Search Results/Filters    

Filters

Year

Banks



Expert Group








Full-Text


Issue Info: 
  • Year: 

    2025
  • Volume: 

    7
  • Issue: 

    2
  • Pages: 

    13-24
Measures: 
  • Citations: 

    0
  • Views: 

    6
  • Downloads: 

    0
Abstract: 

Introduction: Forgery is a reprehensible and immoral behavior that usually aims at financial gain, but may be done to influence the opinion of one person, deceive another, or simply to cause harm. Given the technological developments and the expansion of the use of digital tools, computer Forgery has become one of the serious challenges in legal systems. Therefore, the aim of the present study is to examine the ethical dimensions of Forgery and comparative analysis of computer Forgery and traditional Forgery in Iranian and Iraqi law. Material and Methods: This study used reliable sources and international scientific articles in the field of ethical consideration of Forgery and comparative analysis of computer Forgery and traditional Forgery. Conclusion: Since the emergence of writing and the beginning of the use of writing to convey intentions and thoughts, distortion and alteration of lines and words have been recognized as immoral, undesirable and criminal acts. In Islamic law, Forgery is recognized as one of the examples of Ta’zir crimes, and the Holy Quran has also considered this act immoral and reprehensible and has included it among the sins. With the comparative analysis presented regarding computer Forgery and electronic documents in Iranian and Iraqi law, general and practical conclusions can be reached. This study showed that both legal systems, despite similarities in the main concepts and objectives of the laws, have different approaches in formulating and implementing regulations related to Forgery and electronic documents.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 6

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Journal: 

Legal Research

Issue Info: 
  • Year: 

    2011
  • Volume: 

    -
  • Issue: 

    53
  • Pages: 

    147-182
Measures: 
  • Citations: 

    0
  • Views: 

    6420
  • Downloads: 

    0
Abstract: 

Part of the physical element (Actus Reus) is the subject of a crime upon which the criminal behavior is established. The subject of Forgery are the objects that are used to state will in different legal situations. Documents and other forms of writhing are widespread examples of such items the state will mention in statutes related to Forgery, but the state interest is not limited to those. Anything which is useable for this purpose has the same validity as a document and is considered a subject of Forgery, whether or not it is declared is the law. The declarations of legislators with regard to documents, writing, seals, stamps, logos and punches are the refore exemplary. Each of these mentioned objects are not exhaustively considered as subjects of Forgery, rather in the term that is useable as a real document, writing or seal is considered as a subject of Forgery. In the case of documents and writing, both their form and content must be the same as a real document and writing. Creating false writings that are not useable in legal contexts both in their form and content, does not constitute forgeries.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 6420

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    9
  • Issue: 

    1 (33)
  • Pages: 

    109-128
Measures: 
  • Citations: 

    0
  • Views: 

    8630
  • Downloads: 

    0
Abstract: 

Forgery which is a major crime of depriving public trust and heckle in economic system of a country, is considered as one of the factors of social inefficiency in a community.Committing the crime of Forgery in different aspects and various levels is being evolved by technology development, international and domestic communications and exchanges, therefore in modern technique of preventing Forgery, determining security and safety indicators of Forgery in making documents seems to be one of the essential and efficient factors.The present research which its method is descriptive, aims to study the level of the effect of four main factors in making valuable documents (e.g. paper, design, print and attachable items) in preventing Forgery using questionnaire.The main aim of this research is identifying the modern techniques of preventing Forgery and studying the main and fundamental factors in paper, design, print and functions of attachable items to the documents as security components in Forgery prevention. The statistical population of this research consists of 41 experts in the area of Forgery and producing security documents and the survey is done in total number manner.The results indicate that utilizing the four factors mentioned above is an important and efficient indicator in Forgery prevention. Finally, developing and enhancing the national committee of Forgery prevention is the most significant long-term strategic suggestion for coordination and policy making in preventing and fighting against Forgery along with situational prevention been presented.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 8630

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SALARI SHAHR BABAKI M.R.

Issue Info: 
  • Year: 

    2007
  • Volume: 

    11
  • Issue: 

    2 (TOME 51)
  • Pages: 

    73-105
Measures: 
  • Citations: 

    0
  • Views: 

    1024
  • Downloads: 

    0
Abstract: 

The purpose of this paper is: (a) to briefly examine the issues related to the element of compensation in the crime of Forgery and to discuss different views expressed about it; and (b) to clarify ambiguities regarding the element of compensation in the crime of Forgery that either have not been addressed in the writings of jurists or addressed differently with conflicting results. Therefore, the paper, firstly, describes and examines the element of compensation in the crime of Forgery by relying on the opinions of the Iranian Supreme Court and the views of the criminal lawyers, and analyses the views on the basis of the Islamic Punishment Law. Secondly, it explains the conditions and factors necessary for the formation of the element of compensation in the crime of Forgery. In contrary to some views that some of these factors are essential in forming the element of compensation in the crime of Forgery, the present paper indicates that they are not essential and that they are just necessary conditions for forming such an element. In addition, the paper analyses the related theories and tries to find proper answers to the possible questions.Finally, the paper, by relying on various views and opinions expressed by lawyers, discusses the issue of compensation with regard to any illegal change in invalid documents.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1024

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

Journal: 

Journal of Law

Issue Info: 
  • Year: 

    2019
  • Volume: 

    6
  • Issue: 

    3
  • Pages: 

    21-49
Measures: 
  • Citations: 

    1
  • Views: 

    47
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 47

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2010
  • Volume: 

    12
  • Issue: 

    28
  • Pages: 

    279-300
Measures: 
  • Citations: 

    0
  • Views: 

    4842
  • Downloads: 

    0
Abstract: 

Upon criminal act (actus reus) Forgery and deception divide into two groups: concrete and abstract. The concrete one can be divided into two types: 1. overall and primary concrete Forgery, 2. minor and secondary concrete Forgery. In every two types of concrete Forgery, the criminal act (actus reus) is a positive act and conduct but there are some differences. In the abstract Forgery, the criminal act (actus reus) is a positive action and sometimes failure or refusal of a document editor to insert the desired content will redouned to a forged document. The overall and primary criminal act (actus reus) is making and creating a complete document that non of its elements are concrete Forgery and the offender creates all components of it. The minor and secondary criminal act (actus reus) is adding or deleting some parts of a document. Of course those parts must be effective ones. Actus reus in all of mentioned forms can be simple and solid or complex and complicated. Change of theme or content on the time of making is the actus reus in abstract Forgery. This alleged behavior is conceivable when a person is incumbent to make a document in relation to another one. In this case the later asserts something but the former writes another thing. In all mentioned cases, the actus reus must be detrimental to others. Detriment and harm- whenever material and spiritual - is personally and socially. Contrary to fact cannot be considered as the condition of criminal conduct. Forgery and deception can be committed even the conduct conforms to the fact.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 4842

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    11
  • Issue: 

    3
  • Pages: 

    429-442
Measures: 
  • Citations: 

    0
  • Views: 

    22
  • Downloads: 

    3
Abstract: 

Image is a powerful communication tool that is widely used in various applications, such as forensic medicine and court, where the validity of the image is crucial. However, with the development and availability of image editing tools, image manipulation can be easily performed for a specific purpose. Copy-move Forgery is one of the simplest and most common methods of image manipulation. There are two traditional methods to detect this type of Forgery: block-based and key point-based. In this study, we present a hybrid approach of block-based and key point-based methods using meta-heuristic algorithms to find the optimal configuration. For this purpose, we first search for pair blocks suspected of Forgery using the genetic algorithm with the maximum number of matched key points as the fitness function. Then, we find the accurate Forgery blocks using simulating annealing algorithm and producing neighboring solutions around suspicious blocks. We evaluate the proposed method on CoMoFod and COVERAGE datasets, and obtain the results of accuracy, precision, recall and IoU with values of 96.87, 92.15, 95.34 and 93.45 respectively. The evaluation results show the satisfactory performance of the proposed method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 22

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 3 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    12
  • Issue: 

    Special Issue
  • Pages: 

    1947-1955
Measures: 
  • Citations: 

    0
  • Views: 

    30
  • Downloads: 

    4
Abstract: 

One of the challenges today is capturing fake images. One type of image Forgery is a copy-move Forgery. In this method, a part of the image is copy and placed at the most similar point. Due to the existing algorithms and processing software, it is not easy to detect Forgery areas and has created challenges in various applications. Based on the Bat algorithm, the proposed method has tried to help detect fake images by finding Forgery areas. The proposed method includes a simple image segmentation and detection of Forgery areas with the help of the BAT Algorithm with Mutation. According to the proposed algorithm, the image is first grayed out, then divided into 100 pieces. The optimal Bat algorithm randomly selects some component image and performs a similarity search. The mutation operator is used to avoid getting stuck in the local optimization. The proposed algorithm does not get stuck in the local optimization with the help of the mutation operator and can find Forgery areas with a precision of about 81.39% for the IMD dataset and about 81.04% for the MICC-F600 dataset.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 30

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 4 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2021
  • Volume: 

    15
  • Issue: 

    55
  • Pages: 

    61-80
Measures: 
  • Citations: 

    0
  • Views: 

    820
  • Downloads: 

    0
Abstract: 

Background and Aim: Due to the transformation of the context of registration crimes from traditional space to cyberspace, which is done by computer in a different commission space, which is the difference in the material element, creates ambiguities about the effectiveness of the criminal justice system. Therefore, in this article, we seek to examine the question of whether in Iranian law, criminal responses have been developed in accordance with the crimes of registration in cyberspace and according to the differences in the conditions and characteristics of crimes of registration in cyberspace and real space? Methodology: The present study has been done by descriptive-analytical method and through library studies. Findings and Conclusion: First of all, it should be noted that since the registration laws that govern the registration materials and regulations, it is necessary to make changes in the synchronization of registration laws with the needs of society, because these laws are sometimes obsolete. The laws themselves are decriminalizing and more empowering to commit crimes. In the field of cyberspace, scams and computer forgeries with notary token are unrealistic fingerprints are among the most common crimes in cyberspace. And the dispersion of related laws is related to the incompatibility of punishment with the relevant crimes, especially in cyberspace.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 820

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2019
  • Volume: 

    7
  • Issue: 

    3
  • Pages: 

    37-52
Measures: 
  • Citations: 

    0
  • Views: 

    699
  • Downloads: 

    0
Abstract: 

Nowadays handwriting is known and accepted as a behavioral biometric. Handwriting-based authentication has become a hot topic of research as a result of increasing handwriting Forgery. In this research an offline text-independent method for detection of forgeries in Persian handwritten documents is presented. The proposed approach is based on extracting two dense textures of basic alphabet and some text details. A one class classification (OCC) with only positive (original) samples is used in classification together with Binarization and Skeletonization in the preprocessing phase. Also, a combination of Gabor filter and LPQ descriptor is used to complete the feature vector. Both descriptors have been used for writer identification and verification in English and Persian but this is the first time that the combination of these two is used on a Persian handwriting. We also introduce a new dataset from 62 individuals with 2 pages per each. In the first instance the writers were instructed to copy a preset text and in the second one they were asked to write at least 6 lines about a picture. These instances were to be used as training and testing samples respectively. In order to generate counterfeit samples, we asked 5 qualified calligraphers to duplicate the second sample of each writer. Three forgeries per writer were generated in this way. Tests results are satisfactory and present more than 84% accuracy, demonstrating the quality of the proposed method.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 699

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button