Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_9948324628202882
    Umfang: xv, 128 p. : , ill.
    Ausgabe: Electronic reproduction. Ann Arbor, MI : ProQuest, 2015. Available via World Wide Web. Access may be limited to ProQuest affiliated libraries.
    Serie: Publication NMAB ; 472
    Anmerkung: Study was conducted under a contract with the U.S. Treasury Department, Bureau of Engraving and Printing. , Committee chairman: Glenn T. Sincerbox.
    Sprache: Englisch
    Schlagwort(e): Electronic books.
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    b3kat_BV042245812
    Umfang: XV, 128 S. , ill , 28 cm
    ISBN: 0309050286
    Serie: Publication NMAB 472
    Anmerkung: Study was conducted under a contract with the U.S. Treasury Department, Bureau of Engraving and Printing. - Includes bibliographical references
    Sprache: Englisch
    Schlagwort(e): Banknote ; Geld- und Wertzeichenfälschung ; Sicherheit
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Washington, D.C. : National Academies Press
    UID:
    kobvindex_INT59592
    Umfang: 1 online resource (144 pages)
    Ausgabe: 1st ed.
    ISBN: 9780309562799
    Anmerkung: COUNTERFEIT DETERRENT FEATURES FOR THE NEXT-GENERATION CURRENCY DESIGN -- ACKNOWLEDGMENTS -- PREFACE -- Contents -- EXECUTIVE SUMMARY -- PROBLEM DEFINITIONS -- MAJOR FINDINGS -- FEATURE-ASSESSMENT CONSIDERATIONS -- CONCLUSIONS -- RECOMMENDATIONS -- REFERENCES -- 1 INTRODUCTION -- REFERENCES -- 2 U.S. BANKNOTE COUNTERFEITING THREATS -- COUNTERFEITING TRENDS -- ASSESSMENT OF THE TECHNICAL THREAT -- Equipment -- General Technical Trends -- Unit Placements and Selling Prices -- Summary of the Technical Threat -- TYPES OF COUNTERFEITERS AND REQUIRED GENERAL DETERRENTS -- Class I: Opportunistic Counterfeiters -- Class II: Petty Counterfeiters -- Class III: Professional Counterfeiters -- The Principal Threat -- REFERENCES -- 3 ASSESSMENT METHODOLOGY FORCOUNTERFEIT-DETERRENCE FEATURES -- REQUIREMENTS -- THE "PERFECT" VISIBLE FEATURE -- TIME FRAME FOR POTENTIAL INCORPORATION -- EVALUATION STRATEGY -- EVALUATION FRAMEWORK -- REFERENCES -- BIBLIOGRAPHY -- 4 DESCRIPTION AND ASSESSMENT OF DETERRENT FEATURES -- CURRENTLY USED OVERT U.S. COUNTERFEIT-DETERRENCE FEATURES -- Paper -- Red and Blue Fibers -- Intaglio Printing and Fine-Line Engraving -- Serial Numbers -- Security Thread -- Microprinting -- Color -- Overall Assessment of Existing Visible Features -- INNOVATIVE VISIBLE COUNTERFEIT-DETERRENCE FEATURES -- Substrate-Based Features -- Laminated Substrates -- Plastic Substrates -- Enhanced Security Thread -- Watermarks -- Tinted Substrates -- Paper Furnish Additives -- Enhanced Fibers -- Planchettes -- Microtaggants™ and Microcapsules -- Radar Reflectance -- Color -- Some Fundamentals -- Uses of Color in Banknotes -- Other Aspects of Color in Banknotes -- Inks for Printed Features -- Color-shifting Inks -- Metameric, Photochromic, and Photoluminescent Inks -- Transparent or Absorbing Infrared Inks -- Design-Based Security Features , APPENDIX F BIOGRAPHICAL SKETCHES OF COMMITTEE MEMBERS -- GLOSSARY , Moiré-Inducing Line Structures -- Variable-Sized Dot Patterns -- Latent Images -- See-Throughs -- Bar-Code Technology -- Post-Printed Optically Variable Devices -- Diffraction-Based Holograms -- Diffraction-Based Kinegrams and Pixelgrams -- Multiple-Diffraction Gratings -- Thin-Film Interference Filters -- Hot-Stamped Security Stripe -- Embedded Zero-Order Diffraction Gratings -- Random Pattern/Encryption Counterfeit-Deterrence Concept -- Implementation Using Two Visible Features -- Implementation Using One Visible and One Secret Feature -- Counterfeit Deterrence Incorporated in Copiers and Printers -- Currency Recognition System -- Copier/Printer Identification System -- Features Used by Other Countries -- RECOMMENDATIONS -- REFERENCES -- BIBLIOGRAPHY -- 5 COUNTERFEIT-DETERRENT STRATEGIES -- RESEARCH AND DEVELOPMENT STRATEGIES -- Technology Advancements -- Realistic Testing and Specifications -- Implementation of Changes -- SELECTION OF COMBINATIONS OF FEATURES -- REACTIVE AND PROACTIVE STRATEGIES -- VALIDATION/DETECTION DEVICES -- PUBLIC EDUCATION AND ACCEPTANCE -- LAW ENFORCEMENT CONSIDERATIONS -- INFORMATION EXCHANGE -- REFERENCES -- APPENDIX A CONCLUSIONS AND RECOMMENDATIONS FROM PREVIOUS NATIONAL MATERIALS ADVISORY BOARD REPORTS ON... -- Conclusions -- Recommendations -- Conclusions -- Recommendations -- REFERENCES -- APPENDIX B ADVANCED NON-IMPACT COLOR REPROGRAPHIC TECHNOLOGIES -- ELECTROPHOTOGRAPHY -- INK JET -- THERMAL TRANSFER PRINTING -- MAGNETIC PRINTING -- ELECTROSTATIC PRINTING AND ELECTROSTATIC PRESSES -- INPUT SCANNERS AND ELECTRONIC IMAGING SYSTEMS -- IMAGE-PROCESSING SOFTWARE -- DIGITAL PRESS -- DIGITAL PHOTOGRAPHY -- REFERENCES -- APPENDIX C BACKGROUND ON COLOR -- REFERENCES -- APPENDIX D INDUCED MOIRE PATTERN BACKGROUND -- APPENDIX E METHODS FOR AUTHENTICATION OF UNIQUE RANDOM PATTERNS -- REFERENCES
    Weitere Ausg.: Print version Counterfeit Deterrent Features for the Next-Generation Currency Design Washington, D.C. : National Academies Press,c1993 ISBN 9780309050289
    Sprache: Englisch
    Schlagwort(e): Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 0309025028?
Meinten Sie 0309050294?
Meinten Sie 0719050286?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz