Model-based synthesis of band moire images for authenticating security documents and valuable products
Related publications (41)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Large scale systems are becoming more and more common today. Many distributed applications are emerging that use the capability of world-wide internetworking. Since many applications require availability and consistency in the presence of failures, an adeq ...
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive ...
By means of Raman and photoluminescence measurements we have studied the effect of strain and confinement on the optical phonon spectrum of single InAs quantum wells. The frequency region of longitudinal optical phonons confined in both the InAs well and I ...
A solid coated device is disclosed that has covalently attached a coating which comprises a first layer contg. first functional groups, to which first layer functional groups is covalently attached a second, linking layer carrying second functional groups, ...
The problem of secure key distribution has been the subject of much attention in recent years. This paper describes a novel method for authenticated key distribution in the distributed systems environment. In particular, a braiding technique for key distri ...
We address the problem of recognizing sequences of human interaction patterns in meetings, with the goal of structuring them in semantic terms. The investigated patterns are inherently group-based (defined by the individual activities of meeting participan ...
We address the problem of recognizing sequences of human interaction patterns in meetings, with the goal of structuring them in semantic terms. The investigated patterns are inherently group-based (defined by the individual activities of meeting participan ...
A biocompatible interface was constructed on a microchip by using the layer-by-layer (LBL) assembly of charged polysaccharides incorporating proteases for highly efficient proteolysis. The controlled assembly of natural polyelectrolytes and the enzyme-adso ...
The present invention relies on the moiré patterns generated when superposing a base layer made of base band patterns and a revealing line grating (revealing layer). The produced moiré patterns comprise an enlargement and a transformation of the individual ...
RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious implications on the privacy of people carrying tagged items. Serious opposition from con ...