WO2004084418A2 - Procede permettant d'appliquer un element de securite cache - Google Patents
Procede permettant d'appliquer un element de securite cache Download PDFInfo
- Publication number
- WO2004084418A2 WO2004084418A2 PCT/GB2004/001173 GB2004001173W WO2004084418A2 WO 2004084418 A2 WO2004084418 A2 WO 2004084418A2 GB 2004001173 W GB2004001173 W GB 2004001173W WO 2004084418 A2 WO2004084418 A2 WO 2004084418A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- security feature
- indicia
- elements
- characteristic
- substrate
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/004—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using digital security elements, e.g. information coded on a magnetic thread or strip
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/2041—Matching statistical distributions, e.g. of particle sizes orientations
Definitions
- the invention relates to methods for providing a covert security feature on an article such as a document of value.
- the presence of such a feature can be used to determine the authenticity of the article and/or to prevent a copying process being undertaken.
- Photocopiers, DTP systems, scanners/PCs/printers, digital press and other image reproduction devices are becoming more sophisticated as manufacturers attempt to enable much more accurate or realistic reproductions to be generated.
- document for example documents of value, where reproduction is undesirable.
- security features such as optically variable devices and the like.
- equipment manufacturers have devised methods which enable a photocopier or DTP system to recognise that it has been presented with a document of value which should not be reproduced and then stop the reproduction process.
- this has involved incorporating certain codes such as digital watermarks and the like into documents. The photocopier looks for the code or watermark and a decision is made as to whether or not to copy dependent upon the presence or absence of the code or watermark.
- EP-A-961239 describes an approach in which machine readable data is imperceptibly embedded into visual data by altering the distribution of the ink slightly to encode the data.
- the data can then be retrieved and decoded using a suitable detection device such as a scanner; the scanner may form part of a copying apparatus .
- a method of providing a covert security feature on an article comprises generating data defining indicia to be provided on a substrate of the article, the indicia comprising a plurality of elements, wherein the data defines a security feature constituted by a characteristic of the elements which varies in a predetermined manner; and providing the indicia on a substrate of the article using a marking material and in accordance with the data, wherein the providing step causes the characteristics of the elements to vary so that the security feature cannot be determined from a visual inspection of the indicia on the substrate but the presence of the security feature can be deduced following a statistical analysis of the variation in the said characteristic of the elements of the indicia on the substrate using the predetermined manner in which the security feature was defined.
- the invention recognises and takes advantage of the fact that the step of providing indicia on the substrate will degrade the elements of the indicia to such an extent that the precise form of the original feature cannot be derived from the indicia.
- the invention goes on to recognise, however, that the existence of the feature (even though its precise form cannot be determined) can be deduced by analysing the statistical properties of the elements in the knowledge of the predetermined manner in which the feature was defined.
- the characteristics of the elements are typically selected to have statistical properties that are strongly related to the quality of the image on the substrate, and/or to reflect the empirically determined properties of the distribution of marking material on the substrate. For example, in a design which consisted of closely arranged line segments the characteristic might be the tendency of segments to merge. The measurements of such a characteristic would have statistical properties that were a well defined function of the marking ink and the substrate .
- the present invention measures properties of putative banknotes which are directly related to their quality of production and hence provides an indicator of likely authenticity.
- the predetermined manner comprises varying the data defining the characteristic of known elements in a known manner between a plurality of values, although it is possible to allow a subset of the elements to have characteristics that take on values that are not predetermined to act as a control set or give a bench mark.
- the data defining the characteristic is varied between two values although three or more values are possible.
- line segments these may be physically spaced apart or different parts of a continuous line, e.g. a spiral.
- the principle of the invention therefore, covers any feature which cannot be reproduced with absolute precision by the printing and scanning processes or by photocopying processes using electrostatic means, for instance.
- In the former category are any geometrical features such as line width, line length, regularity of location of featur-es.
- In the latter are any colour features using subtle colour changes that cannot accurately be reproduced and possible metamerism to confuse the reproduction processes.
- the modified pattern will be composed of two or three elements that are repeated in a regular pattern to form a design, the appearance being the result of the location and orientation of the elements.
- the design may comprise continuous lines as in a medallion pattern. This can be contrasted with "digital watermarking" where each pixel of an image is described by a multibit parameter and where the placing of any elements is non predictable and indeed conveys the information which is the essence of the image.
- the essence of the preferred implementation is the printing onto a substrate of a pattern, with measurable characteristics that are very sensitive to the scanning and printing operations that form a necessary part of the unauthorised copying process.
- the pattern to outward appearances is typically a conventional line pattern but in reality is made up of sets of near identical elements distributed in an ostensibly random manner according to a sequence known only to the originator.
- the distinctions between the elements although clearly defined in the original filmwork and printing plates or in electronic form for digital printing, are obfuscated by the printing process with the inevitable indeterminancy arising from the unpredictable transfer and flow of ink onto a substrate.
- the authenticity of the substrate e.g. a banknote, is guaranteed by the detection of the sequence following the scanning of the banknote and application of an algorithmic detection process based on a statistic analysis of the data.
- An important feature of the invention is the fact that the originating pattern is not revealed to those who have access only to the printed copy.
- the unpredictable spreading of ink brought about by the printing process ensures that all that is available is a distribution that has statistical properties deriving from the original file.
- a consequential feature of the invention is the requirement to characterise the operation of the printer and the ink flow on the document so as to predict the optimal difference in dimensions of the elements forming the pattern.
- the unpredictability of ink flow and the "dot gain" or ink spread may result in lines, whose original widths were identical, differing by perhaps ten per cent on the printed document, i.e. there is a variation in width along the length of a line.
- the statistical analysis comprises determining for each group of known elements corresponding to each of the plurality of values, a distribution of the actual values of the characteristic obtained from the indicia on the article, and comparing the distributions, whereby if the difference between the distributions is greater than a threshold, the presence of the security feature is deduced. It will be appreciated that other statistical analyses could be carried out as discussed later.
- the predetermined manner utilizes a pseudo-random sequence.
- a pseudo-random sequence is that although it is very difficult to deduce from the resultant feature, it can be regenerated by repeating the same algorithm which will normally respond to a seed or seeds .
- seed(s) could be used to provide the seed(s) .
- the seed number could be derived from any random source, typically a hardware device, or from such data as the time and date of printing. However, the seed has to be present in the document be it as a printed number or as some pattern of colours or lines (e.g. bar code) .
- pseudo-random sequences include any function of a seed number such as a one way hash of a serial number.
- the significance of a one way hash is that the original number cannot be deduced from the hash and so no recoverable information is added.
- An important further feature of the invention can be obtained when the variation in the characteristic of the elements is chosen such that after the article provided with the indicia is copied, the presence of the security feature cannot be deduced following the said statistical analysis .
- This enables copies of articles to be detected on the basis that a genuine article should have retained the security feature in a deducible form while a counterfeit copy, due to degradation introduced by the copying process, will no longer allow the security feature to be detected.
- An advantage of this is that copiers do not need to be provided with special detection equipment and can simply allow copies to be made but those copies can be detected as counterfeit when presented to a recipient .
- a method of inspecting indicia on an article to determine if the indicia includes a security feature comprises scanning the indicia to generate data defining the said characteristic of elements of the indicia; analysing the data in accordance with the predetermined manner associated with the security feature to determine the statistical distribution of the variation in the said characteristic; and indicating that the security feature is present if the statistical distribution satisfies predetermined conditions.
- the scanning step may be carried out using a flatbed scanner, or a web or digital camera or any other suitable scanning or image capture device.
- the presence or absence of the security feature can be utilized in different ways depending upon the equipment involved in carrying out the method.
- the security feature can be treated as an anti -copy feature whose presence could be used to prevent a copy being made, cause only a partial copy to be issued, cause the copy to be damaged or marked, or indicate an illegal action is occurring.
- the feature can also be used as a teller assist feature to distinguish between a genuine document and a counterfeit .
- Figure IB illustrates the Figure 1A pattern after modification
- Figure 1C illustrates the Figure IB pattern after printing
- Figure ID illustrates the Figure 1C pattern after further copying
- Figure 2 shows part of the pattern in Figure IB, further enlarged
- FIGS 3A and 3B illustrate graphically the distribution of line segment thicknesses for the Figure 1C and Figure ID example respectively;
- Figure 4 is a block diagram of apparatus for preparing filmwork of the security feature
- Figure 5 is a block diagram of a teller assist arrangement
- Figure 6 is a block diagram of a photocopier.
- indicia defining line structure patterns commonly used in banknote printing for example "medallion” are used. These are designs which consist entirely of lines.
- the lines are generally printed in a single “spot” colour (as opposed to being generated by a four or six colour printing process) , although they could also be rainbowed in accordance with methods used by high security printers .
- an electronic file is constructed conveniently in vector format, where line segments are described by their end points.
- the modifying pattern is conveniently generated by the use of pseudo random numbers, that is to say, numbers whose values are fairly evenly distributed and which lack any regular pattern that would be discernible by human perception unaided by analytical tools.
- a security line pattern on the banknote.
- a security line pattern consists of a set of regular hexagons, each hexagon containing 8 parallel lines orientated horizontally, vertically or at +/- 45 degrees. (See Figure 1A) .
- orientation of the lines within a hexagon is used to obtain a seed value, i.e. each orientation is assigned an arbitrary value:
- Orientation of lines at three or more particular points relative to the edge of the banknote is determined.
- the corresponding numbers are then noted and then used in a formula such as that described above in order to generate a set of random numbers .
- the first three letters of country/currency name are chosen and corresponding numbers are noted.
- the random numbers are subjected to a one way "hash" before being used as determinants of the pattern. That is to say the numbers are transformed into a new set of numbers by a rule that cannot be reversed. This means that it is not possible from the generated pattern to deduce the seed values and thus the pattern is not the holder of any information.
- the set of random numbers, once generated, is used to select the elements to be modified in the manner described below.
- Figure 1A An example of a suitable pattern is shown in Figure 1A consisting of a set of regular hexagons, each hexagon containing 8 parallel lines, the lines being horizontal, vertical or diagonal.
- the pattern is then divided up in a regular manner that can be described by a simple algorithm, (the division being conceptual rather than consisting of visible physical lines) .
- the simplest method is to divide the pattern into a set of congruent rectangles although a shape that is more adaptive to the original pattern can improve the statistical properties of the pattern modification.
- Figure 2 shows an example of a single such hexagon. The subdividing rectangles are outlined with narrower lines.
- the line widths will be roughly 50-250 ⁇ m and the line separation roughly 50-270/xm.
- the dimensions are appropriate to particular printing conditions as indicated below.
- rectangles are then labelled in an orderly manner, typically in a rasterised form from left to right and from top to bottom.
- the order is immaterial provided the decoder uses the same order as the encoder.
- the process divides the rectangles into two sets, distinguished by the fact that the width of lines in one set is greater than the widths in the other set .
- the sets are chosen by use of the random numbers.
- Each rectangle in order is associated with a random number, the numbers taken in sequence.
- a criterion is established which determines whether any given random number shall correspond to a wide or a narrow line. For example, if the sum of digits of the given random number is odd then the line should be wide whereas if the sum is even the line should be narrow. If a rectangle is designated as wide then the segment of line passing through that rectangle is widened by maybe 4 pixels.
- a decision has to be made about lines that are partly in two rectangles, and again the deciding criterion is irrelevant providing it is shared with the decoding software.
- Figure IB shows the modified form of the Figure 1A pattern while Figure 2 shows a single hexagon from Figure IB.
- the same process can be applied to other patterns. It may be that instead of rectangles, rhombi are used as the subdividing shape in order to fit the pattern more closely. This would lessen the number of cases that occur in the previous pattern where the rectangle includes intersections of two or more hexagons and hence gives less reliable information.
- the resultant modified pattern is stored as data in electronic form.
- the modified pattern is conveniently converted into a raster format file for film plotting purposes and a printing plate produced.
- a typical banknote is printed on a fibrous cotton or non-cotton based substrate where the precise spread of ink is randomised to a degree by the paper's fibrous nature.
- Figure IC illustrates the result of printing the pattern on paper. Inspection Process
- a banknote In order to determine whether or not a banknote is genuine under the present scheme it is first of all necessary to obtain a digital image of appropriate quality for analysis. Using the range of parameters indicated above a suitable digital image may be obtained by using a cheap flat bed scanner at a resolution of around 300 dpi. The fact that this is less than the printing resolution does not invalidate the analysis because of the statistical nature of the decoding process.
- an instant image retrieval might be required rather than the slow machinations of a scanner.
- This is possible by using a web camera or a digital camera or image capture device in a suitable environment. This environment would include lighting of sufficient intensity, accurate placing of the optical instrument so as to achieve little distortion, or distortion of known characteristics which can be corrected by appropriate geometrical transformation .
- the first process in recovering the data is to establish the precise location and orientation of the virtual grid on the image of the banknote being examined. This is achievable in a number of ways. Knowledge of the position of the pattern relative to some prominent feature on the banknote offers a simple method. Alternatively the pattern itself may have certain macro features which provide fiducial points capable of establishing orientation. Thus in a pattern of hexagons there may be points at which three hexagons all having vertical lines intersect. Determination of a pair of such points may be sufficient to establish a representative direction and also provide a scaling factor to offset distortions due to paper stretching, inaccuracy of scanner lead screw or any similar mechanical defect.
- the image in the case of the Figure IC pattern, can be subdivided into rectangles again as illustrated in Figure 2, except that there will be a degree of blurring of the image following the printing and scanning processes.
- the second process is to generate the appropriate set of random numbers, the same set that was used to modify the original file.
- the requirement here is to find the seeding values. If these have been based on the serial number of the banknote this number will probably be obtained by using optical character recognition on the scan of the serial number. If instead the number generation is based on the preferred approach of using the configuration of the hexagon pattern then the image will be analysed to ascertain, for example, the orientation of lines in a set of hexagons, this being a very simple coding device.
- the set of virtual rectangles can then be associated with the set of random numbers in the same order that was used in the encoding process .
- the result is that the image is conceptually subdivided into rectangles, each rectangle being classified as corresponding to a wide line or a narrow line. (There may be a greater number of classifications in other embodiments.)
- the data within each rectangle is then analysed to produce a metric corresponding to the width of the line. If the data is bilevel (as in Figure 2) , that is to say the scan values are either black or white, the width of the lines is assessed by a simple counting process. There will generally be corrections to allow for random pixel values using knowledge of the type of configurations allowed in the original pattern.
- the data will be contone in form. That is to say, each pixel will have attributed a value typically in the range 0 to 255 according to how dark or light it is.
- a threshold has to be determined to decide whether a particular pixel is deemed to be part of a line or part of the interstitial space. Adjustments have to be made for the configuration of pixels allowing for the fact that closely bunched pixels tend to produce generalised darker areas on account of ink flow in the printing process or signal spreading in the scanning process. It should also be borne in mind that the orientation and alignment of the rectangles can never be exact because, in addition to the above mentioned distortions there is a variable stretching of the substrate, mechanical inaccuracies in scanner lead screws etc.
- each set of rectangles has an associated set of numbers corresponding to the width of lines within the rectangular cells.
- Figure 3A illustrates this situation in the case where printing takes place on a substrate which is a coated paper producing little "dot gain" or ink spread as shown in Figure IC.
- Scan resolution is 300 dpi and line width is digitized into 256 values (from 0 for all black to 255 for pure white, i.e. zero thickness) .
- the line thickness is assessed essentially by totalling the values for each pixel within a rectangle. It can be seen that the thickness values for the rectangles containing the supposedly narrow lines vary from roughly 8 to 23 with a peak at roughly 14 (These thickness values are in arbitrary units) .
- the values for the other rectangles containing supposedly thick lines range from roughly 9 to 25 with a peak at 17.
- the standard deviation of line widths is approximately 2 for both the wide and narrow lines. This spread can be taken under reasonable assumptions as an estimate for the spread of the distributions that would be found in any banknote that is sampled. If we take a sample of 100 rectangles and calculate the mean, this mean value will vary less than the individual samples as one intuitively expects. Using elementary statistics the standard deviation of the means will be reduced from the standard deviation of the original individual rectangle distribution by a factor equal to the square root of 100, i.e. 10, giving the value 0.2. If we keep sampling banknotes at random the probability of a mean being more than 2 standard deviations from the mean of the means is very small according to statistical theory for the likely distributions.
- the embedded pattern made adjustment to the lengths of lines rather than the widths the analysis would be more or less identical to that above. There would, however, tend to be skewing of the distribution because both the printing process and the scanning process tend to elide features which are not clearly separated, as would be the case with line patterns which are fragmented according to some random rule.
- the embedded pattern uses variation in colour it would be possible to use two or three "spot" colours which differed very slightly and where the differences were blurred by the differential absorption and flow of ink on the substrate.
- a scanner with a suitably selected filter would be the instrument for image retrieval .
- FIG. 4 An example of apparatus for preparing filmwork including a pattern of the type described above modified to include an anti-copy or security feature, is shown in Figure 4.
- the apparatus comprises a processor 10 coupled to a pair of data stores 11,12.
- the data store 11 stores data defining the colour content of pixels of an image such as an image of a banknote and including a line pattern of, for example, the Figure 1 type described above.
- the processor is also connected to a random number generator (RNG) 13.
- RNG random number generator
- the processor 10 provides seed(s) to the RNG 13 which then generates a pseudo-random sequence which the processor uses to modify data from the store 11 defining the Figure 1 pattern so as to change line segment widths between thin and thick values, the modified pattern then being stored in the store 12.
- the processor 10 then supplies the pattern in the store 12 to a conventional imagesetter 14 which exposes the banknote pattern onto a suitable record medium such as a film in a conventional manner. From this film, a printing plate is formed which is then used to print the pattern on to banknote paper. As explained above, the printing process will cause the thick and thin widths as originally defined by the data in the store 12 to be further modified or degraded such that a number of line segments intended to be "thin" appear “thick” and vice versa. (In this context, a typical variation in thickness between "thick” and “thin” lines is 5%.) In addition, a pattern or other indicia from which the seed(s) can be derived may also be printed e.g. a serial number. Teller Assist Embodiment
- FIG. 5 illustrates in schematic, block diagram form a teller assist arrangement for use in banks, retail outlets etc.
- the device comprises a banknote transport system 50 of conventional construction driven by a motor 52.
- Banknotes are supplied singly by a teller to an input slot 54 and are then transported by the transport system past at least one detector 56.
- the detector 56 allows a processor 58 to generate digital data defining the colour content of each pixel of the banknote which is stored in a similar manner to that described above in connection with
- the processor 58 analyses the stored data utilizing a random number generator 60 to determine whether or not a security feature is present on the document. As described above, this may involve obtaining one or more seeds from the scanned image which are used by the RNG 60 to define a pseudo-random sequence used by the processor 58 to determine whether each region in a line pattern should be "thick" or "thin".
- the processor 58 causes a message to be displayed on a monitor 62 indicating whether the banknote is genuine or not. Depending upon the structure of the transport system 50, the result of the determination can then be used in a variety of ways to control further handling of the banknote.
- the processor 58 controls the motor 52 to reverse the transport systems so that the banknote is fed back out through the slot 54 for further handling by the teller.
- the transport system 50 may be connected with a store (not shown) , the processor 58 allowing the motor 52 to continue operating so that genuine banknotes are fed on for storage in the store.
- the processor 58 allowing the motor 52 to continue operating so that genuine banknotes are fed on for storage in the store.
- the motor 52 is reversed and the banknote fed back out through the slot 54. In this case, it would not be necessary to display the outcome of the test on the monitor 62 since the performance of the transport system 50 would inevitably provide that information to the teller.
- the teller could control the motor 52 via an input device 64 such as a keyboard, mouse or touch screen thus allowing the teller to determine how the banknote is further handled i.e. returned to the teller or send to a store.
- an input device 64 such as a keyboard, mouse or touch screen
- Figure 6 illustrates in block diagram form a typical photocopier structure.
- the apparatus of Figure 6 comprises a processor 20 coupled to a RNG 21 and to an input scanner
- a document to be copied is supplied to the scanner 22 which will create digital data defining the colour content of each pixel of the scanned document, the digital data being stored in a store 23.
- the processor 20 analyses the data in the store 23 in the manner described above to determine whether or not the anti -copy, security feature is present in the original document. This analysis may involve obtaining one or more seeds from the scanned image, for example a serial number or the like, which are used by the RNG 21 to define the pseudo-random sequence used by the processor 20 to determine whether each region in the line pattern should be "thick" or "thin". Alternatively, the random number sequence could be prestored.
- the processor 20 can then make a decision as to whether or not the anti-copy feature is present on the original document. If it is then it is likely that the copier will wish to prevent the document being copied. In one application, therefore, a processor 20 could cause an output device or printer 24 to cease operation and the data could be deleted from the store 23 to prevent further reproduction. In another option, the processor 20 could control the output device 24 to generate a poor copy of the original document which would be easily recognisable as such while in a further alternative, a special marking could be applied by the output device 24 on the copy indicating that it is a copy and not an original.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computer Security & Cryptography (AREA)
- Credit Cards Or The Like (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0306578.6 | 2003-03-21 | ||
GBGB0306578.6A GB0306578D0 (en) | 2003-03-21 | 2003-03-21 | Method of providing a covert security feature |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2004084418A2 true WO2004084418A2 (fr) | 2004-09-30 |
WO2004084418A3 WO2004084418A3 (fr) | 2005-02-10 |
Family
ID=9955288
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/GB2004/001173 WO2004084418A2 (fr) | 2003-03-21 | 2004-03-18 | Procede permettant d'appliquer un element de securite cache |
Country Status (2)
Country | Link |
---|---|
GB (1) | GB0306578D0 (fr) |
WO (1) | WO2004084418A2 (fr) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5193853A (en) * | 1989-01-18 | 1993-03-16 | Wicker Ralph C | Nonreplicable document and method for making same |
US5629770A (en) * | 1993-12-20 | 1997-05-13 | Lucent Technologies Inc. | Document copying deterrent method using line and word shift techniques |
US5710834A (en) * | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
WO2000007356A2 (fr) * | 1998-07-31 | 2000-02-10 | Digimarc Corporation | Filigranes numeriques et procedes pour documents de securite ou analogues |
US6104812A (en) * | 1998-01-12 | 2000-08-15 | Juratrade, Limited | Anti-counterfeiting method and apparatus using digital screening |
WO2001086579A2 (fr) * | 2000-05-08 | 2001-11-15 | Digimarc Corporation | Enveloppes et documents imprimes utilisant des filigranes numeriques, et procedes associes |
US20030026452A1 (en) * | 1995-05-08 | 2003-02-06 | Rhoads Geoffrey B. | Methods and systems for watermark processing of line art images |
-
2003
- 2003-03-21 GB GBGB0306578.6A patent/GB0306578D0/en not_active Ceased
-
2004
- 2004-03-18 WO PCT/GB2004/001173 patent/WO2004084418A2/fr active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5193853A (en) * | 1989-01-18 | 1993-03-16 | Wicker Ralph C | Nonreplicable document and method for making same |
US5629770A (en) * | 1993-12-20 | 1997-05-13 | Lucent Technologies Inc. | Document copying deterrent method using line and word shift techniques |
US5710834A (en) * | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US20030026452A1 (en) * | 1995-05-08 | 2003-02-06 | Rhoads Geoffrey B. | Methods and systems for watermark processing of line art images |
US6104812A (en) * | 1998-01-12 | 2000-08-15 | Juratrade, Limited | Anti-counterfeiting method and apparatus using digital screening |
WO2000007356A2 (fr) * | 1998-07-31 | 2000-02-10 | Digimarc Corporation | Filigranes numeriques et procedes pour documents de securite ou analogues |
WO2001086579A2 (fr) * | 2000-05-08 | 2001-11-15 | Digimarc Corporation | Enveloppes et documents imprimes utilisant des filigranes numeriques, et procedes associes |
Non-Patent Citations (1)
Title |
---|
MAURICE MAES: "Twin Peaks: The Histogram Attack to Fixed Depth Image Watermarks" LCNS, [Online] vol. 1525, April 1998 (1998-04), pages 290-305, XP002307669 ISSN: 0302-9743 Retrieved from the Internet: URL:http://www.springerlink.com/index/15RV G9Q947PHTV9V.pdf> [retrieved on 2004-11-24] * |
Also Published As
Publication number | Publication date |
---|---|
GB0306578D0 (en) | 2003-04-30 |
WO2004084418A3 (fr) | 2005-02-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7054461B2 (en) | Authenticating printed objects using digital watermarks associated with multidimensional quality metrics | |
JP5552528B2 (ja) | 文書をセキュア化する方法及びデバイス | |
EP0691632B1 (fr) | Appareil et procédé de validation de billets de banque | |
EP1147495B1 (fr) | Substrats pour impression | |
EP1514227B1 (fr) | Modeles d'authentification visibles pour documents imprimes | |
JP5696040B2 (ja) | 文書のための印刷版を識別する方法及び装置 | |
JP4103826B2 (ja) | 真偽判定方法、装置及びプログラム | |
US20070136213A1 (en) | Inline system to detect and show proof of indicia fraud | |
JP3689436B2 (ja) | 複製防止方法および複製防止装置 | |
EP1953710B1 (fr) | Dissuasion de la contrefaçon à l'aide de marques de sécurité miniatures dispersées | |
US8056821B2 (en) | Security marks simulating natural defects for embedding information in documents | |
US8467566B2 (en) | Method for detecting fraud in a printed image | |
EP2320389A2 (fr) | Motifs d'authentification visibles pour document imprimé | |
US20100128320A1 (en) | Protecting printed items intended for public exchange with information embedded in blank document borders | |
KR20010071067A (ko) | 보안 문서를 위한 디지털 워터마크와 방법들 | |
Gruhl et al. | Information hiding to foil the casual counterfeiter | |
EP1371030A1 (fr) | Procede de verification | |
US20040148261A1 (en) | Method, apparatus, and program for image processing with tampering detection, and a medium storing the program | |
US20050147296A1 (en) | Method of detecting counterfeit documents by profiling the printing process | |
US7995246B2 (en) | Detecting printed image copies using phase-space-encoded fragile watermark | |
WO2004084418A2 (fr) | Procede permettant d'appliquer un element de securite cache | |
JP4288998B2 (ja) | 紙の真贋判別方法 | |
Picard | Copy detectable images: from theory to practice | |
Kim et al. | Development of visible anti-copy patterns |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DPEN | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed from 20040101) | ||
122 | Ep: pct application non-entry in european phase |