PROCEEDINGS VOLUME 3314
PHOTONICS WEST '98 ELECTRONIC IMAGING | 24-30 JANUARY 1998
Optical Security and Counterfeit Deterrence Techniques II
Editor Affiliations +
PHOTONICS WEST '98 ELECTRONIC IMAGING
24-30 January 1998
San Jose, CA, United States
Substrate and Printed Security I
Roland Tornare
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304676
Security, Strategy, Design, and Evaluation I
Sara E. Church, Thomas A. Ferguson
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304685
John C. Murphy, Daniel Craig Dubbel, Richard C. Benson
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304695
J. Douwe Brongers
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304703
John W. Mercer
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304707
Gordon E. Pickett
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304708
Security, Strategy, Design, and Evaluation II
Steven G. Tuinstra
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304709
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304710
David J. Pizzanelli
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304711
Digital Security
A. Ravishankar Rao, Gordon W. Braudaway, Frederick C. Mintzer
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304677
Gordon W. Braudaway
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304678
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304679
Thomas D. Hayosh
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304680
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304681
Sharon Carr
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304682
Biometry
Stephane Pigeon, Luc Vandendorpe
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304683
Diffraction and Interference-based Security
Ian M. Lancaster, Lewis T. Kontnik
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304684
Rene Staub, Wayne Robert Tompkin
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304686
Wayne Robert Tompkin, Rene Staub
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304687
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304688
Anton F. Bleikolm
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304689
Pawel J. Stepien, Remigiusz Gajda, Artur Marszalek
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304690
Allan C. Marshall, Frank Russo
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304691
Substrate and Printed Security I
Karel J. Schell
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304692
Security, Strategy, Design, and Evaluation I
Gerard J. Wilson
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304693
Substrate and Printed Security I
Paul Zientek
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304694
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304696
Substrate and Printed Security II
Raman Nayar, Nancy Butchart, Denis Doutre
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304697
Joachim Hossick Schott
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304698
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304699
Security, Strategy, Design, and Evaluation II
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304700
Poster Session
Nina V. Markova, Leonid S. Yamnikov, Elena S. Turkina, Erick G. Semenov, Theodor V. Bulygin, Gennady G. Levin
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304701
Substrate and Printed Security II
James H. Rittenburg
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304702
Substrate and Printed Security I
Will G. J. M. Hospel
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304704
Biometry
Colin Soutar, Danny Roberge, Alex Stoianov, Rene Gilroy, Bhagavatula Vijaya Kumar
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304705
Diffraction and Interference-based Security
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques II, (1998) https://doi.org/10.1117/12.304706
Back to Top