EP2199098A1 - Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document - Google Patents
Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document Download PDFInfo
- Publication number
- EP2199098A1 EP2199098A1 EP08305976A EP08305976A EP2199098A1 EP 2199098 A1 EP2199098 A1 EP 2199098A1 EP 08305976 A EP08305976 A EP 08305976A EP 08305976 A EP08305976 A EP 08305976A EP 2199098 A1 EP2199098 A1 EP 2199098A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- fragment
- document
- data
- line
- identification document
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Images
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/20—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
- B42D25/29—Securities; Bank notes
Definitions
- This invention relates generally to identification documents and a method for making such identification documents. More particularly, this invention relates to an anti-counterfeiting element for such identification document and to a secure identification document that allows detecting a fraudulent modification of the existing personalization or a completely falsified document. The invention also relates to a method for making such anti-counterfeiting element.
- Identification documents are associated with secure applications, such as for example driving licenses, identity cards, membership cards, badges or passes, passports, discount cards, banking cards, money cards, multi-application cards, and other papers of value; and security documents such as bank notes.
- Such documents are widely used, they may comprise an electronic module or not. If they comprise an electronic module, they can function either with contact and/or without contacts depending on the application to which they are intended. They may take the shape of card or a booklet or something else.
- Such identification documents are graphically personalized. Personalized information is personal data of the card's owner, i.e for example his photo, his name, his birth date, his social security number, his biometric information such as his fingerprint for example, a validity date, an identification number allocated to him etc... This personalized information is printed onto the surface of the document, or into one or more constitution layers of the document. Because of the value and importance associated with each of these data carriers, they are often the subject of unauthorized copying and alterations, and forgeries.
- One of these security features consists in providing, into the document, an optically variable security element, which comprises at least two security markings. Said markings are decomposed and interleaved, to create a complex image that is printed into the document. Then, a filter is placed over this complex image, said filter being arranged so that it enables to visualize each marking at a respective particular angle by tilting the document.
- Such filter can be made either with micro-lens or with printed parallel lines.
- optically variable security elements are difficult to copy because impossible to scan, they may still be falsified. Indeed, an infringer can arrive to change the variable data viewed through the filter, or to remove the part of the document comprising the optically variable security feature and to replace it by another part comprising another falsified optically variable element.
- a problem intended to be solved by the invention is to propose an anti-counterfeiting element for an identification document, said anti-counterfeiting element being able to reveal different sets of data or images superimposed onto a background when tilting the document, said anti-counterfeiting element being made with a more complex security, while keeping a simple manufacturing process, and being able to reveal the different sets of data or images with different darkness in comparison with the background.
- the solution of the invention to this problem relates to the fact that said anti-counterfeiting element comprises two separate fragments, each of which comprising part of data/images to be revealed and part of the background, each fragment being provided on each side of said identification document and overlapping each other through the thickness of said identification document.
- the invention relates also to a secure identification document comprising such an anti-counterfeiting element.
- the invention relates also to a method for manufacturing such an anti-counterfeiting element for an identification document.
- the method comprises the following steps :
- ID identity
- the invention is usable with any data carrier that includes, but is not limited to, a driving license, a badge or pass, a passport, a discount card, a membership card, a banking card, a credit card, a money card, a multi-application card, and other security documents and papers of value that are to be provided with information or data in such a way that they cannot be easily imitated by common means.
- identification documents may take indifferently the shape of card, or booklet, or something else.
- Figure 1 shows a cross-sectional view of an identification document 10 comprising an anti-counterfeiting element F1, F2.
- This document may be made either by molding in one-piece, or by lamination or other conventional process for attaching together several layers.
- the document comprises several layers 11, 12, 14, 15, 16, 17 attached together.
- the layers can be made with polycarbonate. This material is very interesting because, when they are laminated, the layers are fused and form only one piece instead of collated layers that could be delaminated.
- invention is not limited to this preferred embodiment, and layers made in other plastic material, such as PVC, ABS, PET etc;.. can also be used.
- the layers can also be attached by other means such as glue for example.
- upper layers 14 and 17, also called external layers or overlay layers are preferably transparent, in order to let information printed onto the body or lower layers to be seen from the outside.
- Layers 15 and 16 can be at least translucent, and laser-sensitive or not.
- Layer 11, which is the core of the body in the illustrated example can be either opaque, or semi opaque or at least translucent. If the core 11 is completely opaque, it is then necessary to provide a part 12 in said core, which has to be either semi-opaque or at least translucent. This part 12 is intended to be used for the anti-counterfeiting element.
- the anti-counterfeiting element is divided into two fragments F1, F2, each of which being provided on one side , respectively S1, S2, of the document, and more particularly on both sides S1, S2 of the part 12.
- the two fragments overlap each other.
- the two fragments overlap each other.
- different data are displayed by the two fragments, as illustrated by the references 21 to 24.
- the first displayed image 21 corresponds only to the background, which is black in the example of figure 1 .
- a first set of data 22 revealed consists in letters G and A which appear brighter than the background.
- the set of data consisting in the two letters G and A appears darker, while another set of data consisting in numbers 1 to 6 appears to be brighter.
- the first two letters G and A have almost disappeared, while the numbers 1 to 6 appear darker.
- each fragment F1, F2 is viewed independently from each other, it can only display an image at least corresponding to a background and at the most corresponding to a grey image.
- the revelation of different sets of data or images, when tilting the document, can only be viewed through the two fragments F1, F2 overlapping each other, through the thickness of the identification document 10 or at least the thickness of part 12.
- the part 12, on which are provided the two fragments F1, F2 of the anti-counterfeiting element can be semi-opaque.
- the two fragments F1, F2 can be viewed with the help of a backlight.
- the thickness of the part 12, and also the thickness of the body 11, has to be adapted to the resolution of the lines of the fragments F1, F2, in order to have good result. That is why the thickness is preferred at least four times the width w of a line of a fragment.
- the lines of the fragment and the width of line are illustrated in figure 3 , which is described in detail bellow.
- This lower limit of the thickness is much more important when the part 12 is semi-opaque, because the two fragments have to be seen together, overlapping each other, in order to reveal the different sets of data or images without using huge angle of viewing.
- the preferred maximum angle for viewing last information is less than 30°.
- the two fragments F1, F2 are applied on both sides S1, S2 either by means of a conventional color or monochrome printing process, or by laser engraving if layers used are laser sensitive. They can be applied either on/into layers 15, 16 or onto each surface of part 12.
- Figure 2 shows a succession of different images displayed when tilting such a document.
- the background corresponds to the photograph of the owner of the document.
- This photograph appears whatever the tilt angle is, and different sets of data or images are revealed superimposed onto the photograph, with more or less darkness compare to the background, depending on the different tilt angles.
- image 25 displayed comprises the photograph onto which are superimposed letters G and A that appear brighter than the photograph, then at a second angle the displayed image 26 comprises only the photograph without any other data superimposed.
- the image 27 displayed comprises the photograph of the owner on which are superimposed numbers 1 to 6 that appear darker than the photograph.
- image 28 displayed comprises the photograph of the owner on which are superimposed first the letters G and A that appear darker than the photograph, and second the numbers 1 to 6 that appear brighter than the photograph.
- Figure 3 shows an example of the successive lines used to build the first fragment F1 of the anti-counterfeiting element.
- a first step of the process consists in subdividing each original pixel of information to be displayed into a matrix M of X x Y dots.
- each matrix has a sufficient color density for rendering the same details of a picture. Consequently, matrix must enable to obtain a contrast and brightness compared to original picture.
- each pixel of information is subdivided into a matrix of 2x2 dots, said matrix comprising for example two dark dots and two bright dots.
- each pixel of the first line of the background for example, is subdivided into a matrix of dots. Then, it is possible to create a first line L1 of matrices of dots, which corresponds to the first line of pixels of the background, each matrix of dots being chosen randomly amongst the different possibilities, i.e. the six different possibilities M1 to M6 in the illustrated example of figure 3 .
- each matrix of dots can also be chosen in a coded manner, in such a manner that its choice is linked to the personalization information of the owner of the document for example.
- matrices of dots are organized in lines by means of an algorithm using the personalized variable such as name or surname for example.
- the place of coded matrix element inside a fragment can either be fixed for all personalized documents or depend itself from the personalized variable. Then, during the authentication step, a similar algorithm can be used to read the coded matrices.
- a second line L2 of the first fragment F1 is created by reversing the just preceding first line L1.
- the first line L1 is called a "positive line” compare to the second line L2, which is called “negative” line.
- the third line L3, positive, of the fragment F1 comprises matrices of dots corresponding to the following line of pixels of the background, i.e. the second line of the background, and the fourth line L4, negative, corresponds to the reversed line of the just preceding line L3.
- each odd line, positive corresponds to successive lines of pixels of the background, and each even line, negative, is the corresponding reversed line of the just preceding odd line.
- Each line has a width w corresponding to the size of the matrices.
- the second fragment F2 intended to be applied on the other side S2 of the part 12 and opposite to the first one, is linked to the first fragment F1. Its building is illustrated by the example of figure 4 .
- Data to be revealed onto the background are coded into lines of matrices of dots, by using each positive or negative line of the first fragment.
- the code consists in dividing the line of matrices of dots into portions of predetermined variable size, each portion corresponding either to a portion of a corresponding odd line of the first fragment F1 or to a portion of a corresponding even line of the first fragment F1.
- FIG 4 illustrates one example.
- a first data to be revealed is coded in such a manner that the first line L1 of the second fragment F2 is divided into four portions P1 to P4 of different size.
- Each portion P1 to P4 corresponds, either to the positive first line L1 of first fragment F1 or to the negative second line L2 of the first fragment F1.
- the portions P1 and P3 correspond to first positive line L1 of first fragment F1
- portions P2 and P4 correspond to second negative line L2 of first fragment F1.
- the second line L2 of second fragment F2 enables to create other coded data to be revealed.
- the preceding steps used for the building of the first line are repeated for this second line L2, with another coded information.
- the second coded information consists also in dividing the second line L2 of the second fragment F2 into four portions P1' to P4' of different size. Portions P1' and P3' correspond to positive first line of first fragment, while portions P2' and P4' correspond to negative second line of first fragment. Then, knowing this second code, it is possible to build the second line L2 of the second fragment F2, by applying the corresponding positive or negative matrices of dots for each portion of line.
- This example is a simple example for illustration purpose, but it is possible to code more than two sets of data/image to be revealed, and each original pixel can be subdivided into matrix of more than 2x2 dots.
- the computation of the two fragments is advantageously made by means of a computer software and then the two fragments are printed or applied or laser engraved simultaneously on both sides of the portion 12, through which the fragments are intended to be viewed and to overlap each other.
- Figure 5 shows an example of the kind of information that can be revealed by the two fragments F1, F2 of figures 3 and 4 , when viewing these two fragments through the thickness of the document while the identification document is tilted.
- the document is tilted in such a manner that when a viewer look at the two overlapping fragments F1, F2, the first line L1 of second fragment F2 is over the second line L2 of first fragment F1.
- the coded first set of data which is surrounded by continuous thick lines 51, appears brighter than the background, while the second line L2 of second fragment F2 does not let appearing the second coded set of data, which is hidden into the background.
- the document is tilted in such a manner that when a viewer look at the two overlapping fragments F1, F2, fragment F2 completely covers fragment F1, i.e. first line L1 of F2 overlaps first line F1 of F1 and second line L2 of F2 overlaps second line L2 of F1.
- first line L1 of F2 overlaps first line F1 of F1
- second line L2 of F2 overlaps second line L2 of F1.
- the coded first set of data which is surrounded by continuous thick lines 51', appears to be darker than the background
- the coded second set of data which is surrounded by dashed thick lines 52, appears to be brighter than the background.
- the document is tilted in such a manner that when a viewer look at the two overlapping fragments F1, F2, the second line L2 of second fragment F2 overlaps the first line F1 of first fragment F1.
- the coded first set of data is completely hidden into the background so that it is not visible to human eye, and the coded second set of data, which is surrounded by dashed thick lines 52', appears to be darker than the background.
- the two fragments F1, F2 can overlap each other in such a manner that the two sets of data are hidden into the background and none of them can be viewed by the viewer.
- the embodiments that have just been illustrated and described relate to monochromatic examples with different grey levels.
- the invention is not limited to such monochromatic embodiments and it can also be applied to all multicolor embodiments.
- two different colors can be chosen for each fragment.
- two colors of each fragment can be for example opposed in the spectrum of colors, so that they display a black color when they overlap each other, by subtractive synthesis.
- the first fragment F1 can be made with matrices of dots in which dark dots are in magenta color and bright dots are in yellow color
- the second fragment F2 is made with matrices of dots in which dark dots are in cyan color and bright dots are in yellow color.
- the two fragments overlap each other, depending on the tilt angles, they display variable information darker or brighter than the background and also display additional information with another color different from the colors used for the fragments.
- first fragment F1 can be made with matrices of dots having red dots
- second fragment F2 can be made with matrices of dots having green dots.
- the two overlapping fragments enable to display a third color, yellow in the example, by additive synthesis.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Credit Cards Or The Like (AREA)
- Printing Methods (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
Description
- This invention relates generally to identification documents and a method for making such identification documents. More particularly, this invention relates to an anti-counterfeiting element for such identification document and to a secure identification document that allows detecting a fraudulent modification of the existing personalization or a completely falsified document. The invention also relates to a method for making such anti-counterfeiting element.
- Identification documents are associated with secure applications, such as for example driving licenses, identity cards, membership cards, badges or passes, passports, discount cards, banking cards, money cards, multi-application cards, and other papers of value; and security documents such as bank notes. Such documents are widely used, they may comprise an electronic module or not. If they comprise an electronic module, they can function either with contact and/or without contacts depending on the application to which they are intended. They may take the shape of card or a booklet or something else. Such identification documents are graphically personalized. Personalized information is personal data of the card's owner, i.e for example his photo, his name, his birth date, his social security number, his biometric information such as his fingerprint for example, a validity date, an identification number allocated to him etc... This personalized information is printed onto the surface of the document, or into one or more constitution layers of the document. Because of the value and importance associated with each of these data carriers, they are often the subject of unauthorized copying and alterations, and forgeries.
- To prevent such activities from being carried out on these data carriers, different types of visual and touchable security features have been added to data carriers. One of these security features consists in providing, into the document, an optically variable security element, which comprises at least two security markings. Said markings are decomposed and interleaved, to create a complex image that is printed into the document. Then, a filter is placed over this complex image, said filter being arranged so that it enables to visualize each marking at a respective particular angle by tilting the document. Such filter can be made either with micro-lens or with printed parallel lines.
- However, even if these optically variable security elements are difficult to copy because impossible to scan, they may still be falsified. Indeed, an infringer can arrive to change the variable data viewed through the filter, or to remove the part of the document comprising the optically variable security feature and to replace it by another part comprising another falsified optically variable element.
- Considering the above, a problem intended to be solved by the invention, is to propose an anti-counterfeiting element for an identification document, said anti-counterfeiting element being able to reveal different sets of data or images superimposed onto a background when tilting the document, said anti-counterfeiting element being made with a more complex security, while keeping a simple manufacturing process, and being able to reveal the different sets of data or images with different darkness in comparison with the background.
- The solution of the invention to this problem relates to the fact that said anti-counterfeiting element comprises two separate fragments, each of which comprising part of data/images to be revealed and part of the background, each fragment being provided on each side of said identification document and overlapping each other through the thickness of said identification document.
- Thus, data or images to be revealed and background are mixed together and then divided in two fragments, each fragment facing each other through the thickness of the document. With such a structure of the anti-counterfeiting element, it appears much more complex for an infringer to modify a data onto one side, because such modification affects immediately the other side and generates wrong information inside the different items showed when tilting the document.
- Then, it becomes impossible to modify such anti-counterfeiting element. Moreover, because the sets of data or images, which are revealed when tilting the document, can be linked to the identity of the owner of the document, it becomes also impossible to remove the anti-counterfeiting element and to replace it by another falsified element.
- According to another aspect, the invention relates also to a secure identification document comprising such an anti-counterfeiting element.
- According to another aspect, the invention relates also to a method for manufacturing such an anti-counterfeiting element for an identification document. The method comprises the following steps :
- subdividing each original pixel of information to be displayed into a matrix of X x Y dots,
- creating lines of matrices of dots, each line being intended to be used for the creation of data or images to be revealed,
- creating two fragments, each comprising a succession of the created lines, each fragment being linked to each other,
- printing each fragment respectively on each side of the identification document in such a manner that they overlap each other, through the thickness of the document, so that they enable to reveal different sets of data or images superimposed onto a background, with different darkness in comparison with the background, when tilting the identification document.
- Other particularities and advantages of the invention will be better understood with the help of the description below, which has been provided as an illustrative and non limitative example by reference to the enclosed figures that represent:
-
Figure 1 , a cross-sectional view of an identification document with an anti-counterfeiting element according to the invention, said element displaying different sets of data or images depending on the tilt angle of the document, -
Figure 2 , some examples of variable data that appear superimposed onto a photography used as background, when tilting a document, -
Figure 3 , an example of some successive lines of matrices of dots used for building the first fragment of the anti-counterfeiting element according to the invention, -
Figure 4 , an example of a manner to built the second fragment of the anti-counterfeiting element according to the invention, said second fragment being linked to the first fragment, -
Figure 5 , an example of the kind of information that can be revealed by viewing the two fragments offigures 3 and4 , when tilting the identification document, -
Figure 6 , an example of a fragment comprising two areas of different resolution. - Hereafter, an embodiment of the present invention will be described in the context of identity (ID) card and a method for producing it. However, it is to be understood that the invention is usable with any data carrier that includes, but is not limited to, a driving license, a badge or pass, a passport, a discount card, a membership card, a banking card, a credit card, a money card, a multi-application card, and other security documents and papers of value that are to be provided with information or data in such a way that they cannot be easily imitated by common means. Such identification documents may take indifferently the shape of card, or booklet, or something else.
-
Figure 1 shows a cross-sectional view of anidentification document 10 comprising an anti-counterfeiting element F1, F2. This document may be made either by molding in one-piece, or by lamination or other conventional process for attaching together several layers. In the illustrated example, the document comprisesseveral layers - In the illustrated example,
upper layers Layers Layer 11, which is the core of the body in the illustrated example, can be either opaque, or semi opaque or at least translucent. If thecore 11 is completely opaque, it is then necessary to provide apart 12 in said core, which has to be either semi-opaque or at least translucent. Thispart 12 is intended to be used for the anti-counterfeiting element. In fact, the anti-counterfeiting element is divided into two fragments F1, F2, each of which being provided on one side , respectively S1, S2, of the document, and more particularly on both sides S1, S2 of thepart 12. The two fragments overlap each other. Thus, when viewing the document, one can see the two fragments overlapping each other and displaying different sets of data or images depending on the tilt angle of the document. For example, as can be seen infigure 1 , when the document is tilted along the axis A-A represented in dashed lines, different data are displayed by the two fragments, as illustrated by thereferences 21 to 24. In a first angle for example, the first displayedimage 21 corresponds only to the background, which is black in the example offigure 1 . In a second angle, a first set ofdata 22 revealed consists in letters G and A which appear brighter than the background. By tilting 23 another time the document, the set of data consisting in the two letters G and A appears darker, while another set of data consisting innumbers 1 to 6 appears to be brighter. In afurther tilt angle 24, the first two letters G and A have almost disappeared, while thenumbers 1 to 6 appear darker. - On
figure 1 , one can see that if each fragment F1, F2 is viewed independently from each other, it can only display an image at least corresponding to a background and at the most corresponding to a grey image. The revelation of different sets of data or images, when tilting the document, can only be viewed through the two fragments F1, F2 overlapping each other, through the thickness of theidentification document 10 or at least the thickness ofpart 12. - In a variant, the
part 12, on which are provided the two fragments F1, F2 of the anti-counterfeiting element, can be semi-opaque. In this case, the two fragments F1, F2 can be viewed with the help of a backlight. - The thickness of the
part 12, and also the thickness of thebody 11, has to be adapted to the resolution of the lines of the fragments F1, F2, in order to have good result. That is why the thickness is preferred at least four times the width w of a line of a fragment. The lines of the fragment and the width of line are illustrated infigure 3 , which is described in detail bellow. - This lower limit of the thickness is much more important when the
part 12 is semi-opaque, because the two fragments have to be seen together, overlapping each other, in order to reveal the different sets of data or images without using huge angle of viewing. Typically, the preferred maximum angle for viewing last information is less than 30°. - The two fragments F1, F2 are applied on both sides S1, S2 either by means of a conventional color or monochrome printing process, or by laser engraving if layers used are laser sensitive. They can be applied either on/into
layers part 12. -
Figure 2 shows a succession of different images displayed when tilting such a document. In this example, the background corresponds to the photograph of the owner of the document. This photograph appears whatever the tilt angle is, and different sets of data or images are revealed superimposed onto the photograph, with more or less darkness compare to the background, depending on the different tilt angles. Thus, in the illustrated example,image 25 displayed comprises the photograph onto which are superimposed letters G and A that appear brighter than the photograph, then at a second angle the displayedimage 26 comprises only the photograph without any other data superimposed. In a further tilt angle, theimage 27 displayed comprises the photograph of the owner on which are superimposednumbers 1 to 6 that appear darker than the photograph. In another further angle,image 28 displayed comprises the photograph of the owner on which are superimposed first the letters G and A that appear darker than the photograph, and second thenumbers 1 to 6 that appear brighter than the photograph. -
Figure 3 shows an example of the successive lines used to build the first fragment F1 of the anti-counterfeiting element. For building the two fragments F1, F2 required to display the background and the different variable sets of data/images, a first step of the process consists in subdividing each original pixel of information to be displayed into a matrix M of X x Y dots. In case background is a picture for example, each matrix has a sufficient color density for rendering the same details of a picture. Consequently, matrix must enable to obtain a contrast and brightness compared to original picture. In the example offigure 3 , each pixel of information is subdivided into a matrix of 2x2 dots, said matrix comprising for example two dark dots and two bright dots. Thus, with such subdivision, there are six different possibilities M1 to M6 to decline the basic matrix of dots for each original pixel. - In a further step, each pixel of the first line of the background for example, is subdivided into a matrix of dots. Then, it is possible to create a first line L1 of matrices of dots, which corresponds to the first line of pixels of the background, each matrix of dots being chosen randomly amongst the different possibilities, i.e. the six different possibilities M1 to M6 in the illustrated example of
figure 3 . - However, in a variant of realization, each matrix of dots can also be chosen in a coded manner, in such a manner that its choice is linked to the personalization information of the owner of the document for example. In this case, matrices of dots are organized in lines by means of an algorithm using the personalized variable such as name or surname for example. The place of coded matrix element inside a fragment can either be fixed for all personalized documents or depend itself from the personalized variable. Then, during the authentication step, a similar algorithm can be used to read the coded matrices.
- Then, a second line L2 of the first fragment F1 is created by reversing the just preceding first line L1. In this case, the first line L1 is called a "positive line" compare to the second line L2, which is called "negative" line. And so on, the third line L3, positive, of the fragment F1 comprises matrices of dots corresponding to the following line of pixels of the background, i.e. the second line of the background, and the fourth line L4, negative, corresponds to the reversed line of the just preceding line L3. Thus, each odd line, positive, corresponds to successive lines of pixels of the background, and each even line, negative, is the corresponding reversed line of the just preceding odd line. Each line has a width w corresponding to the size of the matrices.
- The second fragment F2, intended to be applied on the other side S2 of the
part 12 and opposite to the first one, is linked to the first fragment F1. Its building is illustrated by the example offigure 4 . Data to be revealed onto the background are coded into lines of matrices of dots, by using each positive or negative line of the first fragment. For that, the code consists in dividing the line of matrices of dots into portions of predetermined variable size, each portion corresponding either to a portion of a corresponding odd line of the first fragment F1 or to a portion of a corresponding even line of the first fragment F1. - For better understanding,
figure 4 illustrates one example. In this example, a first data to be revealed is coded in such a manner that the first line L1 of the second fragment F2 is divided into four portions P1 to P4 of different size. Each portion P1 to P4 corresponds, either to the positive first line L1 of first fragment F1 or to the negative second line L2 of the first fragment F1. In the illustrated example, the portions P1 and P3 correspond to first positive line L1 of first fragment F1, while portions P2 and P4 correspond to second negative line L2 of first fragment F1. Then, knowing this code, it is possible to build the first line L1 of the second fragment F2, by applying the corresponding positive or negative matrices of dots for each portion of line. - In a further step, the second line L2 of second fragment F2 enables to create other coded data to be revealed. The preceding steps used for the building of the first line are repeated for this second line L2, with another coded information. In the illustrated example, the second coded information consists also in dividing the second line L2 of the second fragment F2 into four portions P1' to P4' of different size. Portions P1' and P3' correspond to positive first line of first fragment, while portions P2' and P4' correspond to negative second line of first fragment. Then, knowing this second code, it is possible to build the second line L2 of the second fragment F2, by applying the corresponding positive or negative matrices of dots for each portion of line.
- The preceding steps are then repeated for each successive line, each odd line enabling to code the first data to be revealed, and each even line enabling to code the second data to be revealed.
- This example is a simple example for illustration purpose, but it is possible to code more than two sets of data/image to be revealed, and each original pixel can be subdivided into matrix of more than 2x2 dots.
- The computation of the two fragments is advantageously made by means of a computer software and then the two fragments are printed or applied or laser engraved simultaneously on both sides of the
portion 12, through which the fragments are intended to be viewed and to overlap each other. -
Figure 5 shows an example of the kind of information that can be revealed by the two fragments F1, F2 offigures 3 and4 , when viewing these two fragments through the thickness of the document while the identification document is tilted. For simplification, only the two first lines of matrices of dots of each fragment F1, F2 are drawn. In a first case referenced (A), the document is tilted in such a manner that when a viewer look at the two overlapping fragments F1, F2, the first line L1 of second fragment F2 is over the second line L2 of first fragment F1. In this case, the coded first set of data, which is surrounded by continuousthick lines 51, appears brighter than the background, while the second line L2 of second fragment F2 does not let appearing the second coded set of data, which is hidden into the background. - In another case referenced (B), the document is tilted in such a manner that when a viewer look at the two overlapping fragments F1, F2, fragment F2 completely covers fragment F1, i.e. first line L1 of F2 overlaps first line F1 of F1 and second line L2 of F2 overlaps second line L2 of F1. In this case, the coded first set of data, which is surrounded by continuous thick lines 51', appears to be darker than the background, while the coded second set of data, which is surrounded by dashed
thick lines 52, appears to be brighter than the background. - In a third case referenced (C), the document is tilted in such a manner that when a viewer look at the two overlapping fragments F1, F2, the second line L2 of second fragment F2 overlaps the first line F1 of first fragment F1. In this case, the coded first set of data is completely hidden into the background so that it is not visible to human eye, and the coded second set of data, which is surrounded by dashed thick lines 52', appears to be darker than the background.
- By tilting once again the document, the two fragments F1, F2 can overlap each other in such a manner that the two sets of data are hidden into the background and none of them can be viewed by the viewer.
- The embodiments that have just been illustrated and described relate to monochromatic examples with different grey levels. However, the invention is not limited to such monochromatic embodiments and it can also be applied to all multicolor embodiments. For that, two different colors can be chosen for each fragment. Moreover, two colors of each fragment can be for example opposed in the spectrum of colors, so that they display a black color when they overlap each other, by subtractive synthesis. In an example, the first fragment F1 can be made with matrices of dots in which dark dots are in magenta color and bright dots are in yellow color, while the second fragment F2 is made with matrices of dots in which dark dots are in cyan color and bright dots are in yellow color. In this case, when the two fragments overlap each other, depending on the tilt angles, they display variable information darker or brighter than the background and also display additional information with another color different from the colors used for the fragments.
- In another example, it is possible to chose adjacent colors in the spectrum of colors, for each fragment. For example, first fragment F1 can be made with matrices of dots having red dots, while second fragment F2 can be made with matrices of dots having green dots. In this case, the two overlapping fragments enable to display a third color, yellow in the example, by additive synthesis.
- In another embodiment, useful for complicating much more a potential falsification, it is also possible to insert in at least one fragment, different areas having different resolutions. For those areas where resolution is upper than the other areas, then the change between a first visual information and another is quicker. It is also possible to define the tilt angles for which visual information will appear for each area having a given resolution, by shifting the lines of first fragment compared to the lines of second fragment. Thus, by mixing the different resolutions in one fragment, infringement becomes much more impossible.
Figure 6 illustrates an example of a fragment F1' having twodifferent areas - Thanks to such anti-counterfeiting element, if an infringer wants to modify either the background, or one of the sets of data that appear with different brightness compare with the background, by modifying pixels on one side, then the modification affects automatically the other fragment on the other side and generates wrong information inside the different data/image to be displayed when tilting the document. Thus, it becomes impossible to modify such element or to replace it by another falsified element.
Claims (15)
- An anti-counterfeiting element for an identification document, said anti-counterfeiting element being able to reveal different sets of data/images, superimposed onto a background, when tilting said identification document, characterized in that said anti-counterfeiting element comprises two separate fragments (F1, F2), each of which comprising part of data/images to be revealed and part of the background, each fragment (F1, F2) being provided on each side (S1, S2) of said identification document and overlapping each other through the thickness of said identification document.
- An anti-counterfeiting element according to claim 1 wherein the two fragments (F1, F2) are separated from each other by an at least translucent portion (12).
- An anti-counterfeiting element according to claim 1, wherein the two fragments (F1, F2) are separated from each other by a semi-opaque portion (12), and viewed using a backlight.
- An anti-counterfeiting element according to anyone of preceding claims, wherein each fragment (F1, F2) comprises a succession of lines of matrices of dots, each matrix of dots being equivalent to an original pixel of information to be displayed and wherein each fragment is linked to the other.
- An anti-counterfeiting element according to anyone of preceding claims, wherein data/images to be revealed are linked to the identity of the owner of the document.
- A secure identification document comprising an anti-counterfeiting element according to anyone of preceding claims 1 to 5.
- Method for manufacturing an anti-counterfeiting element for an identification document, said anti-counterfeiting element being able to reveal different sets of data/images, superimposed onto a background, when tilting said identification document, characterized in that said method comprises the following steps :- subdividing each original pixel of information to be displayed into a matrix of X x Y dots,- creating lines of matrices of dots, each line being intended to be used for the creation of data or images to be revealed,- creating two fragments (F1, F2), each comprising a succession of the created lines, each fragment being linked to each other,- printing each fragment (F1, F2) respectively on each side (S1, S2) of the identification document in such a manner that they overlap each other, through the thickness of the document, so that they enable to reveal different sets of data or images superimposed onto a background, with different darkness in comparison with the background, when tilting the identification document.
- Method according to claim 7, wherein each basic matrix, equivalent to an original pixel, used for creating the lines of matrices, is chosen randomly amongst different possibilities of equivalent basic matrices.
- Method according to claim 7, wherein each basic matrix, equivalent to an original pixel, used for creating the lines of matrices, is chosen according to a code linked to the identity of the owner of the document.
- Method according to anyone of preceding claims 7 to 9, wherein the two separate fragments (F1; F2) are built according to the following steps:- first fragment (F1) comprises a succession of lines (F1 L1, F1 L2, F1 L3, F1 L4) of matrices of dots, each odd line (F1L1, F1 L3) corresponding to successive lines of pixels of the background, and each even line (F1 L2, F1L4) being the corresponding reversed line of the just preceding odd line (F1 L1, F1 L3),- second fragment (F2) comprises a succession of lines (F2L1, F2L2) of matrices of dots, each line comprising a code for data/image to be revealed, said code consisting in dividing the line into portions (P1, P2, P3, P4; P1', P2', P3', P4') of predetermined variable size, each portion corresponding either to a portion of a corresponding odd line of first fragment (F1,L1) or to a portion of a corresponding even line of the first fragment (F1,L2).
- Method according to claim 7, wherein each fragment (F1, F2) is printed by means of a laser beam.
- Method according to claim 7, wherein each fragment (F1, F2) is printed in color by means of a conventional printing process.
- Method according to claim 12, wherein each fragment (F1, F2) is printed respectively in at least one predetermined color, in such a manner that when the two fragments overlap each other, they display additional information with a third color according to subtractive or additive synthesis.
- Method according to claim 7, wherein at least one fragment (F1') comprises different areas of different resolution.
- Method according to anyone of preceding claims 7 to 14, wherein the sets of data/images intended to be revealed when tilting the document, are linked to the identity of the owner of the document.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08305976A EP2199098A1 (en) | 2008-12-19 | 2008-12-19 | Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document |
PCT/EP2009/067502 WO2010070089A1 (en) | 2008-12-19 | 2009-12-18 | Anti-conterfeiting element for identification document, method for manufacturing such element, and secure identification document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP08305976A EP2199098A1 (en) | 2008-12-19 | 2008-12-19 | Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2199098A1 true EP2199098A1 (en) | 2010-06-23 |
Family
ID=40790790
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP08305976A Withdrawn EP2199098A1 (en) | 2008-12-19 | 2008-12-19 | Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2199098A1 (en) |
WO (1) | WO2010070089A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2974651A1 (en) * | 2011-05-01 | 2012-11-02 | Signoptic Technologies | METHOD FOR UNITARY AUTHENTICATION OF A HARDWARE OBJECT USING A VISUAL CRYPTOGRAPHY ALGORITHM AND A MATERIAL SIGNATURE |
EP2722193A1 (en) * | 2012-10-19 | 2014-04-23 | Gemalto SA | Secure data carrier and method of production of said secure data carrier |
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
EP4019270A1 (en) * | 2020-12-23 | 2022-06-29 | Thales DIS France SA | A security assembly and method for manufacturing the same |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102010054760A1 (en) * | 2010-12-16 | 2012-02-16 | Giesecke & Devrient Gmbh | Security element, method of making same and disk |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2282563A (en) * | 1993-10-07 | 1995-04-12 | Central Research Lab Ltd | A composite image arrangement for documents of value |
GB2289016A (en) * | 1994-04-22 | 1995-11-08 | Yeda Res & Dev | Validating encrypted security pixel array. |
WO2003019483A1 (en) * | 2001-08-22 | 2003-03-06 | Mikhail Vasilievich Shovgenyuk | Graphic element for protecting bank notes, securities and documents and method for producing said graphic element |
JP2005001345A (en) * | 2003-06-16 | 2005-01-06 | National Printing Bureau | Formative body for distinguishing the truth from the false |
EP1886827A1 (en) * | 2006-08-11 | 2008-02-13 | National Bank of Belgium | Hidden image |
-
2008
- 2008-12-19 EP EP08305976A patent/EP2199098A1/en not_active Withdrawn
-
2009
- 2009-12-18 WO PCT/EP2009/067502 patent/WO2010070089A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2282563A (en) * | 1993-10-07 | 1995-04-12 | Central Research Lab Ltd | A composite image arrangement for documents of value |
GB2289016A (en) * | 1994-04-22 | 1995-11-08 | Yeda Res & Dev | Validating encrypted security pixel array. |
WO2003019483A1 (en) * | 2001-08-22 | 2003-03-06 | Mikhail Vasilievich Shovgenyuk | Graphic element for protecting bank notes, securities and documents and method for producing said graphic element |
JP2005001345A (en) * | 2003-06-16 | 2005-01-06 | National Printing Bureau | Formative body for distinguishing the truth from the false |
EP1886827A1 (en) * | 2006-08-11 | 2008-02-13 | National Bank of Belgium | Hidden image |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2974651A1 (en) * | 2011-05-01 | 2012-11-02 | Signoptic Technologies | METHOD FOR UNITARY AUTHENTICATION OF A HARDWARE OBJECT USING A VISUAL CRYPTOGRAPHY ALGORITHM AND A MATERIAL SIGNATURE |
WO2012150411A1 (en) * | 2011-05-01 | 2012-11-08 | Signoptic Technologies | Method of unitary authentication of a hardware object comprising visual cryptography and material signature |
TWI563452B (en) * | 2011-05-01 | 2016-12-21 | Signoptic Technologies | |
EP2722193A1 (en) * | 2012-10-19 | 2014-04-23 | Gemalto SA | Secure data carrier and method of production of said secure data carrier |
WO2014060504A1 (en) * | 2012-10-19 | 2014-04-24 | Gemalto S.A. | Secure data carrier and method of production of said secure data carrier |
US10479128B2 (en) * | 2017-10-27 | 2019-11-19 | Assa Abloy Ab | Security feature |
EP4019270A1 (en) * | 2020-12-23 | 2022-06-29 | Thales DIS France SA | A security assembly and method for manufacturing the same |
WO2022136241A1 (en) * | 2020-12-23 | 2022-06-30 | Thales Dis France Sas | A security assembly and method for manufacturing the same |
Also Published As
Publication number | Publication date |
---|---|
WO2010070089A1 (en) | 2010-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6983048B2 (en) | Multi-section decoding lens | |
CN101528472B (en) | Method of superimposing an image onto another, method of personalizing a data carrier using the image superimposing method and a personalized data carrier | |
US9501697B2 (en) | Method for the authentication and/or identification of a security item | |
US20060197337A1 (en) | Identification document with lenticular watermark | |
EP2123470A1 (en) | Optically variable security element and identification document with such element | |
US10688822B1 (en) | Embedding 3D information in documents | |
CN113508040B (en) | Color image formed from holograms | |
CA2611407A1 (en) | Authentication of secure items by shape level lines | |
US20080018097A1 (en) | Secure laminated cards | |
US8792674B2 (en) | Method for encoding and simultaneously decoding images having multiple color components | |
EP2199099A1 (en) | Identification document with an improved anti-counterfeiting element | |
EP3685311B1 (en) | Data carrier and a method for producing such data carrier | |
US20210260909A1 (en) | Security devices and methods of authentication thereof | |
EP2199098A1 (en) | Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document | |
EP2307204B1 (en) | Method for securing an image by means of graphical anti-counterfeiting means, method for securing an identification document, and secure identification document | |
EP2239145A1 (en) | Anti-counterfeiting element with flip images for an identification document and a method for its manufacture | |
US20180304668A1 (en) | Secure article comprising a combined image and/or a revelation screen | |
JP2007538266A (en) | Method for forming diffraction device | |
EP3581396B1 (en) | Document with integrated display device | |
AU2012101592B4 (en) | Encrypted optically variable image | |
US11331937B2 (en) | Micro-imagery design integration | |
EP3763540B1 (en) | Method for manufacturing a card | |
CN109070619B (en) | Security article comprising a display raster and a combined image | |
AU2022233494A1 (en) | Security item or assembly of the security item and of another object comprising a first and a second raster | |
McCarthy et al. | Modulated digital images for biometric and other security applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR |
|
AX | Request for extension of the european patent |
Extension state: AL BA MK RS |
|
AKY | No designation fees paid | ||
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R108 Effective date: 20110201 Ref country code: DE Ref legal event code: 8566 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20101224 |