Alert button

Mobile authentication of copy detection patterns

Mar 04, 2022
Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

Figure 1 for Mobile authentication of copy detection patterns
Figure 2 for Mobile authentication of copy detection patterns
Figure 3 for Mobile authentication of copy detection patterns
Figure 4 for Mobile authentication of copy detection patterns

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: