across the arts, not just in Chinese porcelain, but this article demonstrates that the production of fake Chinese porcelain was deceptive in several different ways and such porcelains were made in a very particular context that is revealed when the subject of ‘fake’ porcelain is positioned within a historical stylistic framework.…”
    Get full text
    Article
  8. 168

    Characterization of a wooden Brazilian sculpture using µXRF and µCT by Marcelo Lemos da Silva, Ivan Napoleão Bastos, Luis César Rodríguez Aliaga, Joaquim Teixeira de Assis

    Published 2024-12-01
    “…In many cases it is possible to determine the period in which the artifact was created, identify the techniques used by the artist, provide data of a possible restoration process, in addition to helping to identify possible forgeries in valuable works. In this paper, two non-destructive characterization techniques were used: micro-X-ray fluorescence (µXRF) and X-ray microtomography (µCT), with the aim of characterizing a wooden Our Lady of the Immaculate Conception sculpture. µXRF measurements were carried out at 30 spots on the sculpture to identify the pigments used. …”
    Get full text
    Article
  9. 169

    Strongly Unforgeable Ring Signature Scheme from Lattices in the Standard Model by Geontae Noh, Ji Young Chun, Ik Rae Jeong

    Published 2014-01-01
    “…To date, various ring signature schemes have been proposed, all considered to be secure as existentially unforgeable with respect to insider corruption; that is, an adversary who chooses ring-message pairs for which he requests signatures, corrupts honest users, and obtains their signing keys can not produce forgeries for new ring-message pairs. Lattice-based ring signature schemes offer lower computational overhead and security from quantum attacks. …”
    Get full text
    Article
  10. 170

    A Secure Learned Image Codec for Authenticity Verification via Self-Destructive Compression by Chen-Hsiu Huang, Ja-Ling Wu

    Published 2025-01-01
    “…Our experiments demonstrate that SLIC holds significant promise as a proactive defense strategy against image manipulation, offering a new approach to enhancing image credibility and authenticity in a media landscape increasingly dominated by AI-driven forgeries.…”
    Get full text
    Article
  11. 171

    Dva příběhy z kriminálního podsvětí – padělatelé peněz na hradě Žampachu a přepadání Židů v roce 1542 by František Šebek

    Published 2010-07-01
    “…In the workshop they minted Görlitz black money, Viennese money (1⁄2 kreutzer) and the Austrian groschen (3 kreutzers). These forgeries were exchanged for real money at the ratio of 2 : 1. …”
    Get full text
    Article