BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
signatur (7)
verif (6)
skill (5)
use (5)
detect (4)

Stem forgeri$ (all stems)

14 papers:

ICPRICPR-2014-BertoliniOJS #identification
Assessing Textural Features for Writer Identification on Different Writing Styles and Forgeries (DB, LSO, EJRJ, RS), pp. 268–272.
ICDARICDAR-2013-MalikLAOBF #contest #identification #verification
ICDAR 2013 Competitions on Signature Verification and Writer Identification for On- and Offline Skilled Forgeries (SigWiComp 2013) (MIM, ML, LA, WO, MB, BF), pp. 1477–1483.
ICPRICPR-2012-KennardBS #2d #approach #detection #geometry #using #verification
Offline signature verification and forgery detection using a 2-D geometric warping approach (DJK, WAB, TWS), pp. 3733–3736.
ICDARICDAR-2011-LiwickiMHCBSBF #contest #online #verification
Signature Verification Competition for Online and Offline Skilled Forgeries (SigComp2011) (ML, MIM, CEvdH, XC, CB, RS, MB, BF), pp. 1480–1484.
SACSAC-2011-Muramatsu #algorithm #online #random #verification
Random forgery attacks against DTW-based online signature verification algorithm (DM), pp. 27–28.
ICPRICPR-2010-ZhangZ #analysis #canonical #correlation #image #using
Exposing Digital Image Forgeries by Using Canonical Correlation Analysis (CZ, HZ), pp. 838–841.
DRRDRR-2009-SrihariRMB #identification
Identification of forgeries in handwritten petitions for ballot propositions (SNS, VR, MM, GRB), pp. 1–10.
ICDARICDAR-2009-ChenLM #pseudo #towards
Toward Resisting Forgery Attacks via Pseudo-Signatures (JC, DPL, FM), pp. 51–55.
HCIOCSC-2007-MaAL #authentication #protocol
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
ICPRICPR-v4-2006-LuoHQ #detection #image #robust
Robust Detection of Region-Duplication Forgery in Digital Image (WL, JH, GQ), pp. 746–749.
ICDARICDAR-2001-JustinoBS #random #using #verification
Off-line Signature Verification Using HMM for Random, Simple and Skilled Forgeries (EJRJ, FB, RS), pp. 1031–1034.
ICDARICDAR-2001-RheeCK #feature model #online #segmentation #using #verification
On-Line Signature Verification Using Model-Guided Segmentation and Discriminative Feature Selection for Skilled Forgeries (THR, SJC, JHK), pp. 645–649.
ICPRICPR-v2-2000-GuoDR #detection #using
Off-Line Skilled Forgery Detection Using Stroke and Sub-Stroke Properties (JKG, DSD, AR), pp. 2355–2358.
ICDARICDAR-1997-GuoDR #detection #random
Local correspondence for detecting random forgeries (JKG, DSD, AR), pp. 319–323.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.