{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:40:05Z","timestamp":1755862805192,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,2]],"date-time":"2024-02-02T00:00:00Z","timestamp":1706832000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,2]]},"DOI":"10.1145\/3651671.3651691","type":"proceedings-article","created":{"date-parts":[[2024,6,7]],"date-time":"2024-06-07T18:55:50Z","timestamp":1717786550000},"page":"244-250","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Forgery Detection in Aadhaar-based KYC using Deep Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-8065-5611","authenticated-orcid":false,"given":"Damini","family":"Babbar","sequence":"first","affiliation":[{"name":"Airtel, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7091-466X","authenticated-orcid":false,"given":"Aditya","family":"Jain","sequence":"additional","affiliation":[{"name":"Airtel, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4676-7162","authenticated-orcid":false,"given":"Ankit","family":"Sharma","sequence":"additional","affiliation":[{"name":"Airtel, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2432-0258","authenticated-orcid":false,"given":"Dipyaman","family":"Banerjee","sequence":"additional","affiliation":[{"name":"Airtel, India"}]}],"member":"320","published-online":{"date-parts":[[2024,6,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Belhassen Bayar and Matthew\u00a0C. Stamm. 2016. A Deep Learning Approach To Universal Image Manipulation Detection Using A New Convolutional Layer. (2016). https:\/\/doi.org\/10.1145\/2909827.2930786","DOI":"10.1145\/2909827.2930786"},{"key":"e_1_3_2_1_2_1","unstructured":"Amit Doegar Maitreyee Dutta and Kumar Gaurav. 2019. CNN Based Image Forgery Detection Using Pre-trained AlexNet Model. (2019). https:\/\/ssrn.com\/abstract=3355402"},{"key":"e_1_3_2_1_3_1","volume-title":"Deep Residual Learning for Image Recognition. (Dec","author":"He Kaiming","year":"2015","unstructured":"Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2015. Deep Residual Learning for Image Recognition. (Dec. 2015). https:\/\/arxiv.org\/abs\/1512.03385"},{"key":"e_1_3_2_1_4_1","unstructured":"Sagrika Kissu. 2022. Fake Aadhaar racket: Three held in Faridabad. (2022). https:\/\/timesofindia.indiatimes.com\/city\/gurgaon\/fake-aadhaar-racket-three-held-in-faridabad\/articleshow\/93124223.cms"},{"key":"e_1_3_2_1_5_1","unstructured":"Alex Krizhevsky Ilya Sutskever and Geoffrey\u00a0E. Hinton. 2012. ImageNet Classification with Deep Convolutional Neural Networks. (2012). https:\/\/papers.nips.cc\/paper_files\/paper\/2012\/hash\/c399862d3b9d6b76c8436e924a68c45b-Abstract.html"},{"key":"e_1_3_2_1_6_1","unstructured":"Dong-Hyun Lee. 2013. Pseudo-Label : The Simple and E\ufb03cient Semi-Supervised Learning Method for Deep Neural Networks. (2013). https:\/\/www.researchgate.net\/publication\/280581078_Pseudo-Label_The_Simple_and_Efficient_Semi-Supervised_Learning_Method_for_Deep_Neural_Networks"},{"key":"e_1_3_2_1_7_1","volume-title":"Very deep convolutional neural network based image classification using small training sample size. (Nov","author":"Liu Shuying","year":"2015","unstructured":"Shuying Liu and Weihong Deng. 2015. Very deep convolutional neural network based image classification using small training sample size. (Nov. 2015). 10.1109\/ACPR.2015.7486599"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Antonios Makris Ioannis Kontopoulos and Konstantinos Tserpes. 2020. COVID-19 detection from chest X-Ray images using Deep Learning and Convolutional Neural Networks. 60\u201366. https:\/\/doi.org\/10.1145\/3411408.3411416","DOI":"10.1145\/3411408.3411416"},{"key":"e_1_3_2_1_9_1","unstructured":"Unique Identification\u00a0Authority of India. [n. d.]. what are the security features of aadhaar pvc card. ([n. d.]). https:\/\/uidai.gov.in\/en\/1024-english-uk\/faqs\/aadhaar-online-services\/order-aadhaar-pvc-card-online\/12505-what-are-the-security-features-of-aadhaar-pvc-card.html"},{"key":"e_1_3_2_1_10_1","unstructured":"Yassine Ouali C\u00e9line Hudelot and Myriam Tami. 2020. An Overview of Deep Semi-Supervised Learning. (2020). https:\/\/arxiv.org\/abs\/2006.05278"},{"key":"e_1_3_2_1_11_1","volume-title":"A deep learning approach to detection of splicing and copy-move forgeries in images. (Dec","author":"Rao Yuan","year":"2016","unstructured":"Yuan Rao and Jiangqun Ni. 2016. A deep learning approach to detection of splicing and copy-move forgeries in images. (Dec. 2016). https:\/\/ieeexplore.ieee.org\/document\/7823911"},{"key":"e_1_3_2_1_12_1","volume-title":"Very Deep Convolutional Networks for Large-Scale Image Recognition. (April","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. (April 2015). https:\/\/arxiv.org\/abs\/1409.1556"},{"key":"e_1_3_2_1_13_1","unstructured":"Karn\u00a0Pratap Singh. 2023. Delhi cyber cafe raided fake Aadhaar racket busted. (2023). https:\/\/www.hindustantimes.com\/cities\/delhi-news\/delhi-cyber-cafe-raided-fake-aadhaar-racket-busted-101675795291317.html"},{"key":"e_1_3_2_1_14_1","unstructured":"TNN. 2023. Fake Aadhaar PAN making scam busted. (2023). https:\/\/timesofindia.indiatimes.com\/city\/surat\/fake-aadhaar-pan-making-scam-busted-five-held\/articleshow\/101119137.cms?from=mdr"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Yue Wu Wael Abd-Almageed and Prem Natarajan. 2018. Image Copy-Move Forgery Detection via an End-to-End Deep Neural Network. 1907\u20131915. https:\/\/doi.org\/10.1109\/WACV.2018.00211","DOI":"10.1109\/WACV.2018.00211"}],"event":{"name":"ICMLC 2024: 2024 16th International Conference on Machine Learning and Computing","acronym":"ICMLC 2024","location":"Shenzhen China"},"container-title":["Proceedings of the 2024 16th International Conference on Machine Learning and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651691","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651671.3651691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T11:18:33Z","timestamp":1755861513000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651671.3651691"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,2]]},"references-count":15,"alternative-id":["10.1145\/3651671.3651691","10.1145\/3651671"],"URL":"https:\/\/doi.org\/10.1145\/3651671.3651691","relation":{},"subject":[],"published":{"date-parts":[[2024,2,2]]},"assertion":[{"value":"2024-06-07","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}