Redundant image representations in security applications | IEEE Conference Publication | IEEE Xplore