Australian polymer banknote: a review [3314-28] (English)
- New search for: Wilson, G. J.
- New search for: SPIE
- New search for: Wilson, G. J.
- New search for: Van Renesse, R. L.
- New search for: SPIE
In:
Optical security and counterfeit deterrence techniques
3314
;
2-7
;
1998
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Australian polymer banknote: a review [3314-28]
-
Contributors:
-
Conference:Conference; 2nd, Optical security and counterfeit deterrence techniques ; 1998 ; San Jose; CA
-
Published in:
-
Publisher:
- New search for: SPIE
-
Publication date:1998-01-01
-
Size:6 pages
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 2
-
Australian polymer banknote: a review [3314-28]Wilson, G. J. / SPIE et al. | 1998
- 2
-
Australian polymer banknote: a reviewWilson, Gerard J. et al. | 1998
- 8
-
Evaluation of security features in new design of U.S. currencyChurch, Sara E. / Ferguson, Thomas A. et al. | 1998
- 8
-
Evaluation of security features in new design of U.S. currency [3314-02]Church, S. E. / Ferguson, T. A. / SPIE et al. | 1998
- 21
-
Technology approaches to currency securityMurphy, John C. / Dubbel, Daniel C. / Benson, Richard C. et al. | 1998
- 21
-
Technology approaches to currency security [3314-03]Murphy, J. C. / Dubbel, D. C. / Benson, R. C. / SPIE et al. | 1998
- 29
-
Search for effective document security by inventioneeringBrongers, J. D. et al. | 1998
- 29
-
Search for effective document security by inventioneering (Invited Paper) [3314-04]Brongers, J. D. / SPIE et al. | 1998
- 39
-
Document fraud deterrent strategies: four case studies [3314-05]Mercer, J. W. / SPIE et al. | 1998
- 39
-
Document fraud deterrent strategies: four case studiesMercer, John W. et al. | 1998
- 52
-
How do you select the right security features for your company's products? [3314-06]Pickett, G. E. / SPIE et al. | 1998
- 52
-
How do you select the right security features for your company's productsPickett, Gordon E. et al. | 1998
- 60
-
Design and its effect on the quality of documents and security featuresTuinstra, Steven G. et al. | 1998
- 60
-
Design and its effect on the quality of documents and security features (Invited Paper) [3314-07]Tuinstra, S. G. / SPIE et al. | 1998
- 71
-
Verifying versus falsifying banknotesvan Renesse, Rudolf L. et al. | 1998
- 71
-
Verifying versus falsifying banknotes [3314-08]Van Renesse, R. L. / SPIE et al. | 1998
- 86
-
Counterfeit holograms and simulations [3314-09]Pizzanelli, D. / SPIE et al. | 1998
- 86
-
Counterfeit holograms and simulationsPizzanelli, David J. et al. | 1998
- 97
-
Human factors of first-line security [3314-35]Van Renesse, R. L. / SPIE et al. | 1998
- 97
-
Human factors of first-line securityvan Renesse, Rudolf L. et al. | 1998
- 110
-
Automatic visible watermarking of images [3314-10]Rao, A. R. / Braudaway, G. W. / Mintzer, F. C. / SPIE et al. | 1998
- 110
-
Automatic visible watermarking of imagesRao, A. Ravishankar / Braudaway, Gordon W. / Mintzer, Frederick C. et al. | 1998
- 122
-
Results of attacks on a claimed robust digital image watermark [3314-11]Braudaway, G. W. / SPIE et al. | 1998
- 122
-
Results of attacks on a claimed robust digital image watermarkBraudaway, Gordon W. et al. | 1998
- 132
-
Digital protection in a digital agePlimmer, Jeremy J. et al. | 1998
- 132
-
Digital protection in a digital age [3314-12]Plimmer, J. J. / SPIE et al. | 1998
- 140
-
Self-authentication of value documents [3314-13]Hayosh, T. D. / SPIE et al. | 1998
- 140
-
Self-authentication of value documentsHayosh, Thomas D. et al. | 1998
- 150
-
Two-dimensional two-step Fourier spectrum analysis for similar-image identification [3314-14]Markov, V. B. / Mejia, Y. / SPIE et al. | 1998
- 150
-
Two-dimensional two-step Fourier spectrum analysis for similar-image identificationMarkov, Vladimir B. / Mejia, Yobani et al. | 1998
- 159
-
Marketing and selling product security [3314-15]Carr, S. / SPIE et al. | 1998
- 159
-
Marketing and selling product securityCarr, Sharon et al. | 1998
- 166
-
Multiple experts for robust face authenticationPigeon, Stephane / Vandendorpe, Luc et al. | 1998
- 166
-
Multiple experts for robust face authentication [3314-16]Pigeon, S. / Vandendorpe, L. / SPIE et al. | 1998
- 178
-
Biometric Encryption using image processingSoutar, Colin / Roberge, Danny / Stoianov, Alex / Gilroy, Rene / Vijaya Kumar, Bhagavatula et al. | 1998
- 178
-
Biometric Encryption using image processing [3314-41]Soutar, C. / Roberge, D. / Stoianov, A. / Gilroy, R. / SPIE et al. | 1998
- 190
-
Secure future for DOVIDs [3314-19]Lancaster, I. M. / Kontnik, L. T. / SPIE et al. | 1998
- 190
-
Secure future for DOVIDsLancaster, Ian M. / Kontnik, Lewis T. et al. | 1998
- 194
-
Nonstandard diffraction structures for OVDs [3314-20]Staub, R. / Tompkin, W. R. / SPIE et al. | 1998
- 194
-
Nonstandard diffraction structures for OVDsStaub, Rene / Tompkin, Wayne R. et al. | 1998
- 203
-
Machine-verifiable diffractive features for document securityTompkin, Wayne R. / Staub, Rene et al. | 1998
- 203
-
Machine-verifiable diffractive features for document security [3314-21]Tompkin, W. R. / Staub, R. / SPIE et al. | 1998
- 214
-
Holocomposer: progress toward a high-security holographic identification card [3314-22]McGrew, S. P. / SPIE et al. | 1998
- 214
-
Holocomposer: progress toward a high-security holographic identification cardMcGrew, Stephen P. et al. | 1998
- 223
-
New design opportunities with OVI [3314-23]Bleikolm, A. F. / SPIE et al. | 1998
- 223
-
New design opportunities with OVIBleikolm, Anton F. et al. | 1998
- 231
-
Guilloche in diffractive optically variable image devicesStepien, Pawel J. / Gajda, Remigiusz / Marszalek, Artur et al. | 1998
- 231
-
Guilloche in diffractive optically variable image devices (Invited Paper) [3314-24]Stepien, P. J. / Gajda, R. / Marszalek, A. / SPIE et al. | 1998
- 237
-
Additional security features for optically variable foilsMarshall, Allan C. / Russo, Frank et al. | 1998
- 237
-
Additional security features for optically variable foils [3314-25]Marshall, A. C. / Russo, F. / SPIE et al. | 1998
- 247
-
Laser-induced anti-Stokes luminescence for protection of documents and security papersPodbielska, Halina / Strek, Wieslaw et al. | 1998
- 247
-
Laser-induced anti-Stokes luminescence for protection of documents and security papers [3314-42]Podbielska, H. / Strek, W. / SPIE et al. | 1998
- 254
-
Application of laser technology to introduce security features on security documents in order to reduce counterfeitingHospel, Will G. J. M. et al. | 1998
- 254
-
Application of laser technology to introduce security features on security documents in order to reduce counterfeiting [3314-40]Hospel, W. G. / SPIE et al. | 1998
- 260
-
LEAN: laser-etched aqua numberSchell, Karel J. et al. | 1998
- 260
-
LEAN: laser-etched aqua number [3314-27]Schell, K. J. / SPIE et al. | 1998
- 268
-
How a central bank perceives the (visual) communication of security features on its banknotes (Invited Paper) [3314-01]Tornare, R. / SPIE et al. | 1998
- 268
-
How a central bank perceives the (visual) communication of security features on its banknotesTornare, Roland et al. | 1998
- 272
-
Polymeric self-authenticating banknotesZientek, Paul et al. | 1998
- 272
-
Polymeric self-authenticating banknotes [3314-29]Zientek, P. / SPIE et al. | 1998
- 275
-
Clone-preventive technique that features magnetic microfibers and cryptography [3314-30]Matsumoto, H. / Suzuki, K. / Matsumoto, T. / SPIE et al. | 1998
- 275
-
Clone-preventive technique that features magnetic microfibers and cryptographyMatsumoto, Hiroyuki / Suzuki, Keiichi / Matsumoto, Tsutomu et al. | 1998
- 288
-
Luminus: a paper-based optical deterrent to counterfeitingNayar, Raman / Butchart, Nancy / Doutre, Denis et al. | 1998
- 288
-
Luminus: a paper-based optical deterrent to counterfeiting [3314-31]Nayar, R. / Butchart, N. / Doutre, D. / SPIE et al. | 1998
- 294
-
Optical security features for plastic card documentsHossick Schott, Joachim et al. | 1998
- 294
-
Optical security features for plastic card documents [3314-32]Schott, J. H. / SPIE et al. | 1998
- 299
-
Use of molecular binding pair technology for definitive product marking and identificationRittenburg, James H. et al. | 1998
- 299
-
Use of molecular binding pair technology for definitive product marking and identification [3314-38]Rittenburg, J. H. / SPIE et al. | 1998
- 309
-
Color pictorial serpentine halftone for secure embedded dataCurry, Douglas N. et al. | 1998
- 309
-
Color pictorial serpentine halftone for secure embedded data [3314-34]Curry, D. N. / SPIE et al. | 1998
- 320
-
Application of photopolymer holograms for the anticounterfeit protection of banknotesMarkova, Nina V. / Yamnikov, Leonid S. / Turkina, Elena S. / Semenov, Erick G. / Bulygin, Theodor V. / Levin, Gennady G. et al. | 1998
- 320
-
Application of photopolymer holograms for the anticounterfeit protection of banknotes [3314-36]Markova, N. V. / Yamnikov, L. S. / Turkina, E. S. / Semenov, E. G. / SPIE et al. | 1998