EP2705506A1 - Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere - Google Patents

Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere

Info

Publication number
EP2705506A1
EP2705506A1 EP12725079.3A EP12725079A EP2705506A1 EP 2705506 A1 EP2705506 A1 EP 2705506A1 EP 12725079 A EP12725079 A EP 12725079A EP 2705506 A1 EP2705506 A1 EP 2705506A1
Authority
EP
European Patent Office
Prior art keywords
image
shared
message
images
authentication method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP12725079.3A
Other languages
German (de)
English (en)
French (fr)
Inventor
Yann Boutant
Thierry Fournel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Signoptic Technologies
Original Assignee
Signoptic Technologies
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Signoptic Technologies filed Critical Signoptic Technologies
Publication of EP2705506A1 publication Critical patent/EP2705506A1/fr
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • G06T1/0028Adaptive watermarking, e.g. Human Visual System [HVS]-based watermarking
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • H04N2201/3236Details of authentication information generation

Definitions

  • each material signature value is different from one material element to another or from one family of hardware elements to another, and each signature value can not be predicted even in presence of the material element or object except, of course, to know the algorithm implemented and, in the case of the algorithm described by FR 2 895 543, the decomposition base used and / or the extraction parameters of the material signature such as the shape of the acquisition window and / or its reading direction. In the latter case, the decomposition base and / or the extraction parameters can each be considered as a secret key for the extraction of the material signature.
  • the material signature is identical or almost identical to that used during the construction of the authenticator system. Almost identical means that there is a small variation or difference between the material signatures extracted from the same region of the same material object.
  • a recording in an analog form such as, for example, in a printed form in continuous tones
  • the unit authentication performed by means of the method according to the invention has a perfect security and, moreover, a very great robustness and reliability insofar as it combines visual cryptography, whose perfect security is demonstrated and recognized. at the material signature which itself has a demonstrated randomness and can be reliably recalculated even after some alteration, including aging, of the material object.
  • each new extraction material signature is identical or almost identical to that used during the construction of the authenticator system.
  • the interpretation of the result of the superimposed control of the shared images can be performed by a user whose human visual system is able to read or recognize the message image and to interpret it even if this message image is partially altered.
  • the human visual system makes it possible to recognize, from fragments, geometric shapes, images or letters, whereas from the same fragments an artificial vision system is not able to make any recognition.
  • This possibility of recognition, despite possible alterations, offered by the human visual system is also valid in case of slight alterations of one of the shared images.
  • the construction phase of an authenticator system comprises a step of recording the location of the region of the object from which the material signature is generated.
  • a recording or representation in alphanumeric form means a recording or representation in a directly intelligible graphic form comprising numerical and / or alphabetic characters and / or ideograms.
  • the alphanumeric representation of the material signature may be a series of 0 and 1 corresponding to said binary sequence, a representation in a decimal base or other of the number corresponding to this binary sequence.
  • partial graphical representation of the value of the material signature it may, for example, be retained only some of the bits of the bit sequence represented by zeros or ones or by a number in a decimal base or other corresponding to the selected bits of the material signature.
  • the support image can be of any kind.
  • a support image may be selected from the following image types:
  • a binary image such as an image with two visual components such as two distinct colors or two components, one of which has a specular behavior and the other of which has a diffusing behavior
  • the support image may be a uniform image that does not include any information and, for example, a monochrome image such as a white image or a black image or an average uniform image resulting from a random distribution of pixels. 'a color and pixels of another color.
  • the support image may, on the contrary, not be uniform and comprise information elements and / or identifiable forms. Such a support image may then allow indexing or visual identification insofar as the information it conveys is visible at the level of at least one of the shared images and can be interpreted by the human visual system and / or a visual system. reading or artificial optical recognition.
  • an image of the structure of a region of the material object is to be understood as a graphical representation, possibly after optical or numerical processing, of the structure of a region of the object. equipment.
  • This graphical representation can then be real size or involve a change of scale such as an enlargement or a reduction.
  • the implementation of an enlargement then makes it easier to read the details of the structure, while the implementation of optical processing can facilitate the recognition of characteristic elements of the structure.
  • the presentation steps being conducted in such a way that the user perceives the shared images as superimposed to allow the user to read the message image.
  • the presentation steps are conducted successively so as to implement a phenomenon of retinal persistence in the user or other phenomenon of visual perception.
  • At least one presentation step is performed by means of at least one printed shared image. This impression can then be performed on an opaque, translucent or transparent support.
  • the verification phase comprises a step of downloading a shared image from a remote server.
  • the invention is also directed to a method for transforming a binary message image and a support image, comprising at least one color plane, into n shared images that share the message image without leakage of information. , reflect the support image, and are intended to reveal the message image in the view of a user by presenting at least k distinct shared images, k satisfying the relation 2 ⁇ k ⁇ n.
  • the method of transforming the support and message images comprises the following steps:
  • Boolean matrices implementing two collections of transformation Boolean matrices, a first collection being associated with the reference binary value and a second collection being associated with the other binary value, the Boolean matrices being such that:
  • At least one shared image is independent of the message image and each other shared image depends on the message image. This characteristic corresponds to the fact that in the framework of the shared image construction algorithm, explained above, at least one shared image results from a mask image independent of the message image and the other shared images each result from a mask image dependent on the message image.
  • the collections of Boolean matrices are such that for a predetermined index J and any rank i, the line number J of the i-th matrix of the first collection C 0 is equal to the J-th line of the i-th 2nd matrix of the second collection Ci, the two collections having the same number of matrices, (cf figure 6)
  • the resulting shared image of a mask image independent of the message image may be either said mask image or the result of applying the mask image to the support image .
  • At least one shared image is independent of the support image and results from a mask image dependent on the message image, and the other shared images are each obtained by the application of the image. a mask image, depending on the message image, to the support image.
  • each random sequence used comes from a material signature extracted from at least one structural characteristic of a region of a material object.
  • the message image comprises a reference to the origin of the message.
  • This reference can in particular be a secret mark.
  • each random sequence is recorded.
  • the method comprises a selection of the support cells for which a Boolean transformation matrix is drawn.
  • the selection of the support cells is carried out randomly.
  • the total number of the selected support cells corresponds to at least 50% of the number of pixels of the message image so as to guarantee a possible deciphering of the message by the human visual system.
  • the transformation method according to the invention may also comprise a step of recording at least one of the shared images in printed form.
  • FIG. 1 is a perspective view of a product that can be authenticated by means of the method according to the invention.
  • FIG. 4 shows two shared images which form a visual authenticator system and which are constructed by the implementation of the method according to the invention with the support and message images illustrated respectively in FIG. 3 and FIG. 4.
  • FIG. 5 shows an example two collections of Boolean matrices implemented for the construction of shared images.
  • FIG. 6 illustrates another notation of the two collections of Boolean matrices of FIG. 5.
  • FIG. 7 illustrates a device for extracting a material signature, as described in application FR 2 907 923, placed on the face upper product shown in Figure 1.
  • FIG. 9 is the result of the superimposition of the shared images of FIG.
  • FIG. 10 illustrates the rear face of the product shown in Figure 1, one of the two shared images shown in Figure 4 is recorded by printing on this rear face.
  • FIG. 11 is another support image used in the context of the method according to the invention.
  • the invention proposes to implement an authenticator system that allows a user to visually perform an authentication, associated with an identification, of a material object in his possession.
  • object 0 may for example be a box or a packaging case as illustrated in Figure 1.
  • material object provided that the latter comprises solid-state material whose process of evolution and / or spontaneous degradation is considerably longer than the delay between the phase of construction of the authenticator system and the verification phase .
  • uch longer is meant that the delay, from which the first spontaneous evolutions or degradations take place, is at least two times greater, preferably at least one or two orders of magnitude greater, than the delay between build phase of the authenticator system and the verification phase.
  • the construction of the visual authenticator system may be performed in the following manner in the case of a system of two shared image authenticators intended to be superimposed for the reading of the message M.
  • the message image M comprises a given number of message pixels, for the illustrated example, 18720 image pixels of 5 cm by 6.5 cm (156 pixels x 120 pixels).
  • the support image is divided into cells each associated with a pixel of the message image so that there are as many support cells as there are message pixels.
  • Each of the support cells comprises a given number of adjacent pixels preferably greater than or equal to two and according to the illustrated example equal to four. It should be understood that the resolution of the support image is chosen so that, an area equal to that of the message image, the support image comprises enough pixels to be divided into as many support cells as there are pixels. picture.
  • the support image S will comprise 74,880 pixels, ie a resolution of 312 pixels x 120 pixels for a surface of 5 cm by 6.5 cm.
  • Each collection corresponds to one of the two possible values for each pixel of the message picture M.
  • a first collection C 0 of matrix can, for example, correspond to the value 0 while the second collection Ci can correspond to the value 1.
  • Each collection includes a number of sub-collections that each include as many matrices as there will be shared images.
  • each collection corresponds to the columns of each collection C 0 , Ci.
  • each collection comprises six sub-collections respectively C 0 i to C 06 and C to Ci 6 .
  • Each sub-collection comprises, according to the illustrated example, two matrices corresponding to two support cells one of the first mask image Mqi and the other of the second mask image Mq 2 .
  • the first line corresponds to the possible values of the cells of the first mask image while the second line corresponds to the possible values for the cells of the second mask image.
  • the masks cells corresponding to the matrices of the sub-collections In a preferred form of implementation the two collections comprise the same number of sub-collections, however this is not necessary for the implementation of the invention.
  • the second collection Ci which is implemented and it is randomly selected a sub-collection among the sub-collections C, C12, C13, C13, C M , C15 , Ci 6 .
  • the top matrix of the selected sub-collection is then assigned to the first mask image while the bottom matrix is assigned to the second mask image.
  • the mask images can be used directly to reveal a message image to a user by superimposing the mask images.
  • the invention proposes however to implement the support image to build the shared images from the mask images.
  • the use of the support image makes it possible to recognize or index the shared images, which is not possible with the mask images.
  • the shared images have two levels of information, a first level offered by the support image accessible directly for each image distributed alone.
  • the second level of information constituted by the message image is accessible only with the meeting of the two shared images
  • the support image makes it possible to confer a more aesthetic appearance to the shared images.
  • Each shared image is constructed by assigning to each pixel of the shared image the value of multiplying the values of the corresponding pixels of the mask image and the support image. By corresponding pixel it is necessary to hear a pixel having the same position in the mask or support image as the pixel in the shared image.
  • the device used to ensure the extraction of the material signature during the construction of the shared images and / or the verification phase may include any type of image acquisition system such as for example a flatbed scanner, a linear USB scanner, a camera.
  • the invention proposes to take advantage of the fact that the hazard used to construct the shared images is a material signature which has the characteristic of being able to be extracted on demand by being at each extraction identical or almost identical to the material signature used for the generation of shared images PI and P2.
  • This characteristic of the material signature is also called a replayable character.
  • it is proposed to record as previously the second shared image P2 by printing it on the object 0 while the first shared image PI is reconstructed at the time of the verification by the user.
  • the message image M must be known or at least be usable at the time of construction of the second shared image.
  • the human intelligible portion M1 of the message image may correspond to the first 22 bits of the material signature while the portion M2 interpretable by an artificial system may correspond to the first 576 bits of the material signature.
  • the user When the user is in possession of the object 0 on which the second shared image P2 is printed, he can use a communicating terminal SP adapted to extract the material signature from the region R indicated on the upper face 1 of the object 0.
  • the terminal SP is further adapted to generate with this material signature the message image M and the first shared image P1.
  • the communicating terminal is further adapted to produce a photo of the second shared image P2 and to superimpose this image. last with the first shared image he has rebuilt.
  • the invention proposes to use the replayable character of the signature material to allow a construction of the first shared image without knowledge of the message.
  • the collections C 0 and Ci have the same number of sub-collections or columns and a row of a rank i of the first collection C 0 has the same matrices as the row of the same rank i of the second collection Ci
  • the mask image of rank i is independent of the message image and depends solely on the material signature used.
  • the line Mqi of the first collection C 0 is identical to the line Mqi of the second collection.
  • the first mask image will therefore be independent of the message image and will depend only on the hazard used during the construction of the mask images, ie, in the context of the invention, the material signature.
  • An implementation scenario for this third variant is to save by printing the second image shared on the object and then during the verification to build the first image shared with the extracted material signature as explained above.
  • the support image used can then be an image of a part of the object or a predefined image stored in the device ensuring the reconstruction of the first mask image. It should be emphasized that the possibility of recognizing the support image from the second shared image allows the user to determine himself the support image to be implemented.
  • the support image incorporated in the second shared image can provide the user with information on the location of the region of the object from which the material signature is extracted.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Image Processing (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Collating Specific Patterns (AREA)
  • Reinforced Plastic Materials (AREA)
  • Treatment And Processing Of Natural Fur Or Leather (AREA)
  • Credit Cards Or The Like (AREA)
EP12725079.3A 2011-05-01 2012-04-30 Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere Withdrawn EP2705506A1 (fr)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
FR1153713A FR2974652A3 (fr) 2011-05-01 2011-05-01 Procede d'authentification unitaire d'un objet materiel au moyen d'un algorithme de cryptographie visuelle et d'une signature matiere
FR1101548A FR2974651B1 (fr) 2011-05-01 2011-05-19 Procede d'authentification unitaire d'un objet materiel au moyen d'un algorithme de cryptographie visuelle et d'une signature matiere
PCT/FR2012/050968 WO2012150411A1 (fr) 2011-05-01 2012-04-30 Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere

Publications (1)

Publication Number Publication Date
EP2705506A1 true EP2705506A1 (fr) 2014-03-12

Family

ID=44863067

Family Applications (1)

Application Number Title Priority Date Filing Date
EP12725079.3A Withdrawn EP2705506A1 (fr) 2011-05-01 2012-04-30 Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere

Country Status (6)

Country Link
EP (1) EP2705506A1 (zh)
AR (1) AR086145A1 (zh)
BR (1) BR112013028302A2 (zh)
FR (2) FR2974652A3 (zh)
TW (1) TW201246084A (zh)
WO (1) WO2012150411A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR3035253B1 (fr) 2015-04-17 2020-12-04 Oberthur Technologies Procede de verification d'un dispositif de securite comportant une signature

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4586711A (en) * 1983-05-10 1986-05-06 Glenn E. Weeks Matching card game employing randomly-coded monochromatic images
GB2282563A (en) * 1993-10-07 1995-04-12 Central Research Lab Ltd A composite image arrangement for documents of value
US5488664A (en) * 1994-04-22 1996-01-30 Yeda Research And Development Co., Ltd. Method and apparatus for protecting visual information with printed cryptographic watermarks
EP1577847A1 (fr) * 2004-03-17 2005-09-21 Elca Informatique S.A. Procédé d'authentification de produits
FR2895541B3 (fr) * 2005-12-23 2008-04-18 Signoptic Technologies Sarl Procede d'extraction de signature aleatoire d'un element materiel
EP2199098A1 (en) * 2008-12-19 2010-06-23 Gemalto SA Anti-counterfeiting element for identification document, method for manufacturing such element, and secure identification document

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO2012150411A1 *

Also Published As

Publication number Publication date
FR2974651A1 (fr) 2012-11-02
AR086145A1 (es) 2013-11-20
FR2974652A3 (fr) 2012-11-02
TW201246084A (en) 2012-11-16
TWI563452B (zh) 2016-12-21
WO2012150411A1 (fr) 2012-11-08
FR2974651B1 (fr) 2013-05-24
BR112013028302A2 (pt) 2017-01-10

Similar Documents

Publication Publication Date Title
EP3539058B1 (fr) Procédé pour l'authentification d'une illustration
EP2695147B1 (fr) Code-barres de sécurité
EP2596479B1 (fr) Procédés et dispositifs de marquage et d'authentification d'un produit par un consommateur
US9092872B2 (en) System and method for creating an animation from a plurality of latent images encoded into a visible image
FR2895543A1 (fr) Procede d'extraction de signatures aleatoires d'un element materiel et procede de generation d'une base de decomposition pour la mise en oeuvre du procede d'extraction
FR3070079B1 (fr) Procede de signature electronique d'un document par une pluralite de signataires
WO2017198950A1 (fr) Procédé d'authentification augmentée d'un sujet matériel
WO2017089736A1 (fr) Procede d'authentification et/ou de controle d'integrite d'un sujet
JP2004529565A (ja) 画素の基本要素を利用した暗号化/復号化装置及びその方法とそれを利用した暗復号化システム及びその方法
EP2901440A2 (fr) Procédé d'authentification d'un élément de sécurité par superposition de n images partagées en couleur et élément de sécurité mettant en oeuvre ce procédé
EP2705506A1 (fr) Procede d'authentification unitaire d'un objet materiel combinant cryptographie visuelle et signature matiere
EP3729167B1 (fr) Procédé de construction d'une image de sécurité par multiplexage d'images en couleurs
US20150028579A1 (en) Method of unitary authentication of a hardware object comprising visual cryptography and material signature
CN109635905A (zh) 二维码生成方法、装置及系统
FR3008211A1 (fr) Procede d'impression d'elements graphiques de securite interdependants
FR3077767A1 (fr) Procédé d’entrelacement d’image à multiples canaux
WO2024104674A1 (fr) Document de sécurité comprenant un motif de sous-pixels
CN113627577B (zh) 一种三维码的生成方法及基于三维码的防伪溯源系统
FR2997784A1 (fr) Codage d'une image
CN105303383A (zh) 手机大众识读证卡证件防伪方法及网络认证系统构成方法
FR3044451A3 (fr) Procede d'authentification par motif de glass
FR3057375A1 (fr) Procede de lecture d'une serie de codes-barres bidimentionnels disposes sur un support, produit programme d'ordinateur et dispositif de lecture associes
FR3116759A1 (fr) Procédé de fabrication d’un dispositif de sécurité et dispositif de sécurité associé
EP3459755A1 (fr) Procédé d'insertion de motifs guillochés, procédé d'extraction de motifs guillochés, procédé d'authentification de ces motifs guillochés et dispositifs de mise en oeuvre
FR3012995A1 (fr) Impression amelioree de dispositifs de securite

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20131130

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: SIGNOPTIC TECHNOLOGIES

DAX Request for extension of the european patent (deleted)
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1195657

Country of ref document: HK

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20181101

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1195657

Country of ref document: HK