WordNet
- represent another person with comic intentions
- assume or act the character of; "She impersonates Madonna"; "The actor portrays an elderly, lonely man" (同)portray
PrepTutorEJDIC
- 〈他人〉‘の'まねをする / 〈俳優が〉…‘の'役を演じる
Wikipedia preview
出典(authority):フリー百科事典『ウィキペディア(Wikipedia)』「2016/01/13 01:55:40」(JST)
[Wiki en表示]
|
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (August 2010) |
An impersonator of George Michael
Theodore Roosevelt impersonator Joe Wiegand performs October 27, 2008 in the East Room of the White House, during a celebration of Roosevelt's 150th birthday.
An impersonator is someone who imitates or copies the behavior or actions of another.[1] There are many reasons for someone to be an impersonator, some common ones being as follows:
- Entertainment: An entertainer impersonates a celebrity, generally for entertainment, and makes fun of their recent scandals or known behavior patterns. Especially popular objects of impersonation are Elvis (see Elvis impersonator), Michael Jackson, Abraham Lincoln, and Lenin. Entertainers who impersonate multiple celebrities as part of their act, can be sorted into impressionists and celebrity impersonators.
- Crime: As part of a criminal act such as identity theft. This is usually where the criminal is trying to assume the identity of another, in order to commit fraud, such as accessing confidential information, or to gain property not belonging to them. Also known as social engineering and impostors.
- Decoys, used as a form of protection for political and military figures. This involves an impersonator who is employed (or forced) to perform during public appearances, to mislead observers.
- Sowing discord, causing people to fight, or dislike each other for social, business or political gain.
Contents
- 1 Celebrity impersonators
- 2 Notable impersonators
- 3 See also
- 4 References
Celebrity impersonators
A Michael Jackson celebrity impersonator for the 25th anniversary of the album
Thriller at the 2008 Tribeca Film Festival with performers from Step It Up and Dance.
A Madonna wannabe, an impersonator of Madonna's 1980s looks and fashion style.
Celebrity impersonators are entertainers who look similar to celebrities and dress in such a way as to imitate them.
Impersonators are known as look-alikes, impressionists, imitators tribute artists and wannabees. The interest may have originated with the need or desire to see a celebrity who has died.[citation needed] One of the most prominent examples of this phenomenon is the case of Elvis Presley. There are claimed to be more Elvis impersonators and tribute artists in the world than for any other celebrity.[citation needed]
Edward Moss has appeared in movies and sitcoms, impersonating Michael Jackson.[2]
Notable impersonators
- Moin Akhter
- Rory Bremner
- Steve Bridges
- Reggie Brown
- Frank Caliendo
- Jim Carrey
- Dana Carvey
- Marc Dreier
- Jimmy Fallon (does regular impersonations, but better known for impersonating famous singers)
- Will Ferrell
- Tina Fey
- David Frye
- Mikheil Gelovani portrayed Joseph Stalin at least a dozen times in film in their lifetimes
- Darrell Hammond
- Hal Holbrook has portrayed Mark Twain
- Jay Jason
- Clay Jenkinson portrays Thomas Jefferson, Meriwether Lewis, Theodore Roosevelt and Robert Oppenheimer and others.
- Val Kilmer has portrayed Mark Twain
- Jan Leighton, famous for his impersonations of historical figures
- Rich Little (perhaps the most well-known impersonator, called "The Man of a Thousand Voices")
- Vaughn Meader
- El Moreno Michael
- Mike Randall has portrayed Mark Twain and Charles Dickens
- Stevie Riks
- Kevin Spacey
- Aries Spears
- Larry Storch
- Joe Wiegand portrays 26th US President, Theodore Roosevelt
- Robin Williams
- Cameron DeMatteo portrays Christopher Walken, Jerry Seinfeld, Adam Sandler, and Owen Wilson
See also
- False flag
- Impressionist
- Look-alike
- Personation
- Police impersonation
- Soundboard, victim soundboard
- Tribute act
- Wannabe
- Shi (personator), in the Chinese ancestor ritual: a figure impersonating ancestors
References
|
Wikimedia Commons has media related to Impersonators. |
- ^ "Impersonator". The Free Dictionary. Retrieved 2010-01-03.
- ^ Baker, Bob (March 3, 2005). "King of Pop impersonator star of E! trial re-enactment". The Seattle Times.
English Journal
- Pretense of parentage by siblings in immigration: Polesky's paradox reconsidered.
- Wenk RE, Shao A.Author information Relationship Testing Laboratory, BRT Laboratories, Baltimore, Maryland.AbstractBACKGROUND: Older and younger siblings occasionally attempt to impersonate parent and child to expedite immigration under US family-based visa policies. The rate with which full siblings escape detection by current relationship tests is unknown.
- Transfusion.Transfusion.2013 Jun 19. doi: 10.1111/trf.12293. [Epub ahead of print]
- BACKGROUND: Older and younger siblings occasionally attempt to impersonate parent and child to expedite immigration under US family-based visa policies. The rate with which full siblings escape detection by current relationship tests is unknown.STUDY DESIGN AND METHODS: Retrospective study of full-s
- PMID 23781888
- Computer games and fine motor skills.
- Borecki L, Tolstych K, Pokorski M.Author information Institute of Psychology, Opole University, Opole, Poland.AbstractThe study seeks to determine the influence of computer games on fine motor skills in young adults, an area of incomplete understanding and verification. We hypothesized that computer gaming could have a positive influence on basic motor skills, such as precision, aiming, speed, dexterity, or tremor. We examined 30 habitual game users (F/M - 3/27; age range 20-25 years) of the highly interactive game Counter Strike, in which players impersonate soldiers on a battlefield, and 30 age- and gender-matched subjects who declared never to play games. Selected tests from the Vienna Test System were used to assess fine motor skills and tremor. The results demonstrate that the game users scored appreciably better than the control subjects in all tests employed. In particular, the players did significantly better in the precision of arm-hand movements, as expressed by a lower time of errors, 1.6 ± 0.6 vs. 2.8 ± 0.6 s, a lower error rate, 13.6 ± 0.3 vs. 20.4 ± 2.2, and a shorter total time of performing a task, 14.6 ± 2.9 vs. 32.1 ± 4.5 s in non-players, respectively; p < 0.001 all. The findings demonstrate a positive influence of computer games on psychomotor functioning. We submit that playing computer games may be a useful training tool to increase fine motor skills and movement coordination.
- Advances in experimental medicine and biology.Adv Exp Med Biol.2013;755:343-8.
- The study seeks to determine the influence of computer games on fine motor skills in young adults, an area of incomplete understanding and verification. We hypothesized that computer gaming could have a positive influence on basic motor skills, such as precision, aiming, speed, dexterity, or tremor.
- PMID 22826085
- On the designing of a tamper resistant prescription RFID access control system.
- Safkhani M, Bagheri N, Naderi M.Author information Electrical Engineering Department, Iran University of Science and Technology, Tehran, Iran. M_Safkhani@iust.ac.irAbstractRecently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack which allows an active adversary to impersonate a legitimate doctor, e.g. the patient's doctor, to access the patient's tag and change the patient prescription. The presented attack is quite efficient. To impersonate a doctor, the adversary should eavesdrop one session between the doctor and the patient's tag and then she can impersonate the doctor with the success probability of '1'. In addition, we present efficient reader-tag to back-end database impersonation, de-synchronization and traceability attacks against the protocol. Finally, we propose an improved version of protocol which is more efficient compared to the original protocol while provides the desired security against the presented attacks.
- Journal of medical systems.J Med Syst.2012 Dec;36(6):3995-4004. doi: 10.1007/s10916-012-9872-9. Epub 2012 Aug 10.
- Recently, Chen et al. have proposed a novel tamper resistant prescription RFID access control system, published in the Journal of Medical Systems. In this paper we consider the security of the proposed protocol and identify some existing weaknesses. The main attack is a reader impersonation attack
- PMID 22878923
- Treatment modalities and evaluation models for periodontitis.
- Tariq M, Iqbal Z, Ali J, Baboota S, Talegaonkar S, Ahmad Z, Sahni JK.Author information Department of Pharmaceutics, Faculty of Pharmacy, Jamia Hamdard, Hamdard Nagar, New Delhi-110062, India.AbstractPeriodontitis is the most common localized dental inflammatory disease related with several pathological conditions like inflammation of gums (gingivitis), degeneration of periodontal ligament, dental cementum and alveolar bone loss. In this perspective, the various preventive and treatment modalities, including oral hygiene, gingival irrigations, mechanical instrumentation, full mouth disinfection, host modulation and antimicrobial therapy, which are used either as adjunctive treatments or as stand-alone therapies in the non-surgical management of periodontal infections, have been discussed. Intra-pocket, sustained release systems have emerged as a novel paradigm for the future research. In this article, special consideration is given to different locally delivered anti-microbial and anti inflammatory medications which are either commercially available or are currently under consideration for Food and Drug Administration (FDA) approval. The various in vitro dissolution models and microbiological strain investigated to impersonate the infected and inflamed periodontal cavity and to predict the in vivo performance of treatment modalities have also been thrashed out. Animal models that have been employed to explore the pathology at the different stages of periodontitis and to evaluate its treatment modalities are enlightened in this proposed review.
- International journal of pharmaceutical investigation.Int J Pharm Investig.2012 Jul;2(3):106-22. doi: 10.4103/2230-973X.104394.
- Periodontitis is the most common localized dental inflammatory disease related with several pathological conditions like inflammation of gums (gingivitis), degeneration of periodontal ligament, dental cementum and alveolar bone loss. In this perspective, the various preventive and treatment modaliti
- PMID 23373002
Japanese Journal
- A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
- INUMA Manabu,OTSUKA Akira,IMAI Hideki
- IEICE Transactions on Information and Systems E96.D(2), 357-364, 2013
- … The false accept rate FAR is a metric for zero-effort impersonation attack assuming that the attacker attempts to impersonate a user by presenting his own biometric sample to the system. … However, when the attacker has some information about algorithms in the biometric authentication system, he might be able to find a "strange" sample (called a wolf) which shows high similarity to many templates and attempt to impersonate a user by presenting a wolf. …
- NAID 130003370778
- Coding Theorems for a (2; 2)–Threshold Scheme with Detectability of Impersonation Attacks
- Iwamoto Mitsugu,Koga Hiroki,Yamamoto Hirosuke,古賀 弘樹
- IEEE transactions on information theory 58(9), 6194-6206, 2012-09-00
- … Coding theorems on a $(2,2)$-threshold scheme with an opponent are discussed in an asymptotic setup, where the opponent tries to impersonate one of the two participants. …
- NAID 120004791447
- Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
- SHIN SeongHan,KOBARA Kazukuni,IMAI Hideki
- IEICE transactions on information and systems 94(11), 2095-2110, 2011-11-01
- … Specifically, only one legitimate client can freely impersonate any subgroup of clients (the threshold t>1) to the server. …
- NAID 10030193736
- サーバなりすまし攻撃に対し安全なRFIDセキュリティ方式
- 丹羽 弘和,高木 剛,高橋 修
- 情報処理学会論文誌 52(9), 2876-2881, 2011-09-15
- RFIDシステムにおいて,サーバはタグから受け取った識別子と一致する値を検索してタグを識別する.したがって,サーバがタグを識別するためには,互いが同期していなければならない.しかし,SecureComm 2005において,攻撃者がタグとサーバ間の送信データを改竄して同期を崩す攻撃が提案された.さらにUBICOMM 2008において,攻撃者が正規のサーバになりすまし,タグの秘匿情報を更新することで同 …
- NAID 110008608848
Related Links
- ログオン・ユーザーに偽装するには、Web.configに<identity>要素を含めて次のように記述します。 impersonate属性をtrueに設定すると、ASP.NETランタイムはリソースにアクセスする際に、既定のASPNETユーザー・アカウントではなく ...
- impersonateとは。意味や和訳。[動] 〔impəːrsənegrave;it〕 (他)1 〈人の〉ものまねをする;替え玉を演じる,を装う;声色(こわいろ)を使う;(舞台で)…の役を演じる,…に扮する.2 ((古風))〈物・事を〉体現する,擬人化[人格化]する ...
- impersonateの意味は?goo辞書は無料で使える日本最大級の辞書サービスです。国語辞典、英和辞典、和英辞典、類語辞典、中国語辞典、百科事典などを提供しています。
Related Pictures