Skip to search formSkip to main contentSkip to account menu
You are currently offline. Some features of the site may not work correctly.

Identity document forgery

Known as: Identification document forgery, False ID, False identification 
Identity document forgery is the process by which identity documents issued by governing bodies are copied and/or modified by persons not authorized… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
  • L. Li
  • 2013
  • Corpus ID: 155071966
With the increase of globalization in trading and online shopping, phony products are on the rise in the market. This article… Expand
2009
2009
Intrusion detection is a problem of great significance to protecting information systems security. An intruder may move between… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
2009
2009
War between the good and evil in the internet ground is increasingly tougher as more and more refined evolution takes place in… Expand
  • figure 4
  • table I
  • table II
  • table III
  • figure 5
Highly Cited
2006
Highly Cited
2006
Hot data identification for flash memory storage systems not only imposes great impacts on flash memory garbage collection but… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Highly Cited
2006
Highly Cited
2006
In a fault tolerant control (FTC) system, a parameter varying FTC law is reconfigured according to fault parameters estimated by… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
Review
2003
Review
2003
We complete construction of a catalog containing improved astrometry and new optical/infrared photometry for the vast majority of… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2000
Highly Cited
2000
One envisioned application of digital watermarking is fingerprinting, in which different information is embedded into several… Expand
  • figure 1
  • figure 2
  • figure 3
Highly Cited
1999
Highly Cited
1999
Abstract Spectral matching and linear mixture modeling techniques have been applied to synthetic imagery and AVIRIS SWIR imagery… Expand
  • figure 2
  • table 1
  • table 2
  • figure 3
  • table 3
Review
1995
Review
1995
The risk of eyewitnesses making false identifications is influenced by the methods used to construct and conduct lineups. The… Expand
Highly Cited
1990
Highly Cited
1990
Some software design metrics are evaluated using data from a communications system. The design metrics investigated were based on… Expand