[go: up one dir, main page]

WO2003068522A1 - Security printing - Google Patents

Security printing Download PDF

Info

Publication number
WO2003068522A1
WO2003068522A1 PCT/GB2003/000571 GB0300571W WO03068522A1 WO 2003068522 A1 WO2003068522 A1 WO 2003068522A1 GB 0300571 W GB0300571 W GB 0300571W WO 03068522 A1 WO03068522 A1 WO 03068522A1
Authority
WO
WIPO (PCT)
Prior art keywords
lines
security print
print according
image
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/GB2003/000571
Other languages
French (fr)
Inventor
Ian Rodney Smith
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ASCENT SYSTEMS SOFTWARE Ltd
Original Assignee
ASCENT SYSTEMS SOFTWARE Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ASCENT SYSTEMS SOFTWARE Ltd filed Critical ASCENT SYSTEMS SOFTWARE Ltd
Priority to AU2003205863A priority Critical patent/AU2003205863A1/en
Publication of WO2003068522A1 publication Critical patent/WO2003068522A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B41PRINTING; LINING MACHINES; TYPEWRITERS; STAMPS
    • B41MPRINTING, DUPLICATING, MARKING, OR COPYING PROCESSES; COLOUR PRINTING
    • B41M3/00Printing processes to produce particular kinds of printed work, e.g. patterns
    • B41M3/14Security printing
    • B41M3/146Security printing using a non human-readable pattern which becomes visible on reproduction, e.g. a void mark

Definitions

  • This invention relates to security printing.
  • a security print proof against photocopying in which a primary image is rendered in a density modulation of pairs of lines, and a secondary image is applied to said primary image by altering the relationship between lines in a pair.
  • the relationship that is altered is spacing between lines in a pair.
  • the relationship that is altered maybe frequency of crossing of the lines in a pair.
  • the lines may be straight or wavy. Lines of each pair may cross at the edges of secondary image features, and may cross repeatedly within secondary image features, remaining parallel outside, or vice versa.
  • the line spacing of the primary image may be such as to render it capable of being copied by a photocopier, but the line spacing in the secondary image such as to be capable of resolution by a photocopier. Such a print will, of course, reveal its hidden image in a photocopy.
  • the lines may be dotted.
  • the print may be a monochrome print or a colour print, in which lines are made up of colour segments. When the lines are dotted, the dots may be made up of RBG or CMYX components.
  • the invention comprises a security print as above described in combination with a detector in the form of a lenticular screen of which the lenslets correspond to the line spacing of the primary image. Placing the screen over the print in register with the lines of the print will reveal the hidden image because there the lenslets will be out of register with the lines.
  • Figure 2 is a detail of a second security print
  • the print illustrated in Figure 1 has a primary image rendered as a density modulation of pairs of parallel wavy lines 11 , 12.
  • a secondary image is applied to the primary image - in this case, the letter "C” of the word “copy”, for example - by, within the confines of the "C", the spacing between the lines 11 , 12 reducing from “a” to "b".
  • the line spacing "a” is sufficiently small, the eye perceives the print as a continuous image, and can detect no difference within the "C”. It may be arranged, however, that the line spacing "A” is such as to be capable of being copied by a photocopier or scanner, while the spacing "b” is beyond the resolution of such an instrument.
  • the image may have spacings "a" and "b" which can be copied on a photocopier or scanner, the hidden image being revealed by placing over it, in register with the wavy lines, a lenticular detector screen having cylindrical lenslets which correspond precisely to those lines. If a copy is made otherwise than by a photocopier or scanner, the aberration in the lines in the hidden image will not be reproduced, but using the detector screen will reveal that there is not hidden image where there should be one.
  • Figure 2 illustrates how parallel lines can convert to repeatedly crossing lines at the edges of hidden image features.
  • the hidden image is the word COPY (of which, in the detail, only the letters C and O are shown).
  • the line pairs are parallel within the letters, chs-crossing outside.
  • the print may have two hidden images, one capable of being copied by a photocopier and one not.

Landscapes

  • Life Sciences & Earth Sciences (AREA)
  • Animal Behavior & Ethology (AREA)
  • Cleaning In Electrography (AREA)

Abstract

A security print proof against photocopying in which a primary image is rendered in a density modulation of pairs of lines, and a secondary image is applied to said primary image by altering the relationship between lines in a pair.

Description

Security Printing
This invention relates to security printing.
It has long been known to print documents, to protect them from forgery, using fine patterns constituting a background for a main image, The more complex the fine pattern, the more difficult it is to reproduce.
The developments of xerography, laser printing and scanning have created new problems for the printer. Special measures have been devised to make security documents uncopiable by standard or even advanced state of the art copiers and scanners, EP 0920383 being an example of such in which an "object" is worked into a background pattern by linear components of the background being "hollowed", i.e., thick lines becoming slightly spaced thin lines. Such hollowed regions are not readily visible to the naked eye, so they do not mar the appearance of the major image, but they "fool" a photocopier, and are visible in a photocopy. The "object" in question can be a word, such, for example, as "FORGERY".
While this can be effective to prevent photocopying, it is possible that a copy can be made without photocopying or indeed any scanning technique that scans a document - a document sufficiently valuable could be reconstructed even from essentially first principles, by an artist re-drawing the document, possible with some degree of magnification to assist in copying the fine detail. The document may well be sufficiently good to fool the naked eye, and a photocopier may not be to hand in a situation where the document needs to be verified. So it is desirable that a document can be detected as a forgery, even when a photocopier is not available, and it may even be required that the document does not betray the presence of a security measure by such a simple recourse as photocopying.
A security print proof against photocopying in which a primary image is rendered in a density modulation of pairs of lines, and a secondary image is applied to said primary image by altering the relationship between lines in a pair.
In one example of the invention, the relationship that is altered is spacing between lines in a pair.
In addition or alternatively, the relationship that is altered maybe frequency of crossing of the lines in a pair.
The lines may be straight or wavy. Lines of each pair may cross at the edges of secondary image features, and may cross repeatedly within secondary image features, remaining parallel outside, or vice versa.
The line spacing of the primary image may be such as to render it capable of being copied by a photocopier, but the line spacing in the secondary image such as to be capable of resolution by a photocopier. Such a print will, of course, reveal its hidden image in a photocopy. The lines may be dotted.
The print may be a monochrome print or a colour print, in which lines are made up of colour segments. When the lines are dotted, the dots may be made up of RBG or CMYX components.
The invention comprises a security print as above described in combination with a detector in the form of a lenticular screen of which the lenslets correspond to the line spacing of the primary image. Placing the screen over the print in register with the lines of the print will reveal the hidden image because there the lenslets will be out of register with the lines.
A security print according to the invention will now be described with reference to the accompanying drawing, in which: Figure 1 is a small detail of a first security print; and
Figure 2 is a detail of a second security print
The print illustrated in Figure 1 has a primary image rendered as a density modulation of pairs of parallel wavy lines 11 , 12. A secondary image is applied to the primary image - in this case, the letter "C" of the word "copy", for example - by, within the confines of the "C", the spacing between the lines 11 , 12 reducing from "a" to "b". Provided the line spacing "a" is sufficiently small, the eye perceives the print as a continuous image, and can detect no difference within the "C". It may be arranged, however, that the line spacing "A" is such as to be capable of being copied by a photocopier or scanner, while the spacing "b" is beyond the resolution of such an instrument.
On the other hand, the image may have spacings "a" and "b" which can be copied on a photocopier or scanner, the hidden image being revealed by placing over it, in register with the wavy lines, a lenticular detector screen having cylindrical lenslets which correspond precisely to those lines. If a copy is made otherwise than by a photocopier or scanner, the aberration in the lines in the hidden image will not be reproduced, but using the detector screen will reveal that there is not hidden image where there should be one.
Figure 2 illustrates how parallel lines can convert to repeatedly crossing lines at the edges of hidden image features. In this case the hidden image is the word COPY (of which, in the detail, only the letters C and O are shown). The line pairs are parallel within the letters, chs-crossing outside.
Clearly, to avoid copies being made by a photocopier when such a reproducible hidden image is used, the print may have two hidden images, one capable of being copied by a photocopier and one not.

Claims

5 CLAIMS
1. A security print proof against photocopying in which a primary image is rendered in a density modulation of pairs of lines, and a secondary image is applied to said primary image by altering the relationship between lines in a pair.
2. A security print according to claim 1 , wherein the relationship that is altered is spacing between lines in a pair.
3. A security print according to claim 1 or claim 2, wherein the relationship that is altered is frequency of crossing of the lines in a pair.
4. A security print according to claim 1 or claim 2, wherein the lines in each pair are substantially parallel.
5. A security print according to any of the preceding claims, wherein the lines are straight.
6. A security print according to any of the preceding claims, wherein the lines are wavy.
7. A security print according to any of the preceding claims, wherein the lines of each pair cross at the edges of secondary image features.
8. A security print according to any of the preceding claims, wherein the line spacing of the primary image is such as to render it capable of being copied by a photocopier, but the line spacing in the secondary image is such as to be incapable of resolution by a photocopier.
9. A security print according to any of the preceding claims, wherein the lines are dotted.
10. A security print according to any of the preceding claims, being a monochrome print.
11. A security print according to any one of the preceding claims, being a colour print, in which the lines are made up of colour segments.
12. A security print according to claim 11 , wherein the lines are dotted, the dots being made up of RBG or CMYK components.
13. A security print according to any of the preceding claims, in combination with a detector in the form of a lenticular screen of which the lenslets correspond to the line spacing of the primary image.
PCT/GB2003/000571 2002-02-15 2003-02-08 Security printing Ceased WO2003068522A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003205863A AU2003205863A1 (en) 2002-02-15 2003-02-08 Security printing

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0203577.2 2002-02-15
GB0203577A GB0203577D0 (en) 2002-02-15 2002-02-15 Security printing

Publications (1)

Publication Number Publication Date
WO2003068522A1 true WO2003068522A1 (en) 2003-08-21

Family

ID=9931117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2003/000571 Ceased WO2003068522A1 (en) 2002-02-15 2003-02-08 Security printing

Country Status (3)

Country Link
AU (1) AU2003205863A1 (en)
GB (1) GB0203577D0 (en)
WO (1) WO2003068522A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004022976A1 (en) * 2004-05-10 2005-12-08 Clemens Brüntrup Offset-Reproduktion GmbH Steganographic printing and verification system uses transparent overlay with apparently random pattern placed on apparently random printed pattern to make picture or text visible

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0046327A1 (en) * 1980-08-20 1982-02-24 De Nederlandsche Bank N.V. Printed matter having elements to indicate counterfeiting, and method for manufacturing such printed matter
DE3130182A1 (en) * 1981-07-30 1983-02-17 GAO Gesellschaft für Automation und Organisation mbH, 8000 München Guilloche grid
DE3602563C1 (en) * 1986-01-29 1987-04-16 Deutsche Bundesbank Security paper with optically active structures generating a moiré effect
WO1995004665A1 (en) * 1993-08-10 1995-02-16 Hardy Business Forms Limited Embedded printed data - method and apparatus
US5772249A (en) * 1994-11-01 1998-06-30 De La Rue Giori S.A. Method of generating a security design with the aid of electronic means
WO1998047715A1 (en) * 1997-04-18 1998-10-29 De La Rue International Limited Transitory image structure
EP0920383A1 (en) 1996-08-21 1999-06-09 Baasel-Scheel Lasergraphics GmbH Printed document protected against copying
WO2001003944A1 (en) * 1999-07-07 2001-01-18 Moore North America, Inc. Article, protected against forgery using a colour copier

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0046327A1 (en) * 1980-08-20 1982-02-24 De Nederlandsche Bank N.V. Printed matter having elements to indicate counterfeiting, and method for manufacturing such printed matter
DE3130182A1 (en) * 1981-07-30 1983-02-17 GAO Gesellschaft für Automation und Organisation mbH, 8000 München Guilloche grid
DE3602563C1 (en) * 1986-01-29 1987-04-16 Deutsche Bundesbank Security paper with optically active structures generating a moiré effect
WO1995004665A1 (en) * 1993-08-10 1995-02-16 Hardy Business Forms Limited Embedded printed data - method and apparatus
US5772249A (en) * 1994-11-01 1998-06-30 De La Rue Giori S.A. Method of generating a security design with the aid of electronic means
EP0920383A1 (en) 1996-08-21 1999-06-09 Baasel-Scheel Lasergraphics GmbH Printed document protected against copying
WO1998047715A1 (en) * 1997-04-18 1998-10-29 De La Rue International Limited Transitory image structure
WO2001003944A1 (en) * 1999-07-07 2001-01-18 Moore North America, Inc. Article, protected against forgery using a colour copier

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102004022976A1 (en) * 2004-05-10 2005-12-08 Clemens Brüntrup Offset-Reproduktion GmbH Steganographic printing and verification system uses transparent overlay with apparently random pattern placed on apparently random printed pattern to make picture or text visible
DE102004022976B4 (en) * 2004-05-10 2010-09-16 Clemens Brüntrup Offset-Reproduktion GmbH Steganographic printing process and verification system

Also Published As

Publication number Publication date
AU2003205863A1 (en) 2003-09-04
GB0203577D0 (en) 2002-04-03

Similar Documents

Publication Publication Date Title
JP4477479B2 (en) How to handle gloss differences in halftone images
US8460781B2 (en) Infrared encoding of security elements using standard xerographic materials
US5149140A (en) Security, information document
US8455087B2 (en) Infrared encoding of security elements using standard xerographic materials with distraction patterns
EP0490457B1 (en) Support provided with a security element
US5788285A (en) Document protection methods and products
JP3280083B2 (en) Image processing apparatus and image processing method
EP1415828B1 (en) Anti-counterfeiting feature using line patterns
US8444181B2 (en) Single-color screen patterns for copy protection
EP2080636A2 (en) Document containing scanning survivable security features
US8164799B2 (en) Digitally printed color anti-copy document in any resolution and processes and products therefor
US8228551B2 (en) Image processing method and image processing apparatus
JP2606064B2 (en) Image processing device
US7512248B2 (en) Method of incorporating a secondary image into a primary image
EP1772006A1 (en) Full color scanning protection of document
WO2003068522A1 (en) Security printing
US20070086070A1 (en) Full Color Scanning Protection of a Document
US20070133023A1 (en) Document For Determining Interference Scanning Frequencies
KR100217385B1 (en) Anti-counterfeiting printed products by optical interference and latent image and manufacturing method
US11386314B2 (en) Transparent pantograph pattern
JP2008035448A (en) Image processing apparatus and information superimposing method
JP3293844B2 (en) Image processing apparatus and method
HK1006957B (en) Support provided with a security element

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP