Results for 'Forgery'

19 found
Order:
  1. Forgery and the Corruption of Aesthetic Understanding.Sherri Irvin - 2007 - Canadian Journal of Philosophy 37 (2):283-304.
    Prominent philosophical accounts of artistic forgery have neglected a central aspect of the aesthetic harm it perpetrates. To be properly understood, forgery must be seen in the context of our ongoing attempts to augment our aesthetic understanding in conditions of uncertainty. The bootstrapping necessary under these conditions requires a highly refined comprehension of historical context. By creating artificial associations among aesthetically relevant qualities and misrepresenting historical relationships, undetected forgeries stunt or distort aesthetic understanding. The effect of this may (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  2. Forgery: Prediction's Vile Twin.Joachim L. Dagg - 2003 - Science 302:783-784.
    Download  
     
    Export citation  
     
    Bookmark  
  3. Literary Indiscernibles, Referential Forgery, and the Possibility of Allographic Art.Jake Spinella - 2023 - Journal of Aesthetics and Art Criticism 81 (3):306-316.
    Peter Lamarque, in chapter 4 of his 2010 book Work and Object, argues that certain artworks, like musical scores and literary texts, are such that there can be no forgeries of them that purport to be of an actually existing work—what Lamarque calls “referential forgeries”. Lamarque motivates this claim via appeal to another distinction, first made by Goodman, between “allographic” and “autographic” artworks. This article will evaluate Lamarque’s argument that allographic literary works are unable to be referentially forged and will (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  70
    Chiapas Tote Bag.Paloma Atencia-Linares - 2022 - In Darren Hudson Hick, Bloomsbury Contemporary Aesthetics Case Studies.
    Philosophers sometimes discuss cases of forgery and appropriation in art as similar but contrasting examples to understand issues relevant to the artistic value of artworks (Irvin 2005, Hick 2010). Something interesting about these cases is that both in forgeries and in ‘appropriation art’, we find works that can look very similar, and yet, deserve different value judgements or are actually evaluated differently. Moreover, despite the similarity of the cases, the philosophical analysis of what justifies different evaluations in the case (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. “Paintings Can Be Forged, But Not Feeling”: Vietnamese Art—Market, Fraud, and Value.Quan-Hoang Vuong, Manh-Tung Ho, Hong-Kong T. Nguyen, Thu-Trang Vuong & Ho Manh Toan - 2018 - Arts 7 (4):62.
    A work of Vietnamese art crossed a million-dollar mark in the international art market in early 2017. The event was reluctantly seen as a sign of maturity from the Vietnamese art amidst the many existing problems. Even though the Vietnamese media has discussed the issues enthusiastically, there is a lack of literature from the Vietnamese academics examining the subject, and even rarer in from the market perspective. This paper aims to contribute an insightful perspective on the Vietnamese art market, and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Appropriation and Authorship in Contemporary Art.Sherri Irvin - 2005 - British Journal of Aesthetics 45 (2):123-137.
    Appropriation art has often been thought to support the view that authorship in art is an outmoded or misguided notion. Through a thought experiment comparing appropriation art to a unique case of artistic forgery, I examine and reject a number of candidates for the distinction that makes artists the authors of their work while forgers are not. The crucial difference is seen to lie in the fact that artists bear ultimate responsibility for whatever objectives they choose to pursue through (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  7. Artificial intelligence, deepfakes and a future of ectypes.Luciano Floridi - 2018 - Philosophy and Technology 31 (3):317-321.
    AI, especially in the case of Deepfakes, has the capacity to undermine our confidence in the original, genuine, authentic nature of what we see and hear. And yet digital technologies, in the form of databases and other detection tools also make it easier to spot forgeries and to establish the authenticity of a work. Using the notion of ectypes, this paper discusses current conceptions of authenticity and reproduction and examines how, in the future, these might be adapted for use in (...)
    Download  
     
    Export citation  
     
    Bookmark   18 citations  
  8.  33
    Advanced Hybrid Feature Extraction Techniques for Signature Authentication.V. Nagabhuchchayya Chowdry R. Rajkumar, R. Shravan - 2024 - International Journal of Innovative Research in Computer and Communication Engineering 12 (8):10456-10461.
    The feature Obtainment stage of offline systems for authentication of signatures is considered critical and significantly affects performance of these systems. The quantity and calibration of the extracted features determine the systems' ability to differentiate between real and fake signatures. Using a combination of Convolutional Neural Network and a Histogram of Oriented Gradients (HOG), feature selection technique (Decision Trees) to isolate critical characteristics, we devised a advanced approach to attribute elicitation from signature photos in this research. At last, we integrated (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. Appearance and History: the Autographic/Allographic Distinction Revisited.Enrico Terrone - 2018 - British Journal of Aesthetics 58 (1):71-87.
    Nelson Goodman notoriously distinguished between autographic works, whose instances should be identified by taking history of production into account, and allographic works, whose instances can be identified independently of history of production. Scholars such as Jerrold Levinson, Flint Schier, and Gregory Currie have criticized Goodman’s autographic/allographic distinction arguing that all works are such that their instances should be identified by taking history of production into account. I will address this objection by exploiting David Davies’ distinction between e-instances and p-instances of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Aesthetics, experience, and discrimination.Robert Hopkins - 2005 - Journal of Aesthetics and Art Criticism 63 (2):119–133.
    Can indistinguishable objects differ aesthetically? Manifestationism answers ‘no’ on the grounds that (i) aesthetically significant features of an object must show up in our experience of it; and (ii) a feature—aesthetic or not—figures in our experience only if we can discriminate its presence. Goodman’s response to Manifestationism has been much discussed, but little understood. I explain and reject it. I then explore an alternative. Doubles can differ aesthetically provided, first, it is possible to experience them differently; and, second, those experiences (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  11. Ernst Mach and the Theory of Relativity.Gereon Wolters - 1984 - Philosophia Naturalis 21 (2/4):630-341.
    This article shows that those texts, attributed to Ernst Mach, that reject relativity theory are posthumous forgeries.
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  12. Review of 'The aesthetics and ethics of copying'. Hick, Darren Hudson and Reinhold Schmücker, eds. London: Bloomsbury academic, 2016, XX + 408 pp., 1 b&w illus., £28.99 paper. [REVIEW]Lee Walters - 2019 - Journal of Aesthetics and Art Criticism 77 (3):345-349.
    A review of 'The aesthetics and ethics of copying'. Hick, Darren Hudson and Reinhold Schmücker, eds.
    Download  
     
    Export citation  
     
    Bookmark  
  13. John of Salisbury and Pseudo-Plutarch.H. Liebeschüfenzitz - 1943 - Journal of the Warburg and Courtauld Institutes 6 (1):33-39.
    Argues that John of Salisbury's Institutio Traiani is a pseudo-classical forgery. 34: "In my opinion this framework within which John presents his opinions is a pseudo-classical invention of his own, and an invention which in its combination of clerical and classical features is characteristic of the author.".
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  14. Online Block Chain Based Certificate Generation and The Validation.P. Vinayasree P. Vinayasree - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (12):1 - 7.
    Every year, thousands of people receive degrees as a result of an ineffective anti-forge process, events that cause the graduation certificate to be forged often get noticed. According to the Education statistics, a document certificate of document verification is a complex domain that involves various challenging processes to authenticate. Every node in the vast, publicly accessible Certificate of Block chain network saves and authenticates identical data. The handbook suggested block chain-based method lowers the probability of certificate forgery. The system's (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. In Search of Zär’a Ya‛ǝqob: On the History, Philosophy, and Authorship of the Ḥatäta Zär’a Ya‛ǝqob and the Ḥatäta Wäldä Ḥəywät.Lea Cantor, Jonathan Egid & Fasil Merawi (eds.) - 2024 - Berlin: De Gruyter.
    The Ḥatäta Zärʾa Yaʿǝqob and the Ḥatäta Wäldä Ḥəywät are enigmatic and controversial works. Respectively an autobiography and a companion treatise by a disciple, they are composed in the Gǝʿǝz language and set in the highlands of Ethiopia during the seventeenth century. Expressed in prose of great power and beauty, they bear witness to pivotal events in Ethiopian history and develop a philosophical system of considerable depth. However, they have also been condemned by some as a forgery, an elaborate (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16.  38
    Evaluation for Vulnerability Scanning in Web Applications.Atharva Kharate Prof Smita Chunamari - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (4):9460-9467.
    As the internet continues to evolve, the security of web applications has become a paramount concerns for businesses and individuals alike. The ”Website Vulnerability Scanner” project is designed to address this challenge by developing a comprehensive tool that automat-can detect, analyze, and report potential security vulnerabilities on websites. This scanner focuses on identifying a wide range of common web application vulnerabilities, including but not limited to SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), broken authentication, insecure file uploads, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  28
    AI-Based Aadhar & Smart Card Verification System for Loan Waiver.J. Divya Srinivasan C., Dharanidharan N., Pugalenthi S., Subramanian M., DrK. Poornapriya, DrS. Roshini - 2025 - International Journal of Innovative Research in Science Engineering and Technology 14 (4).
    Loan waivers play a crucial role in supporting financially distressed individuals, but the verification process is often plagued by inefficiencies, errors, and fraudulent claims. Traditional methods rely on manual validation of Aadhar and smart cards, which are time-consuming and vulnerable to forgery. To address these challenges, this project proposes an AI-based Aadhar and Smart Card Verification System that automates identity authentication using advanced technologies. The system captures Aadhar and smart card images through a scanner or camera and processes them (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  24
    Study on Blockchain-Based Certificate Verification and Validation.Dr M. Rathi . Sobhika S. - 2025 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (4).
    This review critically examines the developing state of blockchain technology as an evolutionary measure to improve the security, transparency and efficiency of certificate authentication and verification processes. Conventional approaches are usually susceptible to forgery, time-consuming manual actions and lacking inherent trust. The core features of immutability, decentralization, cryptographic hashing and verifiable chain of transaction provided by Blockchain create a profitable paradigm shift to create tamper-proof and easily verifiable digital certificates. This paper gives an up-to-date and comprehensive review of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Was Ist Ein Original?: Eine Begriffsbestimmung Jenseits Genieästhetischer Stereotype.Doris Reisinger (ed.) - 2019 - Berlin: Transcript Verlag.
    Um den Begriff des Originals gibt es heftige Debatten. Können Fälschungen ebenso gut sein wie Originale? Wann sind Kopien vielleicht sogar besser? Und ist die Zeit des Originals nicht überhaupt vorbei? Dabei tritt die Frage, was ein Original eigentlich sei, oft in den Hintergrund. Doris Reisinger stellt die These auf: Der Begriff des Originals ist nicht nur nicht obsolet, er hat auch nicht notwendig mit Neuheit, Urheberschaft oder ästhetischem Wert zu tun - das Problem des Originalbegriffs besteht schlicht darin, dass (...)
    Download  
     
    Export citation  
     
    Bookmark