Identity document forgery
Semantic Scholar uses AI to extract papers important to this topic.
With the increase of globalization in trading and online shopping, phony products are on the rise in the market. This article… Expand Intrusion detection is a problem of great significance to protecting information systems security. An intruder may move between… Expand War between the good and evil in the internet ground is increasingly tougher as more and more refined evolution takes place in… Expand Hot data identification for flash memory storage systems not only imposes great impacts on flash memory garbage collection but… Expand In a fault tolerant control (FTC) system, a parameter varying FTC law is reconfigured according to fault parameters estimated by… Expand We complete construction of a catalog containing improved astrometry and new optical/infrared photometry for the vast majority of… Expand One envisioned application of digital watermarking is fingerprinting, in which different information is embedded into several… Expand Abstract Spectral matching and linear mixture modeling techniques have been applied to synthetic imagery and AVIRIS SWIR imagery… Expand The risk of eyewitnesses making false identifications is influenced by the methods used to construct and conduct lineups. The… Expand Some software design metrics are evaluated using data from a communications system. The design metrics investigated were based on… Expand