MXPA98004236A - Method and device of digital programming against alternative - Google Patents

Method and device of digital programming against alternative

Info

Publication number
MXPA98004236A
MXPA98004236A MXPA/A/1998/004236A MX9804236A MXPA98004236A MX PA98004236 A MXPA98004236 A MX PA98004236A MX 9804236 A MX9804236 A MX 9804236A MX PA98004236 A MXPA98004236 A MX PA98004236A
Authority
MX
Mexico
Prior art keywords
image
encoded
coded
output
programmatic
Prior art date
Application number
MXPA/A/1998/004236A
Other languages
Spanish (es)
Inventor
Alasia Alfred
Original Assignee
Alasia Alfred
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alasia Alfred filed Critical Alasia Alfred
Publication of MXPA98004236A publication Critical patent/MXPA98004236A/en

Links

Abstract

The present invention relates generally to a method and apparatus, in accordance with what is implemented by programmatic in a computer system, to produce images of coded or secret marks to avoid alterations, typically in printed form. This method and system can combine a source image with a latent image in such a way that the encoded latent image can only be seen when viewed through a special decoding lens. The digital processing allows the codification of different latents according to different parameters. Additionally, latent images can be encoded in colors of unique components of a visible original image, at various angles between them.

Description

METHOD AND DEVICE OF DIGITAL PROGRAMMING COTIFTP.A ALTERATIONS FIELD OF THE INVENTION This invention generally refers to a method and apparatus, in accordance with the implimented by a -5 programmatic in a computer system, to produce images of coded or secret marks to avoid l ones, typically in printed form. This method and system can combine a source image with a latent image such that the latent image can be seen only when viewed through a special decoder lens. BACKGROUND OF THE INVENTION In order to avoid duplication or unauthorized alteration of documents, special marks 5 or a background pattern for sheet materials such as tickets, check, etc. are frequently provided. bi 1 letes, and similar- The brands Or pattern of background are placed on the sheet material i 'usually by some type of printing process such as offset printing, lithography, pressing or either 0 or' type of mechanical systems, 'by various methods foto raf iqos, by,; < eroprinting, and by several other methods.
The pattern or brand <it can be produced with customary inks, with special inks which can be magnetic, fluorescent, or the like, from powders that can be baked, from light-sensitive materials such as, for example, silver salts or azo dyes, and the like. Most of these patterns placed on sheet materials depend on the complexity and resolution to avoid a fake duplication. Consequently, they add an additional cost to the sheet material without being totally effective in many cases to provide the "desired protection against duplication or unauthorized alteration. Several methods of strategies have been suggested to avoid facifications, including mo-ind induction line structures, size-point patterns, latent images, transparencies, bar codes, • as holograms based on diffraction. However, none of the mobile technologies uses a self-evident image or the additional security benefits that derive from it. This same inventor previously presented a "new system for coding and decoding marks in ma, and 3) for the production of an imager. • of panoramic agrama, of 'for the je. These principles and modalities of í '¡; US Pat. No. ZZ, 937,565, issued the iO of February 1976 are corporated here by reference. The 'brands were? preferably produced photographically using a lenticular line screen-for example, a lenticular screen-with a known spatial density of lenses, eg 6 lines per inch). A specialized stereoscopic camera can be used to produce the parallax image, as described in the Patent No. 3, 524, 39, of this inwntor, issued on August 18, 1970, Pa in North American No. 3,769,890, issued on November 6, -973. A photographic or analogue production of coded images of brands and the inconvenience of requiring a specialized camera. Likewise, analogical images are limited in their versatility to the extent that an area of secret marks can be observed generally only when it is monad. p uncoded m enes. Also, it is difficult to combine several latent images with different coding parameters because of the ability to effectively re-expose film segments in order to generate the photographic image. Therefore, it is necessary to have an approach and by which the photographic process and its results are essentially digitally simulated through a computer system and a related system. - A l ionally, it is in itself - t ttt eine which encoded latent images that are int in a source image, or individual color components of the same, so that the source image can be seen at a glance and in such a way that the latent image is visible only to be decoded. Se &ampWhat is it? also of the ability to incorporate several latent images, re-setting different "phases" in the source image for greater security. SUMMARY OF THE INVENTION The present invention provides a programmatic method and an apparatus for digitally encoding and incorporating latent images into (the source image, the latent image - I 10 in digitized form - may be encoded "for its" decoding. by several lens lenses selected by the user, each lens having different optical properties such as line densities per inch. fifteen -OR they make up the encoded latent images. Generate Try, when printing images, the image consists of a series of "printer points." that vary in density of -: .- > conformity with the colors found in the various parts of the agen. The programmatic method and the apparatus of the present invention take the grid lines of the source image and reform them therein. same, general pattern as the lines of the encoded latent image. Thus, when the fuzzy image is darker, the coded lines are formed proportionally denser 5 when the source image is more c l a r, the coded lines are formed in a prsporc lly less dense manner. The resulting combined image is visible to the naked eye as the 1 original source image. However, since the component gridlines are formed in the encoded pattern of the encoded latent image, a decoded. ficator will reveal the. underlying latent image. Due to the high resolution 'printing required for such -5 complex coded lines, attempts to copy the. images printed by the tromechanical means, or otherwise, do not usually reproduce the underlying latent image. As a result of this digital approach, i can be coded! . 10 and combine several different latent images into a globular latent image which can then be reformed into the gridded source image. This is achieved by dividing the grid lines into the appropriate number of images (or phases) and through the. between crossing the _5 images in phase in each quad line element.
Each individual latent image can be oriented at an angle and encoded to a different degree at the same time that the coding of each image is a functional multiple of the co-born decoder frequency. Alternatively, l a. Grayscale font image can be divided into primary component printing colors (for example, cyan, magenta, yellow, and black or CMY rojo red, blue, or RGB). Some unique color map formats can also be used for some applications. Lina encoded latent image, or a multiple phase image can then be reshaped indi idually in each component color. By joining the colors to form the final source image, the decoder will reveal. the different latent images hidden in the different color segments. The present invention also allows the option to dump each of the elements of the latent image after its division or coding in its parts of elementary lines. As discovered by the inventor, this unique step produces relatively more accurate decoded images when each of the elements is tipped around its axis by one hundred and eighty degrees (180). This same effect was achieved through the process of US Patent No. 3,937,565, and the stereographic cameras cited there, by dumping an object when it is observed passing the focus point of a lens. The overturned elementary lines are then reformed in the image »grid font. While increasing the sharpness of the latent image, the fact of overturning the elements has no negative, or even visible, effect on the appearance of the final coded source image. In addition, by combining two images consisting of an image where the elements are overturned and another where the elements are not overturned, the appearance of a spatial separation of the two images will be observed when the decoding ion is carried out. | As it is referred to, the source image may consist simply of a solid color, or of a textured background that may contain hidden latent images when observed through proper desing. Such colorful, solid areas can often be found in checks, tickets, tickets, etc. | Other useful applications may include the latent encoding of a person's signature within a source image consisting of the person's photograph. Such a technique would make it virtually impossible to produce false identity cards or false driver's licenses by the common technique of replacing an existing photo with a fake one. Other information such. In addition to the signature of the person (eg height, weight, not identification), it can also be included in the latent image for its coding in the source image. Other useful applications may include, for example, the following: credit cards, passports, photo identification cards, tickets, tickets for special events, stocks and bonds, bank checks and traveler's checks, counterfeit labels (for example, for designer clothes, drugs, liquors, video tapes, audios, CDs, cosmetics, machine parts, as well as pharmaceutical products), fiscal and postal stamps, I birth certificates, vehicle restoration cards, title deeds, and visas. A) Yes. An objective of the present invention is to obtain a method and apparatus for setting up counterfeits, in accordance! with what is implemented by a programmatic in a computer system, to produce images of coded ma- cod; or secret, typically in print, The encoded image can then be decoded and viewed through a special lens 1 corresponding to the prog- matic coding processing pads. i! An additional object of the present invention is to offer an i method and aptarato to avoid falsifications, in accordance ! with what is implemented by a programmatic in a computer system, where a source image is gridded, and the latent image is divided into the corresponding elementary lines, and the gridded source image is reconstructed in accordance with the coded pattern of the secret image. However, an additional object of the present invention is to offer a method and apparatus for avoiding fsifications, in accordance with what is implemented by a programmatic in a computer system, where the source image becomes an image of scale of grays pa to the incorporation of a latent encoded image. Another object of the present invention is to provide a method and apparatus for preventing counterfeiting, in accordance with what is imitated by a programmatic in a computer system, where the image! Grayscale source is further separated from its component color parts for the possible incorporation of latent encoded images in each part of the composite color, with the gathering of the parts to form the final coded source image. The related object of the present invention is to provide a method and apparatus for preventing fl ification, in accordance with what is implimented by a programmatic in a computer system, where the elementary lines of the coded image can be rotated or overturned around its axis as necessary, or as selected by the user.
A further object of the present invention is to provide a method and apparatus for preventing counterfeiting, in accordance with what is implemented by a programmatic in a computer system, where the "single phase" encoded image consists of a first latent image that has been divided and, encoded according to a decoding density ficadsr coding factor selected by the user. Other. It is an object of the present invention to provide a method and apparatus for preventing counterfeiting, in accordance with the | implemented by a programmatic in a computer system! where the image encoded "in two phases" is divided according to a density of decoder selected by the user, and each division is divided into two subdivisions, and the first latent image and the second latent image are! they intersect alternately in the subdivisions, and each latent image is encoded by means of a coding factor selected by the user. Another object of the present invention is to provide a method and apparatus for preventing falsification, in accordance with the impimemerized by a programmatic in a computer system, where the image encoded "in three phases" is divided according to the selected decoder density. by the user, and each division is divided into his. once in three subdi ions, and the first, second and third images! Latencies are alternately criss-crossed in the sub-regions, and each latent image is encoded by a coding factor selected by the user. Another object of the present invention is to provide a method and apparatus for avoiding fsifications, in accordance with what is implemented by a p > rogrammatica in a computer system, where a "brand dye" similar to a two-phase SS is produced, but with a bridge file, and every third subdi tion of the input image is the complement of the first i subdivision. A further object of the present invention is to provide a method and apparatus for preventing counterfeiting, in accordance with what is implemented by a programmatic in a computer system, where the source image; It has a solid color or dye pattern with the built-in shi image, but the elementale lines are only dumped when a letter or an object occurs in the underlying latent image. Another object of the present invention is to provide a method and apparatus for preventing counterfeiters, in accordance with what is implemented for a program. in a system of cQ.np.uto, where the latent image is directly encoded in a certain i figure visible in the source image, using this way. a "hidden image" effect. Qtro object of the present invention to provide a method and apparatus to prevent falsifies ions in accordance with the implemented by a ica program on a computer system, wherein an image font bit maps used lin time of an image scale of grays) to create hidden images behind single-color source images or sections of source images. Another related object of the present invention is to provide a method and apparatus to prevent forgery, in accordance with implemented by a program in a computer system where an effect in three-dimensional relief, multiple levels is created, by applying different parameters of coding to an image and its background. Another related object of the present invention is to provide a method and apparatus for preventing ionization, in accordance with what is implemented by a programmatic in a I computer system, where sections "null dye" can be praáu.c¡tda and words. "null" sis-illary words may appear in S-document if photocopies are attempted, I Other or: - possible of the present invention is to employ the programmatic and the computational system to produce the equivalent of "marks of water "in papers. Another possible object of the present invention is to use the prog- matic and the computer system to produce, or to help produce, holographic images through line diffraction techniques.
Other objects and advantages of this invention will be apparent from the following description in combination with the accompanying drawings when some modalities of this invention are presented by way of example illustration. The drawings constitute a part of this specification including exemplary embodiments of the present invention and illustrate various objects and features thereof. SHORT DESCRIPTION OF THE WELLS Figure 1 shows a single "one phase" axis of the Coded Marking (SI) process where an output image is divided into elements as a function of the decoding lens frequency and the coding factor. good fast change factor of plane, or base code) of conformity as selected by the user. Figure 2 (a) shows a "P" (top) encoded with extended elements 4G0Ü (below) where the elements have been overturned. 180 degrees in relation to its vertical axis. The. figure 2 (b) shows the coded "P" (above) of figure 9 (a) with its resulting extended elements' 400Í4 (below) where the elements have not been inverted or altered. Figure 3 shows an example of SI "two phases" of output image division, where the width of the division is half of the example of phase, with each division not being a file "source one" and each division pair being from a "source two" file. Figure 4 is our SI example of "three phases" of dividing the output image, where the width of the division is one third of the example of one phase, | with every three divisions being from the same input file source ii Figure 5 shows a comparison of the coded and secret results of one, two, and three phases. Figure 6 shows a series comparison of images encoded as a function of a created lens frequency I or line density per inch) of 10 to 100. | Figure 7 shows a series comparison of coded images as a function of fast plane change factor (or base code) which is located from 30 to 250, a given lens frequency. Figure 8 shows a series comparison of images encoded in two phases where the first image is > The second latent image rotates in relation between rows between 10 and 90 degrees. Figure 9 shows the steps involved to encode, as hidden images, two separate patterns of coded marks in two separate base colors in accordance with the extracted from the original source image. Figure 10 shows a flowchart of the steps related to the process as indicated in Figure 9. Figure 11 shows an e.jemplar equipment configuration to be able to employ the programmatic of S.?. and carry out the SI process. Figure 13 shows the introduction screen for the coded mark program (SIS). Figure 14 shows the series of options that appear in the generalized screen for a selection of SI of a phase type. Figure 1 (a) shows the choices that result from the option selection in the File Menu. Figure 14 ib) shows the resulting screen when you select either load or save from the 'menu option'. of files. ,! j Figure 15 shows and presents options with details' add to them from the screen g, drawn from a selection of the Yes of a phase. Figure 15) shows the review option screen! fast selected from the screen illustrated in figure 15. 'Figure 16 shows the generalized screen for one! SI selection of two-phase type. Figure 17 shows the generalized screen for an SI selection of three phase type. Figure 18 shows the generalized screen for an SI selection of dye-type markings. Figure 18 (a) shows an example of "mark dye" dividing the output image, where the width e division is half of the example of a phase, where each bex ^ cus subdivision is the complement of the input sub-mission statement. Figure 19 shows the generalized screen for an SI-Slection of hidden image type. Figure 20 shows the generalized screen, for a multi-level type SI selection. Figure 21 shows the generalized screen for a grid type selection of S.I. Figure 22 shows examples of quadrilateral techniques with corresponding circles indicating a view of a part of the overall pattern. DETAILED DESCRIPTION OF THE PREFERRED MODALITIES Although the invention has been defined in terms of a specific modality with some to the foregoing, it will be readily apparent to those skilled in the art that various modifications, rearrangements and substitutions may be carried out without get out of the spirit of the present invention. The scope of the present invention is defined in the api indications rei. The Coding Marking (SI) process includes gridding, or division into lines, of a source or 'visible' image in accordance with the frequency (or density) of a lenticular decoder lens. The number of lines is also a function of the coding factor, or a fast plane change factor, as it is applied to a latent image or secondary image.
After processing and encoding the image, there is a set of coded lines that can then be combined in the quadrilateral lines of the visible image. The visible image is therefore reformed, or boxed in accordance with the pattern of coded lines of latent image. When the visible image is darker, the coded lines are proportionally thicker in the reformation of the grid lines of the visible image? similarly, when the visible image is clearer, the coded lines are proportionately thinner. Co or As a result, a new image is created, but with the latent SI pattern, coded, seen "below" when viewed through a transparent lens. Referring now to Figure 1, some examples of the process are illustrated. In this example, a latent image is processed in a visible source image, and this process is generally known as an "one phase" SI operation. In an SI operation, an output image is a function of the lens density of the decoder. An output image 2 is illustrated when it is divided into elementary divisions, or segments, of width "h". See Reference 4). Each division width "h" is a function of several factors such as density and base code. As in the case of lens density, the inventor has assigned reference names to lenses with various frequencies and good line densities per inch), including for example, the following: D-7X with 177 lines / inch; D-7 with 152.5 lines / inch? D- with 134 I lines / inch? D-9 with 69 lines / inch. See reference 6), the programmatic for the realization of this process i also provides an option "x2" well doubling factor, df) that doubles the effective line density, and therefore divides the output image into two times more divisions. The resulting SI image is still decodable by it. lens selected because the, number of lines is a multiple pair of dsl lens frequency. The output image division, which has a width "h", is processed according to the input division width "i" (see reference 8). In turn, the width "i" is a function of the width "h", the lens density, and a basic code factor or good coding factor) in accordance with the user's selection. ! These formulas are the following: df = 2 ísi is selected ". < --_" >; 5 1 (by default) or = h * density / lOO (See reference 10) i. = a * base code (B> See reference 8) Rearranging these formulas, the. value for "h" becomes: (l / b) * 100 = density * df Thus, according to the value for the base code and / or the density is increased, the width "h" will decrease. A larger base code, or a larger coding factor, therefore results in a larger number of lines and results in a more distorted or coded image. Additionally, the IS process allows the option to dump 12 the input division to affect the sharpness of the image. With reference now to figure 2), the letter, "P"! I is illustrated in coded form 30 ds compliance with. the process of S.I. An image 34 enlarged by 400% further illustrates the characteristic elements 38. In this case, the elements have each been invested vertically 180 degrees around their vertical axis. Figure 2b) shows i the same example "P" 32,, and an enlarged version '36 where 'Ids elements have not been overturned. When observed through the appropriate decoder lens for these parameters of H.H. particular, the overturned "P" will appear. with greater clarity, or more visually different than the "P" not overturned. For any encoded image, the programmatic provides the user with the option to dump or not dump the elements, as described in more detail below. Referring now to Figure 3, a SI "two-phase" process is shown where the method is similar to the method for the SI process of a phase. In this case, however, each division of width "h" is further divided into a first subdivision and a second subdivision. The elementary lines of the first encoded image and the second encoded image will be stored by the programmatic files ! from "source one" and "source two". In the output image I resulting, the neon divisions 14 are composed of elementary lines from the source file one, and the even divisions 16 come from the source file 2. Al; to carry out decoding, the first image 'encoded and the second encoded code will appear | independently discernible - I '! • '' With reference now, to the fourth, a process of IF of "three phases" similar to 'the process of SI of a phase and, of two phases. In this case, the width "h" is divided into three parts. The first encoded image, the second encoded image and the third encoded image are stored in three computerized source files. In the resulting output image, every three divisions 18, 20, and 22 come from the same first, second or third respective source file. '- ~.,. «: ^^^^ tg» o ^' i! '^, - ^ y- ^ wys - ^, - t - yt; g-t7 ~ - "gc ^. ^ -' .J --- > '' ^ --- ww .-. H ^ Again, upon completion of the decoding, the first, second and third encoded images will appear independently discernible, with reference to Fig. 5, a comparison of encoded results of one, two, and three phases for a given lens density and base code Figure 6 shows a comparison of the results coded for a given base code and a varied set of lens densities ranging from 10 to 100 lines per inch. slow density, the relative width of each elementary line decreases and causes the coded image to be more difficult to discern In figure 7, the lens density is fixed while the fast change factor of flat or base code is increased by a series of values that are within a range of 30 aj 250. Similarly, the case of the formulas i ante As the base code increases, the relative width of each elementary line decreases, which makes the encoded image more difficult to ! . discern. As illustrated, the discernibility of the image I coded for a fast plane change factor of 30 is much greater than in the case of a fast plane change factor of 250. Another characteristic benefit of multi-phase processing is that each latent image can be oriented at an angle different to obtain greater security. Referring now to Figure 8, there is illustrated a series of two-phase images where the first latent image remains fixed and the second latent image is rotated, relative to the first image, through a series of angles located within a 90 degrees range. Referring now to Figure 9, an example of the versatility offered by a programmatic version of the S.I. In this example, a postal stamp is created by which the process of S.I. it incorporates two different latent images, oriented at 90 degrees, between them, in two different base colors ds the visible source image.
The visible source image - made up of its original R8B colors - is scanned, like a high-resolution digital image, into a program and employs ADOBE PHOTOSHOP. The image is after its component color "plates" in another color format used CMYK, where the component images of Cyan 42, Magenta 44, Yellow 46, and Black 48 are illustrated.
The versatility of the programmatic S I. allows a fable combination of an image of S.S. latent with another color component of the visible image. In this case, the latent invisible image 50 with the repeated symbol USPS is coded and combined with the color plate Cyan 42. The resulting Cyan color plate 52 - in accordance with what has been described above - will show the original visible indicator in? N pattern squared with the naked eye, but the latent invisible image is r. coded in the quadrilateral pattern. A second latent invisible image 54 with the repeated trademark SCRAÍ.BLEB IFVlDICIA (from this inventor) is combined with the Magenta colar plate 44 to produce the coded Magenta image 56. The final visible image (similar to 40) will then be recomposed using the original Yellow and Black plates together with the coded Cyan and Magenta plates.
Referring now to Figure 10, an exemplary flow chart of the steps performed by the programmatic S.I. in figure 10. The source image is first digitali -da 41 and then divided into its colors CMY? 43 components. Each color plate 45, 47, 49 and 51 can be operated independently in any of the processes of S.I. -, mplemented. In this case, a technique is carried out hidden image axis or grid in single color), l ^ a color plates that form the objective are quadri- culated 53, 55 and the coding process of YES. is applied to the first latent image 57 and to [The second and latent image 59. The second coded image is i then combined with the plate 6Í of color Cyan grid and the second image cod? f? > : 3 a is combined with the color plate Magenta 63 c? Adx iculada. The final output image is created by recombining the Cvap Magenta color waves coded with the undisturbed Yellow and Black plates 65. In this example, only lo-Cya and Magenta colors were coded. Other examples can choose the coding of a color, three colors, or the four colors. While this process can ip 1 ement in any comput riate system, the preferred mode employs an arrangement in accordance with what is illustrated in FIG. 11. Various image files, in accordance with what is stored in a "tif" 60 format, are they feed on - a workstation 62 SSLICOf, S APHICS INC. -SGI) that uses the programmatic S.I. While the program can operate on any computer layer: from handling graphics to resolution, 13 SSI machine is used because of its superior capabilities, speed and graphics. The archives are opened by the programmatic of S.I. and i I establish the types, values and parameters of I marks coded by the user of the program 64. I algorithms of coding are applied by the programmatic of 5.1. to combine the lame images with visible images to create a new coded "tif" 66 file. The new "tif" file is then fed into a MACI-.TDSH 68 computer for implementation in the final design program, where the file is converted into an Encapsulated PostData 70 file format. The finished design is then sent to an output device of choice 72 which can print the final image at the resolution necessary to keep the hidden images uncovered when decoding. The preferred output device manufactured by SCITE-í BOLVE. Referring now to Figure 12, a flow diagram of the overall operation of the programmatic S.I. Upon entering program 80, 82 are created or 86 parameters are read from a default file 84. The user is then presented with a set of input screens to select the type of process from S.I. to rs.li-ar, along with the related parameters to perform said operation. An action may be to save the settings already made 90 sn a file 92 is e-by the user. A related option and load already saved settings 94 into a file 96 selected by the user. In accordance with what has already been described, the user can choose to carry out a process of S.I. of 1, 2 and 3 phases. Accordingly, the user could indicate the associated files on which the process of S. I * e dic 3 is carried out, which is to be performed on the one-phase, 2-phase or three-phase cycle. It is illustrated as 98, - O and 102 /. Other operations of S.I. which may be selected for calculation, may include a "dye" method 104, a "hidden" method 106, a "multiple-level" method IS, a "grid" method 110. Otherwise, the user may choose If the selection process goes through, the program reviews 166-128 the various input environments selected by the user.The program detects errors 117-129 of the program. relationship between each selection, and displays an appropriate error message 131 as appropriate Based on the selected input settings, 1-s will perform several operations, for example, coding with a one-phase method 130 and saving the results of a phase in an output file 132: coding with two-phase method 134 and saving the results of two phases in an output file 136f coding with the three-period method v Save the three I-phase results in a output file 14 i code with a dye method 142 and saving the results of the dye method in an output file 144; code with an expanded method 346 and save the expanded results in an output file 1 8; encode with a multiple release method 150 and save the results of multiple levels in an output file 15 or well encode with a grid method 154 and save the grid results in an output file 156. The results of any of these methods they can then be presented and visualized 160. if desired) through; of a 1 2 of the resulting observer. Sound indicators 166 can also indicate the progress of the programmatic, if you select 164. The programmatic of S. I. it employs several screens of -ni *, r f ---- of the user which facilitates the choice of the type of oroceso S.I. to perform, and what p ramétricas conditions. Figure 13 shows the introduction screen upon entering the SIS program that shows the user the property rights associated with the program »The user interface for the SIS is based on the environment of" window X ". It is similar to the majority of SL.I ÍInterfaces graphical user) -. When the user moves the mouse pointer to a field of choice and keeps the mouse button pressed, the user will get-. a window that goes up or up. This window will allow the user to make even more choices. Figure 14 shows the basic user interface screen associated with performing an S.I operation. When the ustapo "clicks" on the FILE MEr4U option, the choices in Figure 14 a) will appear (for example, on SIS, Load Environments, Save, Sound, and Abandonment Environments). When the user chooses either to load or save from the file menu, the screen of figure 14b) will appear. The user can drag the slide bar 200 or "click" on the keys 23 arrow 201 to be sorted through the list of available files. In addition, the user can use buttons 202 of the directory barr-t for aespla-ar = - backward in the directory hierarchy illustrated. The "filter" button 203 provides another window 204 that allows the user to specify what type of files he wants to see; for example, the "* that is a" wildcard "can be used with" -f-.tif "to bring all the files" tif "for a possible selection among the listed files. A ^ sz found the desired file, the "0.-" 205 button accepts and saves / saves the file. Any cancellation button 206 terminates operation 1. In addition, if the user activates the Sound environment, the SIS program will provide verbal cues to allow the user to know what is going on; otherwise, the SIS program will remain silent during the operation. The user can leave the SIS program at any time by selecting the "leave" option, or by pressing the Alt-Q keys. Referring again to Figure 14. the "decoder" box 170 shows the type of selected decoder, -for example D-7X.) The "type" box shows the type of coding 176 selected, for example S?. of a phase, S?. of two phases, SI of hidden image, etc.) The "density" slider bar 172 allows the user to control the weight of the line &5t the image that S > is creating during the coding process.The character will affect both the "positive" space - shaded) as "negative" .white) of the object being encoded.This value- may be applied based on what is being encoded and after the printing is finished.The "base code" slider bar 174 allows the user to control the amount of coding that is applied during the coding stage ication, in accordance with what has been described above. He ? d rO "dump" allows the user to rotate cid. individual coded element in 180 degrees around its vertical e. This option helps to hide the original element when this element is of sufficient suf fi cient nature to be observed even after the co-operation. In other words, sometimes when the coding of a single word or of some characters the letters are still available despite the coding process applied. By means of the dump of the elements, a deeper coding can be achieved ur.3 which, however, can be decoded by the same lens. Likewise, as mentioned above, the dump of the elements often produces a clearer decoded character. Figure 15 shows ¡. In the same basic user interface screen with e: .pl i falls additional ions of user mterf.z frames. Table 178"active source" Do my e to the user directly enter the name of the a. hi or in which the program applies the coding. The table 18"destination file" allows the user to directly enter the name of the file for the output -edited- Both the frames of the source and the destination file have "quick review" buttons 182 that provide another frame 184. 15 -a)) to select possible source and ination files In the quick review box, the user can use arrows, or the slider bar to view the file directories and locate and select a particular file »The table 185 of "filter" allows the user to select the specific name of the file and has the program search for it.The block 186 of "resolution" indicates the resolution of the final output image.This number must correspond to the resolution of the destination printing device The "view" option box 188 allows the user to decide whether or not to see the encoded image after the completion of the SI calculation. n "LZW" allows the user to save files using compression. The compression maintains the overall size of the smallest files and conserves disk space. The amount "192" allow the user to do "ch" 1 in these, bar when you are ready to finally apply the coding process of S.I. Figure 16 shows a similar screen for carrying out an S.I operation. of two f. However, this screen provides input boxes for two source files 210 where the images the entities are intertwined in an image encoded in two phases. With the example of the two phases, the user can select a different basic code for each image. This is especially useful when the user wants to create an overlay of two different sets of items that are seen together, however they will be seen as separate words when they are decoded. A "Restrict i n" option box 212 is provided to link the first image and the second image together so that = >; e ap? ica the same base code to C3da image. The rest of the options. is similar to the above described. Figure 17 shows a similar screen to carry out an operation of S.I. of three phases. This screen provides three 214 source file input boxes where each input image can have a base code I applied differently, or the same basic code can be applied to all the images by activating the option of restriction 216. Referring now to Figure 18, the interface screen for performing an operation is illustrated. to carry out a "brand dye" operation. Unlike 13 S.I. of hidden image. below), the brand dye will flow smoothly as possible in the image, ignoring tone variations. This image can be considered as a "single tone" coding. Referring now to Figure 18a) an output image (similar to Figure 2) is illustrated which is similar to an S.I. of two phases, but with only one input file. In this case, every third subdivision 222, 224 of the output image is the complement of the input subdivision i mediately anterior. The complement means, for example, for example, that when the input is black, the complement e = > white, if the entry is ro a, the complement is cyan. etc. Figure 19 shows the interface screen for an S.I operation. of "hidden image" that provides input frames for a latent image 218 and a visible image 220. This operation allows the user to mix two images together where one of the images becomes latent and the other is visible. This effect will allow the image to be visible only when it is observed from the decoded. One yes. The latent image also allows the use of an additional file to compensate for the image display. The S.S. of hidden image is similar to S.I. of two phases - above described) and the mark dye (below) except that the bottom of the exit is an image instead of white. The first step is to copy the visible image onto the output image. In fact, the ss marker is similar to the brand dye, but the density parameter controls the visibility of the image. Likewise, the hidden image technique is similar to the grid of S.T. (bottom), but an image di. bit mark (single color) instead of a grayscale image. Figure 20 shows the user interface screen for operation of S.I. of multiple levels. The IF. Multi-level creates an encoded image that contains a sense of depth perception. This type of coding allows the user to set both a base code 226 and an ms-kimo base code 228. This particular version of the SIS program uses two images, an image called the texture image 222 and another image called a depth image 224. During coding, the pitch values of the deep image elements I will cause variable coding in the elements of the tea image. ture. This variation will provide the decoded image with the illusion of depth, and hence the term of S.I, of multiple levels. For example, this multi-level technique can simulate a camera effect ("D") by placing a face in the deep image and applying less code and base, while certain elements are overturned for additional clarity. The background should be placed in the theme file that would have more base code applied for a greater coding effect and without overturning the elements. By superposing these two images coded between them, the decoded face would appear sharper and have more depth than the surrounding background. Therefore, the car would have a "floating" appearance, creating a three-dimensional effect. Referring now to Figure 21, there is illustrated an interface screen for a grid operation of S.I. The grid of S.I. The user is allowed to mix two images together, one of the images becomes latent 230 in relation to the other that is visible 232. The latent image - intersects with the visible image according to the I grayscale values of this image »This effect allows the latent image to be visible only when >; It is observed through a decoder. ! Additionally, the latent image may consist of; an image of one, two, three phases, as created by using previous interface screens for multi-phase images and saved in an ap plicated ap rch. One of the most useful applications for the grid technique of 3.1. is when the visible image is a photograph and the latent image can be a signature of this person. Using the SIS program, the visible image can be gridded and then the image of the image can be coded and combined in the visible image grid pattern. The resulting coded image sar. a visible image of a photograph of a person, which when decoded shows the signature of the person. The latent image can include other vital statistics such as height, weight, etc. This high security encoded image will prove to be extremely useful in elements such as passports, licenses, photo IDs, etc. The processes described above have employed techniques for gridding lines derived from the suggested lenticular structure of the decoding lens. Other grid techniques may also be employed which would be accompanied by corresponding decoding lenses capable of decoding such coded and coded patterns. Referring now to Figure 22, a series of counting and empirical techniques that could be used to secretly encode secret images in gridded visible source images are illustrated. A circle accompanies each of these types of grid, that circle shows an enlarged area of the square. Exemplary types include; double line thickness modulation; line thickness modulation III stamped line grid; re eve; double relief; stamped round grid; cross-ion quadrupole; latent round grid; oval grid; and cross line gridding. Another technique, 5 cross-stamped grid, can employ one lens density frequency in the vertical plane and another frequency in the horizontal plane. Each user reviews each latent image by rotating the lens. Another technique includes lenses with variation in characteristics of IO frequency and / or refraction through the face of a single lens. Here different parts of printed material can be encoded at different frequencies and said parts would be decoded by a single lens for convenience. or there is no doubt that there are many other types of grid l1. easily adaptable to die SIS coding techniques. I ndapen lentemepte of the type of grid used, several others? Security measures can be implemented using the SIS program and the underlying principles involved. For example, the consecutive 0 numbering system found on tickets or banknotes may be coded to ensure additional protection against copying. The SIS program can also generate! d ig i tally secret bar coding. A Method and Apparatus for Coding and Descoding the Symbols of 5 Bar Code have already been described by these inventors in Non-Theatrical Patent No. 4,914,700, the principles of which are incorporated herein by reference. However, other common printing techniques include the use of complex printed lines, borders, guilloche =, / or buttons that are difficult to falsify or reproduce electronically. »The SIS program can introduce coded patterns that follow certain lines in printed material, therefore, the inventor refers to this technique as Micro Coded Lines. The security of Scrrambled Indicia (Coded Marks) can be increased further by separating 3-color ions in Cyan, Magenta, and Yellow from the image after the completion of the S.I. These colors can be adjusted between them in order to obtain a natural gray in the foreground when they are collected in these colors. The inventor refers to this process as "'correc xa de graises." Here, while the printed image would appear gray with the naked eye, the decoded image would appear in color. The adjustment of the separations to maintain a neutral gray becomes another factor to control when different combinations of ink, paper, and press are used. Maintaining these combinations adds another level of security to a valuable document and bi 1 letes. Another possible use of the SIS program would be the creation of .8 inference or nullity tint, combi ions in printed documents. This technique hides some words, co or for example "null" or "not valid" in elements such as tickets for concerts. If the ticket is photocopied, the underlying words "null" will appear on the copy and the ticket will therefore be invalid in the eyes of a ticket inspector. The SIS program provides an efficient and economical alternative to the production of these products. nude point patterns. The SIS program can also be adapted to produce watermark type patterns that are typically introduced into the paper through the penetration of oil and varnish. Moreover, the SIB program can be applied to the production of holograms through line diffraction methods. Again, the SIS program proves to be more efficient and more economic for the production of such results. 'i It will be understood that while some embodiments of the invention were illustrated and described, said invention is not limited to the specific arrangements or arrangements described and illustrated herein. It will be apparent to those skilled in the art that various changes can be made without departing from the scope of the present invention and the invention is not limited to that illustrated in the drawings described in the specification.

Claims (12)

  1. CLAIMS 1. A method of conformance with what is implemented by a programmatic in a computer system to digitally produce a coded, secret mark that prevents counterfeiting for its. incorporation into a printed material, said method consists of the following steps: (i) the coding of an input image that has been divided into element input segments, said input segments are encoded as a function of a slow density factor specified by the user, a base code factor, a doubled factor, and a dump option, said coding operation results in coded elementary salt segments; and (i i) the grid of a visible source image based on the. number of said elementary output segments , encoded results before: and (iii) the combination of said visible source image i quad icul d with said elementary output segments'. • I encoded in such a way that the resulting encoded output image is formed again to display the visible image while retaining the underlying • core of the encoded input image; and (iv) printing said coded output image, with sufficient resolution in such a way that a decoding device can be displayed to reveal the coded input image.
  2. 2. The programmatic method of the rei indication 1, where said visible source image becomes, when it is d gi t 1 i zad, in a grayscale image with tone variations in a set of component colors.
  3. 3. The programmatic method of claim 2, wherein said component colors are further divided into individual color plates whereby each color plate can be individually gridded and the different latent image can be encoded and incorporated. in each color plate, so the final output image is the result of the recombmsc ion of the color plates encoded and uncoded components.
  4. 4. The programmatic method of re-ion 1, where the encoded input image consists of a single latent image that has been segmented and coded according to the encoding factors selected by the user.
  5. 5. The programmatic and the method of claim 1, wherein the encoded input image consists of two latent images, each of which has been segmented into elements and encoded according to coding factors selected by the user for each image , wherein said output elementary segments are further divided into two subdivisions, and said coded elements of said first image are interleaved in each pair output subdivision, and said encoded entries of said second image are interleaved in each non-subdivision of image of exit. and?. The pro ram and the rei indication method 1, where the encoded input image consists of three latent images, each of which has been segmented into elements and encoded according to coding factors selected by the user for each image. , wherein said output element segments are additionally divided into three subdivisions, and said coded elements of each first, second, and third image are in each subdivision of the respective output image subdivision. 7. The program and method of claim i, wherein the encoded input image consists of a plurality I of latent images, each of which has been j segmented into elements and encoded as a function of coding factors selected by user for each image, I where said elementary output segments are further divided into several subdivisions equal to the number of latent images, and said coded elements of each latent image are in recrossed in their respective sub-images of output image. 8. The programmatic and the method of claim 1, wherein the encoded image consists of a latent image, which has been segmented into elements and encoded according to coding factors selected by user, where said elementary output segments are further divided in half into subdivisions, and said encoded elements of said first image is interleaved in each subdivision of output non, and where each even subdivision is the complement of the subdivision non prior'1. 9. The programmatic and method of claim 1, wherein the visible source image consists of a dye pattern with a coded latent image incorporated therein, with the elementary lines overturned 180 degrees about the vertical axis, but overturned only when a lettering occurs -ra or an object in the underlying latent image. 10. The program and the method of claim 1, wherein the coded input image - and directly incorporated into a predominant feature of the visible source image. so that a latent image is created that appears hidden directly behind the predominantly visible rythmical structure when it is decoded and observed, 11. The programmatic and the method of claim t, where said visible source image becomes, when find di i ta 11 zad, in a single color bitmap image. 12. The programmatic and method of claim 1, wherein a multi-dimensional, multi-level effect is created by the use of an input image comprising a background pattern coded to a higher degree than a second image of an object that is in a In the first plane, said global input image is incorporated into said visible image, where upon decoding, the object in the foreground appears imensively different from the background pattern. 13. An apparatus for implementing and carrying out the method and the program of claim 1, which includes a scanner for digitally raising images, a high-speed computer capable of using said coding program, said computer can also process and display graphics with high resolution, a second high resolution graphic computer that finalizes the resulting encoded images, and a ; lta print resolution to print the resulting encoded images i. ! 14 »A method of conformance with what is implemented by a programmatic 0 in a computer system for the digital production of coded, secret, • brands that prevent falsifications, for incorporation into printed material, said method consists of the following stages - (i) the coding of an input image that has been divided into elementary input seomentos. said input segments are coded according to a lens density factor specified by the user, a base code factor, a doubling factor, and a dump option, said coding operation results in elementary segment segments encoded; and i) separating said coded output image into component colors and adjusting each component color such that when recombined, the component colors produce a gray hue; • 'i i i) the recombination of said component colors into a coded output image of gray color; (iv) the printing of said encoded output image with sufficient resolution gives such a way that a decoding device can be used to reveal the coded color output image »
MXPA/A/1998/004236A 1995-11-29 1998-05-28 Method and device of digital programming against alternative MXPA98004236A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US08564664 1995-11-29

Publications (1)

Publication Number Publication Date
MXPA98004236A true MXPA98004236A (en) 1999-07-06

Family

ID=

Similar Documents

Publication Publication Date Title
RU2176823C2 (en) Program-implemented method and device for counterfeiting protection
US8199913B2 (en) Object authentication using embossed hidden images
US6104812A (en) Anti-counterfeiting method and apparatus using digital screening
DE60310977T2 (en) AUTHENTICATION OF DOCUMENTS AND ARTICLES BY MOIREMUSTER
MXPA98004236A (en) Method and device of digital programming against alternative
KR100562073B1 (en) Anti-counterfeiting method and apparatus using digital screening
Garner Creating security documents on the MECCA 2000 System