Mobile authentication of copy detection patterns

Add code
Mar 04, 2022
Figure 1 for Mobile authentication of copy detection patterns
Figure 2 for Mobile authentication of copy detection patterns
Figure 3 for Mobile authentication of copy detection patterns
Figure 4 for Mobile authentication of copy detection patterns

Share this with someone who'll enjoy it:

View paper onarxiv icon

Share this with someone who'll enjoy it: