[go: up one dir, main page]

WO2000062258A1 - Authentification de documents de securite - Google Patents

Authentification de documents de securite Download PDF

Info

Publication number
WO2000062258A1
WO2000062258A1 PCT/US2000/008867 US0008867W WO0062258A1 WO 2000062258 A1 WO2000062258 A1 WO 2000062258A1 US 0008867 W US0008867 W US 0008867W WO 0062258 A1 WO0062258 A1 WO 0062258A1
Authority
WO
WIPO (PCT)
Prior art keywords
document
security
trigger
image
covert
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2000/008867
Other languages
English (en)
Inventor
Daniel D. Thaxton
William H. Mowry, Jr.
Russell E. Hill
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Standard Register Co
Original Assignee
Standard Register Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/291,537 external-priority patent/US6209923B1/en
Application filed by Standard Register Co filed Critical Standard Register Co
Priority to AU40680/00A priority Critical patent/AU4068000A/en
Publication of WO2000062258A1 publication Critical patent/WO2000062258A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • B41M3/146Security printing using a non human-readable pattern which becomes visible on reproduction, e.g. a void mark
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements

Definitions

  • a device for authenticating a security document includes a security image printed on a face thereof.
  • the security image is defined by a collection of security image elements and defines at least one document authentication scheme.
  • the document authentication scheme is arranged to provide a primary indication of document authenticity.
  • the authentication device comprises an optical imaging device and a specially programmed controller.
  • the optical imaging device is arranged to generate a security image signal representative of at least a portion of the security image.
  • the controller is programmed to (i) define an authentication constellation within the security image, wherein the authentication constellation defines a set of constellation pixels, and wherein the constellation pixels are arranged at predetermined coordinates within the security image; (ii) identify respective occupation characteristics of each of the constellation pixels based on the security image signal, wherein each of the respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and (iii) determine whether the respective identified occupation characteristics correspond to an authentic document by comparing the respective identified occupation characteristics to a set of authentic occupation characteristics.
  • the security document may include a covert trigger defined by a set of covert trigger elements on the face of the security document and the controller may be programmed to identify the respective occupation characteristics based on printed matter defined by at least a portion of the covert trigger.
  • the controller may be programmed to identify the respective occupation characteristics based on printed matter defined by at least a portion of the security image.
  • the security document preferably includes a covert trigger defined on the face of the security document and the controller is preferably programmed to identify the respective occupation characteristics based on printed matter defined by the covert trigger and the security image.
  • a device for authenticating a document includes an image printed on a face thereof.
  • the image is defined by a collection of image elements.
  • the authentication device comprises an optical imaging device and a specially programmed controller.
  • the optical imaging device is arranged to generate an image signal representative of at least a portion of the image.
  • the controller is programmed to (i) define an authentication constellation within the image, wherein the authentication constellation defines a set of constellation pixels, and wherein the constellation pixels are arranged at predetermined coordinates within the image; (ii) identify respective occupation characteristics of each of the constellation pixels based on the image signal, wherein each of the respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and (iii) determine whether the respective identified occupation characteristics correspond to an authentic document by comparing the respective identified occupation characteristics to a set of authentic occupation characteristics.
  • a security document comprising a security image and a covert trigger printed on a face of the document.
  • the security image is defined by a collection of security image elements.
  • the security image defines at least one document authentication scheme.
  • the covert trigger may be arranged to provide an indication of document authenticity in addition to the indication of document authenticity provided by the document authentication scheme. If the security document includes at least one variable data field, the covert trigger may define an authentication parameter for the at least one data field.
  • the variable data field may comprise a date field and the authentication parameter defined by the covert trigger may comprise an encoded date. Alternatively, the variable data field may comprise an amount field and the authentication parameter defined by the covert trigger may comprise a maximum amount limit.
  • the covert trigger may also be arranged to match a predetermined authentication mask or to identify the document authentication scheme.
  • the security document may further comprise an overt trigger arranged to be visually distinct from the security image elements.
  • the overt trigger may also be arranged to provide an indication of document authenticity or to identify the document authentication scheme.
  • the overt trigger may include an encoded identification of the document authentication scheme.
  • the overt trigger arrangement and the covert trigger arrangement may define substantially identical graphical images.
  • An overt secure document indicator may be arranged to be visually distinct from the security image elements and to provide a readily apparent indication that the document at issue includes enhances security features.
  • the overt secure document indicator may comprise a graphical icon.
  • a security document according to the present invention may include a pseudo- covert trigger printed on the face of the document.
  • the pseudo-covert trigger may be arranged as a decoy by printing it such that it is more apparent on the face of the document than the covert trigger and such that its elements are arranged to resemble the security image elements to a significantly lesser extent than the collection of trigger elements.
  • a method of authenticating a security document includes a security image printed on a face of the document.
  • the security image includes a collection of security image elements and defines at least one document authentication scheme arranged to provide a primary indication of document authenticity.
  • the method comprises the steps of: (i) defining an authentication constellation within the security image, wherein the authentication constellation defines a set of constellation pixels, and wherein the constellation pixels are arranged at predetermined coordinates within the security image; (ii) identifying respective occupation characteristics of each of the constellation pixels, wherein each of the respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and (iii) determining whether the respective identified occupation characteristics correspond to an authentic document by comparing the respective identified occupation characteristics to a set of authentic occupation characteristics.
  • a predetermined number of the authentic occupation characteristics may represent a degree of printed matter defined by a covert trigger defined on the face of the security document or by the security image itself.
  • a predetermined number of the authentic occupation characteristics may represent an absence of printed matter within one of the selected constellation pixels.
  • the step of identifying respective occupation characteristics of each of the constellation pixels may be executed by an automated machine.
  • a method of authenticating a document includes an image printed on a face of the document.
  • the image includes a collection of image elements.
  • the method comprises the steps of: (i) defining an authentication constellation within the image, wherein the authentication constellation defines a set of constellation pixels, and wherein the constellation pixels are arranged at predetermined coordinates within the image; (ii) identifying respective occupation characteristics of each of the constellation pixels, wherein each of the respective occupation characteristics represents a degree of printed matter within a selected constellation pixel; and (iii) determining whether the respective identified occupation characteristics correspond to an authentic document by comparing the respective identified occupation characteristics to a set of authentic occupation characteristics.
  • a method of producing a security document comprising the steps of: (i) defining a security image including a collection of security image elements, wherein the security image embodies a predetermined document authentication scheme arranged to provide an indication of document authenticity; (i) defining a covert trigger including a collection of trigger elements, wherein the trigger elements are arranged to resemble the security image elements; (ii) defining a trigger mask, wherein the trigger mask is arranged to define respective non-printed portions aligned with each of the trigger elements, and wherein each of the non-printed portions defines a non-printed buffer zone surrounding a corresponding trigger element; (iii) constructing a printed image from each of the security image, the covert trigger, and the trigger mask; and (iv) printing the constructed printed image on a substrate.
  • the security image may include a background image layer, a message layer, a message layer mask, and a camouflage image layer.
  • Fig 1 is a schematic illustration of a security document according to the present invention.
  • Fig. 2 is a schematic illustration of a security document according to an alternative embodiment of the present invention.
  • Figs. 3-6 are illustrations of a covert trigger and a method of document authentication according to the present invention.
  • Fig. 7 is an illustration of a method of producing a security document according to the present invention
  • Fig. 8 is a schematic illustration of a device for authenticating a security document according to the present invention.
  • a security document 10 according to one embodiment of the present invention is illustrated.
  • the security document 10 may be a negotiable instrument or another type of document including particular security features arranged to provide an indication of document authenticity.
  • the illustrated security document includes a security image 20 printed on a front face 12 of the document 10.
  • the security image 20 is merely illustrated schematically in Fig. 1 , it will be understood by those practicing the present invention and familiar with security documents in general, including those described in U.S. Patents 4,579,370, 5,149,140, 5,197,765, 5,340,159, that the security image 20 is defined by a collection of security image elements 22.
  • a set of security image elements 22 are illustrated schematically in Fig. 3.
  • the security image 20 defines a predetermined document authentication scheme that provides an indication of document authenticity.
  • the security image may be a conventional void pantograph security image, an optically decodable security image, a varying tone security image, some other security image, or combinations thereof.
  • printed matter comprises any type of graphical representations reproduced on a substrate, regardless of the method by which the graphical representation is rendered on the substrate. Referring now to Fig. 3, a covert trigger 30 is printed on the face 12 of the document 10.
  • the covert trigger 30 is defined by a collection of trigger elements 32 and is referred to herein as a "covert" trigger because the trigger elements 32 are arranged to resemble the security image elements 22 such that the covert trigger 30 is not readily apparent on the face 12 of the document 10.
  • the covert trigger elements 32 and the security image elements 22 are constructed of shapes having substantially identical geometry, e.g., printed dots, clusters of printed dots, etc. It is contemplated by the present invention, however, that the covert trigger elements 32 and the security image elements 22 need not be identical. Rather, all that is required is that the covert trigger elements 32 be sized and positioned such that they are substantially hidden within the security image 20 so as not to be readily apparent upon casual inspection of the security document 10.
  • the covert trigger may be defined by partial printed elements, removed security image elements, or non-printed portions of the security image 20.
  • a plurality of covert triggers 30 are provided across the face 12 of the document 10. The plural covert triggers 30 may be identical or distinct.
  • the covert trigger 30 may be arranged to provide an indication of document authenticity, to identify the document authentication scheme, or both. If the covert trigger 30 is arranged to provide an indication of document authenticity, that indication of authenticity will typically be in addition to the indication of document authenticity provided by the document authentication scheme. ln one embodiment of the present invention, the covert trigger 30 may be arranged such that it defines an authentication parameter for a data field on the security document 10. Specifically, the shape, appearance, or arrangement of the trigger 30 may be an encoded representation of a predetermined parameter against which the authenticity of the data field may be checked.
  • the variable data field may comprise a printed issue date and the authentication parameter defined by the covert trigger 30 may comprises an encoded expiration date against which the printed date may be checked.
  • a security document processor may guard against alteration of the security document issue date by reading the encoded expiration date.
  • the variable data field may comprise a printed amount and the authentication parameter defined by the covert trigger 30 may comprise an encoded maximum amount limit.
  • a security document processor may guard against alteration of the value of a negotiable document beyond the encoded maximum value.
  • the covert trigger 30 is arranged to identify the document authentication scheme. Specifically, the arrangement of the covert trigger 30 may be such that it provides an indication as to the nature of the one or more authentication schemes embodied in the security document 10. In this manner, the covert trigger 30 overcomes the disadvantages of merely describing the nature of the document authentication scheme in fine print along the top or bottom of the document - "CASH ONLY WHEN THE COLORED AREA OF THIS
  • an overt trigger 40 is provided to further enhance the security document 10.
  • the overt trigger 40 is arranged to be visually distinct from the security image elements such that it is readily viewable on the face 12 of the security document 10.
  • the overt trigger 40 may be arranged to identify the document authentication scheme by defining an encoded identification of the nature of the authentication scheme embodied in the security document 10.
  • the numerals "6545382" printed on the face of the document 10 may correspond to a predetermined security document decoding algorithm or authentication algorithm, i.e., an algorithm that points to a specific machine-readable decoding or authentication scheme. It is contemplated by the present invention that the overt trigger 40 may be positioned in a portion of the document dedicated to the identification of security features embodied in the document 10. The portion of the document dedicated to the
  • identification of security features i.e., the security features rectangle, may be designated in an industry standard location.
  • the overt trigger 40 may also be arranged to provide an indication of document authenticity.
  • the overt trigger 40 and the covert trigger 30 may be arranged to define substantially identical graphical images.
  • the covert trigger 40 and the covert trigger 30 could be arranged to define the shape of the number "5" or a star shape and the overt trigger could be a printed number "5" or a star.
  • an overt secure document indicator 50 may also be
  • the overt secure document indicator 50 comprises a graphical icon that clearly identifies the document 10 as an enhanced security document.
  • 20 indicator 50 comprises a graphical representation of a pair of handcuffs.
  • Other examples include a key, a lock, a chain link or a concertina wire pattern, etc.
  • FIG. 2 another aspect of the present invention contemplates the addition of a printed pseudo-covert trigger 60 on the face 12 of the document 10.
  • the pseudo-covert trigger is arranged to be more apparent on the face
  • the pseudo-covert trigger 60 is utilized as a decoy for the true covert trigger 30. Specifically, a counterfeiter aware of the presence of a covert trigger
  • the pseudo-covert trigger 60 need not convey any particular meaning or be arrange in any specific manner because it is merely a phony trigger.
  • a true trigger is graphical image or collection of printed elements arranged to provide a direct indication of document authenticity or to indicate a means by which a document may be authenticated.
  • the security document at issue may or may not include a covert trigger, an overt trigger, a pseudo-covert trigger, or an overt secure document indicator. Rather, the security document at issue may merely include a security image 20 printed on a face of the document.
  • the security image 20, which is illustrated only partially in Figs. 3-6, is defined by a collection of security image elements 22 and defines at least one document authentication scheme.
  • the document authentication scheme as is described above, is arranged to provide a primary indication of document authenticity.
  • the method of authentication comprises the step of defining an authentication constellation 70 within the security image 20.
  • the authentication constellation 70 defines a set of constellation pixels 72 arranged at predetermined coordinates within the security image 20. It is noted that seven constellation pixels 72 are present in the embodiments of Figs. 3 and 5, ten constellation pixels 72 are present in the embodiment of Fig. 4, and nine constellation pixels 72 are present in the embodiment of Fig. 6.
  • the constellation pixels 72 are positioned to correspond to the positions of the trigger elements 32. However, as is implied above, the constellation pixels 72 need not be positioned to correspond to the positions the trigger elements 32. Rather, as is illustrated in Figs. 4-6, the constellation pixels 72 may be arranged such that their positions correspond to the locations of security image elements 22 and trigger elements 32 (see Figs. 4 and 6), removed or missing security image elements 34 (see Figs. 4-6), other non-printed portions 36 of the security image 20 (see Figs. 4-6), or other combinations and selections of distinctive portions of printed or non-printed matter on the face of the security document at issue.
  • the respective occupation characteristics of each of the constellation pixels 72 is identified.
  • Each of the respective occupation characteristics represents a measure of the degree of printed matter within a selected constellation pixel 72.
  • the document at issue may then be authenticated based upon a determination of whether the respective occupation characteristics correspond to the predetermined authentic occupation characteristics of a document.
  • the covert trigger 30 itself may be arranged to match a predetermined authentication mask defining the authentication constellation 70.
  • the noted “degree of printed matter” includes the case where no printed matter is included within a selected constellation pixel 72.
  • a device 80 for authenticating a security document comprises a specially programmed controller 82 and an optical imaging device 84.
  • the authentication device 80 may be utilized in a variety of applications.
  • the authentication device may be utilized with various types of security document or check processing equipment, like reader/sorters and point of sale terminals, to enable authentication when security documents or checks are in various stages of processing.
  • the authentication device 80 is utilized at a check's point of first presentment, e.g., a point of sale terminal or a teller terminal at a banking or check cashing institution.
  • the authentication device 80 may be positioned near or mounted to the check processing -12-
  • the authentication device 80 is incorporated directly into the internal structure of the equipment and is arranged to share hardware and software resources with the equipment.
  • the optical imaging device 84 is arranged to generate a security image signal representative of at least a portion of the security image.
  • the imaging device 84 it is noted that any one of a number of commercially available imaging devices may be modified or adapted in accordance with the teachings of the present invention.
  • the device 84 includes a high resolution optics assembly capable of scanning a security document and generating the security image signal with the aid of a suitably programmed controller.
  • imaging devices examples include the IT9000E and the IT9000T imagers and the 4400HD/HD10 handheld image readers available from Welch Allyn data collection Skaneateles Falls, NY and the RDM EC ⁇ OOOi, available from the RDM Corporation, Waterloo, Ontario.
  • the controller 82 is programmed to define the authentication constellation 70 within the security image 20 and identify respective occupation characteristics of each of the constellation pixels 72 based on the security image signal.
  • the controller 82 is further programmed to determine whether the respective identified occupation characteristics correspond to an authentic document by comparing the respective identified occupation characteristics to a set of authentic occupation characteristics.
  • the security document includes a covert trigger 30 the controller 82 is programmed to identify the respective occupation characteristics based on printed matter defined by the covert trigger 30, the security image 20, or combinations thereof.
  • Fig. 7 a method of producing a security document according to the present invention is illustrated schematically. Initially, a digital security image is defined, typically utilizing suitable graphic design software.
  • the security image includes a collection of security image elements and embodies a predetermined document authentication scheme, referred to above, which is arranged to provide an indication of document authenticity.
  • the security image includes: (i) a background image layer 102; (ii) a message layer 106; (iii) a message layer mask 104 defining non-printed areas within the background layer 102 corresponding to the positions of the printed matter within the message layer 106; and (iv) a camouflage image layer 108 further defining non-printed matter arranged to obscure the message layer 106.
  • a covert trigger layer 112 is also defined and includes a collection of trigger elements.
  • the trigger elements may comprise printed elements, partial printed elements, or non-printed space.
  • the trigger elements of the covert trigger layer 112 are preferably arranged to resemble the security image.
  • a trigger mask layer 110 is defined and is arranged to define respective non-printed portions aligned with each of the trigger elements in the covert trigger layer 112.
  • Each of the non-printed portions in the trigger mask layer 110 defines a non-printed buffer zone surrounding a corresponding trigger element in the covert trigger layer 112. The buffer zone is most conveniently provided by ensuring that the non-printed portions of the trigger mask layer 110 are aligned with, and uniformly larger than, the trigger elements in the covert trigger layer 112.
  • the buffer zone of the trigger mask layer 110 provides for a margin of error in positioning the elements of the covert trigger layer 112.
  • the image to be printed on the substrate 100 is constructed from the background image layer 102, the message layer 106, the message layer mask 104, the camouflage image layer 108, the trigger mask layer 110, and the covert trigger layer 112.

Landscapes

  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Credit Cards Or The Like (AREA)

Abstract

L'invention concerne un document de sécurité ainsi qu'un dispositif d'authentification dudit document. Ce dispositif d'authentification de documents de sécurité comprend un dispositif d'imagerie optique et un contrôleur spécialement programmé. Le document de sécurité comprend une combinaison unique de déclencheurs masqués, de déclencheurs apparents, et d'indicateurs de documents sécurisés apparents disposés de manière à renforcer la sécurité du document au moment de son émission et à permettre une authentification automatique rapide du document lors de son émission. Selon un mode de réalisation, la présente invention concerne un dispositif d'authentification d'un document de sécurité. Ledit document de sécurité comprend une image de sécurité imprimée sur l'une de ses faces. L'image de sécurité est définie par un ensemble d'éléments d'image de sécurité, et elle définit au moins un mode d'authentification. Ce mode d'authentification est conçu pour donner une première indication de l'authenticité du document. Le dispositif d'authentification comprend un dispositif d'imagerie optique et un contrôleur spécialement programmé.
PCT/US2000/008867 1999-04-14 2000-04-03 Authentification de documents de securite Ceased WO2000062258A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU40680/00A AU4068000A (en) 1999-04-14 2000-04-03 Security document authentication

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US09/291,537 1999-04-14
US09/291,537 US6209923B1 (en) 1999-04-14 1999-04-14 Security document and authentication scheme
US09/524,441 US6394358B1 (en) 1999-04-14 2000-03-14 Device for authenticating a security document
US09/524,441 2000-03-14

Publications (1)

Publication Number Publication Date
WO2000062258A1 true WO2000062258A1 (fr) 2000-10-19

Family

ID=26966843

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/008867 Ceased WO2000062258A1 (fr) 1999-04-14 2000-04-03 Authentification de documents de securite

Country Status (2)

Country Link
AU (1) AU4068000A (fr)
WO (1) WO2000062258A1 (fr)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6694041B1 (en) 2000-10-11 2004-02-17 Digimarc Corporation Halftone watermarking and related applications
US6754377B2 (en) 1995-05-08 2004-06-22 Digimarc Corporation Methods and systems for marking printed documents
US6760464B2 (en) 2000-10-11 2004-07-06 Digimarc Corporation Halftone watermarking and related applications
US6993150B2 (en) 2001-01-24 2006-01-31 Digimarc Corporation Halftone primitive watermarking and related applications
EP1457349A4 (fr) * 2001-12-20 2006-02-01 Seiko Epson Corp Matiere enregistree comprenant une mesure de prevention contre la contrefa on
US7239734B2 (en) 1998-07-31 2007-07-03 Digimarc Corporation Authentication of identification documents and banknotes
US7246239B2 (en) 2001-01-24 2007-07-17 Digimarc Corporation Digital watermarks for checking authenticity of printed objects
US7519819B2 (en) 2002-05-29 2009-04-14 Digimarc Corporatino Layered security in digital watermarking
US7974495B2 (en) 2002-06-10 2011-07-05 Digimarc Corporation Identification and protection of video

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4579370A (en) 1982-09-10 1986-04-01 Burroughs Corporation Multi-tone cancellation phrase and background
US5149140A (en) 1991-03-11 1992-09-22 The Standard Register Company Security, information document
US5197765A (en) 1991-07-12 1993-03-30 The Standard Register Company Varying tone securing document
US5340159A (en) 1991-07-12 1994-08-23 The Standard Register Company Varying tone security document
US5621810A (en) * 1989-02-10 1997-04-15 Canon Kabushiki Kaisha Image reading or processing with ability to prevent copying of certain originals
US5647010A (en) * 1993-09-14 1997-07-08 Ricoh Company, Ltd. Image forming apparatus with security feature which prevents copying of specific types of documents
WO1998022292A2 (fr) * 1996-11-19 1998-05-28 The Standard Register Company Document de security contenant un agencement non orthogonal d'elements
US5785353A (en) * 1993-05-05 1998-07-28 Diamond Security, Inc. Negotiable document having enhanced security for deterring generation of copies of the negotiable document

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4579370A (en) 1982-09-10 1986-04-01 Burroughs Corporation Multi-tone cancellation phrase and background
US5621810A (en) * 1989-02-10 1997-04-15 Canon Kabushiki Kaisha Image reading or processing with ability to prevent copying of certain originals
US5149140A (en) 1991-03-11 1992-09-22 The Standard Register Company Security, information document
US5197765A (en) 1991-07-12 1993-03-30 The Standard Register Company Varying tone securing document
US5340159A (en) 1991-07-12 1994-08-23 The Standard Register Company Varying tone security document
US5785353A (en) * 1993-05-05 1998-07-28 Diamond Security, Inc. Negotiable document having enhanced security for deterring generation of copies of the negotiable document
US5647010A (en) * 1993-09-14 1997-07-08 Ricoh Company, Ltd. Image forming apparatus with security feature which prevents copying of specific types of documents
WO1998022292A2 (fr) * 1996-11-19 1998-05-28 The Standard Register Company Document de security contenant un agencement non orthogonal d'elements

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6754377B2 (en) 1995-05-08 2004-06-22 Digimarc Corporation Methods and systems for marking printed documents
US7239734B2 (en) 1998-07-31 2007-07-03 Digimarc Corporation Authentication of identification documents and banknotes
US7570784B2 (en) 1998-07-31 2009-08-04 Digimarc Corporation Identification and protection of security documents
US6760464B2 (en) 2000-10-11 2004-07-06 Digimarc Corporation Halftone watermarking and related applications
US6694041B1 (en) 2000-10-11 2004-02-17 Digimarc Corporation Halftone watermarking and related applications
US7020349B2 (en) 2000-10-11 2006-03-28 Digimarc Corporation Halftone watermarking and related applications
US6993150B2 (en) 2001-01-24 2006-01-31 Digimarc Corporation Halftone primitive watermarking and related applications
US7246239B2 (en) 2001-01-24 2007-07-17 Digimarc Corporation Digital watermarks for checking authenticity of printed objects
AU2002357597B2 (en) * 2001-12-20 2008-04-10 Seiko Epson Corporation Recorded Article with Anti-Counterfeit Measures
US7408630B2 (en) 2001-12-20 2008-08-05 Seiko Epson Corporation Recorded article with anti-counterfeit measures
EP1457349A4 (fr) * 2001-12-20 2006-02-01 Seiko Epson Corp Matiere enregistree comprenant une mesure de prevention contre la contrefa on
US7601417B2 (en) 2001-12-20 2009-10-13 Seiko Epson Corporation Recorded matter having countermeasure against forging
US7519819B2 (en) 2002-05-29 2009-04-14 Digimarc Corporatino Layered security in digital watermarking
US7974495B2 (en) 2002-06-10 2011-07-05 Digimarc Corporation Identification and protection of video

Also Published As

Publication number Publication date
AU4068000A (en) 2000-11-14

Similar Documents

Publication Publication Date Title
US6394358B1 (en) Device for authenticating a security document
EP0730243B1 (fr) Système et méthode de vérification de cartes d'identification
US8177136B2 (en) Embedded optical signatures in documents
US7457957B2 (en) Apparatus and method for issuing and authenticating securities, etc. using digital watermarking
CA2170440C (fr) Carte d'identite a auto-verification
US8059858B2 (en) Identification document and related methods
CN1054811C (zh) 不可变更的自动验证制品
US7239734B2 (en) Authentication of identification documents and banknotes
JP2007213148A (ja) 紙幣真贋判定装置及び方法、紙幣表面特徴登録装置及び方法、紙幣真贋判定システム、カード印刷装置及び方法、カード真贋判定装置及び方法、カード真贋判定システム、及び、カード
WO2006065285A1 (fr) Signatures optiques intégrées dans des documents
WO2000062258A1 (fr) Authentification de documents de securite
US7035428B1 (en) Workpiece authentication based upon one or more workpiece images
EP3069293A1 (fr) Système et procédé d'impression de code à barres caché et sécurisé
CN1153402C (zh) 产生和鉴别不可变更的自动验证制品的方法和系统
KR20010087749A (ko) 워터마킹 기술을 기반으로 한 카드 제작 및 인증을 위한장치 및 방법
US20040081319A1 (en) Check verification and authentication process and apparatus
KR20010070865A (ko) 문서의 복사 및 위조/변조 방지 및 인증 장치
US12443815B2 (en) Automated fraudulent altering and photocopying detection utilizing steganographic pattern detection
JP2709850B2 (ja) 偽造防止可能なバーコード
KR100798688B1 (ko) 유가증권 인증장치 및 그 방법
EA006012B1 (ru) Система защиты подлинности носителя печатной информации
HK1002213B (en) Methods and systems for creating and authenticating unalterable self-verifying articles
WO2005036810A1 (fr) Procede et appareil d'application et d'authentification d'instruments negociables et de documents de securite

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP