PROCEEDINGS VOLUME 2659
ELECTRONIC IMAGING: SCIENCE AND TECHNOLOGY | 28 JANUARY - 2 FEBRUARY 1996
Optical Security and Counterfeit Deterrence Techniques
Editor Affiliations +
ELECTRONIC IMAGING: SCIENCE AND TECHNOLOGY
28 January - 2 February 1996
San Jose, CA, United States
Keynote Address
Ian M. Lancaster, Lewis T. Kontnik
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235446
Security Design and Evaluation I
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235456
Jan Pieters
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235463
Sara E. Church, Thomas A. Ferguson
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235470
Thomas A. Ferguson, Sara E. Church
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235471
Sandra L. Hyland, Gordon E. Legge, Robert R. Shannon, Norbert S. Baer
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235472
Jean-Frederic Moser, Rene Staub, Wayne Robert Tompkin
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235473
Security Design and Evaluation II
John W. Mercer
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235474
Dick van Lingen
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235475
Smart Printing and Product Intelligence
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235447
Peter J. Harrop
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235448
Jean-Francois Delaigle, Christophe De Vleeschouwer, Benoit M. M. Macq
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235449
Gilbert Cunningham
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235450
Wim H. M. Sipman
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235451
Martin Swerdlow, Brian Weeks
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235452
Machine Reading of Security Devices
Bahram Javidi, Guanshen Zhang
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235453
Michael H. Metz, Zane A. Coleman, Nicholas J. Phillips, Carl Flatow
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235454
Hugues Souparis
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235455
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235457
Diffraction- and Interference-Based Security Systems I
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235458
Michael M. Chamberlain
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235459
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235460
Diffraction- and Interference-Based Security Systems II
Guenther J. Dausmann, Irina Menz, Klaus Gnaedig, Zishao Yang
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235461
Gilbert Colgate Jr.
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235462
Wayne Robert Tompkin, Rene Staub, Jean-Frederic Moser
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235464
Wilfried Schipper
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235465
Pawel J. Stepien, Remigiusz Gajda, Tomasz Szoplik
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235466
Andrey Nikolayevi Timoshenko
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235467
Pawel J. Stepien, Remigiusz Gajda
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235468
Smart Printing and Product Intelligence
Gordon W. Braudaway, Karen A. Magerlein, Frederick C. Mintzer
Proceedings Volume Optical Security and Counterfeit Deterrence Techniques, (1996) https://doi.org/10.1117/12.235469
Back to Top