WO2011018764A2 - Authentication of security documents, in particular of banknotes - Google Patents

Authentication of security documents, in particular of banknotes Download PDF

Info

Publication number
WO2011018764A2
WO2011018764A2 PCT/IB2010/053638 IB2010053638W WO2011018764A2 WO 2011018764 A2 WO2011018764 A2 WO 2011018764A2 IB 2010053638 W IB2010053638 W IB 2010053638W WO 2011018764 A2 WO2011018764 A2 WO 2011018764A2
Authority
WO
WIPO (PCT)
Prior art keywords
decomposition
sample image
node
wavelet packet
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/IB2010/053638
Other languages
English (en)
French (fr)
Other versions
WO2011018764A3 (en
Inventor
Stefan Glock
Eugen Gillich
Johannes Georg Schaede
Volker Lohweg
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KBA Notasys SA
Original Assignee
KBA Notasys SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=42937652&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2011018764(A2) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Priority to MX2012001852A priority Critical patent/MX2012001852A/es
Priority to IN974DEN2012 priority patent/IN2012DN00974A/en
Priority to EP10757478.2A priority patent/EP2465098B1/en
Priority to CN201080035891.4A priority patent/CN102473329B/zh
Priority to CA2768723A priority patent/CA2768723C/en
Priority to RU2012107821/08A priority patent/RU2543931C2/ru
Priority to SG2012003497A priority patent/SG178047A1/en
Priority to JP2012524327A priority patent/JP5763071B2/ja
Application filed by KBA Notasys SA filed Critical KBA Notasys SA
Priority to KR1020127003188A priority patent/KR101811361B1/ko
Priority to BR112012002787-5A priority patent/BR112012002787B1/pt
Priority to US13/389,769 priority patent/US8781205B2/en
Priority to ES10757478.2T priority patent/ES2526539T3/es
Priority to AU2010283454A priority patent/AU2010283454B2/en
Priority to NZ597790A priority patent/NZ597790A/xx
Publication of WO2011018764A2 publication Critical patent/WO2011018764A2/en
Publication of WO2011018764A3 publication Critical patent/WO2011018764A3/en
Priority to ZA2012/00588A priority patent/ZA201200588B/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • G06F17/14Fourier, Walsh or analogous domain transformations, e.g. Laplace, Hilbert, Karhunen-Loeve, transforms
    • G06F17/148Wavelet transforms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2016Testing patterns thereon using feature extraction, e.g. segmentation, edge detection or Hough-transformation

Definitions

  • the present invention generally relates to the authentication of security documents, in particular of banknotes. More precisely, the present invention relates to further improvements of the invention disclosed in International Application No. WO 2008/146262 A2 of June 2 nd , 2008 entitled "AUTHENTIFICATION OF SECURITY DOCUMENTS, IN PARTICULAR OF BANKNOTES" (which claims priority of European Patent Applications Nos. 07109470.0 of June 1 st , 2007 and 07110633.0 of June 20 th , 2007) in the name of the present Applicant.
  • the present invention was especially made with a view to further improve the invention disclosed in International Application No. WO 2008/146262 A2.
  • a general aim of the invention is therefore to further improve the methods, uses and devices disclosed in International Application No. WO 2008/146262 A2.
  • an aim of the present invention is to provide an improved method for checking the authenticity of security documents, in particular banknotes, which is more robust and can efficiently discriminate features printed, applied or otherwise provided on the security documents.
  • the present invention is aimed at improving the discrimination between intaglio-printed textures and medium- or high-quality commercial offset printed textures.
  • Yet another aim of the present invention is to provide such a method that can be conveniently and efficiently implemented in a portable device.
  • a method for checking the authenticity of security documents in particular banknotes, wherein authentic security documents comprise security features printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents, the method comprising the step of digitally processing a sample image of at least one region of interest of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image.
  • WT wavelet transform
  • the decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image.
  • the wavelet packet transform is a two-dimensional shift-invariant wavelet packet transform (2D-SIWPT), and is preferably based on an incomplete wavelet packet transform.
  • decomposition of the sample image can include decomposition of the sample image into a wavelet packet tree comprising at least one approximation node and detail nodes, and looking for the detail node within the wavelet packet tree that has the highest information content.
  • BBA best branch algorithm
  • WPT wavelet packet transform
  • a method for detecting security features printed, applied or otherwise provided on security documents comprising the step of digitally processing a sample image of at least one region of interest of the surface of a candidate document, which region of interest is selected to include at least a portion of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image.
  • WT wavelet transform
  • the decomposition of the sample image is similarly based on a wavelet packet transform (WPT) of the sample image.
  • Figure 1 a is a greyscale scan of an exemplary banknote specimen
  • Figure 1 b is a greyscale photograph of part of the upper right corner of the banknote specimen of Figure 1 a ;
  • FIGS. 2a and 2b are enlarged views of the banknote specimen of
  • Figures 3a and 3b are enlarged views of a first colour copy of the banknote specimen of Figure 1 a, Figure 3b corresponding to the area indicated by a white square in Figure 3a ;
  • FIGS 4a and 4b are enlarged views of a second colour copy of the banknote specimen of Figure 1 a, Figure 4b corresponding to the area indicated by a white square in Figure 4a ;
  • Figure 5 is a schematic illustration of a two-dimensional tree-structured Wavelet Packet Transform ("WPT") with three tree levels (two decomposition levels) ;
  • WPT Wavelet Packet Transform
  • FIG. 6 is a schematic illustration of a one-dimensional Shift Invariant Wavelet Packet Transform (“SIWPT”) implemented as a filter bank ;
  • SIWPT Shift Invariant Wavelet Packet Transform
  • Figure 7 shows the normalized histograms of wavelet coefficients of an intaglio (left) and a commercial (right) printed texture after a one-level 2D- SIWPT according to the invention ;
  • Figure 8 shows an incomplete Wavelet Packet Tree decomposed according to a Best Branch Algorithm (BBA) in accordance with a preferred embodiment of the invention ;
  • BBA Best Branch Algorithm
  • Figure 9 illustrates six different printed textures that are characteristic of intaglio printing and that have been used as a basis to constitute a set of experiment samples ;
  • Figure 10 is a diagram illustrating the inter-class and intra-class distance of the textures of Figure 9 printed by intaglio printing and by medium- and high- quality commercial offset printing ;
  • Figure 11 is a two-dimensional feature space illustrating the classification of the samples after processing based on the variance ⁇ 2 and excess C of the statistical distribution of the wavelet coefficients resulting from the decomposition of the sample image according to the invention ;
  • Figure 12 is a schematic diagram of a device for checking the authenticity of security documents according to the method of the present invention.
  • the background of the present invention stems from the observation that security features printed, applied or otherwise provided on security documents using the specific production processes that are only available to the security printer, in particular intaglio-printed features, exhibit highly characteristic visual features (hereinafter referred to as "intrinsic features") that are recognizable by a qualified person having knowledge about the specific production processes involved.
  • intrinsic features highly characteristic visual features
  • the following discussion will focus on the analysis of intrinsic features produced by intaglio printing. It shall however be appreciated that the same approach is applicable to other intrinsic features of banknotes, in particular line offset-printed features, letterpress-printed features and/or optically-diffractive structures.
  • intaglio-printed features are very well suited for the purpose of authentication according to the invention and furthermore give the best results. This is especially due to the fact that intaglio printing enables the printing of very fine, high resolution and sharply-defined patterns. Intaglio printing is therefore a preferred process for producing the intrinsic features that are exploited in the context of the present invention.
  • FIG 1 a is a greyscale scan of an illustrative banknote specimen 1 showing the portrait of Jules Verne which was produced during the year 2004 by the present Applicant.
  • This banknote specimen 1 was produced using a combination of printing and processing techniques specific to banknote production, including in particular line offset printing for printing the multicolour background 10 of the note, silk-screen printing for printing optically-variable ink patterns, including motifs of a planisphere 20 and of a sextant 21 , foil stamping techniques for applying optically-variables devices, including a strip of material 30 carrying optically-diffractive structures extending vertically along the height of the banknote (which strip 30 is schematically delimited by two dashed lines in Figure 1 a), intaglio printing for printing several intaglio patterns 41 to 49, including the portrait 41 of Jules Verne, letterpress printing for printing two serial numbers 51 , 52, and varnishing for varnishing the note with a layer of protective varnish.
  • printing and processing techniques specific to banknote production including
  • serial numbers 51 , 52 were printed and the varnishing was performed following the intaglio printing phase. It shall further be understood that the banknote specimen 1 was produced on sheet-fed printing and processing equipment (as supplied by the present Applicant), each printed sheet carrying an array of multiple banknote specimens (as is usual in the art) that were ultimately cut into individual notes at the end of the production process.
  • Figure 1 b is a greyscale photograph of the upper right corner of the banknote specimen of Figure 1 a showing in greater detail the intaglio-printed logo of "KBA-GIORI" with the Pegasus 42 and tactile pattern 45 which comprises a set of parallel lines at forty-five degrees partly overlapping with the Pegasus 42.
  • the characteristic embossing and relief effect of the intaglio printing as well as the sharpness of the print can clearly be seen in this photograph.
  • Figure 2a is a more detailed view of a left-hand side portion of the portrait 41 of Figure 1 a (patterns 20, 21 and 44 being also partly visible in Figure 2a).
  • Figure 2b is an enlarged view of a square portion (or region of interest R.o.l.) of the portrait 41 , which square portion is illustrated by a white square in Figure 2a.
  • Figure 2b shows some of the characteristic intrinsic features of the intaglio patterns constituting the portrait 41.
  • the region of interest R.o.l. used for subsequent signal processing does not need to cover a large surface area of the document. Rather, tests have shown that a surface area of less than 5 cm 2 is already sufficient for the purpose of the authentication.
  • Figures 3a, 3b and 4a, 4b are greyscale images similar to Figures 2a, 2b of two colour copies of the banknote specimen shown in Figure 1 a, which copies were produced using commercial colour copying equipment.
  • the depicted white square indicates the corresponding region of interest R.o.l. of the portrait which is shown in enlarged view in Figures 3b and 4b, respectively.
  • the first colour copy illustrated in Figures 3a, 3b was produced using an Epson ink-jet printer and Epson photo-paper.
  • the second colour copy illustrated in Figures 4a, 4b was produced using a Canon ink-jet printer and normal paper. A high-resolution scanner was used to scan the original specimen and provide the necessary input for the ink-jet printers.
  • WO 2008/146262 A2 concerns a method defining how this difference can be brought forward and exploited in order to differentiate between the original and authentic specimen of Figures 2a, 2b and the copies of Figures 3a, 3b and 4a, 4b. The below discussion will deal with an improvement of this previous method.
  • a wavelet is a mathematical function used to divide a given function or signal into different scale components.
  • a wavelet transformation (or Wavelet Transform - hereinafter "WT") is the representation of the function or signal by wavelets. WTs have advantages over traditional Fourier transforms for representing functions and signals that have discontinuities and sharp peaks.
  • Fourier transform is not to be assimilated to WT. Indeed, Fourier transform merely involves the transformation of the processed image into a spectrum indicative of the relevant spatial frequency content of the image, without any distinction as regards scale.
  • Wavelet theory will not be discussed in depth in the present description as this theory is as such well-known in the art and is extensively discussed and described in several textbooks on the subject.
  • the interested reader may for instance refer to [Mallatl 989] and [Unser1995] (see the list of references at the end of the present description).
  • the pyramid structured WT discussed in [Mallatl 989] and the shift invariant WT discussed in [Unser1995] decompose successively the low frequency scales.
  • a large class of textures has its dominant frequencies at the middle frequency scales.
  • the present invention makes use of so-called
  • WPT Wavelet Packet Transform
  • banknotes are mainly produced by line offset, letterpress printing, foil application, and intaglio printing. Especially the latter technique plays a major role in banknote reliability (see [Dyck2008]).
  • intaglio is of Italian origin and means "to engrave”.
  • the printing method of the same name uses a metal plate with engraved characters and structures. During the printing process the engraved structures are filled with ink and pressed under huge pressure (tens of tons per inch) directly on the paper (see [vanRenesse2005]). A tactile relief and fine lines are formed, unique to intaglio printing process and almost impossible to reproduce via commercial printing methods (see [Schaede2006]).
  • intaglio process is used to produce the currencies of the world, intaglio printing presses and the companies who own them are monitored by government agencies.
  • WPT fine structures of intaglio technique
  • a new feature extraction algorithm preferably based on incomplete WPT (see [Jiang2003]) is proposed. It belongs to the top-down approaches and can be applied to redundant shift invariant and shift invariant WPT.
  • the algorithm decomposes the so-called Wavelet Packet Tree according to a criterion which is based on first order statistical moments of wavelet coefficients.
  • the WPT is a generalization of the classical WT which means that not only the approximation (low frequency parts) but also the details (high frequency parts) of a signal are decomposed (see [Zhang2002]).
  • all leaf nodes are decomposed in one approximation node Aj and three detail nodes cV ⁇ , h cHj, and cDij.
  • cVij represents the vertical details, CHI J the horizontal details, and CDI J the diagonal details, where / is the decomposition level and j the node number.
  • Both versions are downsampled and convulated by arbitrary wavelet filters g[n] and h[n].
  • h[n] is a lowpass and g[n] is a highpass wavelet filter, respectively (see [Mallatl 989] and [Daubechies1992]).
  • the version with the larger information content is identified on the basis of an information content criterion (which will be discussed hereinafter) and further decomposed whereas the other version is upcast.
  • the upcasting yields to a nonredundant representation and to a fast execution time.
  • the implementation of a one-dimensional SIWPT as filter bank is illustrated in Figure 6. As mentioned, in each tree level a nonshifted and a one-pixel-shifted version is decomposed and downsampled. On the basis of an information content criterion, one version is decomposed further, whereas the other version is discarded.
  • the above-mentioned method was exclusively defined for one- dimensional signals.
  • the SIWPT has been modified for two-dimensional signals such as images.
  • the resulting two- dimensional SIWPT (or "2D-SIWPT") first decomposes four different shifted versions of the relevant node. Based on the resulting information content, three out of the four versions are discarded, whereas the version with the highest information content is further decomposed. According to experiments which were carried out, there is no difference is feature stability and quality between the shift invariant WPTs.
  • the WPT enables an entire characterization of textures in all frequency scales.
  • the number of nodes (or subimages) grows exponentially. This lowers the execution time considerably and a methodology has thus been devised to concentrate on the most relevant node only.
  • the WPT is decomposed according to an information content criterion, resulting in an incomplete WPT.
  • Most known methods like [Chang1993], [Jiang2003], [Coifman1992], [Saito1994], [Wang2008] and [Wang2000] use the entropy or the average energy of an image for this purpose. [Choi2006] applies the WT with first order statistics to classify different denominations of banknotes.
  • Figure 7 shows the normalized histograms of wavelet coefficients of an intaglio (left) and a commercial (right) printed texture after a one-level 2D- SIWPT according to the invention (see also Figures 12 to 20 and the related description in International application No. WO 2008/146262 A2).
  • the highly discontinuous structure of intaglio printing yields to a weighting on middle and high wavelet coefficients, whereas the histogram of commercial printing is narrowly distributed and weighted on small coefficients.
  • the best separation between different printing techniques can be reached in this particular case, if the tree is decomposed towards variance and excess, until the subimage contrast is maximized. It can then be assumed that the relevant subimage represent the texture in the best possible way.
  • textures could be influenced by additive noise. Taking into account, that noise is represented by small wavelet coefficients (see [Fowler2005]), the histograms of noisy textures are widely distributed.
  • this subimage size should preferably be used as an overall stopping criterion.
  • BBA Best Branch Algorithm
  • the detail nodes contain the specific or detailed characteristics of a texture. Therefore, even if the textures are akin, they could be discriminated by this information.
  • the approximation nodes of the most left tree branch, the so-called approximation branch contain only the low frequency information. Therefore, it is nearly impossible to distinguish different printing techniques with the information content of the approximation branch and such approximation branch should therefore not be used for feature extraction.
  • Theoretically their children, which represent the lower part of the middle frequency scales, could yield the best spatial frequency resolution. This information could not be directly extracted out of the approximation nodes. For this reason the approximation nodes have to be decomposed as long as their children give the best spatial frequency resolution of the whole tree.
  • Branch Algorithm Algorithm 1 Best Branch Algorithm
  • ⁇ best node is part of the detail branch ⁇
  • Figure 8 schematically shows an illustration of an incomplete Wavelet Packet Tree which has been decomposed using the above Brest Branch Algorithm.
  • the highlighted nodes are identified to be the best nodes (cBi, cB ⁇ , cB ⁇ ) of their corresponding decomposition level and the dashed nodes are those which have been discarded during decomposition.
  • the detail branch of the third decomposition level characterizes the texture almost optimally.
  • further decomposition of the approximation node Ai,o leads to identification of the best node cB ⁇ for the second decomposition level.
  • further decomposition of the approximation node M,o accordingly leads to decomposition into nodes Azo, cV3,i, cti3,2, and cD3,3 which are subsequently discarded as shown in dashed lines.
  • Figure 8 shows that further decomposition of the best node CB3 of the third decomposition level does not lead to a more optimal representation of the feature and decomposition is accordingly stopped. As a result, the detail branch of the third level is selected for feature extraction.
  • the set consists of six different textures with an image size of 256x256 pixels as illustrated in Figure 9. As shown in Figure 9, the textures differ in contrast, latitude of gray-scale transitions and structure. They are illustrative of the most common security printing structures produced by intaglio printing.
  • Figure 10 shows the inter- and intra-class distance between the intaglio-printed textures and the medium- and high-quality commercial offset printed textures, respectively, for the first three decomposition levels (indicated on the horizontal axes in Figure 10).
  • the dashed line highlights the corresponding decomposition level where the Best Branch Algorithm has stopped the decomposition.
  • the Best Branch Algorithm has stopped the decomposition at the level which achieves the best inter-class distance between the intaglio-printed textures and the medium- or high-quality commercial offset printed textures with a rate of 100%.
  • the corresponding intra- class distance of the medium- and high-quality commercial offset printed textures is minimized in most cases with a rate of approximately 60%.
  • the intra-class distance is not minimized for all of the 900 investigated textures, it can be observed that the classes are narrowly distributed. Therefore, on average, the BBA stops at the level where the classes are best separated and lowest expanded.
  • Figure 10 demonstrates that the Best Branch Algorithm (BBA) stops the decomposition for all 900 investigated textures at the level where they are best characterized. In this way, the best inter-class distance is reached with a rate of 100%. Even if the intra-class distance does not reach its minimum in all cases, the class clusters are still narrowly distributed as schematically illustrated in Figure 11.
  • BBA Best Branch Algorithm
  • Figure 11 shows a two-dimensional feature space where the relevant textures have been classified on the basis of their variance ⁇ 2 (along the horizontal axis in Figure 11 ) and the excess C (along the vertical axis in Figure 11 ) of the distribution of the wavelet coefficients resulting from the decomposition using the BBA.
  • the circles on the lower-right corner of Figure 11 designate the medium- quality commercial offset printed textures, while the diamonds on the lower middle portion of Figure 11 designate the high-quality commercial offset printed textures.
  • the squares on the upper-left corner of Figure 11 designate the intaglio-printed textures.
  • Figure 11 shows that the BBA stops on average at the level where the classes are best separated and lowest expanded. This enables a simple separation of the various class clusters using linear boundaries.
  • N MxM is the size of the texture image, which execution time is perfectly suitable for a practical implementation, for instance on a Field Programmable Gate Array (FPGA).
  • FPGA Field Programmable Gate Array
  • the skewness of the statistical distribution of the wavelet coefficients - also referred to in statistics as the "third moment" - which is a measure of the asymmetry of the statistical distribution ;
  • the statistical entropy which is a measure of changes in the statistical distribution.
  • FIG. 21 schematically illustrates an implementation of a device for checking the authenticity of security documents, in particular banknotes, according to the above-described method.
  • This device comprises an optical system 100 for acquiring a sample image (image c°) of the region of interest
  • DSP digital signal processing
  • the DSP 200 may in particular advantageously be implemented as a Field-Programmable-Gate-Array (FPGA) unit.
  • FPGA Field-Programmable-Gate-Array
  • the device of Figure 12 may in particular be embodied in the form of a portable electronic device with integrated image-acquisition capability such as a smart phone.
  • the classifying features may conveniently be statistical parameters selected from the group comprising the arithmetic mean, the variance ( ⁇ 2 ), the skewness, the excess (C), and the entropy of the statistical distribution of the wavelet coefficients resulting from the decomposition of the sample image.
  • the method may provide for the determination of an authenticity rating of a candidate document based on the extracted classifying features.
  • Such an authenticity rating computed according to the above described method can be optimised by designing the security features that are to be printed, applied, or otherwise provided on the security documents in such a way as to optimise the authenticity rating of genuine documents.
  • Such optimisation can in particular be achieved by acting on security features including intaglio patterns, line offset patterns, letterpress patterns, optically-diffractive structures and/or combinations thereof.
  • security features including intaglio patterns, line offset patterns, letterpress patterns, optically-diffractive structures and/or combinations thereof.
  • a high density of such patterns preferably linear or curvilinear intaglio-printed patterns, as shown for instance in Figure 2b, would in particular be desirable.
  • the authentication principle is preferably based on the processing of an image containing (or supposed to be containing) intaglio-printed patterns
  • the invention can be applied by analogy to the processing of an image containing other security features comprising characteristic visual features intrinsic to the processes used for producing the security documents, in particular line offset patterns, letterpress patterns, optically-diffractive structures and/or combinations thereof.
  • each region of interest is preferably selected to include a high density of patterns, preferably linear or curvilinear intaglio-printed patterns as shown for instance in Figure 2b (see also Figure 9).

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Mathematical Optimization (AREA)
  • Pure & Applied Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Algebra (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Image Processing (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)
  • Printing Methods (AREA)
PCT/IB2010/053638 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes Ceased WO2011018764A2 (en)

Priority Applications (15)

Application Number Priority Date Filing Date Title
NZ597790A NZ597790A (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes
IN974DEN2012 IN2012DN00974A (enExample) 2009-08-11 2010-08-11
EP10757478.2A EP2465098B1 (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes
CN201080035891.4A CN102473329B (zh) 2009-08-11 2010-08-11 安全文档尤其是纸币的认证
CA2768723A CA2768723C (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes
RU2012107821/08A RU2543931C2 (ru) 2009-08-11 2010-08-11 Проверка подлинности защищенных документов, в частности банкнот
SG2012003497A SG178047A1 (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes
JP2012524327A JP5763071B2 (ja) 2009-08-11 2010-08-11 セキュリティ文書、特に紙幣の認証
KR1020127003188A KR101811361B1 (ko) 2009-08-11 2010-08-11 보안 문서, 특히 지폐의 인증
MX2012001852A MX2012001852A (es) 2009-08-11 2010-08-11 Autentificacion de los documentos de seguridad, paticularmente de billetes.
ES10757478.2T ES2526539T3 (es) 2009-08-11 2010-08-11 Autenticación de documentos de seguridad, en particular de billetes de banco
US13/389,769 US8781205B2 (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular banknotes
BR112012002787-5A BR112012002787B1 (pt) 2009-08-11 2010-08-11 Método para verificar a autenticidade de documentos de segurança, unidade de processamento de sinais digitais, e dispositivo para verificar a autenticidade de documentos de segurança
AU2010283454A AU2010283454B2 (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes
ZA2012/00588A ZA201200588B (en) 2009-08-11 2012-01-24 Authentication of security documents,in particular of banknotes

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP09167609.8 2009-08-11
EP09167609 2009-08-11

Publications (2)

Publication Number Publication Date
WO2011018764A2 true WO2011018764A2 (en) 2011-02-17
WO2011018764A3 WO2011018764A3 (en) 2011-05-05

Family

ID=42937652

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IB2010/053638 Ceased WO2011018764A2 (en) 2009-08-11 2010-08-11 Authentication of security documents, in particular of banknotes

Country Status (17)

Country Link
US (1) US8781205B2 (enExample)
EP (1) EP2465098B1 (enExample)
JP (1) JP5763071B2 (enExample)
KR (1) KR101811361B1 (enExample)
CN (1) CN102473329B (enExample)
AU (1) AU2010283454B2 (enExample)
BR (1) BR112012002787B1 (enExample)
CA (1) CA2768723C (enExample)
ES (1) ES2526539T3 (enExample)
IN (1) IN2012DN00974A (enExample)
MX (1) MX2012001852A (enExample)
MY (1) MY156070A (enExample)
NZ (1) NZ597790A (enExample)
RU (1) RU2543931C2 (enExample)
SG (1) SG178047A1 (enExample)
WO (1) WO2011018764A2 (enExample)
ZA (1) ZA201200588B (enExample)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2746049A1 (fr) 2012-12-20 2014-06-25 KBA-NotaSys SA Procédé de contrôle d'une impression taille-douce et gamme de contrôle à cette fin
WO2014118763A1 (en) 2013-02-04 2014-08-07 Kba-Notasys Sa Authentication of security documents and mobile device to carry out the authentication
US12038371B2 (en) 2021-05-17 2024-07-16 Becton, Dickinson And Company Particle analyzers having scintillation counters, and methods of use thereof

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2657021A1 (en) 2012-04-24 2013-10-30 KBA-NotaSys SA Adjustable drive unit of a printing press and printing press, especially intaglio printing press, comprising the same
AU2016360852B2 (en) * 2015-11-27 2022-03-17 Kerquest Method for authenticating and/or checking the integrity of a subject
CN105528825B (zh) * 2015-12-02 2018-08-31 广州广电运通金融电子股份有限公司 有价文件自适应识别方法和装置
US10699506B2 (en) * 2016-06-30 2020-06-30 Sicpa Holdings Sa Systems, methods, and computer programs for imaging an object and generating a measure of authenticity of the object
KR101957269B1 (ko) * 2017-06-27 2019-03-14 주식회사 에이텍에이피 지폐 일련번호 감지장치 및 방법
DE102020130444A1 (de) * 2020-11-18 2022-05-19 Koenig & Bauer Ag Vorrichtung zum Erzeugen einer digitalen Kennung von einem mindestens ein Druckbild aufweisenden Exemplar eines Druckerzeugnisses
DE102023107278B3 (de) * 2023-03-23 2024-02-29 Koenig & Bauer Ag Verfahren zum Authentifizieren einer auf ihrem Substrat mindestens eine bedruckte Fläche aufweisenden Banknote

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008146262A2 (en) 2007-06-01 2008-12-04 Kba-Giori S.A. Authentication of security documents, in particular of banknotes

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002017214A2 (en) * 2000-08-24 2002-02-28 Digimarc Corporation Watermarking recursive hashes into frequency domain regions and wavelet based feature modulation watermarks
US7020775B2 (en) * 2001-04-24 2006-03-28 Microsoft Corporation Derivation and quantization of robust non-local characteristics for blind watermarking
JP2003235042A (ja) * 2002-02-12 2003-08-22 Sony Corp 画像符号化装置及びその符号化方法
WO2004056120A1 (en) * 2002-12-17 2004-07-01 Let It Wave Processing or compressing n-dimensional signals with warped wavelet packets and bandelets
KR100751855B1 (ko) 2006-03-13 2007-08-23 노틸러스효성 주식회사 웨이블렛 변환을 이용한 권종인식방법
RU64798U1 (ru) * 2007-02-05 2007-07-10 Аркадий Львович Жизняков Устройство адаптивного многомасштабного разложения изображения
EP2000992A1 (en) * 2007-06-01 2008-12-10 Kba-Giori S.A. Authentication of security documents, in particular of banknotes

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008146262A2 (en) 2007-06-01 2008-12-04 Kba-Giori S.A. Authentication of security documents, in particular of banknotes

Non-Patent Citations (17)

* Cited by examiner, † Cited by third party
Title
"CBMS-NSF Regional Conference Series in Applied Mathematics 61, SIAM", 1992, SOCIETY FOR INDUSTRIAL AND APPLIED MATHEMATICS, article "Ten Lectures on Wavelets"
EUISUN CHOI; JONGSEOK LEE; JOONHYUN YOON: "Feature Extraction for Bank Note Classification Using Wavelet Transform", IEEE PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, ICPR'06, 2006, pages 934 - 937
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, vol. 11, no. 7, 7 July 1989 (1989-07-07), pages 9
JAMES E. FOWLER: "The Redundant Discrete Wavelet Transform and Additive Noise", IEEE SIGNAL PROCESSING LETTERS, vol. 12, no. 9, September 2005 (2005-09-01), pages 629 - 632, XP011137496, DOI: doi:10.1109/LSP.2005.853048
JIANGUO ZHANG; TIENIU TAN: "Brief Review of Invariant Texture Analysis Methods", PATTERN RECOGNITION SOCIETY, vol. 35, 2002, pages 735 - 747
JOHANNES SCHAEDE; VOLKER LOHWEG: "Optical Security and Counterfeit Deterrence Techniques VI", vol. 6075, 2006, PROCEEDINGS OF SPIE-IS&T ELECTRONIC IMAGING, article "The Mechanisms of Human Recognition as a Guideline for Security Feature Development", pages: 607507 - 1,607507
MARK J. SHENSA: "The Discrete Wavelet Transfrom: Wedding the A Trous and Mallat Algorithms", IEEE TRANSACTIONS ON SIGNAL PROCESSING, vol. 40, no. 10, October 1992 (1992-10-01), pages 2464 - 2482, XP000319928, DOI: doi:10.1109/78.157290
MICHAEL UNSER: "Texture classification and segmentation using wavelet frames", IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 4, no. 11, November 1995 (1995-11-01), pages 1549 - 1560
NAOKI SAITO: "Local Feature Extraction and its Applications using a Library of Bases", PHD THESIS, December 1994 (1994-12-01)
QIONG WANG; HONG LI; JIAN LIU: "Subset Selection Using Rough Set in Wavelet Packet Based Texture Classification", PROCEEDINGS OF THE 2008 INTERNATIONAL CONFERENCE ON WAVELET ANALYSIS AND PATTERN RECOGNITION, HONG KONG, 30 August 2008 (2008-08-30), pages 662 - 666, XP031329393
RONALD R. COIFMAN; MLADEN VICTOR WICKERHAUSER: "Entropy-Based Algorithms for Best Basis Selection", IEEE TRANSACTIONS ON INFORMATION THEORY, vol. 38, no. 2, March 1992 (1992-03-01), pages 713 - 718
RUDOLF L. VAN RENESSE: "Artech House Boston/London", 2005, ARTECH HOUSE OPTOELECTRONICS LIBRARY, article "Optical Document Security", pages: 115 - 120
STEPHANE G. MALLAT: "A Theory for Multiresolution Signal Decomposition: The Wavelet Representation", IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, vol. 11, no. 7, 7 July 1989 (1989-07-07), pages 674 - 693
TIANHOMG CHANG; C.-C. JAY KUO: "Texture Analysis and Classification with Tree-Structured Wavelet Transfrom", IEEE TRANSACTIONS ON IMAGE PROCESSING, vol. 2, no. 4, October 1993 (1993-10-01), pages 429 - 441, XP000412059, DOI: doi:10.1109/83.242353
WALTER DYCK; THOMAS TURKE; JOHANNES SCHAEDE; VOLKER LOHWEG: "A New Concept on Quality Inspection and Machine Conditioning for Security Prints", OPTICAL DOCUMENT SECURITY, 2008
XIAIDAN WANG; HUA JIN; RONGCHUN ZHAO: "Texture Segmentation Method Based on Incomplete Tree Structured Wavelet Transform and Fuzzy Kohonen Clustering Network", PROCEEDINGS OF THE 3D WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, 28 June 2000 (2000-06-28), pages 2684 - 2687, XP010506897
XIAO-YUE JIANG; RONG-CHUAN ZHAO: "Segmentation Based on Incomplete Wavelet Packet Frame", IEEE PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, 2 November 2003 (2003-11-02), pages 3172 - 3177, XP010682286, DOI: doi:10.1109/ICMLC.2003.1260125

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2746049A1 (fr) 2012-12-20 2014-06-25 KBA-NotaSys SA Procédé de contrôle d'une impression taille-douce et gamme de contrôle à cette fin
WO2014097227A1 (fr) 2012-12-20 2014-06-26 Kba-Notasys Sa Procédé de contrôle d'une impression taille-douce et gamme de contrôle à cette fin
US10150283B2 (en) 2012-12-20 2018-12-11 Kba-Notasys Sa Control process for intaglio printing and control strip for this purpose
WO2014118763A1 (en) 2013-02-04 2014-08-07 Kba-Notasys Sa Authentication of security documents and mobile device to carry out the authentication
US20160012658A1 (en) * 2013-02-04 2016-01-14 Kba-Notasys Sa Authentication of security documents and mobile device to carry out the authentication
US9947163B2 (en) * 2013-02-04 2018-04-17 Kba-Notasys Sa Authentication of security documents and mobile device to carry out the authentication
US12038371B2 (en) 2021-05-17 2024-07-16 Becton, Dickinson And Company Particle analyzers having scintillation counters, and methods of use thereof

Also Published As

Publication number Publication date
US20120328179A1 (en) 2012-12-27
RU2543931C2 (ru) 2015-03-10
JP2013501994A (ja) 2013-01-17
EP2465098A2 (en) 2012-06-20
CN102473329A (zh) 2012-05-23
KR20120040235A (ko) 2012-04-26
CA2768723A1 (en) 2011-02-17
AU2010283454B2 (en) 2014-08-07
AU2010283454A1 (en) 2012-02-23
MX2012001852A (es) 2012-03-07
US8781205B2 (en) 2014-07-15
IN2012DN00974A (enExample) 2015-04-10
KR101811361B1 (ko) 2017-12-22
SG178047A1 (en) 2012-03-29
ZA201200588B (en) 2013-05-29
JP5763071B2 (ja) 2015-08-12
NZ597790A (en) 2013-09-27
EP2465098B1 (en) 2014-11-05
ES2526539T3 (es) 2015-01-13
MY156070A (en) 2016-01-15
BR112012002787A2 (pt) 2017-12-05
WO2011018764A3 (en) 2011-05-05
BR112012002787B1 (pt) 2019-08-20
CN102473329B (zh) 2014-08-27
CA2768723C (en) 2018-03-06
RU2012107821A (ru) 2013-09-20

Similar Documents

Publication Publication Date Title
CA2768723C (en) Authentication of security documents, in particular of banknotes
RU2476936C2 (ru) Аутентификация защищенных документов, в частности банкнот
EP1964073A1 (en) Banknote validation
Roy et al. Authentication of currency notes through printing technique verification
EP2000992A1 (en) Authentication of security documents, in particular of banknotes
Lamsal et al. Counterfeit paper banknote identification based on color and texture
Glock et al. Feature extraction algorithm for banknote textures based on incomplete shift invariant wavelet packet transform
KR101232684B1 (ko) 베이시안 접근법을 이용한 지폐 진위 감별 방법
Shoeb et al. Software system to detect counterfeit Egyptian currency
Kumar et al. Forensic authentication of bank checks
JP4288998B2 (ja) 紙の真贋判別方法
US12340648B2 (en) Method for authenticating a banknote having at least one printed area on the substrate thereof
JP2025133336A (ja) 真非判別用の学習モデル作成方法、真非判別方法及びソフトウェア
Chhabra et al. Indian currency database for forensic research
Garain et al. Machine authentication of security documents
HK1141355B (en) Authentication of security documents, in particular of banknotes

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201080035891.4

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 2768723

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 12012500158

Country of ref document: PH

WWE Wipo information: entry into national phase

Ref document number: 2010757478

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2010283454

Country of ref document: AU

WWE Wipo information: entry into national phase

Ref document number: 974/DELNP/2012

Country of ref document: IN

ENP Entry into the national phase

Ref document number: 20127003188

Country of ref document: KR

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2012524327

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: MX/A/2012/001852

Country of ref document: MX

WWE Wipo information: entry into national phase

Ref document number: 1201000521

Country of ref document: TH

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2010283454

Country of ref document: AU

Date of ref document: 20100811

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10757478

Country of ref document: EP

Kind code of ref document: A2

WWE Wipo information: entry into national phase

Ref document number: 2012107821

Country of ref document: RU

WWE Wipo information: entry into national phase

Ref document number: 13389769

Country of ref document: US

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112012002787

Country of ref document: BR

REG Reference to national code

Ref country code: BR

Ref legal event code: B01E

Ref document number: 112012002787

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112012002787

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20120207