WO2000019365A1 - Carte porteuse d'informations et systeme a carte porteuse d'informations - Google Patents

Carte porteuse d'informations et systeme a carte porteuse d'informations Download PDF

Info

Publication number
WO2000019365A1
WO2000019365A1 PCT/US1999/021663 US9921663W WO0019365A1 WO 2000019365 A1 WO2000019365 A1 WO 2000019365A1 US 9921663 W US9921663 W US 9921663W WO 0019365 A1 WO0019365 A1 WO 0019365A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information
card
information card
inherent
Prior art date
Application number
PCT/US1999/021663
Other languages
English (en)
Inventor
Eiji Kawaguchi
Richard Eason
Kunihiro Tsuda
Original Assignee
Asa Systems, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Asa Systems, Inc. filed Critical Asa Systems, Inc.
Priority to EP99948328A priority Critical patent/EP1116176B1/fr
Priority to US09/806,653 priority patent/US6742712B1/en
Priority to AU61533/99A priority patent/AU6153399A/en
Priority to AT99948328T priority patent/ATE266886T1/de
Priority to CA002345107A priority patent/CA2345107A1/fr
Priority to DE69917302T priority patent/DE69917302D1/de
Publication of WO2000019365A1 publication Critical patent/WO2000019365A1/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/253Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually

Definitions

  • the present invention relates to an information card and an information card system. More particularly, it relates to an information card for use as a credit card, a cash-ven ⁇ ing card, an ID card, etc. which employs Steganography (i.e., image data embedding, digital watermarking, information hiding, or digital picture envelope technology) , and further to an information card system employing such an information card.
  • Steganography i.e., image data embedding, digital watermarking, information hiding, or digital picture envelope technology
  • One known type of the information card is heretofore an IC card for use as, e.g., a credit card and an ID card.
  • the IC card has an IC chip mounted on a plastic plate.
  • the IC chip has either a microprocessor and a memory or a memory only.
  • the IC card with the IC chip having both of the microprocessor and the memory is what is called an IC card, whne the IC card with the IC chip having only the memory is termed as a memory card.
  • the IC card for use as the credit card carries on its plastic plate surface the name of the card owner and the card number.
  • the memory (ROM) in the IC chip stores an authentication program, a password, and so on. In some cases, the authentication program and the password for use by the authentication program are encrypted for protection against unauthorized access.
  • Another object of the present invention is to provide an information card, which can completely be prevented from being illegally used, and an information card system.
  • the present invention as defined in claim 1 provides an information card including a memory that stores information data, the information data including either image data or acoustic data, the improvement wherein the information data contains inherent data that is embedded in the information data according to Steganography.
  • the information card may take a physical form as, e.g., an IC card or an optical card.
  • the present invention as defined in claim 2 provides an information card according to claim 1, wherein the inherent data shows either the legitimacy or card owner of the information card.
  • the present invention as defined in claim 3 provides an information car ⁇ according to claim 1 or 2, wherein the memory stores a password for permitting the information data to De read from tne memory.
  • the present invention as defined m claim 4 provides an information card according to any one of claims 1 to 3, wherein the information card employs a customized key m order to ⁇ ive a permission to extract the inherent data from the information data.
  • the customized key is data to control a flow of either an embedding program (encoder program) or an extracting program (decoder program) .
  • the customized key can be designed to allow only a legitimate card owner and authorized user of the information card to be aware of the customized key.
  • the present invention as defined m claim 5 provides an information card system comprising: an information card including a memory that stores information data, the information data including either image data or acoustic data, the information data containing inherent data that is embedded m tne information data according to Steganography, the memory storing a password for permitting the information data to be read from tne memory; and, a data processing terminal including input means for submitting a password, password checking means for checking the submitted password agaxnst the password stored m the information card to permit the information data to be read from the memory, and output means for outputtmg the read information data.
  • the data processing terminal can exchange data with the information card oy wire or wireless (m a contact or non-contact manner) .
  • the present invention as defined m claim 6 provides an information card system comprising: an information card including a memory that stores information data, the information data including either image data or acoustic data, tne information data containing inherent data that is embedded m the information data according to Steganography; and, a data processing terminal including input means for submitting a customized key, inherent data extracting means for extracting the inherent data with the use of the submitted customized Key, and output means for outputtmg the extracted inherent data.
  • Tne present invention as defined m claim 7 provides an information card system according to claim 6, wherein tne memory stores a password for permitting the information data to be read from tne memory, and wherein the data processing terminal includes input means for submitting a password, password checking means for checking the submitted password against the password stored m the information card to permit the information data to be read from the memory, and output means for outputtmg the read information data.
  • claim 8 provides an information card system according to any one of claims 5 to 7, wherein the extracted inherent data is wholly or partly checked against either inherent data read from a host or inherent data entered from an external source.
  • the present invention as defined in claim 9 provides an information card or an information card system according to any one of claims 1 to 8, wherein the inherent data is embedded according to Steganography by the steps of converting either image data or acoustic data, both formed as information data, to pure binary code data, or converting the pure binary code data to canonical gray code data, decomposing either the pure binary code data or the canonical gray code data into bit planes, segmenting the bit planes into regions according to a complexity measure, and replacing complex region- orming data with the inherent data.
  • the present invention as defined in claim 10 provides an information card or an information card system according to claim 9, wherein the inherent data to be embedded is subject to a conjugation operation.
  • the present invention as defined in claim 11 provides an information card or an information card system according to any one of claims 1 to 10, wherein the memory comprises an IC chip.
  • the present invention as defined in claim 12 provides an information card or an information card system according to any one of claims 1 to 11, wherein the information card carries a photograph on a surface thereof, and either the information data or the inherent data is image data representing tne photograph.
  • the information card contains the information data m the memory.
  • Tne information data includes either image data or the acoustic data.
  • the inherent data is embedded m the information data according to stegnanography .
  • the information data may be of such a size as to allow the inherent data to be embedded therein according to Steganography .
  • the inherent data shows either the legitimacy of the information card or the card owner of the information card.
  • the ⁇ nherent data is referred, it is easy to confirm and verify the legitimacy of the information card (, i.e., to check for card forgery or modification) . In addition, it is possible to hide the presence of such legitimacy data and card owner data.
  • the memory contains the password for allowing the information data to oe read from the memory
  • password checking can allow the information data to be read therefrom. Accordingly, the security of the stored information data can be made high.
  • tne use of the customized key enables the inherent data to be extracted from tne information data.
  • the customized key is not stored m the information card, and hence can be made highly safe because this Key cannot be stolen.
  • the information card contains the information data.
  • the information data has the inherent data embedded therein according to Steganography.
  • the information card further stores a password for permitting the information data to be read from the memory.
  • the data processing terminal checks a submitted password against the password stored m the information card. Wnen tne submitted password identifies with the stored password, then the data processing terminal permits the information data to be read from the information card, and then outputs such retrieved information data. For example, the read information data is displayed on a display unit, outputted as sounds, or transmitted as electronic data through a communication line.
  • the information data stored m the information card is protected against retrieval therefrom by password checking o ⁇ cause no unauthorized persons are allowed to access it.
  • the information card retains the information data and the inherent data.
  • the data processing terminal extracts the inherent data from tne information data oy means of a submitted customized key.
  • the data processing terminal permits the inherent data to be extracted only when the submitted customized key is a legitimate customized key.
  • the information card system provides a high level of security.
  • the information card contains the password other than the information data (the mnerent data) .
  • Tne data processing terminal protects the information data by password, and further protects tne inherent data by customized key. As a result, the mnerent data is protected against extraction by double protection scheme.
  • the inherent data is read from the host and put into the data processing terminal, or is submitted from the external source into the data processing terminal .
  • the read or submitted inherent data is wholly or partly checked against the inherent data that is contained m the information card.
  • the information card is possible to wor as it is programmed. For example, it can function as a credit card.
  • the information card system provides triple security, making it possible to eliminate forgery and illegal use.
  • the inherent data is embedded according to Steganography by the steps of converting the information data to pure binary code data, or converting the pure binary code data to canonical gray code data, decomposing the pure binary code data or the canonical gray code data into bit planes, and segmenting the bit planes into regions according to a complexity measure, and replacing complex region-forming data with the produced inherent data.
  • the memory of the information card stores information data that has the inherent data embedded therein.
  • tne mnerent data is hidden so that the third parties are unaware of tne presence of the inherent data.
  • the memory of the information card includes an IC chip.
  • an information card which serves as, what _s called, either a memory card or an IC card, and a system of such an information card.
  • an inexpensive card reader/writer can be provided as the data processing terminal.
  • the information card carries a photograph on the card surface thereof.
  • the information data or the inherent data represents the photograph.
  • image data is output and displayed, then such data can be checked against the photograph. This makes tne information card highly secure.
  • FIG. 1 is a olock diagram, showing the concept of the system according to the present invention.
  • the information card system includes an information card, a data processing terminal for exchanging data with the information card, and a host computer for exchanging data with the data processing terminal.
  • the information card has a memory for storing data.
  • the memory contains information data and a password.
  • the information data has inherent data embedded therein by a steganographic process.
  • the data processing terminal has input means, output means, password checking means, and inherent data extracting means .
  • the data processing terminal can read the information data by password checking. It can also extract the inherent data using a customized key. As a result, when the information card is used as a credit card, it is possible to completely eliminate the illegal use of the information card by any person other than the legitimate card owner. Further, it is also possible to completely eliminate illegal use of a forged information card. [0030]
  • the BPCS-Steganography (Bit-Plane Complexity Segmentation Steganography) is a process of replacing (embedding) a random pattern of image data with secret data, in view of the complexity (randomness) of a binary pattern on a "bit plane" that is obtained, e.g., by slicing the image data into bits.
  • a hiding capacity of a conventional steganographic process is in the range of 5 to 10%
  • the BPCS-Steganography has a hiding capacity of about 50% or up to some 70 in some cases. Therefore, the BPCS-Steganography is capable of nidmg with a very hign hiding capacity.
  • the BPCS-Steganography is based on the following four basic ideas:
  • Bit-plane decomposition is executed on a pure binary coded (PBC) image data or a “canonical gray coded (CGC) image converted from the PBC image data.
  • PBC binary coded
  • CGC canonical gray coded
  • a bit plane is segmented according to tne "complexity measure" of a binary pattern, and a complex pattern (random pattern) is replaced by the secret data (i.e., the secret data is hidden). The secret data thus hidden is completely unnoticeable for human eyes.
  • Files to be emoedded are subject to a "conjugation operation", so that any types of files can be embedded.
  • the algorithm of BPCS-Steganography (encoder and decoder programs! can be customized differently to different users.
  • the customized BPCS-Steganography algorithm establishes the security of emoedded information with the use of a "customized key” that is different from the password.
  • ⁇ t can hide with a large hiding capacity. This feature is applicable to the following:
  • the information card system employs a steganographic card which has an IC memory mounted on a conventional card (with a photograph of the card owner thereon) .
  • the IC memory has a storage capacity of 8 KB or more.
  • the steganographic card is used as follows :
  • the IC memory stores the data of the photograph of the card owner. In order to read this data, the password for the card must be submitted to a card reader.
  • the data of the photograph of the card owner contains personal data regarding the card owner (e.g., fingerprints, a personal history, data of relatives, data of hobbies, etc.) .
  • the personal data is embedded according to the BPCS-Steganography.
  • the customized key is defined as follows:
  • each security confirmation level is as follows :
  • Level 1 Visual checking of the card user against the photograph on the card ( order to prevent stolen or found cards from being illegally used) .
  • Level 2 Requesting the car ⁇ user to submit the 'password' , and visually cnecking the photograph data displayed on the display unit against the photograph on the card ( order to prevent photographs on cards from being forged) .
  • Level 3 Requesting the car ⁇ user to submit the "private key”, combining the private key with the "company key” that is sent on-line from the card company, and confirming whether tne personal data embedded according to the BPCS- Steganography can be extracted ( m order to prevent cards from being forged as a whole) .
  • hiding and extraction or information according to the BPCS-Steganography will be described below.
  • a noiselike area does not appreciably affect the visual appearance to the viewer even if the data therein is replaced with other noise-like data. This phenomenon allows us to replace noise-like areas in a natural image with secret data. Since a criterion to determine whether the noise-like areas varies depending upon the natural image, it is necessary to establish a suitable threshold value for each natural image data.
  • the area is decided as an area for secret data hiding or embedding.
  • the secret data file may be first divided into small file segments with " x 2 " size (i.e., 2 1 x 2 r pixel size), and then those small file segments may be embedded successively in noise-like areas of the same size in the image.
  • x 2 size
  • the small file segments having less complexity value than the threshold ⁇ TH are converted to more complex segments by a conjugation operation described below.
  • Such a process makes it possible to embed any secret files in images .
  • W is defined as a pattern where all pixels are white.
  • B is taken as a pattern where all pixels are blac.
  • Wc is viewed as a checkerboard pattern where the leftmost pixel the uppermost pixel row is white.
  • Be is taken as a checkerboard pattern where the leftmost pixel m the uppermost pixel row is black.
  • the binary image P is regarded as an image with a foreground area having the pattern B and a background area having the pattern W.
  • the "conjugated image" P* of the image P is defined as follows:
  • a process for producing a conjugated image is referred to as a conjugation operation.
  • the conjugated image P* is characterized as follows:
  • the foreground area is identical n shape to the foreground area of tre image P.
  • Tne foreground area has the checkerboard pattern Be.
  • Tne background area has the checkerboard pattern Wc .
  • Tne image P and the conjugated image P* have one-to-one correspondence.
  • the image P and the conjugated image P* satisfy the following properties:
  • the property (c) indicates that a simple image can pe converted to a complex image or vise versa without losing its shape information. It is also possible to restore the original image from the converted image because of the property (a) .
  • the BPCS-Steganography proposed by the present application includes the following five steps:
  • a natural image of 2 V' x 2 , N bits/pixel is converted to an N-bit gray code image. This conversion step is based on the study by Eij i Kawaguchi etal. of binary images produced by bit-plane decomposition and their complexity.
  • the gray code image generated in Step 1 is segmented into N binary images by bit-plane decomposition.
  • Each of the N binary images is divided into partial images each having a size of 2 1 " x 2 : .
  • the nth bit-plane image can be expressed by:
  • the nth "conjugation map” can be expressed as follows: where each of Q- , Q ', •••, Q t ' y - r ⁇ has a value of "0" or "1.” The value of "1" represents an area where the conjugation operation is applied. The value of "0" represents an area where the conjugation operation is not applied.
  • Embedded data (expressed by E) includes a header, a body, and a pad.
  • the header indicates a data size of the body.
  • the body represents secret data (e.g., a secret image) which is embedded.
  • the pad serves to shape the embedded data into the size of 2 n x 2 P
  • the partial bit series E. is corresponded to a square area of 2 x 2 " ', bit by bit, based on the principle of raster scanning, then a binary image of 2 ' x 2 " can be generated.
  • the generated binary image is represented by makeS(E- j ) .
  • the N-bit gray code image is reconstructed from the N binary images where the secret data is embedded.
  • the secret data embedded an image may be recover by the above algorithm being reversed. In order to recover the secret data from the embedded image, it is necessary to know the threshold ⁇ ⁇ and the conjugation map. [0035]
  • FIG. 2 is a block diagram, showing the concept of the IC card system.
  • FIG. 3 is a block diagram, illustrating a schematic structure of an IC card and an IC card reader/writer m the ID card system.
  • FIG. 4 is a block diagram, illustrating a ⁇ otner structural example of an IC card.
  • FIGS. 5 and 6 are flowcharts, showing programs to be executed m the ID card system .
  • an IC card 100 as an information card is capable of exchanging data with an IC card reader/writer (data processing terminal) 200.
  • the IC card reader/writer 200 can exchange data on-line with, e.g., a host computer 300 at a credit card company.
  • the IC card reader/writer 200 may be equipped with a ⁇ isplay unit 210 (display means) and an input means 220 (such as a mouse and a keyboard) .
  • the IC car ⁇ reader/writer 200 includes a CPU to execute arithmetic operation processing, a data memory for storing data, a program memory for storing programs, a buffer memory, the keyboard for entering data, a display unit for displaying results of the arithmetic operation processing, an interface for controlling data exchange ⁇ with the IC card, and a power supply.
  • the IC card reader/writer 200 is able to read data from ana write data tne IC card 100.
  • the CPU executes encrypting and decrypting processes and an authentication process.
  • the program memory stores application programs.
  • the IC card 100 nas an interface, a CPU, a program memory, and a data memory. Tne power supply of the IC card reader/writer 200 supplies electric power to the IC card 100.
  • the program memories and the data memories are nonvolatile types. These nonvolatile memories include EEPROMs that is electrically erasable, or static RAMs that is backed up by a battery.
  • FIG. 4 snows another structural exampie of an IC card. More specifically, the IC card includes a CPU, a PROM for storing data, and a connector for connection to an external device (an IC card reader/writer) .
  • the CPU includes a control unit, an arithmetic unit, a ROM, and a RAM.
  • the IC card includes an IC chip that is mounted on a plastic plate member.
  • the plastic plate member carries the name of the car ⁇ owner, the card number, and an expiration date, all of which are embossed on a surface thereof.
  • the IC cnip stores, in a memory thereof having a storage capacity of 8 KB or more, password data, digital image data of the card owner's photograph, or digital acoustic data (information data) .
  • the information data contains personal data of the card owner (e.g., fingerprints), a photograph of the card owner, and part of the personal data (digital signature image data), all of which are embedded according to the BPCS-Steganography.
  • the IC card system enables both visual verification of the card user and mechanical authentication of the IC card at one time. People cannot perceive any secret present m the IC card. Even if someone suspects some secrete data as being present the IC car ⁇ , tney cannot extract such an embedded ⁇ ata from the IC card.
  • the IC card may hide digital data or authentication data. The IC card system can properly read out such hidden authentication data from the IC card, and properly can embed the same data therein. [ 0039 ]
  • FIG. 5 shows a process (encoder program) in which data is stored in the IC card according to Steganography.
  • the card owner's photograph data (including indexed photograph data) is produced in order to be written to the IC card memory (8KB or more) .
  • the produced photograph data is saved as a bit map file.
  • the photograph data is set in size to be some 75% of the IC card memory.
  • the above photograph data is produced from the photograph data of the IC card owner.
  • personal authentication data (text data) is produced and then saved in order to be embedded in the photograph data.
  • the text data is set in size to occupy some 10% of the photograph data.
  • Both of the photograph data and the authentication data are selected and displayed.
  • the photograph data for the IC card is converted to pure binary code (PBC) data.
  • PBC binary code
  • the photograph data thus converted to the PBC data is then converted to canonical gray code (CGC) data.
  • CGC canonical gray code
  • the photograph data thus converted to the CGC data is decomposed into bit planes (i.e., into N binary images) .
  • the personal authentication data (text data) is embedded in the bit-plane-decomposed photograph data.
  • the personal authentication data is embedded according to the above algorithm, using a customized key (which consists of, e.g., 24 digits of data).
  • the photograph data having the embedded text data therein is then re-converted to PBC data.
  • the photograph data for use m the IC card is produced and then saved.
  • the IC card is inserted into the IC card reader/writer, and then any one of the photograph data is selected. Then, the selected photograph data is transferred and saved m the IC card memory. In order to protect the saved photograph data, a password is set and saved m the IC card memory.
  • the password consists of, e.g., 4 digits of data.
  • the IC card (for use as, e.g., an identification card) is now completed. Thereafter, a photograph of the card owner is printed out on tne plastic plate surface of the IC card.
  • FIG. 6 shows part of an decoder program.
  • the IC card is inserted into the IC card reader/writer. Then, the IC card reader/writer starts an initializing process m order to execute an authentication flow. Next, a password is s ⁇ omitted from a keyboard into the IC card reader/writer. The IC card reader/writer compares the submitted password with the stored password m the memory on the IC card. When the submitted password identifies with the stored password, then the IC card reader/writer reads the photograph data (information data) stored the IC card memory, and displays it on the display unit. When the displayed photograph data indicates a photograph of the card owner, then the displayed photograph ..s visually checked against the photograph printed on the IC card surface and against the card user himself.
  • a customized key is submitted.
  • the customized key is used to embed the personal authentication data.
  • the customized key is known only to the legitimate card owner.
  • the customized key is not stored the IC card memory.
  • the customized key works as parameters to control over embedding and extracting of the inherent data.
  • the inherent data is extracted from tne information data only when the customized key submtte ⁇ to extract the inherent data identifies with parameters that are used for embedding.
  • the photograph data (information data) read from the IC card memory is converted to pure binary code (PBC) data, and then the photograph data thus converted to the PBC ⁇ ata is converted to canonical gray code (CGC) data.
  • the CGC data of the photograph is decomposed into bit-planes.
  • the personal authentication data is extracted f om the photograph data already decomposed into the bit-planes, using the customized key.
  • the embedde ⁇ personal authentication data (text data) is extracted from the pnotograph data, and is then displayed.
  • the IC card system is designed to execute password checking after visually checking is made as to whether a card user is an authorized card owner, and then to allow the photograph data to be read from the IC card memory and the pnotograph image to be displayed on the basis of the photograph data.
  • the displayed photograph image is compared with the photograph printed on the IC card, thereby checking the legitimacy of the IC card.
  • the personal authentication data is extracted from the photograph data using a customized key.
  • the extracted data is then displayed.
  • the displayed personal data is compared with the card user' s personal data, thereby confirming that the presented IC card is a legitimate card.
  • apparent image data contains other image data, acoustic data, and text data, all of which are present a visually imperceptible manner. These embedded data are checked to confirm that the card user and the card are both legitimate.
  • the inherent data is possible to verify the legitimacy of the information card. It is possible to hide the presence of the legitimacy data and the card owner data.
  • the password enables protection of the information data, with a consequential increase m security of the card.
  • the customized key can protect the inherent data.
  • the information data can be protected against retrieval by password checking [0047]
  • the information card can be prevented from being illegally used by means of the password and customized key.
  • the mnerent data is embedded according to stegnanography, and is thus difficult to decrypt .
  • the inherent data can securely be hidden.
  • an information card which works as a memory card or an IC card, and a system of such an information car ⁇ .
  • an inexpensive card reader/writer can De provided.
  • the image data can pe checked against the photograph.
  • the photograph can be prevented from being forged. 4. BRIEF EXPLANATION OF THE DRAWINGS
  • FIG. 1 is a bloc diagram, illustrating how an information card system according to the present invention functions
  • FIG. 2 is a block diagram, showing an information card system according to an embodiment of the present invention.
  • FIG. 3 is a block diagram, showing how the information card system according to the embodiment is electrically constructed
  • FIG. 4 is a block diagram, illustrating how an information card according to the embodiment is electrically constructed
  • FIG. 5 is a flowchart, showing an embedding process (encoder program) in the information card system according to the embodiment
  • FIG. 6 is a flowchart, showing an authentication process (decoder program) in the information card system according to the embodiment.
  • FIGS. 7(A) to 7(F) are simulative illustrations illustrative of a conjugation operation according to the present invention. [Identification of Reference Numerals]

Landscapes

  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Credit Cards Or The Like (AREA)
  • Storage Device Security (AREA)
  • Control Of Vending Devices And Auxiliary Devices For Vending Devices (AREA)
  • Holo Graphy (AREA)
  • Optical Record Carriers And Manufacture Thereof (AREA)

Abstract

L'invention concerne un système à carte porteuse d'informations empêchant toute fabrication de faux ou utilisation illicite d'une carte. La carte porteuse d'informations de cette invention mémorise des données numérisées dans une mémoire, ces données numérisées contenant des données caractéristiques incluses par stéganographie. Cette carte porteuse d'informations mémorise également un mot de passe permettant à la mémoire de lire les données numérisées, un terminal de traitement de données étant par ailleurs destiné à vérifier un mot de passe soumis en le comparant au mot de passe mémorisé. Si ces mots de passe correspondent, la mémoire peut ainsi lire lesdites données numérisées. Une clé personnalisée est en outre soumise afin d'extraire les données caractéristiques, lesquelles peuvent être extraites uniquement si cette clé personnalisée est valable. Ce système à carte porteuse d'informations permet donc à la fois de masquer la présence desdites données caractéristiques et de prévenir toute extraction non autorisée de ces données, une personne non autorisée ne pouvant connaître la clé personnalisée. Ce système à carte porteuse d'informations offre donc un niveau de sécurité élevé.
PCT/US1999/021663 1998-09-29 1999-09-17 Carte porteuse d'informations et systeme a carte porteuse d'informations WO2000019365A1 (fr)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP99948328A EP1116176B1 (fr) 1998-09-29 1999-09-17 Carte porteuse d'informations
US09/806,653 US6742712B1 (en) 1998-09-29 1999-09-17 Information card and information card system
AU61533/99A AU6153399A (en) 1998-09-29 1999-09-17 Information card and information card system
AT99948328T ATE266886T1 (de) 1998-09-29 1999-09-17 Informationskarte
CA002345107A CA2345107A1 (fr) 1998-09-29 1999-09-17 Carte porteuse d'informations et systeme a carte porteuse d'informations
DE69917302T DE69917302D1 (de) 1998-09-29 1999-09-17 Informationskarte

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP27551398A JP3636898B2 (ja) 1998-09-29 1998-09-29 情報カードおよび情報カードシステム
JP10/275513 1998-09-29

Publications (1)

Publication Number Publication Date
WO2000019365A1 true WO2000019365A1 (fr) 2000-04-06

Family

ID=17556530

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1999/021663 WO2000019365A1 (fr) 1998-09-29 1999-09-17 Carte porteuse d'informations et systeme a carte porteuse d'informations

Country Status (7)

Country Link
EP (1) EP1116176B1 (fr)
JP (1) JP3636898B2 (fr)
AT (1) ATE266886T1 (fr)
AU (1) AU6153399A (fr)
CA (1) CA2345107A1 (fr)
DE (1) DE69917302D1 (fr)
WO (1) WO2000019365A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7031693B2 (en) 2001-09-13 2006-04-18 Seamless Distribution Ab Method and system for refilling mobile telephone prepaid phone cards via electronic distribution of refill codes
US11829499B2 (en) * 2020-03-26 2023-11-28 Bank Of America Corporation Securing PIN information using obfuscation by applying extra security layer

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4700782B2 (ja) * 2000-04-25 2011-06-15 日立オートモティブシステムズ株式会社 個人認証システム
JP2010204829A (ja) * 2009-03-02 2010-09-16 Nec Corp 認証装置、認証方法及び利用者認証システム
CN101989237B (zh) * 2009-08-03 2014-12-17 成都宇飞信息工程有限责任公司 基于信息隐藏和数字水印技术的u盘信息安全系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0334616A2 (fr) * 1988-03-21 1989-09-27 Leighton, Frank T. Méthode et installation pour identification personnelle
EP0638880A1 (fr) * 1993-08-10 1995-02-15 Audio DigitalImaging, Inc. Méthode pour la vérification de données vidéo d'identification infalsifiables
US5636292A (en) * 1995-05-08 1997-06-03 Digimarc Corporation Steganography methods employing embedded calibration data
US5689587A (en) * 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE19536206A1 (de) * 1994-09-30 1996-04-04 Samsung Electronics Co Ltd Intelligente Karte

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0334616A2 (fr) * 1988-03-21 1989-09-27 Leighton, Frank T. Méthode et installation pour identification personnelle
EP0638880A1 (fr) * 1993-08-10 1995-02-15 Audio DigitalImaging, Inc. Méthode pour la vérification de données vidéo d'identification infalsifiables
US5636292A (en) * 1995-05-08 1997-06-03 Digimarc Corporation Steganography methods employing embedded calibration data
US5636292C1 (en) * 1995-05-08 2002-06-18 Digimarc Corp Steganography methods employing embedded calibration data
US5689587A (en) * 1996-02-09 1997-11-18 Massachusetts Institute Of Technology Method and apparatus for data hiding in images

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7031693B2 (en) 2001-09-13 2006-04-18 Seamless Distribution Ab Method and system for refilling mobile telephone prepaid phone cards via electronic distribution of refill codes
US11829499B2 (en) * 2020-03-26 2023-11-28 Bank Of America Corporation Securing PIN information using obfuscation by applying extra security layer

Also Published As

Publication number Publication date
DE69917302D1 (de) 2004-06-17
CA2345107A1 (fr) 2000-04-06
AU6153399A (en) 2000-04-17
EP1116176B1 (fr) 2004-05-12
ATE266886T1 (de) 2004-05-15
JP3636898B2 (ja) 2005-04-06
EP1116176A1 (fr) 2001-07-18
JP2000105812A (ja) 2000-04-11

Similar Documents

Publication Publication Date Title
US6742712B1 (en) Information card and information card system
US8058972B2 (en) Methods and devices for enrollment and verification of biometric information in identification documents
Ratha et al. Enhancing security and privacy in biometrics-based authentication systems
Jain et al. Hiding biometric data
US6978035B2 (en) Information hiding system, method, and printed matter into which information is hidden
KR100335308B1 (ko) 워터마크를 이용한 인간 지각가능 데이터 세트의 배포와 인증 방법 및 그 장치
JP3768249B2 (ja) 物その他の実体を識別する方法および識別カードを製造する装置
US20050036651A1 (en) Digital anti&minus forging method
CA2374196A1 (fr) Protection de la legitimite d'un document electronique et d'une copie imprimee associee
KR20060074912A (ko) 암호화로 안전한 개인 신원 확인
ES2899599T3 (es) Procedimientos de registro de datos de un documento de identidad de un individuo y de autenticación de un documento de identidad
US20100260372A1 (en) Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination
Komninos et al. Protecting biometric templates with image watermarking techniques
KR101509877B1 (ko) 이미지로부터 생성한 워터마크를 이미지에 삽입하는 기법에 의한 워터마킹 방법 및 장치
JP2001126046A (ja) Icカード、icカード認証システム、及びその認証方法
EP1116176B1 (fr) Carte porteuse d'informations
JP2005293490A (ja) 生体認証システム
US11279164B1 (en) Length-modulated screening lines and line codes
CN115526282A (zh) 水印加密方法、水印提取方法、装置及存储介质
Yadav et al. Biometric template security using invisible watermarking with minimum degradation in quality of template
CN111523141A (zh) 一种基于个人隐私保护的身份标识和核验系统
EP2350913B1 (fr) Procédé et dispositif de capture électronique d'une signature manuscrite en utilisant une technique d'imbrication
US20030048924A1 (en) Method for inserting binary messages in a digital image
Khan Transmission of Secure Biometric Data for Network-based User Authentication
Busch et al. 3D Face Recognition for Unattended Border Control.

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
ENP Entry into the national phase

Ref document number: 2345107

Country of ref document: CA

Ref country code: CA

Ref document number: 2345107

Kind code of ref document: A

Format of ref document f/p: F

WWE Wipo information: entry into national phase

Ref document number: 1999948328

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 1999948328

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 09806653

Country of ref document: US

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWG Wipo information: grant in national office

Ref document number: 1999948328

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP