| http://www.w3.org/ns/prov#value | - By way of introduction, security documents, or objects or documents subject to counterfeit, such as software discs, CD's, music tapes, share certificates and the like can use perimeter coating alignment to provide either visible or invisible coating treatments in precise repeatable patterns to provide identification which may not be readily visible.
|