WO2021101297A1 - 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 - Google Patents
잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 Download PDFInfo
- Publication number
- WO2021101297A1 WO2021101297A1 PCT/KR2020/016429 KR2020016429W WO2021101297A1 WO 2021101297 A1 WO2021101297 A1 WO 2021101297A1 KR 2020016429 W KR2020016429 W KR 2020016429W WO 2021101297 A1 WO2021101297 A1 WO 2021101297A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- pattern
- latent image
- forgery
- solid line
- line
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000005516 engineering process Methods 0.000 title claims abstract description 25
- 238000007689 inspection Methods 0.000 title abstract 3
- 238000012795 verification Methods 0.000 claims description 48
- 230000004075 alteration Effects 0.000 claims description 47
- 230000000007 visual effect Effects 0.000 claims description 3
- 238000004891 communication Methods 0.000 description 24
- 238000007639 printing Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 4
- 238000004590 computer program Methods 0.000 description 3
- 238000006243 chemical reaction Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000008034 disappearance Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 108091008695 photoreceptors Proteins 0.000 description 1
- 239000002994 raw material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/95—Pattern authentication; Markers therefor; Forgery detection
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
- B42D25/355—Security threads
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/40—Manufacture
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/10—Image acquisition
- G06V10/12—Details of acquisition arrangements; Constructional details thereof
- G06V10/14—Optical characteristics of the device performing the acquisition or on the illumination arrangements
Definitions
- the present invention relates to a forgery and alteration verification device using a latent image technology and a driving method of the device, and more particularly, a latent image that allows a latent image to appear when a discrimination object in which color difference cannot be discriminated by the naked eye is copied by a high-resolution color copier. It relates to a forgery and alteration verification device using technology and a driving method of the device.
- the larger the size difference the better the effect of distinguishing the missing part and the outstanding part during copying.
- the size difference is large, it is possible to visually check the original print before copying. Applicability is inferior because it is easy to understand.
- An embodiment of the present invention is to provide a forgery and alteration verification device using a latent image technology that enables a latent image to appear when a discrimination object in which the color difference cannot be discriminated with the naked eye is copied from a high-resolution color copier, and a method of driving the device. have.
- the forgery and alteration verification apparatus using the latent image technology includes data generated by using a forgery determination object forming a line-shaped pattern at equal intervals on a background pattern and a latent pattern latent in the background pattern. Based on the received scan data and the stored data by receiving the scan data of the storage unit to store and the random discrimination target, the line shape of the latent pattern is displayed as a single line or image in a designated condition to be forged or altered. It includes a control unit that determines whether or not to prevent forgery and alteration.
- the forgery and alteration verification apparatus may further include an interface unit for receiving scan data for the object to be determined forming a double solid line as the line-shaped pattern.
- the interface unit forms the same spacing, thickness, angle, and density of the double solid lines so that visual discrimination by color difference is not possible, but the thickness and density of the double solid lines on the background pattern and the double solid lines on the latent image pattern are formed differently.
- Scan data for the object to be determined may be received.
- the interface unit may receive scan data for the object to be determined further forming an additional pattern to further reveal the latent image pattern on a double solid line of the background pattern.
- the interface unit may receive scan data in which the linear pattern formed on the background pattern is weaker than the latent image pattern under the specified condition or is lost.
- the forgery and alteration verification device may further determine whether or not the two-dimensional pattern formed on the latent image pattern is recognized.
- a forgery verification method using a latent image technology includes data generated using a forgery determination object forming a line-shaped pattern at equal intervals on a background pattern and a latent pattern latent in the background pattern. Storing, and preventing forgery by determining whether the shape of the line on the latent pattern appears to the outside as a single line or image under a designated condition that is forged or altered based on the scanned data of a random object to be determined and the stored data. do.
- a double solid line may be formed as the line-shaped pattern.
- the distance, thickness, angle, and density of the double solid lines are kept the same so that visual discrimination by color difference is not possible, but the double solid lines on the background pattern and the double solid lines on the latent image pattern are formed.
- the thickness and concentration can be formed differently.
- an additional pattern may be further formed so that the latent image pattern is further exposed on a double solid line of the background pattern.
- the linear pattern formed on the background pattern may be weaker than the latent image pattern or disappear under the specified condition.
- the background pattern and the two-dimensional pattern formed on the latent image pattern are recognized.
- the thickness and density of the solid line it may be possible to prevent counterfeiting through a copy machine.
- the latent image pattern and the background pattern cannot be identified with the naked eye.
- the solid line of the background pattern is weakly expressed or disappeared, and the solid line of the latent image pattern is one. As it is expressed like a line of the figure and appears to be visually discriminated, forgery or alteration will not be possible.
- FIG. 1 is a diagram showing a forgery verification system according to an embodiment of the present invention.
- FIGS. 2 and 3 are views for explaining an object to be determined according to an embodiment of the present invention.
- FIG. 4 is a block diagram illustrating a detailed structure of the copier of FIG. 1 as an apparatus for verifying forgery and alteration according to an embodiment of the present invention
- FIG. 5 is a view showing a forgery verification process according to an embodiment of the present invention.
- FIG. 6 is a flowchart illustrating a driving process of a forgery verification device according to an embodiment of the present invention
- FIG. 7 and 8 are views for explaining a determination object according to another embodiment of the present invention.
- 9 and 10 are views for explaining an object to be determined according to another embodiment of the present invention.
- FIGS. 2 and 3 are diagrams for explaining an object of determination according to an exemplary embodiment of the present invention.
- the forgery and alteration verification service system 90 includes a copy machine 100, a user terminal device 110, a communication network 120, and a part of the forgery and alteration verification service device 130, or It includes all, and may further include a printer for printing a pattern according to an embodiment of the present invention.
- a component such as the copy machine 100 operates in a stand alone form, or a part or all of the components such as the forgery and alteration verification service device 130 is a communication network ( 120), which can be integrated and configured in a network device (eg, a wireless switching device, etc.), and will be described as including all in order to help a sufficient understanding of the invention.
- a network device eg, a wireless switching device, etc.
- the determination object 97 subjected to forgery and alteration determination according to an embodiment of the present invention may be formed by a separate printer (or printer), or the like, and may be formed in various forms. It may be formed in a document or the like, but may be formed in a separate mark form and attached to the product. Therefore, there will be no particular limitation on the shape of the discrimination object 97 according to the embodiment of the present invention. As shown in FIGS. 1 to 3, the discrimination target 97 displays a secret by configuring the latent image pattern and the background pattern in a line shape, more precisely, a double solid line, and at this time, the line spacing, thickness, angle, and concentration are the same. So that the latent image pattern and background pattern are not visible to the naked eye.
- the solid line of the background pattern is weakly expressed or disappeared, and the solid line of the latent image pattern is set to be expressed as a single line (or image).
- the thickness of the solid line is about 0.02 ⁇ 0.04mm, the interval is 0.05 ⁇ 0.07mm, and it has a screen tone player of 200 or more and a concentration of 15% or less.
- this state may be changed as much as possible without changing the technical idea in the embodiment of the present invention.
- a latent image secret table eg, characters and Data of Things (DoT) patterns may be identified on the authentic paper.
- the background pattern includes a latent image pattern, where the latent image pattern means a latent image, that is, an image or a pattern. Since there is no color difference, the latent image pattern is not normally visible as shown in FIGS. 2A and 3A, but has a form that is exposed to the outside in a specific situation where, for example, copying is performed.
- double solid lines are formed at equal intervals, and as shown in Fig. 3(b), the solid lines of the background pattern have DoT. It may also include a pattern 300.
- the DoT pattern is additionally formed on the double solid line, it may be referred to as an additional pattern.
- the case of FIG. 2 may be referred to as K-DoT
- the case of FIG. 3 may be referred to as X-DoT.
- X-DoT uses the same principle as K-DoT to display a secret table between the background pattern and the DoT pattern with a difference in line spacing.
- Non-marks can be inserted by mixing two types of DoT patterns and characters.
- a solid line with a spacing of 0.05 ⁇ 0.07mm is weakly expressed or disappeared upon copying, and thus the emerged line can be expressed as a DoT pattern.
- a specific filter recognizer eg, mobile recognizes the displayed DoT pattern to determine whether it is forged or not.
- a double solid line is illustrated in Figs. 2 and 3, but since this may be a single solid line at equal intervals or a broken line, it is expressed as having a shape or shape of a line. desirable. Accordingly, since the formation of the object to be determined 97 may be variously changed and formed without departing from the technical idea according to the embodiment of the present invention, it will not be specifically limited to any one form.
- the copier 100 may serve as a forgery verification device according to an embodiment of the present invention together with a printer and a user terminal device 110. As well as independent movements, it may be possible to operate in parallel.
- the copier 100 may refer to a high-resolution color copier capable of forgery or alteration of documents among products on the market rather than a general copier. As the technology develops more and more, this is the reason why it is necessary to prevent forgery or alteration of genuine or genuine products by high-performance color copiers.
- the copier 100 according to an embodiment of the present invention may be merely a device that verifies, that is, confirms, when the object to be determined 97 is forged, rather than including a technology for verifying forgery and alteration.
- the internal copy condition of the copier 100 is, for example, brightness, data conversion, etc. when scanning a lamp can be an important factor in expressing the latent image of the object to be discriminated 97, according to the present invention. In the examples, this will not be overlooked.
- the embodiments of the present invention may perform operations such as changing the spacing of double solid lines or changing the thickness without departing from the technical matters of the present invention. will be.
- the copier 100 downloads a related program from the forgery and alteration verification service device 130 via the communication network 120 in order to perform the operation according to the embodiment of the present invention, stores it therein, and implements the present invention through it.
- the same forgery verification operation may be performed, it will not be specifically limited to the above form.
- the user terminal device 110 may perform the role of a forgery verification device according to an embodiment of the present invention together with the copy machine 100, and may include a smartphone or a wearable device such as a domestic S company's Galaxy* Gear. .
- the user terminal device 110 may include a high-resolution camera capable of photographing.
- the principle of reading a document through the scanner of the copier 100 is not much different from that taken through the user terminal device 110 through a high-resolution camera. Therefore, in the case of the user terminal device 110, as in the copier 100, it is possible to verify that there is forgery or alteration as much as possible. For example, in the case of the copier 100 above, if the latent image pattern is exposed on the output document as in FIGS.
- the determination object 97 that does not include the background pattern and the latent image pattern as in the embodiment of the present invention is determined to be forged and altered because the latent image is not revealed.
- the user terminal device 110 may perform the same operation as above through a dedicated app downloaded from an external device for such forgery verification, but may request the forgery verification service device 130 to verify whether the app is forged or forged. have. Therefore, when photographing through the user terminal device 110, the solid line of the background pattern is lost, as in the copier 100, the latent image pattern is expressed as a single line, and the photographed image is provided to the forgery verification service device 130. Whether forgery or alteration can be verified.
- the communication network 120 includes all wired and wireless communication networks.
- a wired/wireless Internet network may be used or interlocked.
- the wired network includes an Internet network such as a cable network or a public telephone network (PSTN)
- the wireless communication network includes CDMA, WCDMA, GSM, Evolved Packet Core (EPC), Long Term Evolution (LTE), and Wibro networks. It is meant to include.
- the communication network 120 according to the embodiment of the present invention is not limited thereto, and may be used as an access network for a next-generation mobile communication system to be implemented in the future, for example, a cloud computing network or a 5G network under a cloud computing environment.
- the AP in the communication network 120 can access the switching center of the telephone office, but in the case of a wireless communication network, it accesses SGSN or GGSN (Gateway GPRS Support Node) operated by a communication company to process data.
- SGSN Serving GPRS Support Node
- GGSN Gateway GPRS Support Node
- data can be processed by accessing various repeaters such as BTS (Base Station Transmission), NodeB, and e-NodeB.
- the communication network 120 may include an AP.
- APs include small base stations such as femto or pico base stations that are frequently installed in buildings.
- the femto or pico base station is classified according to the maximum number of units that can be connected to the copier 100 or the user terminal device 110 according to the classification of the small base station.
- the AP may include a short-range communication module for performing short-range communication such as the copy machine 100 or the user terminal device 110 with Zig-bee and Wi-Fi.
- the AP can use TCP/IP or RTSP for wireless communication.
- short-range communication includes various standards such as RF and ultra wideband communication (UWB) such as Bluetooth, ZigBee, infrared, UHF and VHF in addition to Wi-Fi as mentioned above.
- UWB ultra wideband communication
- the AP extracts the location of the data packet, designates the best communication path for the extracted location, and transfers the data packet to the next device, for example, the forgery verification service device 130 along the designated communication path.
- APs can share multiple lines in a general network environment, and include routers, repeaters, and repeaters.
- the forgery verification service device 130 may be set and operated in various ways according to the intention of the system designer. For example, the forgery and alteration verification operation may be performed by itself in the copier 100 or the user terminal device 110 that substantially operates as a forgery and alteration verification device. This has already been explained above. However, the forgery and alteration verification service device 130 downloads an app, generates data, or manages the generated data in order to provide a service according to an embodiment of the present invention, and there is a request for verification from the user terminal device 110. When it is set to perform verification, the verification operation can be performed.
- the forgery verification service device 130 may be a management server of a service operator. It may also play a role of generating and providing data related to the determination object 97 of FIG. 1. It is to provide a kind of service program.
- the forgery and alteration verification service device 130 may monitor the forgery and alteration operation of the copier 100 or the user terminal device 110. In other words, it performs integrated management. For example, it is possible to quickly cope with the situation even in the event of a forgery or forgery event by determining where the copier 100 is located. Further, the forgery and alteration verification service apparatus 130 may perform various operations such as generating, storing, and updating data managed through the determination object 97 of FIG. 1 by including the DB 130.
- FIG. 4 is a block diagram illustrating a detailed structure of the copier of FIG. 1 as an apparatus for verifying forgery and alteration according to an embodiment of the present invention.
- the copier 100 is a forgery and alteration verification device, and includes an interface unit (or a communication interface unit, a user interface unit, and a scanning unit) ( 400), a control unit 410, a latent image data processing unit 420, and a part or all of the storage unit 430.
- the interface unit 400 for example, as a communication interface unit, connects to the forgery and alteration verification service device 130 via the communication network 120 to install a program according to an embodiment of the present invention or receive reference data necessary for forgery verification, etc. Can perform the operation of.
- a storage medium such as USB
- the interface unit 400 includes a user interface unit, a scanning unit, and a printing unit.
- Data for copying or scanning documents may be received through the scanning unit.
- the lamp is driven for each scan line and sequentially illuminated, and the document is copied or scanned through a camera provided on the upper side.
- the controller 410 may store the copied or scanned data in the storage unit 430 in the form of a scanned image, transmit it to the outside, or output a copied document through a printing unit.
- the control unit 410 may provide the input data to the latent image data processing unit 420 to request data processing, and may receive data according to the request result and output a document.
- the latent image data processing unit 420 When the scan data provided by the control unit 410 is the scan data for the discrimination target 97 as shown in FIG. 1, the latent image data processing unit 420 includes a background pattern and a latent image pattern formed on the discrimination target 97. In the copying process of the distortion, more precisely, the transferred data is included in the scan data. In an embodiment of the present invention, for this reason, it may be expressed as “prevention of forgery and alteration using latent image and digital forensic transfer.” Therefore, the latent image data processing unit 420 reflects the transferred data as it is and outputs it to the printing unit. , If the scanned data is provided as a pixel value of RGB, the printing unit may convert the pixel value of RGB to a value suitable for printing and perform printing through the converted data in the printing unit to implement ink or photoreceptor. .
- the latent image data processing unit 420 determines the transferred data rather than performing a special operation.
- the solid line of the background pattern is weakly expressed or disappeared, and the solid line of the latent image pattern is expressed as a single line, and the displayed data is acquired and printed as it is.
- the storage unit 430 stores various types of information and data processed under the control of the controller 410. If the information refers to a simple control command, the data may refer to scanned pixel data or the like, but in the embodiment of the present invention, the concept of such terms will not be particularly limited. That is, they can be used interchangeably.
- FIG. 5 is a diagram illustrating a forgery verification process according to an embodiment of the present invention.
- the DoT pattern may be revealed by the loss of the latent image pattern (S510).
- the copying machine 100 or the user terminal device 110 can recognize (or include) a specific filter, in other words, can extract the missing DoT pattern of the latent image pattern, and thus confirm the extracted latent image pattern and make a copy. It may be possible to check whether or not (S513).
- the filter performs a filtering operation, for example, when the latent image data is extracted by passing the transferred data through the filter, it can be expressed.
- the extracted latent image pattern is also output to the output document.
- the latent image may be visually determined as in (c) and (d) of FIG. 2 and (c) and (d) of FIG. 3.
- FIG. 6 is a flowchart illustrating a driving process of the forgery and alteration verification device of FIG. 1.
- the forgery and alteration verification apparatus includes at least one of a copier 100, a user terminal device 110, a printer, and a forgery verification service device 130.
- the printing machine may form a line-shaped pattern at equal intervals on the background pattern and the latent pattern latent in the background pattern (S600).
- the copier 100 may prevent forgery and alteration by allowing the line shape of a latent pattern to appear as a single line or image to the outside under a designated condition to be forged or altered (S610).
- the forgery and alteration verification apparatus can perform various operations, and other details have been sufficiently described above, and thus the contents will be substituted.
- FIG. 7 and 8 are views for explaining a determination object according to another embodiment of the present invention.
- the determination object 697 is X-DoT (e.g., D-DoT) in a form to which the X-DoT technology described in FIG. 3 is applied. It is a technology that double-prints a D-DoT, that is, a two-dimensional pattern code, on the latent image with a pattern inserted.
- the recognizer e.g., mobile
- copying e.g., forgery and alteration
- the D-DoT is lost and the X-DoT latent image Only the D-DoT inserted in is expressed.
- Different DoTs can be identified in the original (700, 701) and the copy (710), so that it is possible to determine whether or not forged.
- 9 and 10 are views for explaining an object to be determined according to another embodiment of the present invention.
- a G-DoT is double-printed on an X-DoT (a latent image in which the D-DoT pattern 801 is inserted).
- the original (800, 801) only the G-DoT pattern printed above can be recognized by the recognizer (mobile), and when copying (forgery, alteration), the G-DoT is lost, and only the D-DoT inserted in the latent X-DoT image. Is expressed. Different DoTs can be identified in the original (800, 801) and the copy (810), so that it is possible to determine whether or not forgery has occurred.
- the G-DoT prints the 2D code with transparent ink, recognizes the value of the code reflected and expressed through the flash embedded in the terminal, and then connects the result data. This is used to determine the presence or absence of duplication or forgery, such as genuine product authentication, and the authenticity of the original, and is used to verify the corresponding result.
- Visible printing provided by the existing genuine product certification platform has a disadvantage that it can be reproduced through optical equipment, and the current applied technology is manufactured in an invisible form, and there is no physical color difference, so it is possible to use optical equipment. It provides a form that cannot be reproduced.
- the present invention is not necessarily limited to this embodiment. That is, within the scope of the object of the present invention, all the constituent elements may be selectively combined and operated in one or more.
- all of the components may be implemented as one independent hardware, a program module that performs some or all functions combined in one or more hardware by selectively combining some or all of the components. It may be implemented as a computer program having Codes and code segments constituting the computer program may be easily inferred by those skilled in the art of the present invention.
- Such a computer program is stored in a non-transitory computer readable media that can be read by a computer and is read and executed by a computer, thereby implementing an embodiment of the present invention.
- the non-transitory readable recording medium is not a medium that stores data for a short moment, such as a register, cache, memory, etc., but a medium that stores data semi-permanently and can be read by a device.
- the above-described programs may be provided by being stored in a non-transitory readable recording medium such as a CD, DVD, hard disk, Blu-ray disk, USB, memory card, ROM, or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Manufacturing & Machinery (AREA)
- Editing Of Facsimile Originals (AREA)
- Facsimile Image Signal Circuits (AREA)
Abstract
Description
Claims (8)
- 배경 패턴과 상기 배경 패턴에 잠재되어 있는 잠상 패턴상에 등 간격을 두고 선 형태의 패턴을 형성하는 위변조 판별대상을 이용해 생성되는 데이터를 저장하는 단계; 및임의 판별대상의 스캔 데이터 및 상기 저장한 데이터를 근거로 위변조되는 지정 조건에서 상기 잠상 패턴상의 선 형태가 하나의 선 또는 이미지로 외부로 현출되는지 판단하여 위변조를 방지하는 단계;를 포함하되,앱을 실행하여 상기 판별 대상을 고해상도의 카메라에 의해 촬영하는 사용자 단말장치로부터 상기 스캔 데이터를 수신하는 단계; 및위변조의 여부를 상기 사용자 단말장치로 전송하는 단계;를 더 포함하고,상기 패턴을 형성하는 단계는,상기 선 형태의 패턴으로서 이중 실선을 형성하고, 상기 등 간격을 이루는 하나의 이중 실선과 근접하는 이중 실선 사이에 선 형태의 패턴을 미포함하며,색상차에 의한 육안 판별이 불가능하도록 상기 이중 실선의 간격, 두께, 각도 및 농도를 동일하게 유지하여 형성하되, 상기 배경 패턴상의 이중 실선과 상기 잠상 패턴상의 이중 실선의 두께와 농도는 다르게 형성하며,상기 패턴을 형성하는 단계는,상기 배경 패턴과 상기 잠상 패턴을 하나의 이중 실선상에서 서로 연결하여 형성하고, 상기 잠상 패턴의 이중 실선의 두께가 상기 배경 패턴의 이중 실선의 두께보다 얇게 형성하며,상기 위변조를 방지하는 단계는,상기 스캔 데이터를 필터에 통과시켜 잠상 데이터가 추출되면 상기 추출한 잠상 데이터가 상기 선 또는 이미지로 외부로 현출되는 것으로 판단하는 잠상기술을 이용한 위변조 검증방법.
- 제1항에 있어서,상기 패턴을 형성하는 단계는,상기 배경 패턴의 이중 실선상에 상기 잠상 패턴이 더욱 현출되도록 하는 부가 패턴을 더 형성하는 잠상기술을 이용한 위변조 검증방법.
- 제1항에 있어서,상기 위변조를 방지하는 단계는,상기 배경 패턴에 형성되는 상기 선 형태의 패턴이 상기 지정 조건에서 상기 잠상 패턴보다 약하게 발현되거나 소실되는 잠상기술을 이용한 위변조 검증방법.
- 제1항에 있어서,상기 위변조를 방지하는 단계는,상기 배경 패턴 및 상기 잠상 패턴상에 형성되는 2차원 패턴의 인식 여부에 따라 위변조 여부를 더 판단하는 잠상기술을 이용한 위변조 검증방법.
- 배경 패턴과 상기 배경 패턴에 잠재되어 있는 잠상 패턴상에 등 간격을 두고 선 형태의 패턴을 형성하는 위변조 판별대상을 이용해 생성되는 데이터를 저장하는 저장부; 및임의 판별 대상의 스캔 데이터를 수신하여 상기 수신한 스캔 데이터 및 상기 저장한 데이터를 근거로, 위변조되는 지정 조건에서 상기 잠상 패턴상의 선 형태가 하나의 선 또는 이미지로 외부로 현출되는지 판단하여 위변조를 방지하는 제어부;를 포함하되,앱을 실행하여 상기 판별 대상을 고해상도의 카메라에 의해 촬영하는 사용자 단말장치로부터 상기 선 형태의 패턴으로서 이중 실선을 형성하는 상기 판별 대상에 대한 스캔 데이터를 수신하고, 위변조의 여부를 상기 사용자 단말장치로 전송하는 인터페이스부;를 더 포함하며,상기 인터페이스부는,상기 선 형태의 패턴으로서 이중 실선이 형성되고, 상기 등 간격을 이루는 하나의 이중 실선과 근접하는 이중 실선 사이에 선 형태의 패턴이 미포함되며, 색상차에 의한 육안 판별이 불가능하도록 상기 이중 실선의 간격, 두께, 각도 및 농도를 동일하게 유지하여 형성하되, 상기 배경 패턴상의 이중 실선과 상기 잠상 패턴상의 이중 실선의 두께와 농도는 다르게 형성되고, 상기 배경 패턴과 상기 잠상 패턴이 하나의 이중 실선상에서 서로 연결되어 형성되며, 상기 잠상 패턴의 이중 실선의 두께가 상기 배경 패턴의 이중 실선의 두께보다 얇게 형성되는 상기 판별 대상에 대한 상기 스캔 데이터를 수신하고,상기 제어부는,상기 수신한 스캔 데이터를 필터에 통과시켜 잠상 데이터가 추출되면 상기 추출한 잠상 데이터가 상기 선 또는 이미지로 외부로 현출되는 것으로 판단하는 잠상기술을 이용한 위변조 검증장치.
- 제5항에 있어서,상기 인터페이스부, 상기 배경 패턴의 이중 실선상에 상기 잠상 패턴이 더욱 현출되도록 하는 부가 패턴을 더 형성하는 상기 판별 대상에 대한 스캔 데이터를 수신하는 잠상기술을 이용한 위변조 검증장치.
- 제5항에 있어서,상기 인터페이스부는, 상기 배경 패턴에 형성되는 상기 선 형태의 패턴이 상기 지정 조건에서 상기 잠상 패턴보다 약하게 발현되거나 소실되는 스캔 데이터를 수신하는 잠상기술을 이용한 위변조 검증장치.
- 제5항에 있어서,상기 제어부는, 상기 배경 패턴 및 상기 잠상 패턴상에 형성되는 2차원 패턴의 인식 여부에 따라 위변조 여부를 더 판단하는 잠상기술을 이용한 위변조 검증장치.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2019-0150969 | 2019-11-22 | ||
KR1020190150969A KR102163121B1 (ko) | 2019-11-22 | 2019-11-22 | 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021101297A1 true WO2021101297A1 (ko) | 2021-05-27 |
Family
ID=72884777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2020/016429 WO2021101297A1 (ko) | 2019-11-22 | 2020-11-20 | 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR102163121B1 (ko) |
WO (1) | WO2021101297A1 (ko) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102163121B1 (ko) * | 2019-11-22 | 2020-10-07 | 주식회사 더코더 | 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003237211A (ja) * | 2002-02-18 | 2003-08-27 | Toppan Printing Co Ltd | コピー偽造防止用紙及びこのコピー偽造防止用紙を用いた有価証券類 |
JP2004228896A (ja) * | 2003-01-22 | 2004-08-12 | Canon Inc | 画像処理方法 |
KR20080110117A (ko) * | 2007-06-14 | 2008-12-18 | (주)광인사 | 위조방지용지 |
KR101164003B1 (ko) * | 2012-03-28 | 2012-07-18 | 한국조폐공사 | 위조 방지 및 복사 방해용 인쇄물의 제조방법 |
KR20130016786A (ko) * | 2011-08-09 | 2013-02-19 | 주식회사 씨텍 | 화폐처리기 |
KR102163121B1 (ko) * | 2019-11-22 | 2020-10-07 | 주식회사 더코더 | 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR940006793A (ko) | 1992-09-29 | 1994-04-25 | 스기에 다께시 | 잠상표현식 복사위조 방지용지 |
KR960012223B1 (ko) | 1994-08-31 | 1996-09-18 | 만도기계 주식회사 | 전자제어식 동력조향장치의 압력조정밸브 |
KR20010070865A (ko) | 2001-06-14 | 2001-07-27 | 최종욱 | 문서의 복사 및 위조/변조 방지 및 인증 장치 |
KR100405828B1 (ko) | 2002-02-01 | 2003-11-14 | 주식회사 마크애니 | 위변조의 방지가 가능한 문서를 제작하는 장치 및 방법,그리고 상기 문서를 인증하는 장치 및 방법 |
KR100587621B1 (ko) | 2004-12-16 | 2006-06-08 | 한국조폐공사 | 시변각 복합 잠상을 갖는 위·변조방지용 인쇄물 및 이의제조 방법 |
KR20090053563A (ko) | 2007-11-23 | 2009-05-27 | 한국조폐공사 | 컬러 출력기에 의한 위조방지 인쇄물 및 이의 제조방법 |
KR101770984B1 (ko) | 2016-03-14 | 2017-09-06 | 한국조폐공사 | 위조방지 인쇄물 및 그 제조방법 |
-
2019
- 2019-11-22 KR KR1020190150969A patent/KR102163121B1/ko active IP Right Grant
-
2020
- 2020-11-20 WO PCT/KR2020/016429 patent/WO2021101297A1/ko active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003237211A (ja) * | 2002-02-18 | 2003-08-27 | Toppan Printing Co Ltd | コピー偽造防止用紙及びこのコピー偽造防止用紙を用いた有価証券類 |
JP2004228896A (ja) * | 2003-01-22 | 2004-08-12 | Canon Inc | 画像処理方法 |
KR20080110117A (ko) * | 2007-06-14 | 2008-12-18 | (주)광인사 | 위조방지용지 |
KR20130016786A (ko) * | 2011-08-09 | 2013-02-19 | 주식회사 씨텍 | 화폐처리기 |
KR101164003B1 (ko) * | 2012-03-28 | 2012-07-18 | 한국조폐공사 | 위조 방지 및 복사 방해용 인쇄물의 제조방법 |
KR102163121B1 (ko) * | 2019-11-22 | 2020-10-07 | 주식회사 더코더 | 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 |
Also Published As
Publication number | Publication date |
---|---|
KR102163121B1 (ko) | 2020-10-07 |
KR20210063215A (ko) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2501513C (en) | Document containing security images | |
CA2306068C (en) | Digital imaging method and apparatus for detection of document security marks | |
EP0554115A1 (en) | Image processing method and apparatus | |
EP1755327B1 (en) | Detection of document security marks using run profiles | |
WO2016163632A1 (ko) | 데이터가 삽입된 이미지 생성 방법 및 이를 실행하는 이미지 생성 장치 | |
JP2001086331A (ja) | セキュリティマークの有無の確認方法 | |
US6621922B2 (en) | Image processing system and electronic apparatuses | |
WO2021101297A1 (ko) | 잠상기술을 이용한 위변조 검증장치 및 그 장치의 구동방법 | |
WO2021101290A1 (ko) | 도트 난반사 특성을 이용한 진위여부 판별장치 및 그 장치의 구동방법 | |
WO2021101298A1 (ko) | 이종 패턴을 이용한 위변조 검증장치 및 그 장치의 구동방법 | |
US20070086070A1 (en) | Full Color Scanning Protection of a Document | |
KR102668025B1 (ko) | 잠상기술을 이용한 위변조 검증방법 및 장치 | |
KR20080083992A (ko) | 지폐 인식장치 및 그 인식방법 | |
WO2020085655A1 (ko) | 위조방지용 인쇄물 및 그 제조 방법 | |
AU2004321079A1 (en) | Full color scanning protection of document | |
US20220150378A1 (en) | Method of Printing Authentication Indicators with Amplitude Modulated Halftone Printing | |
KR102668040B1 (ko) | 이종 패턴을 이용한 위변조 검증방법 및 장치 | |
JP3260772B2 (ja) | 画像処理装置及び方法 | |
JP3272739B2 (ja) | 画像処理装置およびその方法 | |
JP4857083B2 (ja) | 画像形成システム及び画像形成装置 | |
JP2022114031A (ja) | 印刷物の真正の確認装置、確認方法及び確認用ソフトウェア | |
JP3245154B2 (ja) | 画像処理装置 | |
KR100819437B1 (ko) | 이미지 인증장치 및 그 인증방법 | |
JPH04227367A (ja) | 画像形成装置 | |
JP3109984B2 (ja) | カラー画像処理装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20889803 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20889803 Country of ref document: EP Kind code of ref document: A1 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20889803 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 08.12.2022) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20889803 Country of ref document: EP Kind code of ref document: A1 |