EP3284065B1 - Method for verifying a security device comprising a signature - Google Patents

Method for verifying a security device comprising a signature Download PDF

Info

Publication number
EP3284065B1
EP3284065B1 EP16723413.7A EP16723413A EP3284065B1 EP 3284065 B1 EP3284065 B1 EP 3284065B1 EP 16723413 A EP16723413 A EP 16723413A EP 3284065 B1 EP3284065 B1 EP 3284065B1
Authority
EP
European Patent Office
Prior art keywords
image
representation
verifying
signature
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP16723413.7A
Other languages
German (de)
French (fr)
Other versions
EP3284065A1 (en
Inventor
Benoit Berthe
Coralie VANDROUX
Yvonnic Morel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia France SAS
Original Assignee
Idemia France SAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Idemia France SAS filed Critical Idemia France SAS
Publication of EP3284065A1 publication Critical patent/EP3284065A1/en
Application granted granted Critical
Publication of EP3284065B1 publication Critical patent/EP3284065B1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/1205Testing spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/004Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/205Matching spectral properties

Definitions

  • the present invention relates to the field of security devices. It is known to produce a security device and to associate it with a sensitive document in terms of security, such as an identity document, in order to secure said document.
  • An effective security device is characterized in that it is: difficult to produce or reproduce, and difficult to modify in an undetectable manner.
  • an identity document comprises an image associated with the holder of the identity document, such as an identity photo.
  • An identity check can thus compare an image comprising a photo of the holder, present on the identity document, with an acquisition carried out on the bearer of the identity document, in order to verify whether the acquisition corresponds biometrically, or not, to the image , in order to determine whether or not the bearer is the holder he claims to be.
  • this image is advantageously accompanied by a security device.
  • the security device is advantageously intimately linked to said image, so that the security and authentication characteristics of the security device also apply to the image.
  • the present invention proposes a multimodal verification mode capable of verifying a security device comprising an image, by making it possible to detect and discriminate between different possible counterfeits.
  • the present invention relates to a process for verification of a security device comprising an image comprising a signature, comprising the following steps: acquisition of the image according to a first optical spectrum to obtain a first representation, extraction of the signature, and verification of the signature, characterized in that the signature is colorimetric and comprises a particular orientation of a color plate, or the signature is frequency-based, the image comprising at least one reference spatial period.
  • the signature is frequency-based, the image comprising at least one reference spatial period
  • the method further comprises the following steps: application of a spectral transformation to the first representation, to obtain a first transform comprising at least a first spatial period, verification that the value of the spatial period(s) correspond(s) to the value of the reference spatial period(s).
  • the image is visible according to the first optical spectrum and at least one second optical spectrum and the method further comprises the following steps: acquisition of the image according to the second optical spectrum to obtain a second representation, verification that the two representations are graphically substantially identical, verification that a distance between the two representations is less than a threshold.
  • the threshold is equal to 10 ⁇ m, preferably equal to 5 ⁇ m.
  • the distance between the two representations is determined by identifying, by means of a registration algorithm, a transformation for which one of the representations is an image of the other representation.
  • the first optical spectrum is located in the visible spectrum and/or the second optical spectrum is located in the infrared.
  • the method further comprises the following steps: application of the same transformation at the second representation, to obtain a second transform, verification that the first transform is substantially equal to the second transform.
  • the method further comprises a step of: verifying that the value of the spatial period(s) of the second transform corresponds(s) to the value of the period(s) s) spatial reference.
  • the spectral transformation is applied to at least part of the first representation and/or to the same at least part of the second representation.
  • the spectral transformation is applied to at least two parts of a representation, and the method further comprises a step of: checking that the transforms of the different parts are substantially equal.
  • the method further comprises a step of: checking that the two representations are colorimetrically different.
  • the image represents a part of the body, preferably the face, the eye, or the finger, of a holder associated with the security device and the method further comprises the steps of: acquiring an image of the part of the body with a wearer of the security device, verification that the acquired image corresponds biometrically to the first representation, and/or verification that the acquired image corresponds biometrically to the second representation.
  • the security device is associated with a digital storage means comprising a digital representation of the image
  • the method further comprises the steps of: reading the digital representation of the image, checking that the digital representation is substantially identical to the first representation, and/or verifying that the digital representation is substantially identical to the second representation.
  • the method comprises another step of: verification that the acquired image corresponds biometrically to the digital representation.
  • the invention also relates to a verification apparatus comprising means for implementing such a verification method.
  • the invention also relates to a computer program comprising a series of logic instructions capable of implementing such a verification method.
  • the invention also relates to a computer data carrier comprising such a computer program.
  • the figure 1 illustrates an identity document 20 comprising at least one image 2.
  • the identity document 20 can, if necessary, comprise other elements 21.
  • the image 2 is produced in such a way as to integrate a security device 1.
  • the device security 1 consists in that the image 2 comprises a signature.
  • a signature is a specific characteristic of the image 2 able to be detected, typically by an analysis tool.
  • a signature is most often a consequence of the embodiment or of a machine used to produce the image 2.
  • a signature can thus be intrinsically linked to the embodiment. Alternately a signature can be voluntarily introduced into image 2, in order to be able to be detected there for verification.
  • a first step carries out an acquisition of the image 2 according to the first optical spectrum to obtain a first representation 3.
  • Such an acquisition is carried out by illuminating the image 2 with lighting according to the desired optical spectrum and by producing the representation 3.4 by an acquisition, typically by means of an image sensor, sensitive in said desired optical spectrum.
  • a 3.4 representation is an image, which can be digitized and stored in a computer memory and conventionally organized in the form of an image, or a two-dimensional matrix of pixels.
  • An optical spectrum may be defined herein by at least one optical frequency band.
  • An optical spectrum can thus be all or part of the infrared spectrum, all or part of the X spectrum, all or part of the ultraviolet spectrum, or even all or part of the visible spectrum, or any combination of the preceding.
  • a 3.4 representation in an optical spectrum such as for example the infrared optical spectrum
  • the representation obtained is an image, a two-dimensional matrix of pixels, where each pixel comprises a unique intensity, indicative of the optical radiation, in the optical spectrum considered, reflected by the image 2.
  • Such a representation 3,4 generally has the form of a monochrome image.
  • a pixel may include several intensities, indicative of the elemental color intensities.
  • a 3.4 representation then has the form of a polychrome image, ie the form of a superposition of several monochrome images, called component images.
  • the signature is then extracted.
  • the operating mode of this extraction step depends on the nature of the signature.
  • the signature is checked, to check that the signature extracted from the representation 3 resulting from the image 2 does indeed correspond to a signature, as it must be present, in that it has been introduced and inserted into the image 2 during the production of the image 2.
  • the operating mode of this verification step still depends on the nature of the signature and is detailed further.
  • the signature is colorimetric.
  • This also covers numerous procedures, which are illustrated by non-limiting examples.
  • a general idea of this type of signature is to take advantage of the technological advance, in terms of means of manufacture and means of verification, generally observed between manufacturers in the field of security devices and/or government offices issuing the documents identity, in relation to counterfeiters.
  • the colorimetric signature uses the orientation of a given color board.
  • each basic color for example RGB(K) or CMY(W), typically 2 to 5 in number
  • each such color plate is oriented at a different angle, so that each color plate is angularly spaced relative to the others, thus the angle of each color plate is characteristic of a printing machine.
  • a very precise measurement of this set of angles, or even a voluntary modification of at least one angle, can make it possible to identify and/or particularize a machine printing, and generalizing an issuing body. With precise verification tools, it is thus possible to use at least one angle of this set of angles as a signature.
  • a second unclaimed example of a color signature uses the precise hue of each color board.
  • Each color board includes a base color.
  • the different colors of the different color boards thus define a colorimetric base, at the same time as a vector base.
  • the basic colors must include substantially distributed colors in order to have a good power of colorimetric expression. It is thus known to use an RGB base: Red Green (Green) and Blue, optionally supplemented by White (White) and/or Black (blacK).
  • RGB base Red Green
  • RGB Red Green
  • Blue Red Green
  • White White
  • blacK Black
  • Another base is CMY: Cyan Magenta and Yellow (Yellow). But it is possible to define any n-tuple of base colors, or even starting from a classic triplet to slightly modify at least one of the base colors by shifting its hue by a few %.
  • a precise measurement can thus make it possible to detect a printing machine with precision, relying solely on the inevitable dispersions from one machine to another or even by creating a deliberate shift.
  • a voluntary shift is advantageous in that it can make it possible to particularize all the machines of the same entity and thus characterize a transmitter, such as a service or a state.
  • a third unclaimed example of a colorimetric signature is the use of a particular hue.
  • a tint a particular combination of basic colors can thus be used to produce a specific part of an image 2. It can, for example, be a frame, or even a particular point, produced with a shade definition, given absolute or relative, capable of being verified with great precision. The position of the point used may be part of the signature.
  • the signature is frequency-based.
  • image 2 comprises at least one reference spatial period.
  • the reference spatial period can be intrinsic in that it is introduced by the process for manufacturing the image 2 or it can still be artificial, in that it is added to the image.
  • the presence of at least one such reference spatial period constitutes a signature whose presence and quality can be verified. Due to the embodiment of the image 2, the period or periods 6.7 is (are) integrated in the entire surface of a representation 3.4, and must (must) be equal to the or the reference spatial period(s) as present in the security device 1 at the origin.
  • a spectral transformation 8 is applied to the first representation 3. This makes it possible to obtain a first transform 9.
  • Such a spectral transformation 8 is characterized in that it highlights in the image/representation to which it is applied, due to a series breakdown of periodic functions, the spatial frequencies present in said image/representation.
  • Such a spectral transformation 8 can be any transformation carrying out a decomposition according to a series of functions.
  • a commonly used transformation of this type in that it advantageously has an efficient and fast numerical implementation, is a fast fourrier transform (FFT).
  • FFT fast fourrier transform
  • a verification step is then carried out absolute, verifying that the value of the spatial period(s), at least the most remarkable, of reference correspond(s) to the value of the period(s) 6 of the first transformed 9.
  • this tolerance must be able to be configured in order to take account of the performance of the optical sensor used.
  • a tolerance equal to 50 ⁇ m can be used for an inefficient sensor. However, this tolerance is chosen as small as possible.
  • the value of the threshold can be adapted as a function of the distance, which is variable, of shooting.
  • This frequency verification step makes it possible to verify that the image 2 corresponds to the original image as produced by the issuing organization of the security device 1, in that it indeed includes the reference frequencies present at the 'origin. This can make it possible to discriminate against a counterfeit attempting to modify all or part of the image 2 without respecting said reference frequencies.
  • the image 2 is produced in such a way as to be visible according to a first optical spectrum and at least one second optical spectrum.
  • the first optical spectrum and said at least one second optical spectrum are advantageously separated, two by two.
  • the verification of such a security device 1 comprises the following steps, illustrated with reference to picture 2 .
  • a first step acquires image 2 according to the first optical spectrum to obtain a first representation 3.
  • a second step acquires image 2 according to the second optical spectrum to obtain a second representation 4.
  • Such an acquisition is carried out by illuminating the image 2 with lighting according to the desired optical spectrum and by producing the representation 3.4 by an acquisition, typically by means of an image sensor, sensitive in said desired optical spectrum.
  • a 3.4 representation is an image, which can be digitized and stored in a computer memory and conventionally organized in the form of an image, or a two-dimensional matrix of pixels.
  • An optical spectrum may be defined herein by at least one optical frequency band.
  • An optical spectrum can thus be all or part of the infrared spectrum, all or part of the X spectrum, all or part of the ultraviolet spectrum, or even all or part of the visible spectrum, or any combination of the preceding.
  • a 3.4 representation in an optical spectrum such as for example the infrared optical spectrum
  • the representation obtained is an image, a two-dimensional matrix of pixels, where each pixel comprises a unique intensity, indicative of the optical radiation, in the optical spectrum considered, reflected by the image 2.
  • Such a representation 3,4 generally has the form of a monochrome image.
  • a pixel can comprise several intensities, indicative of the intensities of elementary colors.
  • a 3.4 representation then has the form of a polychrome image, ie the form of a superposition of several monochrome images, called component images.
  • the first representation 3 represents a first pattern which is substantially identical graphically to a second pattern represented by the second representation 4.
  • This first step verified it is possible to determine a distance between the first pattern and the second pattern and to verify that this distance is less than a threshold.
  • the security device 1 is verified if and only if the two preceding tests are validated: the first pattern is graphically substantially identical to the second pattern, and the distance between the two patterns is less than the threshold.
  • the same component of the image 2 is visible according to the first spectrum optical and according to said at least one second optical spectrum. Also a shift or distance between the two 3.4 representations is theoretically zero. In order to take account of measurement and/or calculation inaccuracies, a tolerance is introduced in the form of said threshold. However, this threshold can be chosen to be very small.
  • said threshold should be lower than the alignment capabilities (in English: registration) of current technologies and production machines.
  • a threshold equal to 10 ⁇ m, preferably equal to 5 ⁇ m, meets this need, in that such alignment performance is unattainable regardless of the technology used.
  • a first verification step consisted in comparing the first representation 3 with the second representation 4 and in testing the graphic identity of the two representations. Numerous image processing techniques are applicable to carry out such a comparison.
  • the identity between the two representations 3,4 can be verified by identifying, by means of a known registration algorithm, a transformation making it possible to pass from one representation 3 to the other representation 4. In this case the verification is acquired if said transformation is sufficiently close to the identity transformation.
  • An advantage of this approach is that the identification of the transformation still provides, as a modulus of this transformation, the distance between the two 3,4 representations, which can then be compared to the threshold.
  • the comparison can be applied to any of the component images of said polychrome image, or even after preprocessing of the polychrome image in order to make it monochrome, by any method whatsoever (average, saturation, etc.).
  • the two optical spectra can be arbitrary, as soon as one has a component, visible simultaneously according to these two optical spectra and capable of entering into the production of image 2.
  • one of the optical spectra is situated in the visible spectrum.
  • An optical spectrum included in the visible spectrum also has the advantage of simplifying the illumination of image 2 when performing the acquisition, since it can be performed by daylight or even by any type of light. usual artificial lighting.
  • the use of the visible spectrum is further advantageous in that it makes it possible to obtain a polychrome representation.
  • polychromy can provide additional verification.
  • one of the optical spectra can be located in the ultraviolet, UV.
  • one of the optical spectra can be located in the infrared, IR.
  • Some of these embodiments contribute, intrinsically or artificially, to providing the image 2 with a frequency signature, so that it includes at least least one space period.
  • the 9,10 transforms represent characteristic points of the remarkable periods. It is possible to use methods extracting a set of the most remarkable p periods for each of the transforms 9,10 and to compare the p periods of each of the sets. It is considered that two transforms are equal if at least some parts of the remarkable periods of a transform 9 are found in the set of remarkable periods of the other transform 10.
  • the verification step is positive and the security device 1 is deemed verified and therefore valid. Otherwise, the verification step is negative and the security device 1 and/or its authenticity are in doubt.
  • the previous verification step is relative in that it compares the respective 9,10 transforms of the two 3,4 representations. This makes it possible to verify that the image 2 has indeed been produced jointly, for its part 3 visible according to a first optical spectrum and for its part 4 visible according to at least a second optical spectrum, and that one finds substantially the same frequency spectra in the two representations 3.4, indicative of the presence of the same original frequency signature 5.
  • the absolute verification step, carried out for the first transform 9, can also be applied to the second transform 10, in order to verify that the period(s), at least the most remarkable of reference are indeed present in the (or the) period(s) 7 of the second transform (10).
  • This second step of frequency verification makes it possible to verify that the particular periodicity of the image 2 corresponds to that carried out by the body issuing the security device 1.
  • the spectral transformation 8 is applied to the whole of the first representation 3 and/or, likewise, to the whole of the second representation 4.
  • the spectral transformation 8 is applied to at least part of the first representation 3 and to the same at least part of the second representation 4.
  • Each of the partial transforms can then be compared, with a partial transform of the other representation, for example with the corresponding partial transform, this comparison being able to be carried out part by part, but not necessarily, and/or with another partial transform of the same representation.
  • a modified part 11 aims to modify the eyes on a photo ID. While the original image 2 and therefore its representation 3 comprises a frequency signature 5, the modified part 11, whether by addition or by replacement, whatever the technology used, has every chance of presenting a frequency signature 5' different from the original frequency signature 5, y including the case where no 5' frequency signature is present. Also a comparison of the 9,10 spectral transforms, carried out on all or part of a 3,4 representation necessarily reveals a detectable difference.
  • an image 2 comprising a security device 1 visible according to a first optical spectrum and according to at least a second optical spectrum.
  • a security device 1 can be, in known manner, an image 2 produced by monochrome laser engraving.
  • a safety device 1 is known and widely used in the technical field.
  • the principle is to arrange a layer sensitive to the laser, in which it is possible to carry out, by means of a laser beam, a localized carbonization. It is thus possible, by means of a laser, to draw and produce an image 2.
  • This embodiment makes it possible to produce an image, necessarily monochrome, such as an identity photo. It is known that a point of image 2, blackened by the laser, is visible in a first optical spectrum: the visible spectrum and that moreover a point of image 2 is still visible according to a second optical spectrum: the infrared spectrum.
  • a security device 1 can be an image 2 produced by color laser engraving.
  • a security device 1 comprises an arrangement comprising a color matrix.
  • the color matrix is an array of pixels, each pixel comprising at least two sub-pixels of advantageously elementary and different colors.
  • the color matrix is sensitive to the laser, a laser firing allowing selectively, for each pixel, to express a hue by combining the elementary colors of the sub-pixels.
  • the color matrix is insensitive to the laser, and said arrangement comprises at least one layer sensitive to the laser. Said at least one sensitive layer is arranged above and/or below the color matrix.
  • Laser etching according to the monochrome technology described above, makes it possible to produce, in said at least one sensitive layer, a monochrome mask, allowing each pixel to selectively express a hue by combining the elementary colors of the sub-pixels.
  • a security device 1 can be an image 2 produced by a printing technique.
  • the printing technique can be any printing technique: offset, screen printing, retransfer, sublimation, inkjet, etc..., as long as it uses an ink comprising at least one visible component according to the first optical spectrum and the second optical spectrum. This component, integrated in the ink, thus determines according to which optical spectra the image 2 can be seen.
  • An image 2 can thus be invisible in the visible spectrum, but be visible in the IR and in the UV.
  • the printing of image 2 creates image points which are simultaneously visible according to the at least two optical spectra.
  • an image point is a single component, necessarily located at the same place in the first representation 3 or in the second representation 4.
  • a simplifying technique of counterfeiting consists in producing an image 2 in monochrome.
  • a counterfeiter may be tempted to produce a monochrome image 2, which is simpler to manufacture or requires simpler tools.
  • a polychrome print can be replaced by a monochrome print.
  • a counterfeiter can be equipped with a monochrome engraving laser, and master this technology, which is already quite old, and be tempted to replace a 2 color image created by laser engraving, whose very recent technology is still not widely available and probably difficult to access. to a counterfeiter, by a monochrome image 2 created by laser engraving.
  • the verification method can advantageously include an additional step verifying that the two representations 3,4 are colorimetrically different.
  • one of the representations represents a polychrome acquisition of the image 2 and the other representation, for example because it is visible in an optical spectrum situated outside the visible spectrum, represents a monochrome acquisition.
  • This verification step checks an effective presence of color in one of the representations.
  • the 3.4 representations are here colorimetrically different, even if they are graphically identical (same pattern).
  • the colorimetric difference can be checked by any colorimetric processing method.
  • the 3,4 representations can be modeled according to a CIE Lab colorimetric model. he can it can then be verified that the representation reputed to be in color actually has generally high values of the coefficients a,b, whereas the representation reputed to be monochrome, is gray, and has low values of the coefficients a,b.
  • An analogous approach could use a conversion of the 3,4 representations according to an HLS model, and an observation of the value of the saturation S.
  • At least three embodiments of a security device 1 visible according to at least two optical spectra have been seen: monochrome laser engraving, color laser engraving and printing with special ink.
  • An image 2 made by monochrome laser engraving includes a frequency signature 5, because the laser shots are made according to a shot matrix.
  • a firing matrix for example rectangular, is advantageously periodic. It therefore appears, spatially, at least one period 6.7, per dimension. In the case of a rectangular matrix, there may thus appear a period 6.7 along a first axis and a second period 6.7 along the other axis of the matrix.
  • the transform 9 of representation 3 is equal to the transform 10 of representation 4.
  • This spectral transformation 8 reveals, and this for the two optical spectra, at least the two periods 6.7. If the rectangular matrix is oriented parallel to image 2, and the spectral transformation 8 is an FFT2, there will appear at least a first point 6.7 on the ordinate axis, representative of the period along the abscissa axis and at least one second point on the abscissa axis, representative of the period along the ordinate axis.
  • An image produced by color laser engraving intrinsically comprises, most often, a frequency signature 5 in that the arrangement making it possible to engrave such an image 2 in color comprises a color matrix.
  • the pixels and the sub-pixels comprising the colors are advantageously arranged in said color matrix periodically. It is thus possible to find, according to at least one dimension, a main period 6.7 corresponding to the distance between the pixels.
  • each pixel comprises a number n, at least equal to 2, and conventionally equal to 4 (Cyan, Magenta, Yellow, Black), of sub-pixels each comprising a basic color.
  • n colors are advantageously spatially equitably distributed, thus forming a secondary spatial period n-sub-multiple of the main period 6.7.
  • the color matrix is arranged in lines, for example horizontal, alternating according to a sequence advantageously identically repeated the n colors.
  • the color matrix is theoretically visible only in the visible optical spectrum. However, dots produced by laser etching are visible on the one hand in the visible optical spectrum and on the other hand in the infrared, IR optical spectrum. Also, in an engraved image 2, the engraved points being necessarily arranged according to the color matrix, will make it possible to show the main 6.7 and secondary spatial periods of the color matrix. This characteristic assumes that the density of engraved points is sufficient. This is the case for a complex image and particularly for a photograph. The main 6.7 and secondary spatial periods appear, both in the first transform 9 resulting from a representation 3 according to a first optical spectrum, here the visible spectrum, and in the second transform 10 resulting from a representation 4 according to a second spectrum optical, here the IR spectrum.
  • the same frequency signature 5 from the color matrix is revealed and highlighted by the engraved dots and the two transforms 9,10 must be substantially identical.
  • the periods 6.7 highlighted by the spectral transformation 8 must correspond to the main periods and where applicable, the secondary reference of the frequency signature 5, as manufactured.
  • An image 2 produced by a printing process does not necessarily include a frequency signature 5.
  • certain production methods can induce a periodic arrangement of the points which then forms a frequency signature 5, of which at least one spatial period 6.7 is the distance between the points. This periodic pattern thus forms a frequency signature 5 which can then be used to verify the security device 1 by applying a spectral transformation 8.
  • a frequency signature 5 in an image 2 by replacing certain points or lines, advantageously periodically arranged, with a given color.
  • an image 2 is printed with a special ink, it is possible to verify the presence, the identity and the distance of the two representations 3,4 resulting from acquisitions according to at least two optical spectra. If the image 2, or at least said additional frequency signature 5 is printed with a special ink, the frequency signature 5 thus produced is visible according to at least two optical spectra and must be present in the two transforms 9,10 resulting from these two representations 3.4, these two transforms then being equal.
  • image 2 represents a part of the body of a holder associated with the security device 1.
  • the verification method may further comprise the following steps.
  • a first step consists of acquiring an image of said part of the body from the wearer of the security device 1.
  • a second step verifies that this acquired image corresponds biometrically to the image 2 of the security device 1.
  • image 2 of security device 1 is deemed to be a representation of the authorized holder. Also if a biometric match can be verified between a direct acquisition from the bearer accompanying the security device 1, it can be assumed that the bearer is indeed the holder he claims to be.
  • the verification can be doubled, by verifying that the acquired image 13 corresponds biometrically to the first representation 3, and/or by verifying that the acquired image 13 corresponds biometrically to the second representation 4.
  • biometric correspondence is used here because such a step, comparing a direct acquisition from the wearer and an image 2, associated with the security device 1, resulting from an acquisition having been carried out during the issue, can be relatively old, and the wearer's appearance may have changed, is necessarily more complex than verifying identity between two images. Biometric matching techniques are assumed to be known.
  • the image 2 then representing an identity photograph of the bearer of an identity document 20 associated with said security device 1.
  • it can still be the eye, one of the fingers or any other part of the body.
  • the verification process thus combines several verification steps targeting different aspects of a control. It is checked that the image 2 is authentic, and could not be modified since the delivery of the security device 1. It is also checked that the bearer corresponds to the holder. The guarantees provided by each of these checks reinforce the security of the security device 1.
  • the security device 1 is associated with a digital storage means comprising a digital representation of the image 2.
  • a storage means is typically a secure device (in English: secure device, SD) offering services access to an internal memory, in a secure manner, such as a microcircuit.
  • the digital representation of the image 2 has been stored beforehand, in a controlled manner, by the issuing authority of the security device 1. It is therefore deemed to be a representation of the holder. Securing guarantees that it has not been modified.
  • Such a characteristic makes it possible to redundant the security device 1 and to complete the verification method by adding another verification by means of the following steps.
  • the digital representation of the image 2 is read from the storage means.
  • the method compares the digital representation with one and/or both representations 3,4. Verification is deemed acquired if the digital representation is substantially identical to all the representations 3.4 with which it is compared.
  • An authentic identity document 20 comprising an image 2 representing an identity photo produced by color laser engraving and a microcircuit containing a representation digital photo ID is checked.
  • the verification method carries out an acquisition, advantageously in color, of the image 2 according to a visible spectrum to obtain a first representation 3, a monochrome acquisition of the image 2 according to an IR spectrum to obtain a second representation 4, a direct acquisition, advantageously in color, of the wearer's face and extracts a digital representation of the microcircuit.
  • a first verification confirms that the first representation 3 (visible) is graphically identical and not far from the second representation 4 (IR).
  • a second verification confirms that the direct acquisition corresponds biometrically to the first representation 3 (visible), and corresponds biometrically to the second representation 4 (IR).
  • a third check confirms that the digital representation from the microcircuit is identical to the first representation 3 (visible), is identical to the second representation 4 (IR), and biometrically corresponds to the direct acquisition.
  • a fourth verification applies a spectral transformation 8 to the representation 3, advantageously made monochrome, and to the representation 4, compares the two transformed 9,10 obtained to verify their equality and verifies that the spatial periods 6,7 detected are the periods of the frequency signature 5 of the color matrix used.
  • a fifth verification verifies that representation 3, in color, differs colorimetrically from representation 4, monochrome.
  • a forged identity document 20 in that it includes an image 2 made by printing.
  • Image 2 printed here, has no visibility in the IR. Also the second representation 4 is a null image. The printed image has no frequency signature 5.
  • the first check fails in that it detects a difference between the first representation 3 (visible) and (the absence of content of) the second representation 4 (IR).
  • the third verification succeeds in that an identity is found for the first representation 3 (visible) and a biometric correspondence is found with the direct acquisition. However it fails for the second representation 4 (IR). If the counterfeiter has failed to alter the digital representation in the microcircuit, all checks fail.
  • the fourth verification can find an equality between the two transforms 9,10 (absence of significant spectrum) but fails in that it does not find the periods of the color matrix, neither in the transform 9 resulting from the visible spectrum, nor in the transform 10 resulting from the IR spectrum.
  • the fifth check succeeds in that image 2 is in color.
  • a counterfeit identity document 20 in that it comprises an image 2 produced by monochrome laser engraving.
  • Image 2 here laser-engraved, is visible in the visible and in the IR and presents two identical and superimposed (not distant) 3.4 representations.
  • the engraved image monochrome does not have a frequency signature 5.
  • the first verification succeeds in that it detects a representation 3 (visible) identical and superimposed with the second representation 4 (IR).
  • the third verification succeeds in that an identity is found for the first representation 3 (visible), for the second representation 4 (IR) and a biometric match is found with direct acquisition.
  • the fourth verification can find an equality between the two transforms 9,10 (absence of significant spectrum) but fails in that it does not find the periods of the color matrix, neither in the transform 9 resulting from the visible spectrum, nor in the transform resulting from the IR spectrum.
  • a frequency signature is present, it bears no resemblance to a frequency signature of a color matrix and the spectral verification fails.
  • the fifth check fails in that image 2 is monochrome.
  • a counterfeit identity document 20 in that it comprises an image 2 produced by printing, said printing including lines simulating a frequency signature 5 of a color matrix.
  • Image 2 printed here, has no visibility in the IR. Also the second representation 4 is a null image. The printed image has a convincing frequency signature, but only in the visible.
  • the first check fails in that it detects a difference between the first representation 3 (visible) and the absence of content of the second representation 4 (IR).
  • the third verification succeeds in that an identity is found for the first representation 3 (visible) and a biometric correspondence is found with the direct acquisition. However it fails for the second representation 4 (IR).
  • the fourth verification may succeed in that it finds an acceptable transform ⁇ in the visible.
  • the fourth verification fails in that the transform 10 in the IR is not acceptable (absence of significant spectrum) and is not equal to the transform 9 (visible) either.
  • the fifth check succeeds in that image 2 is in color.

Description

La présente invention concerne le domaine des dispositifs de sécurité. Il est connu de réaliser un dispositif de sécurité et de l'associer à un document sensible en termes de sécurité, tel un document identitaire, afin de sécuriser ledit document. Un dispositif de sécurité efficace se caractérise en ce qu'il est : difficile à produire ou reproduire, et difficile à modifier de manière indétectable.The present invention relates to the field of security devices. It is known to produce a security device and to associate it with a sensitive document in terms of security, such as an identity document, in order to secure said document. An effective security device is characterized in that it is: difficult to produce or reproduce, and difficult to modify in an undetectable manner.

De manière connue, un document identitaire comprend une image associée au titulaire du document identitaire, telle une photo d'identité. Un contrôle d'identité peut ainsi comparer une image comprenant une photo du titulaire, présente sur le document identitaire, avec une acquisition réalisée sur le porteur du document identitaire, afin de vérifier si l'acquisition correspond biométriquement, ou non, à l'image, afin de déterminer si le porteur est, ou non, le titulaire qu'il prétend être.In known manner, an identity document comprises an image associated with the holder of the identity document, such as an identity photo. An identity check can thus compare an image comprising a photo of the holder, present on the identity document, with an acquisition carried out on the bearer of the identity document, in order to verify whether the acquisition corresponds biometrically, or not, to the image , in order to determine whether or not the bearer is the holder he claims to be.

Une telle comparaison est d'autant plus probante que l'image présente sur le document identitaire représente effectivement le titulaire autorisé. Pour cela il convient que cette image soit bien celle, authentique et originale, disposée par une autorité de délivrance, et qu'elle n'ait pas pu être modifiée depuis la délivrance.Such a comparison is all the more convincing since the image present on the identity document actually represents the authorized holder. For this it is necessary that this image is indeed the one, authentic and original, arranged by an authority of issue, and that it could not have been modified since the issue.

Afin qu'un faussaire ne puisse ni remplacer ni modifier l'image sur le document identitaire, pour, par exemple tenter de reproduite l'apparence d'un porteur différend du titulaire, cette image est avantageusement assortie d'un dispositif de sécurité. Le dispositif de sécurité est avantageusement intimement lié à ladite image, afin que les caractéristiques de sécurité et d'authentification du dispositif de sécurité s'appliquent aussi à l'image.So that a forger can neither replace nor modify the image on the identity document, in order, for example, to attempt to reproduce the appearance of a holder who differs from the holder, this image is advantageously accompanied by a security device. The security device is advantageously intimately linked to said image, so that the security and authentication characteristics of the security device also apply to the image.

Le document WO 01/60047 A2 divulgue les caractéristiques de la préambule de la revendication 1.The document WO 01/60047 A2 discloses the features of the preamble of claim 1.

La présente invention propose un mode de vérification multimodal apte à vérifier un dispositif de sécurité comprenant une image, en permettant de détecter et discriminer différentes contrefaçons possibles.The present invention proposes a multimodal verification mode capable of verifying a security device comprising an image, by making it possible to detect and discriminate between different possible counterfeits.

La présente invention a pour objet un procédé de vérification d'un dispositif de sécurité comprenant une image comportant une signature, comprenant les étapes suivantes : acquisition de l'image selon un premier spectre optique pour obtenir une première représentation, extraction de la signature, et vérification de la signature, caractérisé en ce que la signature est colorimétrique et comprend une orientation particulière d'une planche de couleur, ou la signature est fréquentielle, l'image comprenant au moins une période spatiale de référence.The present invention relates to a process for verification of a security device comprising an image comprising a signature, comprising the following steps: acquisition of the image according to a first optical spectrum to obtain a first representation, extraction of the signature, and verification of the signature, characterized in that the signature is colorimetric and comprises a particular orientation of a color plate, or the signature is frequency-based, the image comprising at least one reference spatial period.

Selon une autre caractéristique, la signature est fréquentielle, l'image comprenant au moins une période spatiale de référence, et le procédé comprend encore les étapes suivantes : application d'une transformation spectrale à la première représentation, pour obtenir une première transformée comprenant au moins une première période spatiale, vérification que la valeur de la (ou des) période(s) spatiale(s) corresponde(nt) à la valeur de la (ou des) période(s) spatiales de référence.According to another characteristic, the signature is frequency-based, the image comprising at least one reference spatial period, and the method further comprises the following steps: application of a spectral transformation to the first representation, to obtain a first transform comprising at least a first spatial period, verification that the value of the spatial period(s) correspond(s) to the value of the reference spatial period(s).

Selon une autre caractéristique, l'image est visible selon le premier spectre optique et au moins un deuxième spectre optique et le procédé comprend encore les étapes suivantes : acquisition de l'image selon le deuxième spectre optique pour obtenir une deuxième représentation, vérification que les deux représentations sont graphiquement sensiblement identiques, vérification qu'une distance entre les deux représentations est inférieure à un seuil.According to another characteristic, the image is visible according to the first optical spectrum and at least one second optical spectrum and the method further comprises the following steps: acquisition of the image according to the second optical spectrum to obtain a second representation, verification that the two representations are graphically substantially identical, verification that a distance between the two representations is less than a threshold.

Selon une autre caractéristique, le seuil est égal à 10 µm, préférentiellement égal à 5 µm.According to another characteristic, the threshold is equal to 10 μm, preferably equal to 5 μm.

Selon une autre caractéristique, la distance entre les deux représentations est déterminée en identifiant, au moyen d'un algorithme de recalage, une transformation pour laquelle une des représentations est image de l'autre représentation.According to another characteristic, the distance between the two representations is determined by identifying, by means of a registration algorithm, a transformation for which one of the representations is an image of the other representation.

Selon une autre caractéristique, le premier spectre optique est situé dans le spectre visible et/ou le deuxième spectre optique est situé dans l'infrarouge.According to another characteristic, the first optical spectrum is located in the visible spectrum and/or the second optical spectrum is located in the infrared.

Selon une autre caractéristique, le procédé comprend encore les étapes suivantes : application de la même transformation à la deuxième représentation, pour obtenir une deuxième transformée, vérification que la première transformée est sensiblement égale à la deuxième transformée.According to another characteristic, the method further comprises the following steps: application of the same transformation at the second representation, to obtain a second transform, verification that the first transform is substantially equal to the second transform.

Selon une autre caractéristique, le procédé comprend encore une étape de : vérification que la valeur de la (ou des) période(s) spatiale(s) de la deuxième transformée corresponde(nt) à la valeur de la (ou des) période(s) spatiales de référence.According to another characteristic, the method further comprises a step of: verifying that the value of the spatial period(s) of the second transform corresponds(s) to the value of the period(s) s) spatial reference.

Selon une autre caractéristique, la transformation spectrale est appliquée sur au moins une partie de la première représentation et/ou sur la même au moins une partie de la deuxième représentation.According to another characteristic, the spectral transformation is applied to at least part of the first representation and/or to the same at least part of the second representation.

Selon une autre caractéristique, la transformation spectrale est appliquée sur au moins deux parties d'une représentation, et le procédé comprend encore une étape de : vérification que les transformées des différentes parties sont sensiblement égales.According to another characteristic, the spectral transformation is applied to at least two parts of a representation, and the method further comprises a step of: checking that the transforms of the different parts are substantially equal.

Selon une autre caractéristique, le procédé comprend encore une étape de : vérification que les deux représentations sont colorimétriquement différentes.According to another characteristic, the method further comprises a step of: checking that the two representations are colorimetrically different.

Selon une autre caractéristique, l'image représente une partie du corps, préférentiellement le visage, l'oeil, ou le doigt, d'un titulaire associé au dispositif de sécurité et le procédé comprend encore les étapes de : acquisition d'une image de la partie du corps auprès d'un porteur du dispositif de sécurité, vérification que l'image acquise correspond biométriquement à la première représentation, et/ou vérification que l'image acquise correspond biométriquement à la deuxième représentation.According to another characteristic, the image represents a part of the body, preferably the face, the eye, or the finger, of a holder associated with the security device and the method further comprises the steps of: acquiring an image of the part of the body with a wearer of the security device, verification that the acquired image corresponds biometrically to the first representation, and/or verification that the acquired image corresponds biometrically to the second representation.

Selon une autre caractéristique, le dispositif de sécurité est associé à un moyen de stockage numérique comprenant une représentation numérique de l'image, et le procédé comprend encore les étapes de : lecture de la représentation numérique de l'image, vérification que la représentation numérique est sensiblement identique à la première représentation, et/ou vérification que la représentation numérique est sensiblement identique à la deuxième représentation.According to another characteristic, the security device is associated with a digital storage means comprising a digital representation of the image, and the method further comprises the steps of: reading the digital representation of the image, checking that the digital representation is substantially identical to the first representation, and/or verifying that the digital representation is substantially identical to the second representation.

Selon une autre caractéristique, le procédé comprend encore une étape de : vérification que l'image acquise correspond biométriquement à la représentation numérique.According to another characteristic, the method comprises another step of: verification that the acquired image corresponds biometrically to the digital representation.

L'invention concerne encore un appareil de vérification comprenant des moyens de mise en œuvre d'un tel procédé de vérification.The invention also relates to a verification apparatus comprising means for implementing such a verification method.

L'invention concerne encore un programme d'ordinateur comprenant une suite d'instructions logiques aptes à mettre en œuvre un tel procédé de vérification.The invention also relates to a computer program comprising a series of logic instructions capable of implementing such a verification method.

L'invention concerne encore un support de données informatiques comprenant un tel programme d'ordinateur.The invention also relates to a computer data carrier comprising such a computer program.

D'autres caractéristiques, détails et avantages de l'invention ressortiront plus clairement de la description détaillée donnée ci-après à titre indicatif en relation avec des dessins sur lesquels :

  • la figure 1 illustre un document identitaire comprenant une image associée à un dispositif de sécurité,
  • la figure 2 illustre une étape du procédé de vérification, effectuant une comparaison entre deux représentations de l'image acquises selon des spectres optiques différents,
  • la figure 3 illustre une autre étape du procédé de vérification, utilisant une transformation spectrale,
  • la figure 4 illustre une possible contrefaçon, qu'une transformation spectrale permet de détecter.
Other characteristics, details and advantages of the invention will emerge more clearly from the detailed description given below by way of indication in relation to the drawings in which:
  • the figure 1 illustrates an identity document comprising an image associated with a security device,
  • the picture 2 illustrates a step of the verification method, performing a comparison between two representations of the image acquired according to different optical spectra,
  • the picture 3 illustrates another step in the verification process, using a spectral transformation,
  • the figure 4 illustrates a possible counterfeit, which a spectral transformation makes it possible to detect.

La figure 1 illustre un document identitaire 20 comprenant au moins une image 2. Le document identitaire 20 peut, le cas échéant, comprendre d'autres éléments 21. L'image 2 est réalisée de manière à intégrer un dispositif de sécurité 1. Selon une caractéristique le dispositif de sécurité 1 consiste en ce que l'image 2 comporte une signature. Une signature est une caractéristique spécifique de l'image 2 apte à pouvoir être détectée, typiquement par un outil d'analyse. Une signature est le plus souvent une conséquence du mode de réalisation ou d'une machine utilisée pour réaliser l'image 2. Une signature peut être ainsi intrinsèquement liée au mode de réalisation. Alternativement une signature peut être volontairement introduite dans l'image 2, afin de pouvoir y être détectée pour vérification.The figure 1 illustrates an identity document 20 comprising at least one image 2. The identity document 20 can, if necessary, comprise other elements 21. The image 2 is produced in such a way as to integrate a security device 1. According to one characteristic, the device security 1 consists in that the image 2 comprises a signature. A signature is a specific characteristic of the image 2 able to be detected, typically by an analysis tool. A signature is most often a consequence of the embodiment or of a machine used to produce the image 2. A signature can thus be intrinsically linked to the embodiment. Alternately a signature can be voluntarily introduced into image 2, in order to be able to be detected there for verification.

La nature d'une signature peut être très diverse. Plusieurs exemples, non limitatifs, seront décrits par la suite.The nature of a signature can be very diverse. Several non-limiting examples will be described below.

La vérification d'un tel dispositif de sécurité 1 comprend les étapes suivantes. Une première étape réalise une acquisition de l'image 2 selon le premier spectre optique pour obtenir une première représentation 3.The verification of such a security device 1 comprises the following steps. A first step carries out an acquisition of the image 2 according to the first optical spectrum to obtain a first representation 3.

Une telle acquisition est réalisée en éclairant l'image 2 avec un éclairage selon le spectre optique souhaité et en réalisant la représentation 3,4 par une acquisition, typiquement au moyen d'un capteur d'image, sensible dans ledit spectre optique souhaité. Le résultat obtenu, soit une représentation 3,4 est une image, pouvant être numérisée et stockée dans une mémoire informatique et classiquement organisée sous forme d'une image, soit une matrice bidimensionnelle de pixels.Such an acquisition is carried out by illuminating the image 2 with lighting according to the desired optical spectrum and by producing the representation 3.4 by an acquisition, typically by means of an image sensor, sensitive in said desired optical spectrum. The result obtained, either a 3.4 representation is an image, which can be digitized and stored in a computer memory and conventionally organized in the form of an image, or a two-dimensional matrix of pixels.

Un spectre optique peut être défini, dans la présente, par au moins une bande de fréquence optique. Un spectre optique peut ainsi être tout ou partie du spectre infrarouge, tout ou partie du spectre X, tout ou partie du spectre ultraviolet, ou encore tout ou partie du spectre visible, ou une combinaison quelconque des précédents.An optical spectrum may be defined herein by at least one optical frequency band. An optical spectrum can thus be all or part of the infrared spectrum, all or part of the X spectrum, all or part of the ultraviolet spectrum, or even all or part of the visible spectrum, or any combination of the preceding.

Ainsi l'obtention d'une représentation 3,4 dans un spectre optique, tel que par exemple le spectre optique infrarouge, suppose un éclairage de l'image 2 par une source couvrant au moins le spectre optique infrarouge souhaité et l'acquisition simultanée de la représentation 3,4 au moyen d'un capteur, telle une caméra, sensible au moins dans le spectre optique infrarouge souhaité. La représentation obtenue est une image, matrice bidimensionnelle de pixels, où chaque pixel comprend une unique intensité, indicative du rayonnement optique, dans le spectre optique considéré, réfléchi par l'image 2. Une telle représentation 3,4 a généralement la forme d'une image monochrome.Thus obtaining a 3.4 representation in an optical spectrum, such as for example the infrared optical spectrum, supposes illumination of the image 2 by a source covering at least the desired infrared optical spectrum and the simultaneous acquisition of representation 3.4 by means of a sensor, such as a camera, sensitive at least in the desired infrared optical spectrum. The representation obtained is an image, a two-dimensional matrix of pixels, where each pixel comprises a unique intensity, indicative of the optical radiation, in the optical spectrum considered, reflected by the image 2. Such a representation 3,4 generally has the form of a monochrome image.

Dans le cas particulier d'un spectre optique comprenant au moins partiellement le spectre optique visible, un pixel peut comprendre plusieurs intensités, indicatives des intensités de couleurs élémentaires. Une représentation 3,4 a alors la forme d'une image polychrome, soit la forme d'une superposition de plusieurs images monochromes, dites images composantes.In the particular case of an optical spectrum comprising at least partially the visible optical spectrum, a pixel may include several intensities, indicative of the elemental color intensities. A 3.4 representation then has the form of a polychrome image, ie the form of a superposition of several monochrome images, called component images.

Au cours d'une deuxième étape, il est ensuite procédé à une extraction de la signature. Le mode opératoire de cette étape d'extraction dépend de la nature de la signature. Au cours d'une troisième étape, la signature est vérifiée, pour contrôler que la signature extraire de la représentation 3 issue de l'image 2 correspond bien à une signature, telle qu'elle doit être présente, en ce qu'elle a été introduite et insérée dans l'image 2 lors de la fabrication de l'image 2. Le mode opératoire de cette étape de vérification dépend encore de la nature de la signature et est détaillé plus avant.During a second step, the signature is then extracted. The operating mode of this extraction step depends on the nature of the signature. During a third step, the signature is checked, to check that the signature extracted from the representation 3 resulting from the image 2 does indeed correspond to a signature, as it must be present, in that it has been introduced and inserted into the image 2 during the production of the image 2. The operating mode of this verification step still depends on the nature of the signature and is detailed further.

Selon un premier mode de réalisation, la signature est colorimétrique. Ceci recouvre encore de nombreux modes opératoires, qui sont illustrés par des exemples non limitatifs. Une idée générale de ce type de signature est de tirer profit de l'avance technologique, en termes de moyens de fabrication et de moyens de vérifications, généralement constatée entre les industriels du domaine des dispositifs de sécurité et/ou les officines gouvernementales délivrant les documents identitaires, relativement à des contrefacteurs.According to a first embodiment, the signature is colorimetric. This also covers numerous procedures, which are illustrated by non-limiting examples. A general idea of this type of signature is to take advantage of the technological advance, in terms of means of manufacture and means of verification, generally observed between manufacturers in the field of security devices and/or government offices issuing the documents identity, in relation to counterfeiters.

Selon le premier mode de réalisation la signature colorimétrique utilise l'orientation d'une planche de couleur donnée. Ainsi, dans un procédé d'impression offset, chaque couleur de base (par exemple RGB(K) ou CMY(W), typiquement au nombre de 2 à 5, est imprimée au moyen d'une planche de couleur. Afin d'éviter des effets de moiré préjudiciables, chaque telle planche de couleur est orienté selon un angle différent, afin que chaque planche de couleur soit angulairement espacée relativement aux autres. Ainsi l'angle de chaque planche de couleur est caractéristique d'une machine d'impression.According to the first embodiment, the colorimetric signature uses the orientation of a given color board. Thus, in an offset printing process, each basic color (for example RGB(K) or CMY(W), typically 2 to 5 in number, is printed using a color plate. In order to avoid moiré effects, each such color plate is oriented at a different angle, so that each color plate is angularly spaced relative to the others, thus the angle of each color plate is characteristic of a printing machine.

Un mesure très précise de ce jeu d'angles, ou même une modification volontaire d'au moins un angle, peut permettre d'identifier et/ou de particulariser une machine d'impression, et en généralisant un organisme émetteur. Avec des outils de vérification précis, il est ainsi possible d'utiliser au moins un angle de ce jeu d'angles comme signature.A very precise measurement of this set of angles, or even a voluntary modification of at least one angle, can make it possible to identify and/or particularize a machine printing, and generalizing an issuing body. With precise verification tools, it is thus possible to use at least one angle of this set of angles as a signature.

Un deuxième exemple non revendiqué de signature colorimétrique utilise la teinte précise de chaque planche de couleur. Chaque planche de couleur comprend une couleur de base. Les différentes couleurs des différentes planches de couleur définissent ainsi une base colorimétrique, à l'instant d'une base vectorielle. Les couleurs de base doivent comprendre des couleurs sensiblement répartie afin de disposer d'une bonne puissance d'expression colorimétrique. Il est ainsi connu d'utiliser une base RGB : Rouge Vert (Green) et Bleu, éventuellement complétée par du Blanc (White) et/ou du Noir (blacK). Une autre base est CMY : Cyan Magenta et Jaune (Yellow). Mais il est possible de définir n'importe quel n-uplet de couleurs de base, ou encore en partant d'un triplet classique de légèrement modifier au moins une des couleurs de base en décalant sa teinte de quelques %. Une mesure précise peut ainsi permettre de détecter avec précision une machine d'impression, en tablant uniquement sur les inévitables dispersions d'une machine à l'autre ou encore en créant un décalage volontaire. Un décalage volontaire est avantageux en ce qu'il peut permettre de particulariser toutes les machines d'une même entité et ainsi caractérisé un émetteur, tel un service ou un état.A second unclaimed example of a color signature uses the precise hue of each color board. Each color board includes a base color. The different colors of the different color boards thus define a colorimetric base, at the same time as a vector base. The basic colors must include substantially distributed colors in order to have a good power of colorimetric expression. It is thus known to use an RGB base: Red Green (Green) and Blue, optionally supplemented by White (White) and/or Black (blacK). Another base is CMY: Cyan Magenta and Yellow (Yellow). But it is possible to define any n-tuple of base colors, or even starting from a classic triplet to slightly modify at least one of the base colors by shifting its hue by a few %. A precise measurement can thus make it possible to detect a printing machine with precision, relying solely on the inevitable dispersions from one machine to another or even by creating a deliberate shift. A voluntary shift is advantageous in that it can make it possible to particularize all the machines of the same entity and thus characterize a transmitter, such as a service or a state.

Un troisième exemple non revendiqué de signature colorimétrique est l'utilisation d'une teinte particulière. Une telle teinte, combinaison particulière des couleurs de base peut ainsi être employée pour réaliser une partie spécifique d'une image 2. Il peut, par exemple, s'agir d'un cadre, ou même d'un point particulier, réalisé avec une définition de teinte, absolue ou relative donnée, apte à être vérifiée avec une grande précision. La position du point utilisé peut être partie à la signature.A third unclaimed example of a colorimetric signature is the use of a particular hue. Such a tint, a particular combination of basic colors can thus be used to produce a specific part of an image 2. It can, for example, be a frame, or even a particular point, produced with a shade definition, given absolute or relative, capable of being verified with great precision. The position of the point used may be part of the signature.

Selon un autre mode de réalisation, la signature est fréquentielle. Pour cela l'image 2 comprend au moins un période spatiale de référence. Ici encore plusieurs modes de réalisation sont possibles et certains sont illustrés plus avant. La période spatiale de référence peut être intrinsèque en ce qu'elle est introduite par le procédé de fabrication de l'image 2 ou elle peut encore être artificielle, en ce qu'elle est ajoutée à l'image.According to another embodiment, the signature is frequency-based. For this, image 2 comprises at least one reference spatial period. Here again several modes of realization are possible and some are illustrated further. The reference spatial period can be intrinsic in that it is introduced by the process for manufacturing the image 2 or it can still be artificial, in that it is added to the image.

La présence d'au moins une telle période spatiale de référence constitue une signature dont il est possible de vérifier la présence et la qualité. Du fait du mode de réalisation de l'image 2, la ou les périodes 6,7 est (sont) intégrée(s) dans la totalité de la surface d'une représentation 3,4, et doit (doivent) être égales à la ou les période(s) spatiale(s) de référence telle(s) que présente(s) dans le dispositif de sécurité 1 à l'origine.The presence of at least one such reference spatial period constitutes a signature whose presence and quality can be verified. Due to the embodiment of the image 2, the period or periods 6.7 is (are) integrated in the entire surface of a representation 3.4, and must (must) be equal to the or the reference spatial period(s) as present in the security device 1 at the origin.

L'extraction de la signature est alors réalisée au moyen des étapes suivantes. Il est appliqué une transformation 8 spectrale à la première représentation 3. Ceci permet d'obtenir une première transformée 9.The extraction of the signature is then carried out by means of the following steps. A spectral transformation 8 is applied to the first representation 3. This makes it possible to obtain a first transform 9.

Une telle transformation 8 spectrale se caractérise en ce qu'elle met en évidence dans l'image/représentation à laquelle elle est appliquée, du fait d'une décomposition en série de fonctions périodiques, les fréquences spatiales présentes dans ladite image/représentation. Une telle transformation 8 spectrale peut être toute transformation réalisant une décomposition selon une série de fonctions. Une transformation de ce type couramment utilisée, en ce qu'elle dispose avantageusement d'une implémentation numérique efficace et rapide, est une transformée de fourrier rapide (en anglais : fast fourrier transform, FFT). Une telle transformation peut être monodimensionnelle. Dans le cas d'une transformation 8 applicable à une image, il existe une version bidimensionnelle de cette transformation (transformée de fourrier rapide bidimensionnelle, FT2), qui transforme une représentation 3,4, homogène à une image, en un spectre/transformée 9,10, lui-même homogène à une image. Un point de forte intensité, figuré par un point noir sur les figures, est indicatif d'une période spatiale 6,7, présente dans la représentation 3,4.Such a spectral transformation 8 is characterized in that it highlights in the image/representation to which it is applied, due to a series breakdown of periodic functions, the spatial frequencies present in said image/representation. Such a spectral transformation 8 can be any transformation carrying out a decomposition according to a series of functions. A commonly used transformation of this type, in that it advantageously has an efficient and fast numerical implementation, is a fast fourrier transform (FFT). Such a transformation can be one-dimensional. In the case of an 8-transform applicable to an image, there is a two-dimensional version of this transformation (two-dimensional fast fourier transform, FT2), which transforms a 3,4 representation, homogeneous to an image, into a spectrum/transform 9 ,10, itself homogeneous to an image. A point of strong intensity, represented by a black point in the figures, is indicative of a spatial period 6.7, present in the representation 3.4.

Il est ensuite procédé à une étape de vérification absolue, vérifiant que la valeur de la (ou des) période(s) spatiale(s), au moins les plus remarquables, de référence corresponde(nt) à la valeur de la (ou des) période(s) 6 de la première transformée 9.A verification step is then carried out absolute, verifying that the value of the spatial period(s), at least the most remarkable, of reference correspond(s) to the value of the period(s) 6 of the first transformed 9.

Cette correspondance est vérifiée en s'accordant une tolérance afin de tenir compte des éventuelles erreurs de mesure et/ou de calcul. Il est ainsi vérifié qu'un point de la transformée 9, figurant une période spatiale, correspond bien à une période spatiale de référence, à une tolérance près.This correspondence is checked by agreeing a tolerance in order to take into account any measurement and/or calculation errors. It is thus verified that a point of the transform θ, representing a spatial period, indeed corresponds to a reference spatial period, to within a tolerance.

La valeur de cette tolérance doit pouvoir être configurée afin de tenir compte des performances du capteur optique utilisé. Une tolérance égale à 50 µm peut être employée pour un capteur peu performant. Cependant cette tolérance est choisie aussi petite que possible. Une tolérance préférentiellement égale à 30 µm, et encore préférentiellement égal à 10 µm, est retenue si les performances du capteur le permettent. Dans le cas d'utilisation d'un capteur mobile, tel la caméra d'un smartphone, la valeur du seuil peut être adaptée en fonction de la distance, variable, de prise de vue.The value of this tolerance must be able to be configured in order to take account of the performance of the optical sensor used. A tolerance equal to 50 µm can be used for an inefficient sensor. However, this tolerance is chosen as small as possible. A tolerance preferably equal to 30 μm, and even more preferably equal to 10 μm, is retained if the performance of the sensor allows it. In the case of the use of a mobile sensor, such as the camera of a smartphone, the value of the threshold can be adapted as a function of the distance, which is variable, of shooting.

Cette étape de vérification fréquentielle, permet de vérifier que l'image 2 correspond à l'image d'origine telle que réalisée par l'organisme émetteur du dispositif de sécurité 1, en ce qu'elle comporte bien les fréquences de référence présentes à l'origine. Ceci peut permettre de discriminer une contrefaçon tentant de modifier tout ou partie de l'image 2 sans en respecter lesdites fréquences de référence.This frequency verification step makes it possible to verify that the image 2 corresponds to the original image as produced by the issuing organization of the security device 1, in that it indeed includes the reference frequencies present at the 'origin. This can make it possible to discriminate against a counterfeit attempting to modify all or part of the image 2 without respecting said reference frequencies.

Selon une autre caractéristique, l'image 2 est réalisée de telle manière à être visible selon un premier spectre optique et au moins un deuxième spectre optique. Le premier spectre optique et ledit au moins un deuxième spectre optique sont avantageusement disjoints, deux à deux.According to another characteristic, the image 2 is produced in such a way as to be visible according to a first optical spectrum and at least one second optical spectrum. The first optical spectrum and said at least one second optical spectrum are advantageously separated, two by two.

Il sera détaillé plus avant plusieurs modes de réalisation permettant d'obtenir une telle caractéristique de l'image 2. Il convient de noter que ce qui caractérise le dispositif de sécurité 1 est que, par construction, un même composant constitutif de l'image 2 est visible selon un premier spectre optique et selon au moins un deuxième spectre optique.There will be detailed further several embodiments making it possible to obtain such a characteristic of the image 2. It should be noted that what characterizes the security device 1 is that, by construction, a same constituent component of the image 2 is visible according to a first optical spectrum and according to at least a second optical spectrum.

Il peut encore être noté qu'une telle caractéristique permet au dispositif de sécurité 1 d'être intimement lié avec l'image 2, rendant ainsi toute dissociation quasiment impossible. Un tel dispositif de sécurité 1, s'il est vérifié, authentifie ainsi de manière relativement certaine, son authenticité et son origine, et ainsi l'authenticité et l'origine de l'image 2.It can also be noted that such a characteristic allows the security device 1 to be intimately linked with the image 2, thus making any dissociation almost impossible. Such a security device 1, if it is verified, thus authenticates with relative certainty, its authenticity and its origin, and thus the authenticity and origin of the image 2.

La vérification d'un tel dispositif de sécurité 1 comprend les étapes suivantes, illustrées en référence à la figure 2. Une première étape réalise une acquisition de l'image 2 selon le premier spectre optique pour obtenir une première représentation 3. Une deuxième étape réalise une acquisition de l'image 2 selon le deuxième spectre optique pour obtenir une deuxième représentation 4.The verification of such a security device 1 comprises the following steps, illustrated with reference to picture 2 . A first step acquires image 2 according to the first optical spectrum to obtain a first representation 3. A second step acquires image 2 according to the second optical spectrum to obtain a second representation 4.

Une telle acquisition est réalisée en éclairant l'image 2 avec un éclairage selon le spectre optique souhaité et en réalisant la représentation 3,4 par une acquisition, typiquement au moyen d'un capteur d'image, sensible dans ledit spectre optique souhaité. Le résultat obtenu, soit une représentation 3,4 est une image, pouvant être numérisée et stockée dans une mémoire informatique et classiquement organisée sous forme d'une image, soit une matrice bidimensionnelle de pixels.Such an acquisition is carried out by illuminating the image 2 with lighting according to the desired optical spectrum and by producing the representation 3.4 by an acquisition, typically by means of an image sensor, sensitive in said desired optical spectrum. The result obtained, either a 3.4 representation is an image, which can be digitized and stored in a computer memory and conventionally organized in the form of an image, or a two-dimensional matrix of pixels.

Un spectre optique peut être défini, dans la présente, par au moins une bande de fréquence optique. Un spectre optique peut ainsi être tout ou partie du spectre infrarouge, tout ou partie du spectre X, tout ou partie du spectre ultraviolet, ou encore tout ou partie du spectre visible, ou une combinaison quelconque des précédents.An optical spectrum may be defined herein by at least one optical frequency band. An optical spectrum can thus be all or part of the infrared spectrum, all or part of the X spectrum, all or part of the ultraviolet spectrum, or even all or part of the visible spectrum, or any combination of the preceding.

Ainsi l'obtention d'une représentation 3,4 dans un spectre optique, tel que par exemple le spectre optique infrarouge, suppose un éclairage de l'image 2 par une source couvrant au moins le spectre optique infrarouge souhaité et l'acquisition simultanée de la représentation au moyen d'un capteur, telle une caméra, sensible au moins dans le spectre optique infrarouge souhaité. La représentation obtenue est une image, matrice bidimensionnelle de pixels, où chaque pixel comprend une unique intensité, indicative du rayonnement optique, dans le spectre optique considéré, réfléchi par l'image 2. Une telle représentation 3,4 a généralement la forme d'une image monochrome.Thus obtaining a 3.4 representation in an optical spectrum, such as for example the infrared optical spectrum, supposes illumination of the image 2 by a source covering at least the desired infrared optical spectrum and the simultaneous acquisition of the representation by means of a sensor, such as a camera, sensitive at least in the spectrum desired infrared optics. The representation obtained is an image, a two-dimensional matrix of pixels, where each pixel comprises a unique intensity, indicative of the optical radiation, in the optical spectrum considered, reflected by the image 2. Such a representation 3,4 generally has the form of a monochrome image.

Dans le cas particulier d'un spectre optique comprenant au moins partiellement le spectre optique visible, un pixel peut comprendre plusieurs intensités, indicatives des intensités de couleurs élémentaires. Une représentation 3,4 a alors la forme d'une image polychrome, soit la forme d'une superposition de plusieurs images monochromes, dites images composantes.In the particular case of an optical spectrum comprising at least partially the visible optical spectrum, a pixel can comprise several intensities, indicative of the intensities of elementary colors. A 3.4 representation then has the form of a polychrome image, ie the form of a superposition of several monochrome images, called component images.

Il a été vu que, par construction, un même composant constitutif de l'image 2, forme l'image 2 et est visible selon les différents spectres optiques. Cette caractéristique est mise à profit pour la vérification, qui compare les deux représentations 3,4 afin de vérifier que les deux représentations 3,4 sont graphiquement sensiblement identiques. De plus au cours d'une deuxième étape, il est vérifié que les deux représentations 3,4 ne sont pas décalées l'une par rapport à l'autre, en ce qu'une distance 5 entre les deux représentations 3,4 reste inférieure à un seuil.It has been seen that, by construction, the same constituent component of the image 2, forms the image 2 and is visible according to the different optical spectra. This characteristic is used for verification, which compares the two representations 3.4 in order to verify that the two representations 3.4 are graphically substantially identical. Moreover, during a second step, it is verified that the two representations 3.4 are not offset relative to each other, in that a distance 5 between the two representations 3.4 remains lower at a threshold.

Ainsi, tel qu'illustré à la figure 2, il est vérifié que la première représentation 3 figure un premier motif qui est sensiblement identique graphiquement à un deuxième motif figuré par la deuxième représentation 4.Thus, as illustrated in figure 2 , it is verified that the first representation 3 represents a first pattern which is substantially identical graphically to a second pattern represented by the second representation 4.

Cette première étape vérifiée, il est possible de déterminer une distance entre le premier motif et le deuxième motif et de vérifier que cette distance est inférieure à un seuil.This first step verified, it is possible to determine a distance between the first pattern and the second pattern and to verify that this distance is less than a threshold.

Il s'ensuit que le dispositif de sécurité 1 est vérifié si et seulement si, les deux tests précédents sont validés : le premier motif est graphiquement sensiblement identique au deuxième motif, et la distance entre les deux motifs est inférieure au seuil.It follows that the security device 1 is verified if and only if the two preceding tests are validated: the first pattern is graphically substantially identical to the second pattern, and the distance between the two patterns is less than the threshold.

Tel qu'est conçu le dispositif de sécurité 1, un même composant de l'image 2 est visible selon le premier spectre optique et selon ledit au moins un deuxième spectre optique. Aussi un décalage ou une distance entre les deux représentations 3,4 est théoriquement nul. Afin de tenir compte des imprécisions de mesure et/ou de calcul, une tolérance est introduite sous forme dudit seuil. Cependant ce seuil peut être choisi très petit. Afin de permettre une discrimination entre un dispositif authentique, où l'image visible selon un premier spectre optique est réalisée conjointement et simultanément avec l'image visible selon un deuxième spectre optique, et une éventuelle contrefaçon qui réaliserait, en deux étapes, une première image visible selon un premier spectre optique et une deuxième image visible selon un premier spectre optique, alignée avec la première image, il convient que ledit seuil soit inférieur aux capacités d'alignement (en anglais : registration) des technologies et machines de production actuelles. Un seuil égal à 10 µm, préférentiellement égal à 5 µm, répond à ce besoin, en ce qu'une telle performance d'alignement est inatteignable quelle que soit la technologie employée.As the security device 1 is designed, the same component of the image 2 is visible according to the first spectrum optical and according to said at least one second optical spectrum. Also a shift or distance between the two 3.4 representations is theoretically zero. In order to take account of measurement and/or calculation inaccuracies, a tolerance is introduced in the form of said threshold. However, this threshold can be chosen to be very small. In order to allow discrimination between an authentic device, where the visible image according to a first optical spectrum is produced jointly and simultaneously with the visible image according to a second optical spectrum, and a possible counterfeit which would produce, in two stages, a first image visible according to a first optical spectrum and a second image visible according to a first optical spectrum, aligned with the first image, said threshold should be lower than the alignment capabilities (in English: registration) of current technologies and production machines. A threshold equal to 10 μm, preferably equal to 5 μm, meets this need, in that such alignment performance is unattainable regardless of the technology used.

Il a été vu qu'une première étape de vérification consistait à comparer la première représentation 3 avec la deuxième représentation 4 et à tester l'identité graphique des deux représentations. De nombreuses techniques de traitement d'image sont applicables pour réaliser une telle comparaison.It has been seen that a first verification step consisted in comparing the first representation 3 with the second representation 4 and in testing the graphic identity of the two representations. Numerous image processing techniques are applicable to carry out such a comparison.

Selon un mode de réalisation illustratif, l'identité entre les deux représentations 3,4 peut être vérifiée en identifiant, au moyen d'un algorithme connu de recalage, une transformation permettant de passer d'une représentation 3 à l'autre représentation 4. Dans ce cas la vérification est acquise si ladite transformation est suffisamment proche de la transformation identité. Un avantage de cette approche est que l'identification de la transformation fournit encore, en tant que module de cette transformation, la distance entre les deux représentations 3,4, qui peut alors être comparée au seuil.According to an illustrative embodiment, the identity between the two representations 3,4 can be verified by identifying, by means of a known registration algorithm, a transformation making it possible to pass from one representation 3 to the other representation 4. In this case the verification is acquired if said transformation is sufficiently close to the identity transformation. An advantage of this approach is that the identification of the transformation still provides, as a modulus of this transformation, the distance between the two 3,4 representations, which can then be compared to the threshold.

Dans le cas où l'une au moins des représentations 3,4 est une image polychrome, la comparaison peut être appliquée sur l'une quelconque des images composantes de ladite image polychrome, ou encore après un prétraitement de l'image polychrome afin de la rendre monochrome, par quelque méthode que ce soit (moyenne, saturation, etc...).In the case where at least one of the representations 3.4 is a polychrome image, the comparison can be applied to any of the component images of said polychrome image, or even after preprocessing of the polychrome image in order to make it monochrome, by any method whatsoever (average, saturation, etc.).

Les deux spectres optiques peuvent être quelconques, dès lors que l'on dispose d'un composant, visible simultanément selon ces deux spectres optiques et apte à entrer dans la réalisation de l'image 2.The two optical spectra can be arbitrary, as soon as one has a component, visible simultaneously according to these two optical spectra and capable of entering into the production of image 2.

Avantageusement, afin de permettre certains tests à l'œil nu, un des spectres optiques est situé dans le spectre visible. Un spectre optique inclus dans le spectre visible présente encore l'avantage de simplifier l'éclairage de l'image 2 lors de la réalisation de l'acquisition, puisqu'il peut être réalisé par la lumière du jour ou encore par tout type d'éclairage artificiel habituel.Advantageously, in order to allow certain tests with the naked eye, one of the optical spectra is situated in the visible spectrum. An optical spectrum included in the visible spectrum also has the advantage of simplifying the illumination of image 2 when performing the acquisition, since it can be performed by daylight or even by any type of light. usual artificial lighting.

L'utilisation du spectre visible est encore avantageuse en ce qu'elle permet d'obtenir une représentation polychrome. Comme il est décrit plus avant, la polychromie peut fournir une vérification supplémentaire.The use of the visible spectrum is further advantageous in that it makes it possible to obtain a polychrome representation. As described above, polychromy can provide additional verification.

Alternativement, un des spectres optiques peut être situé dans l'ultraviolet, UV.Alternatively, one of the optical spectra can be located in the ultraviolet, UV.

Alternativement, un des spectres optiques peut être situé dans l'infrarouge, IR.Alternatively, one of the optical spectra can be located in the infrared, IR.

De tels spectres optiques, non situés dans le visible, améliorent la sécurité en ce que leur utilisation n'est pas nécessairement détectée par un contrefacteur. Ils compliquent légèrement l'étape de vérification en ce qu'un éclairage et un moyen d'acquisition spécifique sont nécessaires. Cependant il convient de noter, dans le cas d'un document identitaire 20, que les officines de contrôle, tels les postes frontières, sont le plus souvent déjà équipés de scanners aptes à réaliser une acquisition IR ou UV.Such optical spectra, not located in the visible, improve security in that their use is not necessarily detected by a counterfeiter. They slightly complicate the verification step in that lighting and a specific means of acquisition are necessary. However, it should be noted, in the case of an identity document 20, that the control offices, such as border posts, are most often already equipped with scanners capable of carrying out an IR or UV acquisition.

Les modes de réalisation de l'image 2, permettant qu'elle soit visible selon au moins deux spectres optiques, sont détaillés plus avant.The embodiments of the image 2, allowing it to be visible according to at least two optical spectra, are detailed further.

Certains de ces modes de réalisation contribuent, intrinsèquement ou artificiellement, à doter l'image 2 d'une signature fréquentielle, de manière à ce qu'elle comprenne au moins une période spatiale.Some of these embodiments contribute, intrinsically or artificially, to providing the image 2 with a frequency signature, so that it includes at least least one space period.

Il a été vu précédemment que la signature fréquentielle d'une image 2 peut être vérifiée de manière absolue.It was seen previously that the frequency signature of an image 2 can be checked absolutely.

Lorsque l'image 2 est visible selon au moins deux spectres optiques, il est encore possible d'appliquer une vérification relative. Pour cela, il est encore appliqué la même transformation 8 à la deuxième représentation 4. Ceci permet d'obtenir une deuxième transformée 10.When the image 2 is visible according to at least two optical spectra, it is still possible to apply a relative verification. For this, the same transformation 8 is again applied to the second representation 4. This makes it possible to obtain a second transform 10.

A partir de ces transformées 9,10, il peut être vérifié que la première transformée 9 est sensiblement égale à la deuxième transformée 10.From these transforms 9,10, it can be verified that the first transform 9 is substantially equal to the second transform 10.

Cette égalité peut être testée selon de nombreuses méthodes. Si les transformées 9,10 sont des images, il est possible de leur appliquer toutes les méthodes de comparaison d'image, telles que la méthode précédemment décrite pour comparer les représentations et vérifier qu'elles sont identiques (identification du recalage).This equality can be tested by many methods. If the 9,10 transforms are images, it is possible to apply all the image comparison methods to them, such as the method previously described for comparing the representations and verifying that they are identical (identification of the registration).

Dans tous les cas, les transformées 9,10 figurent des points caractéristiques des périodes remarquables. Il est possible d'utiliser des méthodes extrayant un ensemble des p périodes les plus remarquables pour chacune des transformées 9,10 et de comparer les p périodes de chacun des ensembles. On considère que deux transformées sont égales si au moins une certaines parties des périodes remarquables d'une transformée 9 se retrouvent dans l'ensemble des périodes remarquables de l'autre transformée 10.In all cases, the 9,10 transforms represent characteristic points of the remarkable periods. It is possible to use methods extracting a set of the most remarkable p periods for each of the transforms 9,10 and to compare the p periods of each of the sets. It is considered that two transforms are equal if at least some parts of the remarkable periods of a transform 9 are found in the set of remarkable periods of the other transform 10.

Si une égalité est trouvée, l'étape de vérification est positive et le dispositif de sécurité 1 est réputé vérifié et donc valide. A défaut, l'étape de vérification est négative et le dispositif de sécurité 1 et/ou son authenticité sont mis en doute.If an equality is found, the verification step is positive and the security device 1 is deemed verified and therefore valid. Otherwise, the verification step is negative and the security device 1 and/or its authenticity are in doubt.

L'étape de vérification précédente est relative en ce qu'elle compare les transformées 9,10 respectives des deux représentations 3,4. Ceci permet de vérifier que l'image 2 a bien été réalisée conjointement, pour sa partie 3 visible selon un premier spectre optique et pour sa partie 4 visible selon au moins un deuxième spectre optique, et que l'on retrouve sensiblement les mêmes spectres fréquentiels dans les deux représentations 3,4, indicatifs de la présence d'une même signature fréquentielle 5 d'origine.The previous verification step is relative in that it compares the respective 9,10 transforms of the two 3,4 representations. This makes it possible to verify that the image 2 has indeed been produced jointly, for its part 3 visible according to a first optical spectrum and for its part 4 visible according to at least a second optical spectrum, and that one finds substantially the same frequency spectra in the two representations 3.4, indicative of the presence of the same original frequency signature 5.

L'étape de vérification absolue, réalisée pour la première transformée 9, peut encore être appliquée à la deuxième transformée 10, afin de vérifier que la (ou les) période(s), au moins les plus remarquables de référence sont bien présentes dans la (ou les) période (s) 7 de la deuxième transformée (10). Cette deuxième étape de vérification fréquentielle, permet de vérifier que la périodicité particulière de l'image 2 correspond à celle réalisée par l'organisme émetteur du dispositif de sécurité 1.The absolute verification step, carried out for the first transform 9, can also be applied to the second transform 10, in order to verify that the period(s), at least the most remarkable of reference are indeed present in the (or the) period(s) 7 of the second transform (10). This second step of frequency verification makes it possible to verify that the particular periodicity of the image 2 corresponds to that carried out by the body issuing the security device 1.

Selon un premier mode de réalisation, la transformation 8 spectrale est appliquée à la totalité de la première représentation 3 et/ou, de même, à la totalité de la deuxième représentation 4.According to a first embodiment, the spectral transformation 8 is applied to the whole of the first representation 3 and/or, likewise, to the whole of the second representation 4.

Alternativement, selon un autre mode de réalisation, la transformation 8 spectrale est appliquée à au moins une partie de la première représentation 3 et sur la même au moins une partie de la deuxième représentation 4. Chacune des transformées partielles peut alors être comparée, à une transformée partielle de l'autre représentation, par exemple à la transformée partielle correspondante, cette comparaison pouvant être réalisée partie à partie, mais pas nécessairement, et/ou à une autre transformée partielle de la même représentation.Alternatively, according to another embodiment, the spectral transformation 8 is applied to at least part of the first representation 3 and to the same at least part of the second representation 4. Each of the partial transforms can then be compared, with a partial transform of the other representation, for example with the corresponding partial transform, this comparison being able to be carried out part by part, but not necessarily, and/or with another partial transform of the same representation.

Un intérêt d'une vérification utilisant une transformation spectrale 8 va maintenant être illustré en relation avec la figure 4.An interest of a verification using a spectral transformation 8 will now be illustrated in relation to the figure 4 .

Il est supposé qu'une image 2 est contrefaite afin d'en modifier au moins une partie l1. Ainsi, tel qu'illustré à la figure 4, une partie 11 modifiée vise à modifier les yeux sur une photo d'identité. Alors que l'image d'origine 2 et donc sa représentation 3 comporte une signature fréquentielle 5, la partie 11 modifiée, que ce soit par ajout ou par remplacement, quelle que soit la technologie employée, a toutes les chances de présenter une signature fréquentielle 5' différente de la signature fréquentielle d'origine 5, y compris le cas où aucune signature fréquentielle 5' n'est présente. Aussi une comparaison des transformées 9,10 spectrales, réalisées sur tout ou partie d'une représentation 3,4 fait nécessairement apparaître une différence détectable.It is assumed that an image 2 is counterfeited in order to modify at least a part l1 of it. Thus, as illustrated in figure 4 , a modified part 11 aims to modify the eyes on a photo ID. While the original image 2 and therefore its representation 3 comprises a frequency signature 5, the modified part 11, whether by addition or by replacement, whatever the technology used, has every chance of presenting a frequency signature 5' different from the original frequency signature 5, y including the case where no 5' frequency signature is present. Also a comparison of the 9,10 spectral transforms, carried out on all or part of a 3,4 representation necessarily reveals a detectable difference.

Il va maintenant être décrit plusieurs modes de réalisation permettant d'obtenir une image 2 comprenant un dispositif de sécurité 1 visible selon un premier spectre optique et selon au moins un deuxième spectre optique.There will now be described several embodiments making it possible to obtain an image 2 comprising a security device 1 visible according to a first optical spectrum and according to at least a second optical spectrum.

Selon un premier mode de réalisation, un dispositif de sécurité 1 peut être, de manière connue, une image 2 réalisée par gravure laser monochrome. Un tel dispositif de sécurité 1 est connu et largement répandu dans le domaine technique. Le principe est de disposer une couche sensible au laser, dans laquelle il est possible de réaliser, au moyen d'un faisceau laser, une carbonisation localisée. Il est ainsi possible, au moyen d'un laser, de dessiner et de réaliser une image 2. Ce mode de réalisation permet de réaliser une image, nécessairement monochrome, telle une photo d'identité. Il est connu qu'un point de l'image 2, noirci par le laser, est visible dans un premier spectre optique : le spectre visible et que de plus un point de l'image 2 est encore visible selon un deuxième spectre optique : le spectre infrarouge.According to a first embodiment, a security device 1 can be, in known manner, an image 2 produced by monochrome laser engraving. Such a safety device 1 is known and widely used in the technical field. The principle is to arrange a layer sensitive to the laser, in which it is possible to carry out, by means of a laser beam, a localized carbonization. It is thus possible, by means of a laser, to draw and produce an image 2. This embodiment makes it possible to produce an image, necessarily monochrome, such as an identity photo. It is known that a point of image 2, blackened by the laser, is visible in a first optical spectrum: the visible spectrum and that moreover a point of image 2 is still visible according to a second optical spectrum: the infrared spectrum.

Il convient de remarquer ici que cette propriété de visibilité selon au moins deux spectres optiques est connue est exploitée par les contrôleurs. Il est vérifié, pour une image obtenue par gravure laser monochrome que l'image est visible dans le spectre optique visible et que, de plus, l'image est visible dans le spectre optique IR. Ceci permet au contrôleur de vérifier qu'il est bien en présence d'une image réalisée par gravure laser monochrome. Cependant aujourd'hui, cette vérification est uniquement humaine et qualitative : le contrôleur vérifie visuellement qu'une image peut être vue, selon les deux spectres optiques. Cependant l'art antérieur ne vérifie ni que les deux représentations 3,4 sont identiques, ni que leur distance est inférieure à un seuil. L'invention, qui apporte une approche quantitative, permet avantageusement que ces deux opérations puissent être réalisées automatiquement, avec beaucoup plus de précision, en incluant la prise de décision.It should be noted here that this property of visibility according to at least two optical spectra is known and exploited by the controllers. It is verified, for an image obtained by monochrome laser etching, that the image is visible in the visible optical spectrum and that, moreover, the image is visible in the IR optical spectrum. This allows the controller to verify that it is indeed in the presence of an image produced by monochrome laser engraving. However today, this verification is only human and qualitative: the controller visually verifies that an image can be seen, according to the two optical spectra. However, the prior art does not check either that the two representations 3.4 are identical, or that their distance is less than a threshold. The invention, which provides a quantitative approach, advantageously allows these two operations to be carried out automatically, with much more precision, including decision making.

Selon un autre mode de réalisation, un dispositif de sécurité 1 peut être une image 2 réalisée par gravure laser couleur. Pour cela, un dispositif de sécurité 1 comprend un arrangement comprenant une matrice de couleur. La matrice de couleur est un tableau de pixel, chaque pixel comprenant au moins deux sous-pixels de couleurs avantageusement élémentaires et différentes. Selon un premier mode de réalisation la matrice de couleur est sensible au laser, un tir laser permettant sélectivement pour chaque pixel, d'exprimer une teinte par combinaison des couleurs élémentaires des sous-pixels. Selon un autre mode de réalisation, la matrice de couleur est insensible au laser, et ledit arrangement comprend au moins une couche sensible au laser. Ladite au moins une couche sensible est disposée au-dessus et/ou en-dessous de la matrice de couleur. Une gravure laser, selon la technologie monochrome précédemment décrite, permet de réaliser, dans ladite au moins une couche sensible, un masque monochrome, permettant sélectivement pour chaque pixel d'exprimer une teinte par combinaison des couleurs élémentaires des sous-pixels.According to another embodiment, a security device 1 can be an image 2 produced by color laser engraving. For this, a security device 1 comprises an arrangement comprising a color matrix. The color matrix is an array of pixels, each pixel comprising at least two sub-pixels of advantageously elementary and different colors. According to a first embodiment, the color matrix is sensitive to the laser, a laser firing allowing selectively, for each pixel, to express a hue by combining the elementary colors of the sub-pixels. According to another embodiment, the color matrix is insensitive to the laser, and said arrangement comprises at least one layer sensitive to the laser. Said at least one sensitive layer is arranged above and/or below the color matrix. Laser etching, according to the monochrome technology described above, makes it possible to produce, in said at least one sensitive layer, a monochrome mask, allowing each pixel to selectively express a hue by combining the elementary colors of the sub-pixels.

Ces deux modes de réalisation permettent la réalisation d'une image en couleur par gravure laser. Ici encore, le point carbonisé par laser constitutif de l'image 2 est simultanément visible dans le spectre optique visible et dans le spectre optique IR. Il s'agit donc d'un même composant, qui est ainsi nécessairement situé au même endroit dans la première représentation 3 ou dans la deuxième représentation 4.These two embodiments allow the production of a color image by laser engraving. Here again, the point carbonized by laser constituting image 2 is simultaneously visible in the visible optical spectrum and in the IR optical spectrum. It is therefore the same component, which is thus necessarily located at the same place in the first representation 3 or in the second representation 4.

Selon encore un autre mode de réalisation, un dispositif de sécurité 1 peut être une image 2 réalisée par une technique d'impression. La technique d'impression peut être n'importe quelle technique d'impression : offset, sérigraphie, retransfert, sublimation, jet d'encre, etc..., tant qu'elle utilise une encre comprenant au moins un composant visible selon le premier spectre optique et le deuxième spectre optique. Ce composant, intégré dans l'encre, détermine ainsi selon quels spectres optiques l'image 2 peut être vue. Une image 2 peut ainsi être invisible dans le spectre visible, mais être visible dans l'IR et dans l'UV. L'impression de l'image 2 crée des points d'image qui sont simultanément visibles selon les au moins deux spectres optiques. Ici encore, un point image est un unique composant, nécessairement situé au même endroit dans la première représentation 3 ou dans la deuxième représentation 4.According to yet another embodiment, a security device 1 can be an image 2 produced by a printing technique. The printing technique can be any printing technique: offset, screen printing, retransfer, sublimation, inkjet, etc..., as long as it uses an ink comprising at least one visible component according to the first optical spectrum and the second optical spectrum. This component, integrated in the ink, thus determines according to which optical spectra the image 2 can be seen. An image 2 can thus be invisible in the visible spectrum, but be visible in the IR and in the UV. The printing of image 2 creates image points which are simultaneously visible according to the at least two optical spectra. Here again, an image point is a single component, necessarily located at the same place in the first representation 3 or in the second representation 4.

Une technique simplificatrice de contrefaçon consiste à réaliser une image 2 en monochrome. Ainsi un contrefacteur peut être tenté de réaliser une image 2 monochrome, plus simple à fabriquer ou nécessitant un outillage plus simple. Ainsi une impression polychrome peut être remplacée par une impression monochrome. De même un contrefacteur peut être équipé d'un laser de gravure monochrome, et maitriser cette technologie déjà assez ancienne, et être tenté de remplacer une image 2 couleur créée par gravure laser, dont la technologie très récente est encore peu diffusée et vraisemblablement difficilement accessible à un contrefacteur, par une image 2 monochrome créée par gravure laser.A simplifying technique of counterfeiting consists in producing an image 2 in monochrome. Thus a counterfeiter may be tempted to produce a monochrome image 2, which is simpler to manufacture or requires simpler tools. Thus a polychrome print can be replaced by a monochrome print. Similarly, a counterfeiter can be equipped with a monochrome engraving laser, and master this technology, which is already quite old, and be tempted to replace a 2 color image created by laser engraving, whose very recent technology is still not widely available and probably difficult to access. to a counterfeiter, by a monochrome image 2 created by laser engraving.

Aussi, et pour peu que le dispositif de sécurité 1 authentique comprenne une image en couleur et que l'un au moins des spectres optiques soit le spectre visible, le procédé de vérification peut avantageusement comprendre une étape supplémentaire vérifiant que les deux représentations 3,4 sont colorimétriquement différentes. Ainsi, typiquement, une des représentations figure une acquisition polychrome de l'image 2 et l'autre représentation, par exemple parce qu'elle est visible dans un spectre optique situé hors du spectre visible, figure une acquisition monochrome. Cette étape de vérification, contrôle une présence effective de couleur l'une des représentations. Les représentations 3,4 sont ici colorimétriquement différentes, même si elles sont graphiquement identiques (même motif).Also, and provided that the authentic security device 1 includes a color image and that at least one of the optical spectra is the visible spectrum, the verification method can advantageously include an additional step verifying that the two representations 3,4 are colorimetrically different. Thus, typically, one of the representations represents a polychrome acquisition of the image 2 and the other representation, for example because it is visible in an optical spectrum situated outside the visible spectrum, represents a monochrome acquisition. This verification step checks an effective presence of color in one of the representations. The 3.4 representations are here colorimetrically different, even if they are graphically identical (same pattern).

La différence colorimétrique peut être vérifiée par toute méthode de traitement colorimétrique. Selon un mode de réalisation possible, les représentations 3,4 peuvent être modélisées selon un modèle colorimétrique CIE Lab. Il peut alors être vérifié que la représentation réputée être en couleur présente effectivement des valeurs des coefficients a,b généralement élevées, alors que la représentation réputée être monochrome, est grise, et présente des valeurs des coefficients a,b faibles. Une approche analogue pourrait utiliser une conversion des représentations 3,4 selon un modèle HLS, et une observation de la valeur de la saturation S.The colorimetric difference can be checked by any colorimetric processing method. According to a possible embodiment, the 3,4 representations can be modeled according to a CIE Lab colorimetric model. he can it can then be verified that the representation reputed to be in color actually has generally high values of the coefficients a,b, whereas the representation reputed to be monochrome, is gray, and has low values of the coefficients a,b. An analogous approach could use a conversion of the 3,4 representations according to an HLS model, and an observation of the value of the saturation S.

Il a été vu au moins trois modes de réalisation d'un dispositif de sécurité 1 visible selon au moins deux spectres optiques : gravure laser monochrome, gravure laser couleur et impression avec encre spéciale.At least three embodiments of a security device 1 visible according to at least two optical spectra have been seen: monochrome laser engraving, color laser engraving and printing with special ink.

Une image 2 réalisée par gravure laser monochrome comprend une signature fréquentielle 5, du fait que les tirs lasers sont réalisés selon une matrice de tir. Une telle matrice de tir, par exemple rectangulaire, est avantageusement périodique. Il apparait donc, spatialement, au moins une période 6,7, par dimension. Dans le cas d'une matrice rectangulaire, il peut ainsi apparaître une période 6,7 selon un premier axe et une deuxième période 6,7 selon l'autre axe de la matrice.An image 2 made by monochrome laser engraving includes a frequency signature 5, because the laser shots are made according to a shot matrix. Such a firing matrix, for example rectangular, is advantageously periodic. It therefore appears, spatially, at least one period 6.7, per dimension. In the case of a rectangular matrix, there may thus appear a period 6.7 along a first axis and a second period 6.7 along the other axis of the matrix.

Aussi si l'on applique une transformation 8 spectrale à une représentation 3,4 issue d'une telle image 2, la transformée 9 de la représentation 3 est égale à la transformée 10 de la représentation 4. Cette transformation 8 spectrale fait apparaître, et ce pour les deux spectres optiques, au moins les deux périodes 6,7. Si la matrice rectangulaire est orientée parallèle à l'image 2, et que la transformation 8 spectrale est une FFT2, il apparaitra au moins un premier point 6,7 sur l'axe des ordonnées, représentatif de la période selon l'axe des abscisses et au moins un deuxième point sur l'axe de abscisses, représentatif de la période selon l'axe des ordonnées.Also if we apply a spectral transformation 8 to a 3.4 representation resulting from such an image 2, the transform 9 of representation 3 is equal to the transform 10 of representation 4. This spectral transformation 8 reveals, and this for the two optical spectra, at least the two periods 6.7. If the rectangular matrix is oriented parallel to image 2, and the spectral transformation 8 is an FFT2, there will appear at least a first point 6.7 on the ordinate axis, representative of the period along the abscissa axis and at least one second point on the abscissa axis, representative of the period along the ordinate axis.

Une image réalisée par gravure laser couleur comprend intrinsèquement, le plus souvent, une signature fréquentielle 5 en ce que l'arrangement permettant de graver une telle image 2 en couleur comprend une matrice de couleur. Bien que cela ne soit pas une obligation, afin de faciliter la gravure, les pixels et les sous-pixels comprenant les couleurs sont avantageusement disposés dans ladite matrice de couleur de manière périodique. Il est ainsi possible de trouver, selon au moins une dimension, une période principale 6,7 correspondant à la distance entre les pixels. De plus, chaque pixel comprend un nombre n, au moins égal à 2, et classiquement égal à 4 (Cyan, Magenta, Jaune, Noir), de sous-pixels comprenant chacun une couleur de base. Ces n couleurs sont avantageusement spatialement équitablement réparties, formant ainsi une période spatiale secondaire n-sous-multiple de la période principale 6,7.An image produced by color laser engraving intrinsically comprises, most often, a frequency signature 5 in that the arrangement making it possible to engrave such an image 2 in color comprises a color matrix. Although this is not an obligation, in order to facilitate the engraving, the pixels and the sub-pixels comprising the colors are advantageously arranged in said color matrix periodically. It is thus possible to find, according to at least one dimension, a main period 6.7 corresponding to the distance between the pixels. In addition, each pixel comprises a number n, at least equal to 2, and conventionally equal to 4 (Cyan, Magenta, Yellow, Black), of sub-pixels each comprising a basic color. These n colors are advantageously spatially equitably distributed, thus forming a secondary spatial period n-sub-multiple of the main period 6.7.

Selon un mode de réalisation, la matrice de couleur est arrangée en lignes, par exemple horizontales, alternant selon une séquence avantageusement identiquement répétée les n couleurs.According to one embodiment, the color matrix is arranged in lines, for example horizontal, alternating according to a sequence advantageously identically repeated the n colors.

La matrice de couleur n'est théoriquement visible que dans le spectre optique visible. Cependant, des points réalisés par gravure laser sont visibles d'une part dans le spectre optique visible et d'autre part dans le spectre optique infrarouge, IR. Aussi, dans une image 2 gravée, les points gravés étant nécessairement disposés selon la matrice de couleur, vont permettre de faire apparaître les périodes spatiales principale 6,7 et secondaire de la matrice de couleur. Cette caractéristique suppose que la densité de points gravés soit suffisante. Ceci est le cas pour une image complexe et particulièrement pour une photographie. Les périodes spatiales principale 6,7 et secondaire apparaissent, tant dans la première transformée 9 issue d'une représentation 3 selon un premier spectre optique, ici le spectre visible, que dans la deuxième transformée 10 issue d'une représentation 4 selon un deuxième spectre optique, ici le spectre IR.The color matrix is theoretically visible only in the visible optical spectrum. However, dots produced by laser etching are visible on the one hand in the visible optical spectrum and on the other hand in the infrared, IR optical spectrum. Also, in an engraved image 2, the engraved points being necessarily arranged according to the color matrix, will make it possible to show the main 6.7 and secondary spatial periods of the color matrix. This characteristic assumes that the density of engraved points is sufficient. This is the case for a complex image and particularly for a photograph. The main 6.7 and secondary spatial periods appear, both in the first transform 9 resulting from a representation 3 according to a first optical spectrum, here the visible spectrum, and in the second transform 10 resulting from a representation 4 according to a second spectrum optical, here the IR spectrum.

Pour un dispositif de sécurité 1 authentique, la même signature fréquentielle 5 issue de la matrice de couleur est révélée et mise en évidence par les points gravés et les deux transformées 9,10 doivent être sensiblement identiques. De plus les périodes 6,7 mises en évidence par la transformation 8 spectrale doivent correspondre aux périodes principale et le cas échéant secondaire de référence de la signature fréquentielle 5, telle que fabriquée.For an authentic security device 1, the same frequency signature 5 from the color matrix is revealed and highlighted by the engraved dots and the two transforms 9,10 must be substantially identical. Moreover, the periods 6.7 highlighted by the spectral transformation 8 must correspond to the main periods and where applicable, the secondary reference of the frequency signature 5, as manufactured.

Une image 2 réalisée par un procédé d'impression ne comprend pas nécessairement de signature fréquentielle 5. Cependant, certains procédés de réalisation peuvent induire un arrangement périodique des points qui forme alors une signature fréquentielle 5, dont au moins une période spatiale 6,7 est la distance entre les points. Ce motif périodique forme ainsi une signature fréquentielle 5 qui peut alors être utilisée pour vérifier le dispositif de sécurité 1 en appliquant une transformation spectrale 8.An image 2 produced by a printing process does not necessarily include a frequency signature 5. However, certain production methods can induce a periodic arrangement of the points which then forms a frequency signature 5, of which at least one spatial period 6.7 is the distance between the points. This periodic pattern thus forms a frequency signature 5 which can then be used to verify the security device 1 by applying a spectral transformation 8.

Selon un autre mode de réalisation, il est encore possible d'inclure dans l'image 2 une signature fréquentielle additionnelle, volontairement ajoutée, par impression d'un motif périodique. Il est ainsi possible d'insérer une signature fréquentielle 5, dans une image 2, en remplaçant certains points ou lignes, avantageusement périodiquement disposés, par une couleur donnée. Ainsi, à l'instar d'une matrice de couleur apte à permettre la réalisation d'une image couleur par gravure laser, ou encore pour tenter de simuler une telle matrice, il est possible de modifier une image 2 en remplaçant une ligne sur p par une ligne noire. Ceci modifie suffisamment peu l'image 2 pour qu'elle reste exploitable, tout en lui conférant une signature fréquentielle 5 utilisable pour les besoins d'une vérification après application d'une transformation 8 spectrale.According to another embodiment, it is also possible to include in the image 2 an additional frequency signature, voluntarily added, by printing a periodic pattern. It is thus possible to insert a frequency signature 5, in an image 2, by replacing certain points or lines, advantageously periodically arranged, with a given color. Thus, like a color matrix capable of allowing the production of a color image by laser engraving, or even to attempt to simulate such a matrix, it is possible to modify an image 2 by replacing a line on p by a black line. This modifies the image 2 sufficiently little for it to remain usable, while giving it a frequency signature 5 usable for the purposes of verification after application of a spectral transformation 8 .

Si de plus une image 2 est imprimée avec une encre spéciale, il est possible de vérifier la présence, l'identité et la distance des deux représentations 3,4 issues d'acquisitions selon au moins deux spectres optiques. Si l'image 2, ou au moins ladite signature fréquentielle 5 additionnelle est imprimée avec une encre spéciale, la signature fréquentielle 5 ainsi réalisée est visible selon au moins deux spectres optiques et doit être présente dans les deux transformées 9,10 issues de ces deux représentations 3,4, ces deux transformées étant alors égales.If moreover an image 2 is printed with a special ink, it is possible to verify the presence, the identity and the distance of the two representations 3,4 resulting from acquisitions according to at least two optical spectra. If the image 2, or at least said additional frequency signature 5 is printed with a special ink, the frequency signature 5 thus produced is visible according to at least two optical spectra and must be present in the two transforms 9,10 resulting from these two representations 3.4, these two transforms then being equal.

Selon une autre caractéristique l'image 2 représente une partie du corps d'un titulaire associé au dispositif de sécurité 1. Le procédé de vérification peut encore comprendre les étapes suivantes. Une première étape consiste en une acquisition d'une image de ladite partie du corps auprès du porteur du dispositif de sécurité 1. Une deuxième étape réalise une vérification que cette image acquise correspond biométriquement à l'image 2 du dispositif de sécurité 1. L'image 2 du dispositif de sécurité 1 est réputée être une représentation du titulaire autorisé. Aussi si une correspondance biométrique peut être vérifiée entre une acquisition en direct auprès du porteur accompagnant le dispositif de sécurité 1, il peut être assumé que le porteur est bien le titulaire qu'il prétend être.According to another characteristic, image 2 represents a part of the body of a holder associated with the security device 1. The verification method may further comprise the following steps. A first step consists of acquiring an image of said part of the body from the wearer of the security device 1. A second step verifies that this acquired image corresponds biometrically to the image 2 of the security device 1. image 2 of security device 1 is deemed to be a representation of the authorized holder. Also if a biometric match can be verified between a direct acquisition from the bearer accompanying the security device 1, it can be assumed that the bearer is indeed the holder he claims to be.

Si l'image 2 est visible selon deux spectres optiques, la vérification peut être doublée, en vérifiant que l'image acquise 13 correspond biométriquement à la première représentation 3, et/ou en vérifiant que l'image acquise 13 correspond biométriquement à la deuxième représentation 4.If the image 2 is visible according to two optical spectra, the verification can be doubled, by verifying that the acquired image 13 corresponds biometrically to the first representation 3, and/or by verifying that the acquired image 13 corresponds biometrically to the second representation 4.

Il est ici utilisé le terme de correspondance biométrique car une telle étape, comparant une acquisition en direct auprès du porteur et une image 2, associée au dispositif de sécurité 1, issue d'une acquisition ayant été réalisée lors de la délivrance, pouvant être relativement ancienne, et l'apparence du porteur ayant pu évoluer, est nécessairement plus complexe qu'une vérification d'identité entre deux images. Les techniques de correspondance biométriques sont supposées connues.The term biometric correspondence is used here because such a step, comparing a direct acquisition from the wearer and an image 2, associated with the security device 1, resulting from an acquisition having been carried out during the issue, can be relatively old, and the wearer's appearance may have changed, is necessarily more complex than verifying identity between two images. Biometric matching techniques are assumed to be known.

Ceci s'applique par exemple au cas où la partie du corps est le visage, l'image 2 représentant alors une photographie d'identité du porteur d'un document identitaire 20 associé au dit dispositif de sécurité 1. Selon un autre mode de réalisation, il peut encore s'agir de l'œil, de l'un des doigts ou de toute autre partie du corps.This applies for example to the case where the part of the body is the face, the image 2 then representing an identity photograph of the bearer of an identity document 20 associated with said security device 1. According to another embodiment , it can still be the eye, one of the fingers or any other part of the body.

Le procédé de vérification combine ainsi plusieurs étapes de vérification ciblant différents aspects d'un contrôle. Il est vérifié que l'image 2 est authentique, et n'a pu être modifiée depuis la délivrance du dispositif de sécurité 1. Il est de plus vérifié que le porteur correspond au titulaire. Les garanties apportées par chacune de ces vérifications renforcent la sécurité du dispositif de sécurité 1.The verification process thus combines several verification steps targeting different aspects of a control. It is checked that the image 2 is authentic, and could not be modified since the delivery of the security device 1. It is also checked that the bearer corresponds to the holder. The guarantees provided by each of these checks reinforce the security of the security device 1.

Selon une autre caractéristique, le dispositif de sécurité 1 est associé à un moyen de stockage numérique comprenant une représentation numérique de l'image 2. Un tel moyen de stockage est typiquement un dispositif sécurisé (en anglais : secure device, SD) proposant des services d'accès à une mémoire interne, de manière sécurisée, tel un microcircuit. La représentation numérique de l'image 2 a été préalablement stockée, de manière contrôlée, par l'autorité de délivrance du dispositif de sécurité 1. Elle est donc réputée être une représentation du titulaire. La sécurisation garantit qu'elle n'a pas été modifiée.According to another characteristic, the security device 1 is associated with a digital storage means comprising a digital representation of the image 2. Such a storage means is typically a secure device (in English: secure device, SD) offering services access to an internal memory, in a secure manner, such as a microcircuit. The digital representation of the image 2 has been stored beforehand, in a controlled manner, by the issuing authority of the security device 1. It is therefore deemed to be a representation of the holder. Securing guarantees that it has not been modified.

Une telle caractéristique permet de redonder le dispositif de sécurité 1 et de compléter le procédé de vérification en ajoutant une autre vérification au moyen des étapes suivantes. Selon une première étape la représentation numérique de l'image 2 est lue depuis le moyen de stockage. Selon une deuxième étape le procédé compare la représentation numérique avec l'une et/ou les deux représentations 3,4. La vérification est réputée acquise si la représentation numérique est sensiblement identique à toutes les représentations 3,4 auxquelles elle est comparée.Such a characteristic makes it possible to redundant the security device 1 and to complete the verification method by adding another verification by means of the following steps. According to a first step, the digital representation of the image 2 is read from the storage means. According to a second step, the method compares the digital representation with one and/or both representations 3,4. Verification is deemed acquired if the digital representation is substantially identical to all the representations 3.4 with which it is compared.

Si une acquisition d'une image du porteur est réalisée, il est encore possible d'ajouter une autre vérification en testant une correspondance biométrique entre ladite image acquise auprès du porteur et la représentation numérique de l'image 2 issue du moyen de stockage.If an acquisition of an image of the wearer is carried out, it is still possible to add another verification by testing a biometric correspondence between said image acquired from the wearer and the digital representation of the image 2 coming from the storage means.

Les différentes caractéristiques du procédé de vérification ayant été détaillées, la description va maintenant être complétée au moyen de cas d'utilisation, permettant de mettre en évidence les capacités discriminantes de chacune de vérifications.The different characteristics of the verification process having been detailed, the description will now be completed by means of use cases, making it possible to highlight the discriminating capacities of each of the verifications.

Cas d'utilisation A - dispositif authentiqueUse case A - genuine device

Un document identitaire 20 authentique comprenant une image 2 figurant une photo d'identité réalisée par gravure laser couleur et un microcircuit contenant une représentation numérique de la photo d'identité est contrôlé.An authentic identity document 20 comprising an image 2 representing an identity photo produced by color laser engraving and a microcircuit containing a representation digital photo ID is checked.

Le procédé de vérification effectue une acquisition, avantageusement en couleur, de l'image 2 selon un spectre visible pour obtenir une première représentation 3, une acquisition, monochrome, de l'image 2 selon un spectre IR pour obtenir une deuxième représentation 4, une acquisition directe, avantageusement couleur, du visage du porteur et extrait une représentation numérique du microcircuit.The verification method carries out an acquisition, advantageously in color, of the image 2 according to a visible spectrum to obtain a first representation 3, a monochrome acquisition of the image 2 according to an IR spectrum to obtain a second representation 4, a direct acquisition, advantageously in color, of the wearer's face and extracts a digital representation of the microcircuit.

Une première vérification confirme que la première représentation 3 (visible) est graphiquement identique et peu distante de la deuxième représentation 4 (IR).A first verification confirms that the first representation 3 (visible) is graphically identical and not far from the second representation 4 (IR).

Une deuxième vérification confirme que l'acquisition directe correspond biométriquement à la première représentation 3 (visible), et correspond biométriquement à la deuxième représentation 4 (IR).A second verification confirms that the direct acquisition corresponds biometrically to the first representation 3 (visible), and corresponds biometrically to the second representation 4 (IR).

Une troisième vérification confirme que la représentation numérique issue du microcircuit est identique à la première représentation 3 (visible), est identique la deuxième représentation 4 (IR), et correspond biométriquement à l'acquisition directe.A third check confirms that the digital representation from the microcircuit is identical to the first representation 3 (visible), is identical to the second representation 4 (IR), and biometrically corresponds to the direct acquisition.

Une quatrième vérification applique une transformation spectrale 8 à la représentation 3, avantageusement rendue monochrome, et à la représentation 4, compare les deux transformées 9,10 obtenues pour vérifier leur égalité et vérifie que les périodes spatiales 6,7 détectées sont les périodes de la signature fréquentielle 5 de la matrice de couleur utilisée. La présence de la signature fréquentielle 5 de la matrice de couleur originale, visible tant dans le spectre visible que dans le spectre IR assure que les deux transformées 9,10 sont égales et que leurs périodes 6,7 correspondent aux périodes de la matrice de couleur originale.A fourth verification applies a spectral transformation 8 to the representation 3, advantageously made monochrome, and to the representation 4, compares the two transformed 9,10 obtained to verify their equality and verifies that the spatial periods 6,7 detected are the periods of the frequency signature 5 of the color matrix used. The presence of the 5 frequency signature of the original color matrix, visible both in the visible spectrum and in the IR spectrum, ensures that the two 9,10 transforms are equal and that their 6,7 periods correspond to the periods of the color matrix. original.

Une cinquième vérification vérifie que la représentation 3, en couleur, diffère colorimétriquement de la représentation 4, monochrome.A fifth verification verifies that representation 3, in color, differs colorimetrically from representation 4, monochrome.

Cas d'utilisation B - dispositif contrefait 1Use case B - counterfeit device 1

Un document identitaire 20 contrefait en ce qu'il comprend une image 2 réalisée par impression.A forged identity document 20 in that it includes an image 2 made by printing.

L'image 2, ici imprimée, ne présente aucune visibilité dans l'IR. Aussi la deuxième représentation 4 est une image nulle. L'image imprimée ne comporte aucune signature fréquentielle 5.Image 2, printed here, has no visibility in the IR. Also the second representation 4 is a null image. The printed image has no frequency signature 5.

La première vérification échoue en ce qu'elle détecte une différence entre la première représentation 3 (visible) et (l'absence de contenu de) la deuxième représentation 4 (IR).The first check fails in that it detects a difference between the first representation 3 (visible) and (the absence of content of) the second representation 4 (IR).

Il peut être supposé que le contrefacteur a réalisé une image 2 représentant une photo du porteur. Aussi la deuxième vérification réussit en ce qu'une correspondance biométrique est trouvée pour la première représentation 3 (visible). Cependant elle échoue pour la deuxième représentation 4 (IR).It can be assumed that the counterfeiter has made an image 2 representing a photo of the wearer. Also the second check succeeds in that a biometric match is found for the first representation 3 (visible). However it fails for the second representation 4 (IR).

Sous réserve que le contrefacteur ait pu modifier la représentation numérique dans le microcircuit, la troisième vérification réussit en ce qu'une identité est trouvée pour la première représentation 3 (visible) et une correspondance biométrique est trouvée avec l'acquisition directe. Cependant elle échoue pour la deuxième représentation 4 (IR). Si le contrefacteur n'a pas réussi à modifier la représentation numérique dans le microcircuit, toutes les vérifications échouent.Provided that the counterfeiter was able to modify the digital representation in the microcircuit, the third verification succeeds in that an identity is found for the first representation 3 (visible) and a biometric correspondence is found with the direct acquisition. However it fails for the second representation 4 (IR). If the counterfeiter has failed to alter the digital representation in the microcircuit, all checks fail.

Du fait de l'absence de signature fréquentielle 5 dans l'image 2 imprimée contrefaite, la quatrième vérification peut trouver une égalité entre les deux transformées 9,10 (absence de spectre signifiant) mais échoue en ce qu'elle ne retrouve pas les périodes de la matrice de couleur, ni dans la transformée 9 issue du spectre visible, ni dans la transformée 10 issue du spectre IR.Due to the absence of frequency signature 5 in the counterfeit printed image 2, the fourth verification can find an equality between the two transforms 9,10 (absence of significant spectrum) but fails in that it does not find the periods of the color matrix, neither in the transform 9 resulting from the visible spectrum, nor in the transform 10 resulting from the IR spectrum.

La cinquième vérification réussit en ce que l'image 2 est en couleur.The fifth check succeeds in that image 2 is in color.

Cas d'utilisation C - dispositif contrefait 2Use case C - counterfeit device 2

Un document identitaire 20 contrefait en ce qu'il comprend une image 2 réalisée par gravure laser monochrome.A counterfeit identity document 20 in that it comprises an image 2 produced by monochrome laser engraving.

L'image 2, ici gravée au laser est visible dans le visible et dans l'IR et présente deux représentations 3,4 identiques et superposées (non distantes). L'image gravée monochrome ne comporte pas de signature fréquentielle 5.Image 2, here laser-engraved, is visible in the visible and in the IR and presents two identical and superimposed (not distant) 3.4 representations. The engraved image monochrome does not have a frequency signature 5.

La première vérification réussit en ce qu'elle détecte une représentation 3 (visible) identique et superposée avec la deuxième représentation 4 (IR).The first verification succeeds in that it detects a representation 3 (visible) identical and superimposed with the second representation 4 (IR).

Il peut être supposé que le contrefacteur a réalisé une image 2 représentant une photo du porteur. Aussi la deuxième vérification réussit en ce qu'une correspondance biométrique est trouvée, tant pour la première représentation 3 (visible) que pour la deuxième représentation 4 (IR).It can be assumed that the counterfeiter has made an image 2 representing a photo of the wearer. Also the second verification succeeds in that a biometric match is found, both for the first representation 3 (visible) and for the second representation 4 (IR).

Sous réserve que le contrefacteur ait pu modifier la représentation numérique dans le microcircuit, la troisième vérification réussit en ce qu'une identité est trouvée pour la première représentation 3 (visible), pour la deuxième représentation 4 (IR) et une correspondance biométrique est trouvée avec l'acquisition directe.Provided that the counterfeiter was able to modify the digital representation in the microcircuit, the third verification succeeds in that an identity is found for the first representation 3 (visible), for the second representation 4 (IR) and a biometric match is found with direct acquisition.

Du fait de l'absence de signature fréquentielle 5 dans l'image 2 gravée contrefaite, la quatrième vérification peut trouver une égalité entre les deux transformées 9,10 (absence de spectre signifiant) mais échoue en ce qu'elle ne retrouve pas les périodes de la matrice de couleur, ni dans la transformée 9 issue du spectre visible, ni dans la transformée issue du spectre IR. Dans le cas particulier où une signature fréquentielle est présente, elle n'a aucune ressemblance avec une signature fréquentielle 5 d'une matrice de couleur et la vérification spectrale échoue.Due to the absence of frequency signature 5 in the counterfeit engraved image 2, the fourth verification can find an equality between the two transforms 9,10 (absence of significant spectrum) but fails in that it does not find the periods of the color matrix, neither in the transform 9 resulting from the visible spectrum, nor in the transform resulting from the IR spectrum. In the particular case where a frequency signature is present, it bears no resemblance to a frequency signature of a color matrix and the spectral verification fails.

La cinquième vérification échoue en ce que l'image 2 est monochrome.The fifth check fails in that image 2 is monochrome.

Cas d'utilisation D - dispositif contrefait 3Use case D - counterfeit device 3

Un document identitaire 20 contrefait en ce qu'il comprend une image 2 réalisée par impression, ladite impression incluant des lignes simulant une signature fréquentielle 5 d'une matrice de couleur.A counterfeit identity document 20 in that it comprises an image 2 produced by printing, said printing including lines simulating a frequency signature 5 of a color matrix.

L'image 2, ici imprimée, ne présente aucune visibilité dans l'IR. Aussi la deuxième représentation 4 est une image nulle. L'image imprimée comporte une signature fréquentielle convaincante, mais uniquement dans le visible.Image 2, printed here, has no visibility in the IR. Also the second representation 4 is a null image. The printed image has a convincing frequency signature, but only in the visible.

La première vérification échoue en ce qu'elle détecte une différence entre la première représentation 3 (visible) et l'absence de contenu de la deuxième représentation 4 (IR).The first check fails in that it detects a difference between the first representation 3 (visible) and the absence of content of the second representation 4 (IR).

Il peut être supposé que le contrefacteur a réalisé une image 2 représentant une photo du porteur. Aussi la deuxième vérification réussit en ce qu'une correspondance biométrique est trouvée pour la première représentation 3 (visible). Cependant elle échoue pour la deuxième représentation 4 (IR).It can be assumed that the counterfeiter has made an image 2 representing a photo of the wearer. Also the second check succeeds in that a biometric match is found for the first representation 3 (visible). However it fails for the second representation 4 (IR).

Sous réserve que le contrefacteur ait pu modifier la représentation numérique dans le microcircuit, la troisième vérification réussit en ce qu'une identité est trouvée pour la première représentation 3 (visible) et une correspondance biométrique est trouvée avec l'acquisition directe. Cependant elle échoue pour la deuxième représentation 4 (IR).Provided that the counterfeiter was able to modify the digital representation in the microcircuit, the third verification succeeds in that an identity is found for the first representation 3 (visible) and a biometric correspondence is found with the direct acquisition. However it fails for the second representation 4 (IR).

Si la signature fréquentielle imprimée est suffisamment bien réalisée pour simuler une signature fréquentielle 5 dans le visible, la quatrième vérification peut réussir en ce qu'elle trouve une transformée 9 acceptable dans le visible. Cependant la quatrième vérification échoue en ce que la transformée 10 dans l'IR n'est pas acceptable (absence de spectre signifiant) et n'est pas non plus égale à la transformée 9 (visible).If the printed frequency signature is sufficiently well produced to simulate a frequency signature 5 in the visible, the fourth verification may succeed in that it finds an acceptable transform θ in the visible. However, the fourth verification fails in that the transform 10 in the IR is not acceptable (absence of significant spectrum) and is not equal to the transform 9 (visible) either.

La cinquième vérification réussit en ce que l'image 2 est en couleur.The fifth check succeeds in that image 2 is in color.

Claims (15)

  1. A method for verifying a security device (1) comprising an image (2) including a signature, comprising the following steps:
    - acquiring the image (2) according to a first optical spectrum in order to obtain a first representation (3),
    - extracting the signature, and
    - verifying the signature,
    characterized in that:
    - the signature is colorimetric and comprises a particular orientation of a color chart, or
    - the signature is a frequency signature, the image (2) comprising at least one reference spatial period.
  2. The method according to claim 1, wherein when the signature is a frequency signature, the method further comprises the following steps:
    - applying a spectral transformation (8) to the first representation (3), in order to obtain a first transform (9) comprising at least a first spatial period (6),
    - verifying that the value of the spatial period(s) (6) corresponds to the value of the reference spatial period(s).
  3. The method according to claim 1 or 2, wherein the image (2) is visible according to the first optical spectrum and at least a second optical spectrum and wherein the method further comprises the following steps:
    - acquiring the image (2) according to the second optical spectrum in order to obtain a second representation (4),
    - verifying that the two representations (3, 4) are graphically substantially identical,
    - verifying that a distance between the two representations (3, 4) is less than a threshold.
  4. The method according to claim 3, wherein the distance between the two representations (3, 4) is determined by identifying, by means of a reframing algorithm, a transformation for which one of the representations (3) is the image of the other representation (4).
  5. The method according to claim 3 or 4, further comprising the following steps:
    - applying the same transformation (8) to the second representation (4) in order to obtain a second transform (10),
    - verifying that the first transform (9) is substantially equal to the second transform (10).
  6. The method according to claim 5, further comprising a step of:
    - verifying that the value of the spatial period(s) (7) of the second transform (10) corresponds to the value of the reference spatial period(s).
  7. The method according to claim 5 or 6, wherein the spectral transformation (8) is applied on at least part of the first representation (3) and/or on the same at least part of the second representation (4).
  8. The method according to claim 5 or 7, wherein the spectral transformation (8) is applied on at least two parts of a representation (3, 4), and wherein the method further comprises a step of:
    - verifying that the transforms of the different parts are substantially equal.
  9. The method according to claim 7 or 8, further comprising a step of:
    - verifying that the two representations (3, 4) are colorimetrically different.
  10. The method according to any one of claims 3 to 9, wherein the image (2) represents part of the body, preferably the face, the eye or the finger, of a holder associated with the security device (1) and wherein the method further comprises the steps of:
    - acquiring an image (13) of the part of the body from a wearer of the safety device (1),
    - verifying that the acquired image (13) biometrically corresponds to the first representation (3), and/or
    - verifying that the acquired image (13) biometrically corresponds to the second representation (4).
  11. The method according to any one of claims 3 to 10, wherein the security device (1) is associated with a digital storage means comprising a digital representation of the image (2), and wherein the method further comprises the steps of:
    - reading the digital representation of the image (2),
    - verifying that the digital representation is substantially identical to the first representation (3), and/or
    - verifying that the digital representation is substantially identical to the second representation (4).
  12. The method according to claim 11, further comprising a step of:
    - verifying that the acquired image (13) biometrically corresponds to the digital representation.
  13. A verification apparatus characterized in that it comprises means for implementing a verification method according to any one of the preceding claims.
  14. A computer program comprising instructions which lead the apparatus according to claim 13 to execute the steps of a verification method according to any one of claims 1 to 12.
  15. A computer data medium characterized in that it comprises a computer program according to the preceding claim.
EP16723413.7A 2015-04-17 2016-04-15 Method for verifying a security device comprising a signature Active EP3284065B1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1553437A FR3035253B1 (en) 2015-04-17 2015-04-17 PROCEDURE FOR VERIFYING A SAFETY DEVICE BEHAVING A SIGNATURE
PCT/FR2016/050880 WO2016166490A1 (en) 2015-04-17 2016-04-15 Method for verifying a security device comprising a signature

Publications (2)

Publication Number Publication Date
EP3284065A1 EP3284065A1 (en) 2018-02-21
EP3284065B1 true EP3284065B1 (en) 2022-01-12

Family

ID=54199758

Family Applications (1)

Application Number Title Priority Date Filing Date
EP16723413.7A Active EP3284065B1 (en) 2015-04-17 2016-04-15 Method for verifying a security device comprising a signature

Country Status (10)

Country Link
US (1) US10445968B2 (en)
EP (1) EP3284065B1 (en)
KR (1) KR102500424B1 (en)
CN (1) CN107667392B (en)
AU (1) AU2016250128B2 (en)
CA (1) CA2982878C (en)
FR (1) FR3035253B1 (en)
HK (1) HK1245482A1 (en)
SG (1) SG11201708548WA (en)
WO (1) WO2016166490A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102017003746A1 (en) 2017-04-18 2018-10-18 Giesecke+Devrient Currency Technology Gmbh Value document with security mark with varying cooldown and method for identifying the security mark
FR3111201B1 (en) 2020-06-03 2022-08-05 Idemia France Method for securing an authentication image of a security document using antagonist images

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE463897B (en) * 1983-07-01 1991-02-04 Esselte Security Syst Ab PROCEDURE PROVIDES TO SAY SIMPLE CODES
US4663518A (en) * 1984-09-04 1987-05-05 Polaroid Corporation Optical storage identification card and read/write system
CN85100700A (en) * 1985-04-01 1987-01-31 陆伯祥 Computing machine Moire fringe certificate and recognition system thereof
US4972476A (en) * 1989-05-11 1990-11-20 Nathans Robert L Counterfeit proof ID card having a scrambled facial image
US5027401A (en) * 1990-07-03 1991-06-25 Soltesz John A System for the secure storage and transmission of data
US6122403A (en) * 1995-07-27 2000-09-19 Digimarc Corporation Computer system linked by using information in data objects
US6104812A (en) * 1998-01-12 2000-08-15 Juratrade, Limited Anti-counterfeiting method and apparatus using digital screening
DE10005835A1 (en) * 2000-02-10 2001-08-16 Bundesdruckerei Gmbh Authenticating of documents containing security features having different spectral responses
US8543823B2 (en) * 2001-04-30 2013-09-24 Digimarc Corporation Digital watermarking for identification documents
US7213757B2 (en) * 2001-08-31 2007-05-08 Digimarc Corporation Emerging security features for identification documents
US7712673B2 (en) * 2002-12-18 2010-05-11 L-L Secure Credentialing, Inc. Identification document with three dimensional image of bearer
WO2006023822A2 (en) * 2004-08-18 2006-03-02 Kappa Image Llc Validating negotiable documents using public document validation profiles
WO2007117261A2 (en) * 2005-07-26 2007-10-18 Digimarc Corporation Forensic feature for secure documents
US20080087189A1 (en) * 2005-10-03 2008-04-17 Sun Chemical Corporation Security pigments and the process of making thereof
US8081304B2 (en) * 2006-07-31 2011-12-20 Visualant, Inc. Method, apparatus, and article to facilitate evaluation of objects using electromagnetic energy
FR2974652A3 (en) * 2011-05-01 2012-11-02 Signoptic Technologies METHOD FOR UNITARY AUTHENTICATION OF A HARDWARE OBJECT USING A VISUAL CRYPTOGRAPHY ALGORITHM AND A MATERIAL SIGNATURE
EP2605218A1 (en) * 2011-12-14 2013-06-19 Gemalto SA Method for securing an electronic document
FR2989798B1 (en) * 2012-04-18 2016-07-29 Oberthur Technologies SECURITY DEVICE AND IDENTITY DOCUMENT
FR2990097A1 (en) * 2012-04-26 2013-11-01 Thomson Licensing SPATIALLY SCALABLE CODING AND DECODING METHODS AND CORRESPONDING DEVICES
US9607462B2 (en) * 2013-03-18 2017-03-28 Kenneth Gerald Blemel System for anti-tamper parcel packaging, shipment, receipt, and storage
KR20150022276A (en) * 2013-08-22 2015-03-04 삼성전자주식회사 Apparatas and method for extravting a encrypted message of image file in an electronic device
EP3050031B1 (en) * 2013-09-24 2019-11-06 Robert Bosch GmbH System and method for document and article authentication
US10007964B1 (en) * 2015-05-20 2018-06-26 Digimarc Corporation Image processing methods and arrangements

Also Published As

Publication number Publication date
FR3035253A1 (en) 2016-10-21
AU2016250128A1 (en) 2017-11-16
KR20170137193A (en) 2017-12-12
US10445968B2 (en) 2019-10-15
WO2016166490A1 (en) 2016-10-20
CA2982878A1 (en) 2016-10-20
CN107667392B (en) 2020-04-17
AU2016250128B2 (en) 2021-02-04
KR102500424B1 (en) 2023-02-16
CN107667392A (en) 2018-02-06
SG11201708548WA (en) 2017-11-29
US20180122173A1 (en) 2018-05-03
HK1245482A1 (en) 2018-08-24
FR3035253B1 (en) 2020-12-04
EP3284065A1 (en) 2018-02-21
CA2982878C (en) 2023-08-29

Similar Documents

Publication Publication Date Title
US8896647B2 (en) Method and device for producing colour images by way of a UV laser on pigmented substrates, and products produced as a result
EP2689400B1 (en) Method and system to authenticate security documents
JP4898999B2 (en) Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device
EP2780865B1 (en) Pattern for encoding digital information on a surface, and marking and reading methods
US11715309B2 (en) Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image
EP3382605A1 (en) Method for analysing a deformable structured document
KR20140133860A (en) Security element and method to inspect authenticity of a print
EP3284065B1 (en) Method for verifying a security device comprising a signature
Wang et al. Anti-counterfeiting for polymer banknotes based on polymer substrate fingerprinting
JP2008068511A (en) Printed matter in which truth distinction is possible
EP3956809A1 (en) Image processing method for an identity document
CH711061A2 (en) Process and document authentication system.
WO2020088797A1 (en) Method for ascertaining the authenticity of a document, and device for carrying out such a method
EP3999357B1 (en) Method for manufacturing a two-dimensional coloured bar code and associated security device
WO2023020795A1 (en) Method for personalising a security device, personalised security device, identity document comprising such a device, and method for authenticating such a device
EP3782060A1 (en) Method for authenticating a secure document
FR3116760A1 (en) Method of manufacturing a security device and associated security device
EP3459755A1 (en) Method for inserting guilloche patterns, method for extracting guilloche patterns, authentication method for said guilloche patterns and implementation devices
FR3044451A3 (en) AUTHENTICATION METHOD BY GLASS PATTERN

Legal Events

Date Code Title Description
STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE

PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20171026

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: IDEMIA FRANCE

DAV Request for validation of the european patent (deleted)
DAX Request for extension of the european patent (deleted)
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1245482

Country of ref document: HK

REG Reference to a national code

Ref country code: DE

Ref legal event code: R079

Ref document number: 602016068287

Country of ref document: DE

Free format text: PREVIOUS MAIN CLASS: G07D0007120000

Ipc: G07D0007202000

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

RIC1 Information provided on ipc code assigned before grant

Ipc: G07D 7/202 20160101AFI20210706BHEP

Ipc: G07D 7/004 20160101ALI20210706BHEP

Ipc: G07D 7/1205 20160101ALI20210706BHEP

INTG Intention to grant announced

Effective date: 20210804

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

Free format text: NOT ENGLISH

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602016068287

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

Free format text: LANGUAGE OF EP DOCUMENT: FRENCH

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 1462885

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220215

RAP4 Party data changed (patent owner data changed or rights of a patent transferred)

Owner name: IDEMIA FRANCE

REG Reference to a national code

Ref country code: NL

Ref legal event code: FP

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG9D

REG Reference to a national code

Ref country code: EE

Ref legal event code: FG4A

Ref document number: E022162

Country of ref document: EE

Effective date: 20220401

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 1462885

Country of ref document: AT

Kind code of ref document: T

Effective date: 20220112

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220512

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220412

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220412

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220413

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220512

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602016068287

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

26N No opposition filed

Effective date: 20221013

GBPC Gb: european patent ceased through non-payment of renewal fee

Effective date: 20220415

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20220430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220415

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220430

Ref country code: GB

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220415

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20220112

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220430

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20220415

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20230321

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: LV

Payment date: 20230321

Year of fee payment: 8

Ref country code: IT

Payment date: 20230322

Year of fee payment: 8

Ref country code: EE

Payment date: 20230322

Year of fee payment: 8

P01 Opt-out of the competence of the unified patent court (upc) registered

Effective date: 20230428

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20230321

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: DE

Payment date: 20230321

Year of fee payment: 8

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: AL

Payment date: 20230425

Year of fee payment: 8

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20160415

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: NL

Payment date: 20240320

Year of fee payment: 9