1–10 von 37 Ergebnissen
|

    LEAN: laser-etched aqua number [3314-27]

    Schell, K. J. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Biometric Encryption using image processing [3314-41]

    Soutar, C. / Roberge, D. / Stoianov, A. et al. | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Optical security features for plastic card documents [3314-32]

    Schott, J. H. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Two-dimensional two-step Fourier spectrum analysis for similar-image identification [3314-14]

    Markov, V. B. / Mejia, Y. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    How do you select the right security features for your company's products? [3314-06]

    Pickett, G. E. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Evaluation of security features in new design of U.S. currency [3314-02]

    Church, S. E. / Ferguson, T. A. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Application of photopolymer holograms for the anticounterfeit protection of banknotes [3314-36]

    Markova, N. V. / Yamnikov, L. S. / Turkina, E. S. et al. | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Polymeric self-authenticating banknotes [3314-29]

    Zientek, P. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Laser-induced anti-Stokes luminescence for protection of documents and security papers [3314-42]

    Podbielska, H. / Strek, W. / SPIE | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques

    Guilloche in diffractive optically variable image devices (Invited Paper) [3314-24]

    Stepien, P. J. / Gajda, R. / Marszalek, A. et al. | British Library Conference Proceedings | 1998
    Schlagwörter: counterfeit deterrence techniques