EP3459755A1 - Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung - Google Patents

Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung Download PDF

Info

Publication number
EP3459755A1
EP3459755A1 EP17306266.2A EP17306266A EP3459755A1 EP 3459755 A1 EP3459755 A1 EP 3459755A1 EP 17306266 A EP17306266 A EP 17306266A EP 3459755 A1 EP3459755 A1 EP 3459755A1
Authority
EP
European Patent Office
Prior art keywords
guilloche
pattern
patterns
document
guilloché
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP17306266.2A
Other languages
English (en)
French (fr)
Inventor
Joseph Leibenguth
Michel Jourlin
Maxime CARRÉ
Mohamed BOUABDELLAH
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales DIS France SA
Original Assignee
Gemalto SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemalto SA filed Critical Gemalto SA
Priority to EP17306266.2A priority Critical patent/EP3459755A1/de
Priority to US16/650,959 priority patent/US11065905B2/en
Priority to EP18774049.3A priority patent/EP3687823B1/de
Priority to EP21162556.1A priority patent/EP3871896B1/de
Priority to PL18774049.3T priority patent/PL3687823T3/pl
Priority to ES18774049T priority patent/ES2936113T3/es
Priority to PCT/EP2018/075980 priority patent/WO2019063556A1/en
Publication of EP3459755A1 publication Critical patent/EP3459755A1/de
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/337Guilloche patterns
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/23Identity cards
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/24Passports
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/20Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof characterised by a particular use or purpose
    • B42D25/29Securities; Bank notes
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/305Associated digital information
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B42BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
    • B42DBOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
    • B42D25/00Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
    • B42D25/30Identification or security features, e.g. for preventing forgery
    • B42D25/309Photographs

Definitions

  • the present invention relates to a method for inserting guilloché patterns containing coded data and a device for inserting said guilloche patterns. It further relates to a method for extracting and authenticating guilloche patterns containing encoded data. It also relates to an authentication device and a secure document that needs to be authenticated such as an identity card, a driver's license, a notarial act, etc.
  • the invention finds applications in the field of securing documents and, in particular, authentication of secure documents even when they are damaged.
  • security documents such as identity documents
  • identity documents generally include an identity photograph of its holder as well as alphanumeric data such as, for example, the name of the holder, his date of birth, his size, address, document number, date of issue of the document and / or the identity of the issuing authority.
  • guilloches To secure these identity documents, it is known to associate identity photography with guilloches. These guilloches form a network of wavy lines, superimposed on the photograph and visible to the naked eye.
  • the guilloches are intended to make discernable, during an identity check, any fraudulent modification of the photograph. In particular, they make it possible to guard against changes in the hue of the photograph, for example when adding a beard or hair.
  • the guilloches generally allow the implementation of level 1 (visual inspection with the naked eye) and / or level 2 (visual control with a simple optical equipment such as a magnifying glass or an ultraviolet lamp) .
  • the protection of alphanumeric data can be obtained by digital tattooing techniques (or watermarking, in English-speaking terms) intended to integrate elements invisible to the naked eye in an identity photograph, these elements coding predefined information.
  • Digital tattoo provides level 3 security (automatic verification of encoded data) during a security check.
  • the identity photograph is analyzed and the data tattooed there are extracted. A consistency check of these data is then performed.
  • digital tattooing has a number of disadvantages. Indeed, since it is not visible to the naked eye, the digital tattoo does not allow to implement a level 1 or 2 security. The verification of secure tattooed documents therefore requires a trained staff, equipped with means analysis, which limits the security controls, especially the itinerant controls.
  • digital tattoos may be sensitive to degradations of the identity document, degradations that can be induced, during the validity period of the document, by natural wear, exposure to UV rays, lack of care from the holder, etc. The analysis of degraded digital tattoos can then lead to an incorrect reading of tattoos, or to an impossibility of reading during the control.
  • Another known technique also makes it possible to secure the alphanumeric data mentioned on the identity documents.
  • This technique proposes to insert, on the identity photograph, variable guilloches encoding all or part of the alphanumeric data. Examples of document security methods using such variable guilloches are described in particular in patent applications.
  • EP 2 325 022 A1 and US 2010/0260372 filed in the name of the plaintiff.
  • guilloches must allow both level 1 and level 3 security to be implemented.
  • level 1 security the guilloches must not interfere with the visual perception of the underlying content. underlying of the document, in particular of the photograph, and not to prevent a good readability of the characteristic features of the holder of the secure document.
  • the guilloches must be sufficiently marked to be able to be retrieved automatically by means of an authentication device and thus to meet a level of security 3.
  • the implementation of a security of Level 3 requires, prior to any extraction of the guilloches, a print phase of the photograph on the document and then a scanning phase of the scanned image of the photograph and the superimposed guilloches.
  • these print and scan phases (called "print-scan" in English terms) generate a double degradation of the quality of the image, the degree of degradation depending in particular on the quality of the printing system and of digitization.
  • An example of an original image and its degraded images is shown on the figure 1 .
  • image (a) of the figure 1 represents an example of an original digital image, comprising a photograph of the holder of the secure document on which are superimposed guilloches.
  • the images (b), (c) and (d) represent the image (a) degraded by a printing and scanning system, respectively, of high quality, medium quality and low quality.
  • a printing and scanning system for example, of high quality, medium quality and low quality.
  • secure documents tend to suffer additional degradation during their period of validity, such as natural wear, the effects of UV rays, physical aggression, etc.
  • the automatic extraction of the guilloche, security level 3 is not hampered by the damage suffered by the security document, it is important that these guilloches are inserted sufficiently marked in the document.
  • the guilloches affixed to the photograph must be extracted automatically by means of an authentication device in order to be verified and / or authenticated.
  • a level 3 verification / authentication of a document secured by guilloches requires, prior to any extraction of the guilloches, a print phase of the photograph on the document and then a scanning phase of the scanned image of the photograph and superimposed guilloches.
  • these phases of printing and digitization (called "print-scan" in English-speaking terms) generates a double degradation of the quality of the image, the degree of degradation depending in particular on the quality of the printing and scanning system.
  • An example of an original image and its degraded images is shown on the figure 6 .
  • image (a) of the figure 6 represents an example of an original digital image, comprising a photograph of the holder on which are superimposed guilloches.
  • the images (g), (h) and (j) represent the image (a) degraded by a printing and scanning system, respectively, of high quality, medium quality and low quality.
  • the double degradation of the printing and scanning phase to which can be added additional degradations, has the effect of hindering the extraction of the guilloches, which leads to an impossibility to check / authenticate the alphanumeric data encoded in guilloches and compromises the implementation of level 3 security.
  • the applicant proposes to insert the guilloches, or guilloche patterns, with an intensity of Insertion determined according to the average gray level of the document in the vicinity of the guilloche patterns.
  • the applicant proposes to extract the guilloches, or guilloche patterns, from trajectories generated according to the contrasts of the secure document.
  • the invention relates to a method of inserting guilloche patterns on a document, each guilloche pattern being able to encode variable alphanumeric data ensuring a different appearance to each guilloche pattern so as to secure said document.
  • This method is characterized in that it comprises an operation for determining an insertion intensity of each guilloche pattern previously generated according to an average gray level of the document in the vicinity of said guilloche pattern.
  • This process is used to insert the guilloche patterns with an intensity that depends on the gray level of the document where the guilloche pattern is affixed.
  • the marking of the guilloche pattern on the document is thus more or less marked is a function of the photographic environment.
  • the insertion intensity of a guilloche pattern comprises a contrast value and a thickness of said guilloche pattern.
  • the variation of the thickness and the contrast of a guilloche pattern make it possible to more or less mark said pattern on the document.
  • the determination of the insertion intensity of the guilloche pattern comprises a calculation operation, at each pixel of said guilloche pattern, of the contrast value between an internal zone with the guilloche pattern and an external zone, close to said internal area.
  • the contrast value is obtained by comparing the average gray level of the inner zone and the average gray level of the outer zone.
  • the comparison between the average gray level of the inner zone and the average gray level of the outer zone is performed by a logarithmic image processing (called “Logarithmic Image Processing”). or LIP).
  • the determination of the insertion intensity of the guilloche pattern includes a step of selecting a thickness of the guilloche pattern.
  • the outer area is an area of pixels contiguous to the inner area.
  • the guilloche pattern is a sinusoidal pattern, affixed substantially horizontally to the document, the outer zone being positioned vertically to the pixel (s) of the guilloché pattern.
  • the guilloche pattern is a set of streaks corresponding to a fingerprint, for example that of the holder of the document, the inner and outer zones being positioned along a normal to the curve at the pixel in question.
  • the invention relates to a device for inserting guilloche patterns on a document, comprising a computer comprising a set of instructions that cause said computer to implement the method for inserting guilloche patterns as defined herein. -above. This device allows to insert guilloche patterns with more or less marked marking depending on the photographic environment.
  • the invention relates to a secure document on which are affixed guilloche patterns encoding alphanumeric data, characterized in that the guilloche patterns are inserted on the document by the insertion method defined above.
  • the invention relates to an identity document comprising an identity photograph and alphanumeric data relating to the holder, characterized in that the identity photograph comprises visibly guilloche patterns encoding the alphanumeric data, inserted by the insertion method defined above.
  • the contrast map is constructed using a logarithmic image processing (LIP) model.
  • LIP logarithmic image processing
  • the contrast map is calculated from the luminance image associated with the color image.
  • This authentication method makes it possible to control a secure document with a security level 3, even when the secure document is damaged and / or the quality of the guilloche patterns is degraded.
  • the theoretical guilloche pattern is obtained by optical character recognition (OCR) alphanumeric data mentioned on the secure document and generation guilloché patterns corresponding theoretical.
  • OCR optical character recognition
  • the theoretical guilloche pattern is an original guilloche pattern, previously stored in the chip during the generation of the guilloche pattern affixed to the secure document.
  • the comparison operation of the extracted and theoretical guilloche patterns comprises an estimate of a score based on a distance between each point of the extracted guilloché pattern and a corresponding point of the theoretical guilloche pattern.
  • the score is calculated by accumulating distances for all the points of the guilloche pattern.
  • the distance is calculated in number of pixels.
  • a weight is assigned to each distance, the distant distances having a greater weight than short distances.
  • This weight can be flexible.
  • the invention relates to a guilloche pattern authentication device comprising a computer comprising a set of instructions that cause said computer to implement the guilloche pattern authentication method defined above.
  • the invention relates to an identity document comprising alphanumeric data relating to the holder and an identity photograph on which are affixed guilloche patterns encoding the alphanumeric data, characterized in that the guilloche patterns are capable of being authenticated by the method defined above.
  • the method of the invention proposes to insert guilloche patterns on a portion or on the entirety of a secure document such as those mentioned above.
  • a secure document such as a photograph on which are superimposed the guilloche patterns, also called guilloches.
  • the term "photograph” will be understood indifferently as a portion of secure document or an underlying content.
  • guilloche patterns are, for example, one-dimensional patterns, or 1D guilloche patterns, adapted to encode alphanumeric data such as the holder's personal data mentioned on the identity documents.
  • Each 1D guilloche pattern is in the form of a variable wavy line, visible with the naked eye, on an underlying content, and in particular on a photograph.
  • the visual saliency is sufficiently low that it does not disturb the visual perception of the underlying content, that is to say the portion of the secure document positioned under the guilloche patterns - for example the photograph - all by being sufficiently marked to allow automatic extraction even when the secure document is degraded for reasons such as those mentioned above.
  • Examples of a photograph of a secure document are shown on the figure 2 .
  • the image (a) of this figure 2 represents a digital photograph of the holder.
  • Image (b) of this figure 2 represents the photograph (a) on which guilloché motifs according to the invention have been affixed.
  • the guilloche patterns do not disturb the readability of the photograph; in other words, the holder is recognizable to the naked eye, despite the presence of guilloche patterns. Level 1 security is assured.
  • the image (c) of this figure 2 represents an example of the image (b) when it has been deteriorated by a printing and scanning process. This image (c) shows that, even in the presence of deterioration, the guilloche patterns inserted according to the method of the invention remain sufficiently marked to be detected automatically by an authentication machine, so as to ensure the level 3 security.
  • the method of the invention proposes to adapt the insertion intensity of each guilloche pattern. depending on the gray level of the photograph.
  • the insertion intensity is determined, for each pixel of the guilloche pattern, as a function of the average gray level of the pixels of the photograph around said guilloche pattern.
  • the insertion intensity is defined by the thickness of the guilloche pattern and the level of contrast between the photograph and said guilloché pattern.
  • the thickness is the number of pixels aligned in the same direction (for example horizontal or vertical) to form the guilloché pattern inserted in the photograph.
  • contrast is a property of an image that quantifies the difference in brightness between the light and dark parts of the image.
  • the contrast is the difference in brightness between the guilloche pattern and the area of the photograph in the vicinity of said guilloche pattern.
  • Contrast is a unitless value, calculated for each pixel of each guilloche pattern.
  • the method of the invention proposes to calculate the contrast between the average gray level of an area internal to the guilloche pattern and the average gray level of at least one zone external to said guilloché pattern.
  • the figure 3 is an example of a photograph portion having an internal zone zi with a guilloche pattern and two outer zones ze with said guilloche pattern. This portion of photography comprises several pixels p1 - pn aligned in the same direction.
  • the inner zone zi comprises the pixels of a slice of the guilloche pattern.
  • Each outer zone ze comprises pixels of the photograph, aligned with the pixels of the inner zone zi.
  • the pixels p1 - pn are aligned vertically because the guilloche pattern is a pattern having a sinusoidal shape extending in a generally horizontal direction, as will be described in more detail later.
  • the photograph portion of the figure 3 comprises those pixels p1 - pn which form the edge of the guilloche pattern.
  • it comprises the pixel px, called the current pixel, whose contrast is sought to be determined.
  • These pixels of the inner zone zi constitute the thickness of the guilloche pattern.
  • This thickness is variable. In the example of the figure 3 the thickness is 5. It can also be, for example, 7 or 9, as in the examples of the figure 4 described later.
  • the thickness of the guilloche as well as the contrast - the insertion force - are chosen according to the psycho-visual impact (the guilloches must not disturb the observation of the photograph) and the robustness (the extraction guilloché patterns should work properly, even after aging).
  • the thickness chosen is, furthermore, highly dependent on the quality of the printing and scanning system: the printing step and the scanning step each have their own resolution (pixel dimension), in general worse than that of the initial image. This has the effect of disturbing the colors of the pixels located at the border of the guilloche pattern: the thickness of the guilloche pattern must be sufficient for the colors of the central pixels (near the axis of said guilloche pattern) to be correct, so that to prepare a future extraction.
  • the photograph portion of the figure 3 also has external zones ze contiguous to the inner zone zi.
  • Each of these external zones ze includes the pixels of the photograph that are in the vicinity of the inner zone zi.
  • the number of pixels of each external zone ze is predefined.
  • the external zone ze1, like the external zone ze2 comprises two pixels selected in the continuity and the alignment of the pixels of the inner zone zi.
  • the pixels of the outer zones ze1, ze2 and of the inner zone zi are aligned in the same direction.
  • the pixels of the external ze1 and ze2 are aligned vertically with the pixels of the inner zone zi, respectively above and below the inner zone zi, insofar as the guilloche pattern is globally horizontal.
  • a slice of said guilloche pattern comprises vertically aligned pixels; the inner and outer zones are then aligned vertically, as in the example of the figure 3 .
  • the edge of said guilloche pattern includes horizontally aligned pixels; the inner and outer zones are then aligned horizontally.
  • the guilloche pattern is a sinusoidal pattern, passing right through the photograph horizontally or vertically, or even at an angle.
  • the direction of said pattern is the overall direction of travel of the photograph.
  • the guilloche pattern may consist of the streaks of an imprint, for example a fingerprint of the holder.
  • the inner and outer zones are positioned along a normal to the curve at the point considered, that is to say orthogonally to a direction of tangent estimated near said point.
  • the contrast is calculated for each pixel px of the inner zone zi by comparing the average gray level of the inner zone zi and the average gray level of the outer zones ze.
  • the average gray level is determined from the luminance image associated with the color image.
  • LIP logarithmic Image Processing
  • a contrast value is calculated which is added to or subtracted from the LIP image so as to obtain an additive contrast LIP selected from the average gray levels of the inner zone zi and the zones external ze.
  • the same contrast value is then applied to all points of the inner zone zi.
  • the pixels of the same guilloche pattern slice all have the same contrast value.
  • the guilloche pattern may have a variable contrast value from one slice to another.
  • the same guilloche pattern may have a contrast that varies over its length.
  • guilloche patterns may be more pronounced in the character's hair areas than in the background areas
  • the figure 4 represents several examples of the same photograph on which are affixed guilloche motifs of different insertion intensity. Although it may be different from one guilloche pattern to another, the intensity of insertion of the guilloche motifs is chosen to be identical for all the motifs of the same image, in the examples of the figure 4 . In these examples of figure 4 , the insertion intensity differs from one image to another.
  • the images (a1) (b1) and (c1) are images, after printing and scanning, of the same holder.
  • the guilloche patterns of the image (a1) have a thickness of 5, which corresponds to a guilloché pattern slice of 5 pixels aligned vertically.
  • the guilloche patterns of the image (b1) have a thickness of 7 and the guilloche patterns of the image (c1) have a thickness of 9.
  • the contrast value of each of these examples was determined as the thicknesses, depending the quality of the printing and scanning system: a stronger contrast makes extraction easier.
  • the images (a2) (b2) and (c2) of the figure 4 are images after automatic detection of guilloche patterns during a level 3 check.
  • the guilloches visible in these figures (a2) (b2) and (c2) are the guilloches detected (reconstructed) by the authentication machine when level 3 security.
  • FIG. 5 is shown an example of a functional diagram showing the various steps of the insertion method according to the invention.
  • This method comprises a first step 100 of generating a guilloche pattern.
  • the guilloche pattern is a curve resulting from a function, for example sinusoidal, which encodes alphanumeric data.
  • Many documentations describe methods of generating guilloches. The generation of guilloche motifs will therefore not be described in this application.
  • the guilloche patterns generated are then positioned - step 200 - on the photograph (or other document) with a predefined distance which depends, for example, on the number of guilloche patterns to be affixed and / or the importance of the modulation used during the printing. generation of guilloche motifs.
  • the method then comprises a step 300 for selecting and applying a thickness of guilloche.
  • a step 400 for calculating the contrast value is performed for each pixel of the guilloche. As long as all the N pixels of the guilloche pattern have not been processed, the operation 400 for calculating the contrast value is reiterated for the next n pixel (steps 410 and 420).
  • the guilloche is inserted on the document in step 500. As long as all the K guilloches have not been inserted on the document (steps 510 and 520), the process is reiterated from step 300 of applying the thickness for the following guilloche k. When all the guilloches have been inserted (step 510), the document is secured (step 600).
  • the determined contrast value associated with the chosen thickness of the guilloche pattern, constitutes the intensity of insertion of a guilloche.
  • the insertion intensity allows more or less intense marking of each guilloche pattern, which depends directly on the gray level of the document on which it is affixed. The intensity of the marking is therefore directly dependent on the gray level of the document in the vicinity of the guilloche. This allows that, whatever the state of the document, the underlying content is visible to the naked eye and the guilloche patterns can be detected and the encoded data authenticated.
  • the insertion method as just described can be implemented in a guilloché pattern insertion device on a document.
  • This device comprises at least one computer executing a set of instructions that cause said computer to implement this method of inserting the guilloches.
  • the method of the invention proposes to authenticate guilloché patterns inserted in a portion or in the entirety of a secure document such as those mentioned above.
  • a secure document such as a photograph on which are superimposed guilloche patterns, also called guilloches.
  • guilloches also called guilloches.
  • guilloche patterns are, for example, one-dimensional patterns, or 1D guilloche patterns, adapted to encode alphanumeric data such as personal data of the holder, mentioned on the identity documents.
  • Each 1D guilloche pattern is in the form of a variable wavy line, visible to the naked eye, on an underlying content, and in particular on a photograph, but whose visual saliency is sufficiently low enough not to disturb the visual perception of the underlying content, that is, the portion of the secure document positioned under the guilloche patterns.
  • FIG. 7 An example of a document secured by guilloche motifs 601-608 is shown in the image (a) of the figure 7 .
  • the portion 600 of the secure document is a photograph on which are superimposed guilloche patterns 1D, referenced 601 - 608.
  • the guilloche patterns 601-608 are sets of wavy lines and irregular , whose irregularities correspond to coded data.
  • the guilloche patterns 601-608 are different from each other. They are all weakly prominent, which allows not to visually disturb the main features of the character of the photograph 600. In other words, the salience of guilloche patterns on the underlying content is limited so that the attention of the controller is not focused on the guilloches but on said underlying content.
  • the underlying content on which the guilloche patterns are affixed will be indifferently called photograph, underlying content or image (a).
  • FIG 10 An example of the authentication method according to the invention is represented on the figure 10 .
  • This method comprises several operations 710 - 730 making it possible to extract the guilloche patterns from the digitized secure document 600.
  • the security level 3 requires, before the implementation of the authentication method, a phase of authentication. scanner printing and scanning of the secure document.
  • this phase of printing and digitization degrades the quality of information contained in the secure document, and in particular that of photography and guilloche patterns.
  • An example of a photograph with original guilloches, named image (a), and the same photograph with guilloches after degradation by the printing and scanning phase, named image (b), are represented on the figure 7 .
  • the guilloche patterns of the image (b) are substantially degraded compared to those of the image (a), which makes the automatic extraction of these guilloché patterns more complex.
  • the extraction method firstly comprises an operation 710 for determining a contrast map of the portion 600 of the secure document.
  • This operation which aims to reveal the contrasts along the guilloche patterns of the image (b), comprises a calculation, at each point of each guilloche pattern, of the contrast between the average gray level of an internal zone and the average gray level of an external zone of said point.
  • the internal zone of the guilloché pattern is defined as the vertical neighborhood of the pixel in question, with a predetermined thickness, for example of two pixels, on either side of said pixel.
  • the outer area of the guilloché pattern is defined as the vertical neighborhood around the inner area, with a predetermined thickness, for example four pixels, around said inner area.
  • the contrast calculation is based on the Logarithmic Image Processing (LIP) model described, for example, in Mr. Jourlin and JC. Pinoli, "A Model for Logarithmic Image Processing," Journal of Microscopy, 149 (1), pp 21-35, 1988 or in the document M. Jourlin, "Logarithmic Image Processing: Theory and Applications,” Advances in Imaging and Electron Physics, Vol. 195, 253 p, 2016 .
  • LIP Logarithmic Image Processing
  • the contrast map is calculated from the luminance image associated with the color image.
  • a luminance image (grayscale) calculated from the three color planes is previously extracted.
  • the extraction method then comprises an operation 720 of identification, on this contrast map, of the optimal percolation trajectory.
  • this operation 720 includes an identification of all the percolation trajectories that may pass through the image (c) to connect a starting point of a guilloche pattern to an end point of said guilloché pattern.
  • the guilloche patterns 1D are positioned in the secure document in a horizontal overall direction. Each guilloche pattern thus crosses the image from side to side, from left to right.
  • the method then proposes to search, in the image (c) of contrasts, all the trajectories that cross the image from left to right.
  • the starting points and the arrival points of the desired percolation paths are not necessarily on the left. and to the right of the image but, for example, at the top and bottom of the image.
  • the method then proposes to determine, among all the percolation trajectories detected, the optimal percolation trajectory, that is to say the trajectory that has the most preferred direction.
  • This detection of the optimal percolation trajectory is obtained by calculating a cost function for each of the trajectories and by determining the minimum cost function.
  • the cost function of a trajectory corresponds to the variability of the contrast between the contrast determined for each trajectory and an expected contrast, previously determined. The closer the contrast is to the expected contrast, the lower the cost function.
  • the cost function therefore favors points with contrast levels that are close to the contrast value chosen for inserting the guilloche pattern into the secure document.
  • the trajectory of Optimal percolation is therefore, among all the percolation trajectories detected, that which has the smallest cost function.
  • this optimal percolation trajectory is the guilloche pattern.
  • the guilloche pattern is therefore extracted (step 730 of the figure 10 ) when the optimum percolation trajectory has been determined.
  • image (d) shows the optimal percolation trajectories, that is to say the guilloche patterns 611-618 from the contrast image (c).
  • a comparison of the image (d) with the image (a) of the figure 7 allows to understand that the guilloche patterns extracted 611-618 with the method described above - image (d) - are close to the original guilloche patterns 601-608 of the image (a).
  • These guilloche patterns extracted 611-618 although having an image (b) where they are not very visible, can be used at security level 3. Authentication of these guilloche patterns can then be implemented.
  • the authentication method comprises an operation 740 for comparing each extracted guilloche pattern with the corresponding theoretical guilloche pattern.
  • the theoretical guilloche pattern is the original guilloche pattern, that is to say the one that was initially generated and affixed to the content of the document to be secured.
  • each guilloche pattern is stored in an electronic chip housed in the secure document.
  • the guilloche pattern extracted (for example the pattern 618) is compared with the corresponding guilloche pattern which is stored in the chip (for example the pattern 608). Comparing each of the extracted guilloché motifs with the original guilloche patterns can be used to determine whether the secure document has been tampered with or not.
  • the theoretical guilloche pattern is obtained by means of OCR type optical character recognition, carried out for example during the scan (scanning by scanner) of the secure document.
  • the alphanumeric data mentioned on the secure document next to the image (a) are determined by optical recognition and theoretical guilloche patterns are generated from these alphanumeric data recognized.
  • the guilloche patterns extracted are then compared to these theoretical guilloche motifs and their comparison makes it possible to determine whether the secure document has been falsified or not.
  • the extracted guilloche patterns are compared with the theoretical guilloche patterns, for example by superimposing said extracted patterns and said theoretical patterns.
  • This comparison can be based on an estimate of a score calculated for each pair of guilloche patterns, a pair consisting of an extracted guilloche pattern and a theoretical guilloche pattern.
  • This score estimation operation referenced 741 on the figure 10 , can be obtained by calculating, at each point of the x-axis (when the guilloche patterns extend horizontally), the distance between the extracted guilloche pattern and the theoretical guilloche pattern.
  • the score at a point x of the X axis corresponds to the distance along the Y axis between the extracted guilloche pattern and the theoretical guilloche pattern. This distance is preferably calculated in number of pixels.
  • An example of calculating the score at a point x is represented on the figure 8 .
  • the distance - referenced d - separating the extracted guilloche pattern 618 from the theoretical guilloche pattern 608 is the length along the Y axis between the two patterns 608 and 618.
  • the scores calculated in each point of the X axis, for a pair of guilloche motifs, are cumulated to form the score of the extracted guilloche pattern.
  • the comparison of the score with a predetermined threshold is represented by step 742. Below a predefined score threshold, the guilloche pattern is considered to be authenticated (block 780 of the figure 10 ). Above the predefined score threshold, the guilloche pattern is considered unauthenticated (block 790 of the figure 10 ).
  • the scores of all pairs of guilloche patterns may also be cumulated to authenticate or not the secure document as a whole.
  • Two examples of images (b) after printing and scanning are represented on the figure 9 , each of these images (b) being associated with an example of an authenticated image (e) and an example of an unauthenticated image (f).
  • Each of the images (e) and (f) has, superimposed on the photograph, the theoretical guilloche motifs completed by the distances between extracted and theoretical guilloche motifs. This distance is symbolized by the thickness of the guilloche line.
  • the lines representing the guilloche patterns are thin.
  • the cumulative score is less than or equal to the predetermined threshold.
  • the image (e) is authenticated.
  • the lines representing the guilloche motifs are thick over a great length of each motif.
  • the cumulative score is greater than the predetermined threshold.
  • the image (f) is not authenticated.
  • a weight is assigned to each score before being accumulated.
  • the extraction is generally not perfect, it is normal that small distances exist between two patterns of a same pair of guilloche patterns, as is the case in the example of the images (e) of the figure 9 .
  • the distances are large, as in the example of the images (f) of the figure 9 there is suspicion of falsification.
  • the method therefore proposes to assign a greater weight to large distances than to small distances so as to optimize the cumulative score.
  • a "long distance” is a distance between a point of an extracted guilloche pattern and the corresponding point (for example of the same abscissa) of the theoretical guilloche pattern, which generates an extra thickness of the guilloche.
  • a "small distance” does not generate extra thickness in the guilloche.
  • the weights assigned to the scores may be adjustable. For example, they can be proportional to the square of the distance, to its exponential, and so on. in order to maximize the cumulative score and make the falsified guilloche patterns more easily detectable.
  • the method of inserting guilloche patterns according to the invention comprises various variants, modifications and improvements which will become apparent to those skilled in the art, being understood that these variants, modifications and improvements are within the scope of the invention.

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Credit Cards Or The Like (AREA)
  • Collating Specific Patterns (AREA)
  • Facsimile Image Signal Circuits (AREA)
  • Digital Computer Display Output (AREA)
EP17306266.2A 2017-09-26 2017-09-26 Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung Withdrawn EP3459755A1 (de)

Priority Applications (7)

Application Number Priority Date Filing Date Title
EP17306266.2A EP3459755A1 (de) 2017-09-26 2017-09-26 Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung
US16/650,959 US11065905B2 (en) 2017-09-26 2018-09-25 Method for the insertion of guilloche patterns, method for the extraction of guilloche patterns, method for the authentication of these guilloche patterns and devices for implementation
EP18774049.3A EP3687823B1 (de) 2017-09-26 2018-09-25 Gerät und verfahren zum einfügen von guillochierten motiven
EP21162556.1A EP3871896B1 (de) 2017-09-26 2018-09-25 Verfahren zur extraktion von guillochenmustern, verfahren zur authentifizierung dieser guillochenmuster und vorrichtungen zur implementierung
PL18774049.3T PL3687823T3 (pl) 2017-09-26 2018-09-25 Sposób i urządzenie do wstawiania wzorów giloszowych
ES18774049T ES2936113T3 (es) 2017-09-26 2018-09-25 Método y dispositivo para la inserción de patrones guilloche
PCT/EP2018/075980 WO2019063556A1 (en) 2017-09-26 2018-09-25 METHOD FOR INSERTING GUILLOCHIS PATTERNS, METHOD FOR EXTRACTING GUILLOCHIS PATTERNS, METHOD FOR AUTHENTICATING THESE GUILLOCHIS PATTERNS, AND DEVICES FOR IMPLEMENTING THE SAME

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP17306266.2A EP3459755A1 (de) 2017-09-26 2017-09-26 Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung

Publications (1)

Publication Number Publication Date
EP3459755A1 true EP3459755A1 (de) 2019-03-27

Family

ID=60574490

Family Applications (3)

Application Number Title Priority Date Filing Date
EP17306266.2A Withdrawn EP3459755A1 (de) 2017-09-26 2017-09-26 Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung
EP18774049.3A Active EP3687823B1 (de) 2017-09-26 2018-09-25 Gerät und verfahren zum einfügen von guillochierten motiven
EP21162556.1A Active EP3871896B1 (de) 2017-09-26 2018-09-25 Verfahren zur extraktion von guillochenmustern, verfahren zur authentifizierung dieser guillochenmuster und vorrichtungen zur implementierung

Family Applications After (2)

Application Number Title Priority Date Filing Date
EP18774049.3A Active EP3687823B1 (de) 2017-09-26 2018-09-25 Gerät und verfahren zum einfügen von guillochierten motiven
EP21162556.1A Active EP3871896B1 (de) 2017-09-26 2018-09-25 Verfahren zur extraktion von guillochenmustern, verfahren zur authentifizierung dieser guillochenmuster und vorrichtungen zur implementierung

Country Status (5)

Country Link
US (1) US11065905B2 (de)
EP (3) EP3459755A1 (de)
ES (1) ES2936113T3 (de)
PL (1) PL3687823T3 (de)
WO (1) WO2019063556A1 (de)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4557596A (en) * 1981-07-30 1985-12-10 Gao Gesellschaft Fur Automation Und Organisation Mbh Method of screening half-tone picture themes
WO2010003948A1 (en) * 2008-07-07 2010-01-14 Gemalto Sa Method for securing an image by means of graphical anti-counterfeiting means, method for securing an identification document, and secure identification document
EP2236308A1 (de) * 2009-03-31 2010-10-06 Gemalto SA Ausweisdokument mit einem durchsichtigen Teil mit zur Fälschungssicherung dienenden Blasen und ein Verfahren zu dessen Herstellung
US20100260372A1 (en) 2007-12-13 2010-10-14 Gemalto Sa Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination
EP2325022A1 (de) 2009-11-12 2011-05-25 Gemalto SA Identitätsdokumente, die eine mit Hilfe von Motiven gesicherte Identitätsfotografie umfassen

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102006019616A1 (de) 2006-04-25 2007-11-08 Bundesdruckerei Gmbh Sicherheits- und/oder Wertdokument
EP1889732A1 (de) * 2006-08-18 2008-02-20 Setec Oy Methode zum Übereinanderlegen von Abbildungen und Methode zur Personalisierung von Dokumenten mit der Methode
FR2996943B1 (fr) 2012-10-16 2015-12-25 Advanced Track & Trace Procedes, dispositifs et document d'identification d'une personne ou d'un animal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4557596A (en) * 1981-07-30 1985-12-10 Gao Gesellschaft Fur Automation Und Organisation Mbh Method of screening half-tone picture themes
US20100260372A1 (en) 2007-12-13 2010-10-14 Gemalto Sa Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination
WO2010003948A1 (en) * 2008-07-07 2010-01-14 Gemalto Sa Method for securing an image by means of graphical anti-counterfeiting means, method for securing an identification document, and secure identification document
EP2236308A1 (de) * 2009-03-31 2010-10-06 Gemalto SA Ausweisdokument mit einem durchsichtigen Teil mit zur Fälschungssicherung dienenden Blasen und ein Verfahren zu dessen Herstellung
EP2325022A1 (de) 2009-11-12 2011-05-25 Gemalto SA Identitätsdokumente, die eine mit Hilfe von Motiven gesicherte Identitätsfotografie umfassen

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
M. JOURLIN: "Logarithmic Image Processing : Theory and Applications", ADVANCES IN IMAGING AND ELECTRON PHYSICS, vol. 195, 2016, pages 253
M. JOURLIN; J-C. PINOLI: "A Model for Logarithmic Image Processing", JOURNAL OF MICROSCOPY, vol. 149, no. 1, 1988, pages 21 - 35, XP008092949

Also Published As

Publication number Publication date
EP3687823A1 (de) 2020-08-05
WO2019063556A1 (en) 2019-04-04
ES2936113T3 (es) 2023-03-14
EP3871896A1 (de) 2021-09-01
US20200254807A1 (en) 2020-08-13
EP3687823B1 (de) 2022-11-23
PL3687823T3 (pl) 2023-02-06
US11065905B2 (en) 2021-07-20
EP3871896B1 (de) 2023-06-07

Similar Documents

Publication Publication Date Title
EP2294558B1 (de) Verfahren und vorrichtung zur identifikation einer druckplatte eines dokuments
EP2689400B1 (de) Verfahren und vorrichtung zum prüfen von sicherheitsdokumente
EP3659070B1 (de) Verfahren zur authentifizierung einer illustration
EP3382605A1 (de) Analyseverfahren eines strukturierten dokuments, das verformbar ist
WO2011061442A1 (fr) Procede et systeme de controle automatique de l'authenticite d'un document d'identite.
WO2017089736A1 (fr) Procede d'authentification et/ou de controle d'integrite d'un sujet
CA3024562A1 (fr) Procede d'authentification augmentee d'un sujet materiel
EP3264331A1 (de) Verfahren zur detektion von betrug eines iris-erkennungssystems
EP2499000B1 (de) Identitätsdokumente, die eine mit hilfe von motiven gesicherte identitätsfotografie umfassen
WO2016175908A1 (en) Systems, methods and devices for tamper proofing documents and embedding data in a biometric identifier
WO2008078009A1 (fr) Procede de caracterisation d'elements aleatoires de la reproduction de graphismes leur conferant les proprietes d'un sceau
EP3425565A1 (de) Verarbeitungsverfahren eines bilds, das ein strukturiertes dokument zeigt, das eine visuelle inspektionszone über eine automatische lesezone oder vom type barcode enthält
EP3459755A1 (de) Verfahren zum einfügen von guillochierten motiven, verfahren zum extrahieren guillochierter motive, authentifizierungsverfahren dieser guillochierten motive und vorrichtungen zur umsetzung
FR2986890A1 (fr) Procede d'insertion d'une marque numerique dans une image, et procede correspondant de detection d'une marque numerique dans une image a analyser
CA2982878C (fr) Procede de verification d'un dispositif de securite comportant une signature
EP4260228A1 (de) Verfahren zur überprüfung eines digitalen bildes
WO2020144225A1 (fr) Procédé de traitement d'images numériques
EP3956809A1 (de) Bildverarbeitungsverfahren für ein identitätsdokument
EP1802093A1 (de) Verfahren zum Synchronisieren eines Bildes zur unsichtbaren Markierung
EP2073175A1 (de) Datenträger für die gesicherte Identifikation und Sicherungsverfahren eines solchen Datenträgers
WO2019202027A1 (fr) Procédé pour authentifier un document securisé
FR3044451A3 (fr) Procede d'authentification par motif de glass
FR2989798A1 (fr) Dispositif de securite et document identitaire
CA3161385A1 (fr) Procede de segmentation d'une image d'entree representant un document comportant des informations structurees

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20190928