EP2000992A1 - Authentication of security documents, in particular of banknotes - Google Patents

Authentication of security documents, in particular of banknotes Download PDF

Info

Publication number
EP2000992A1
EP2000992A1 EP07109470A EP07109470A EP2000992A1 EP 2000992 A1 EP2000992 A1 EP 2000992A1 EP 07109470 A EP07109470 A EP 07109470A EP 07109470 A EP07109470 A EP 07109470A EP 2000992 A1 EP2000992 A1 EP 2000992A1
Authority
EP
European Patent Office
Prior art keywords
sample image
security
patterns
features
wavelet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP07109470A
Other languages
German (de)
French (fr)
Inventor
Volker Lohweg
Eugen Gillich
Johannes Georg Schaede
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
KBA Notasys SA
Original Assignee
KBA Giori SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by KBA Giori SA filed Critical KBA Giori SA
Priority to EP07109470A priority Critical patent/EP2000992A1/en
Priority to NZ581538A priority patent/NZ581538A/en
Priority to EP08751322.2A priority patent/EP2153423B1/en
Priority to MX2009012963A priority patent/MX2009012963A/en
Priority to JP2010509940A priority patent/JP5314007B2/en
Priority to US12/602,227 priority patent/US8781204B2/en
Priority to PCT/IB2008/052135 priority patent/WO2008146262A2/en
Priority to CA2689270A priority patent/CA2689270C/en
Priority to CN2008800252965A priority patent/CN101755290B/en
Priority to EP13172170.6A priority patent/EP2639773B1/en
Priority to KR1020097027358A priority patent/KR101461208B1/en
Priority to CN2012104086816A priority patent/CN102930632A/en
Priority to RU2009147707/08A priority patent/RU2476936C2/en
Priority to BRPI0812240-7A priority patent/BRPI0812240B1/en
Priority to MYPI20095095A priority patent/MY183641A/en
Priority to EP13172172.2A priority patent/EP2639774B1/en
Priority to AU2008256256A priority patent/AU2008256256B2/en
Publication of EP2000992A1 publication Critical patent/EP2000992A1/en
Priority to ZA2009/08451A priority patent/ZA200908451B/en
Priority to HK10107737.1A priority patent/HK1141355A1/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/205Matching spectral properties
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/003Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/2016Testing patterns thereon using feature extraction, e.g. segmentation, edge detection or Hough-transformation

Definitions

  • the present invention generally relates to the authentication of security documents, in particular of banknotes. More precisely, the present invention relates to a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents.
  • the invention further relates to a digital signal processing unit adapted for carrying out part of the authentication method, a device for carrying out the authentication method, as well as to a method for producing security documents aimed at optimising the authentication of the security documents according to the authentication method.
  • Offset-printed forgeries or "offset counterfeits" printed using commercial offset printing presses do also exist. These counterfeits are often printed in screen offset (i.e. with multicolour screen or raster combinations that are characteristic of commercial offset printing) and/or line offset (i.e. without any screen or raster combinations).
  • banknotes combine high quality printed features created by intaglio printing, line offset printing with high precision recto-verso register, and letterpress printing.
  • Intaglio and line offset in particular allow the creation of high resolution patterns with great print sharpness.
  • Letterpress printing is typically used for printing variable information, such as serial numbers. Further printing or processing techniques are also exploited to print or apply other features on banknotes, such as silk-screen printing, foil stamping, laser marking or perforating, etc.
  • Machine-based authentication of security documents i.e. automatic recognition in document processing systems such as vending machines, automatic teller machines (ATM), note acceptors and similar financial transaction machines, is also affected by counterfeiting. Indeed, it is not unusual to discover rather more advanced forgeries of security documents which also replicate the machine-readable security features present on genuine documents, such as infrared, luminescent and/or magnetic markings. As a matter of fact, most machine-based authentication systems essentially focus on such machine-readable features and do not or barely proceed to an actual visual inspection of the visible security features printed, applied or otherwise provided onto the security documents.
  • ISARD Intaglio S canning A nd R ecognition D evice and is based on a measurement of the characteristic relief profile of intaglio-printed features.
  • the ISARD authentication principle and a device for carrying out this principle are also disclosed in patent publications GB 1 379 764 (corresponding to NL 7017662 ), NL 7410463 , NL 9401796 and NL 9401933 .
  • ISARD International Rectaglio imprints
  • ISARD technology was for instance applied as a pattern of parallel intaglio-printed lines on the Dutch 50 guilder "Sunflower” note (issued in 1982), as well as on the current issue of Euro banknotes (see [Hei06]).
  • the ISARD was and is mainly exploited by the public at large to perform a nail scratching test (i.e. by scratching a nail over the pattern of parallel intaglio lines).
  • a general aim of the invention is therefore to improve the known methods for checking the authenticity of security documents, in particular banknotes.
  • a further aim of the invention is to provide a method that exploits the intrinsic features of the security features that are already typically printed, applied or otherwise provided on the security documents, especially the intrinsic features of intaglio-printed patterns.
  • a further aim of the present invention is to provide a solution that enables a robust and efficient differentiation between authentic (genuine) security documents and copies or counterfeits thereof.
  • Still another aim of the present invention is to provide a solution that can be implemented in automatic document processing systems (such as vending machines, ATMs, etc.) in a more simple manner than the currently known solutions.
  • automatic document processing systems such as vending machines, ATMs, etc.
  • a method for checking the authenticity of security documents in particular banknotes, wherein authentic security documents comprise security features printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents, the method comprising the steps of :
  • the digital processing of the sample image includes (i) performing a transform of the sample image to derive at least one set of spectral coefficients representative of the high resolution details of the sample image, and (ii) processing the spectral coefficients to extract the classifying features.
  • the transform is a wavelet-transform, advantageously a discrete wavelet transform (DWT) selected from the group comprising Haar-wavelet transform, Daubechies-wavelet transform, and Pascal-wavelet transform.
  • DWT discrete wavelet transform
  • the processing of the spectral coefficients preferably includes performing a processing of the statistical distribution of the spectral coefficients.
  • This statistical processing can in particular include the computing of at least one statistical parameter selected from the group comprising the arithmetic mean (first moment in statistics), the variance (second moment in statistics), the skewness (third moment in statistics), the excess (fourth moment in statistics), and the entropy of the statistical distribution of said spectral coefficients.
  • the decomposition of the sample image is advantageously performed as a result of one or more iterations of a multiresolution analysis (MRA) of the sample image.
  • MRA multiresolution analysis
  • the method may provide for the performance of a decomposition of a plurality of images corresponding to several regions of interest of the same candidate document.
  • the sample image can be acquired at a relatively low-resolution, i.e. lower than 600 dpi, preferably of 300 dpi.
  • a relatively low-resolution i.e. lower than 600 dpi, preferably of 300 dpi.
  • Tests have indeed shown that a high scanning resolution for the sample image is not at all necessary. This is particularly advantageous in that the low resolution shortens the time necessary for performing the acquisition of the sample image and reduces the amount of data to be processed for a given surface area, which accordingly substantially facilitates a practical implementation of the method.
  • the security features that are exploited for the purpose of authentication preferably mainly include intaglio patterns.
  • the security features may include intaglio patterns, line offset patterns, letterpress patterns, optically-diffractive structures (i.e. patterns or structures that are intrinsic to the processes carried out by the security printer) and/or combinations thereof.
  • Maximization of the authentication rating is achieved by ensuring that the selected region of interest includes a high density (high spatial frequency) of patterns (preferably linear or curvilinear intaglio-printed patterns).
  • the patterns can in particular be patterns of a pictorial representation, such as a portrait, provided on the candidate document.
  • a digital signal processing unit for processing image data of a sample image of at least one region of interest of the surface of a candidate document to be authenticated according to the above method, the digital signal processing unit being programmed for performing the digital processing of the sample image, which digital signal processing unit can advantageously be implemented as an FPGA (Freely-Programmable-Gate-Array) unit.
  • FPGA Freely-Programmable-Gate-Array
  • a device for checking the authenticity of security documents in particular banknotes, according to the above method, comprising an optical system for acquiring the sample image and a digital signal processing unit programmed for performing the digital processing of the sample image.
  • a method for producing security documents comprising the step of designing security features to be printed, applied, or otherwise provided on the security documents, wherein the security features are designed in such a way as to optimise an authenticity rating computed according to the above method by producing a characteristic response in the said at least one sub-space.
  • wavelet transform for the authentication of security documents, in particular banknotes, is also claimed.
  • the present invention stems from the observation that security features printed, applied or otherwise provided on security documents using the specific production processes that are only available to the security printer, in particular intaglio-printed features, exhibits highly characteristic visual features (hereinafter referred to as "intrinsic features") that are recognizable by a qualified person having knowledge about the specific production processes involved.
  • FIG 1a is a greyscale scan of an illustrative banknote specimen 1 showing the portrait of Jules Verne which was produced during the year 2004 by the present Applicant.
  • This banknote specimen was produced using a combination of printing and processing techniques specific to banknote production, including in particular line offset printing for printing the multicolour background 10 of the note, silk-screen printing for printing optically-variable ink patterns, including motifs of a planisphere 20 and of a sextant 21, foil stamping techniques for applying optically-variables devices, including a strip of material 30 carrying optically-diffractive structures extending vertically along the height of the banknote (which strip 30 is schematically delimited by two dashed lines in Figure 1 a) , intaglio printing for printing several intaglio patterns 41 to 49, including the portrait 41 of Jules Verne, letterpress printing for printing two serial numbers 51, 52, and varnishing for varnishing the note with a layer of protective varnish.
  • the portrait 41 (together with the vertical year designation 2004 and the pictorial motifs surrounding the portrait), a logo of "KBA-GIORI” with the Pegasus 42, indications "KBA-GIORI” 43 and “Specimen” 44, and tactile patterns 45 to 49 on three corners of the note and on the righthand side and left-hand side of the note were printed by intaglio printing on top of the line offset background 10, the silk-screen-printed motifs 20, 21 and the strip of material 30.
  • the serial numbers 51, 52 were printed and the varnishing was performed following the intaglio printing phase.
  • banknote specimen was produced on sheet-fed printing and processing equipment (as supplied by the present Applicant), each printed sheet carrying an array of multiple banknote specimens (as is usual in the art) that were ultimately cut into individual notes at the end of the production process.
  • Figure 1b is a greyscale photograph of the upper right corner of the banknote specimen of Figure 1a showing in greater detail the intaglio-printed logo of "KBA-GIORI" with the Pegasus 42 and tactile pattern 45 which comprises a set of parallel lines at forty-five degrees partly overlapping with the Pegasus 42.
  • the characteristic embossing and relief effect of the intaglio printing as well as the sharpness of the print can clearly be seen in this photograph.
  • Figure 2a is a more detailed view of a left-hand side portion of the portrait 41 of Figure 1a (patterns 20, 21 and 44 being also partly visible in Figure 2a).
  • Figure 2b is an enlarged view of a square portion (or region of interest R.o.l.) of the portrait 41, which square portion is illustrated by a white square in Figure 2a.
  • Figure 2b shows some of the characteristic intrinsic features of the intaglio patterns constituting the portrait 41.
  • the region of interest R.o.l. used for subsequent signal processing does not need to cover a large surface area of the document. Rather, tests have shown that a surface area of less than 5 cm 2 is already sufficient for the purpose of the authentication.
  • Figures 3a, 3b and 4a, 4b are greyscale images similar to Figures 2a, 2b of two colour copies of the banknote specimen shown in Figure 1a , which copies were produced using commercial colour copying equipment.
  • the depicted white square indicates the corresponding region of interest R.o.I. of the portrait which is shown in enlarged view in Figures 3b and 4b , respectively.
  • the first colour copy illustrated in Figures 3a, 3b was produced using an Epson ink-jet printer and Epson photo-paper.
  • the second colour copy illustrated in Figures 4a, 4b was produced using a Canon ink-jet printer and normal paper. A high-resolution scanner was used to scan the original specimen and provide the necessary input for the ink-jet printers.
  • the decomposition of the image is carried out by performing digital signal processing techniques based on so-called wavelets ("ondelettes" in French).
  • a wavelet is a mathematical function used to divide a given function or signal into different scale components.
  • a wavelet transformation (or wavelet transform) is the representation of the function or signal by wavelets. Wavelet transforms have advantages over traditional Fourier transforms for representing functions and signals that have discontinuities and sharp peaks. According to the present invention, one in particular exploits the properties of so-called discrete wavelet transforms (DWTs) as this will be discussed in the following.
  • DWTs discrete wavelet transforms
  • Wavelet theory will not be discussed in-depth in the present description as this theory is as such well-known in the art and is extensively discussed and described in several textbooks on the subject. The interested reader may for instance refer to the following books and papers about wavelet theory :
  • a wavelet can conveniently be expressed by a wavelet function (or “mother wavelet”) ⁇ and a scaling function (or “father wavelet”) ⁇ .
  • the wavelet function ⁇ can in effect be expressed as a band-pass/high-pass filter which filters an upper half of the signal scale/spectrum, while the scaling function ⁇ can be expressed as a low-pass filter which filters the remaining lower half of the signal scale/spectrum.
  • This principle is schematically illustrated in Figure 5a as a one-level digital filter bank comprising a low-pass filter with function h(n) and a high-pass filter with function g(n) which split the signal scale/spectrum in two parts of equal spectral range.
  • the output y LOW (n) of the low-pass filter which basically is the result of the convolution * of signal x(n) and function h(n), comprises the scaling function transform coefficients, or simply "scaling coefficients" (also referred to as the approximation coefficients), while the output y HIGH (n) of the high-pass filter, which is similarly the result of the convolution * of signal x(n) and function g(n), comprises the wavelet function transform coefficients, or simply "wavelet coefficients" (also referred to as the detail coefficients).
  • a signal can be decomposed into a plurality of wavelet coefficients corresponding to different scales (or resolutions) by iteratively repeating the process, i.e. by passing the approximation coefficients outputted by the low-pass filter to a subsequent similar filter stage.
  • This approach is known as a multiresolution analysis or MRA (see [MaI89]) and is schematically illustrated in Figure 5b in the case of a three-level multiresolution analysis.
  • MRA multiresolution analysis
  • Figure 5b the filter bank is in effect a three-level filter bank wherein the low-pass filtered output of a preceding filter stage is again filtered by the subsequent filter stage.
  • the signal x(n) is in effect decomposed in four signal components corresponding to three distinct scales, namely (i) detail coefficients at a first scale (the level 1 coefficients) which comprise half the number of samples as compared to signal x(n), (ii) detail coefficients at a second scale different from the first (the level 2 coefficients) which comprise 1/4 of the number of samples as compared to signal x(n), and (iii) approximation coefficients and (iv) detail coefficients at a third scale (the level 3 coefficients) which each comprise 1/8 of the number of samples as compared to signal x(n).
  • a discrete sample signal can eventually be completely decomposed in a set of detail coefficients (wavelet coefficients) at different scales as long as the sample signal includes 2 N samples, where N would be the number of iterations or levels required to completely decompose the signals into wavelet coefficients.
  • multiresolution analysis refers to a signal processing technique based on wavelet transforms, whereby a signal is decomposed in a plurality of nested subspaces of different scales ranging from fine details (high resolution components) to coarse details (low resolution components) of the signal as schematically illustrated by the diagram of Figure 6 .
  • the intrinsic features of genuine security features especially the intrinsic feature of intaglio patterns, will be identified by looking especially at the fine high resolution details of an image of the candidate document to be authenticated, rather than at the coarser low resolution details of the image of the candidate document.
  • Two-dimensional wavelet transform basically involves a row-wise and column-wise processing of the two-dimensional signal wherein the rows and columns of the signal are processed separately using the above-discussed one-dimensional wavelet algorithm. This will be explained in reference to Figures 7a, 7b , 8 and 9 .
  • an original image i.e. an image corresponding to a selected region of interest of a sample image of a candidate document to be authenticated - such as for instance the image of Figures 2b , 3b or 4b
  • This original image c° consists of a matrix of n x n pixels, where n is dividable by 2 N , N being an integer corresponding to the number N of wavelet iterations one wishes to perform.
  • the image size should be sufficiently big so as to encompass a relatively high number of features.
  • the original image c° may for instance consist of a matrix of 256 x 256 pixels. Other images sizes are however perfectly possible. At a sampling resolution of 300 dpi, it will be appreciated that such an image size corresponding to a surface area on the candidate document to be authenticated of approximately 2x2 cm 2 .
  • the original image c° is decomposed in four sub-images c 1 , d 1 1 , d 2 1 and d 3 1 each having a size of (n/2) x (n/2) pixels.
  • Sub-image c 1 contains the approximation of the original image c° resulting from low-pass filtering along both the rows and columns of the original image c°.
  • sub-images d 1 1 , d 2 1 and d 3 1 contain the details of the original image c° resulting from high-pass filtering along the rows and/or columns of the original image c°. More precisely :
  • sub-images d 1 1 , d 2 1 and d 3 1 are representative of details of the image c° at a first resolution (or scale), while sub-images d 1 2 , d 2 2 and d 3 2 are representative of details of the image c° at a second resolution, half that of the first resolution.
  • sub-images d 1 m will each contain the horizontal details of the original image at different scales (or resolutions)
  • sub-images d 2 m and d 3 m will each respectively contain the vertical and diagonal details of the original image at different scales.
  • the two-dimensional wavelet transform is preferably carried out according to the so-called "non-standard decomposition" method, which method is schematically illustrated in Figure 8 .
  • this decomposition method one-dimensional wavelet transform is alternately performed on the rows and the columns of the image.
  • references A, D, a, d respectively designate :
  • the rows of the original image are first processed and then the columns, such as to yield to the result illustrated in Figure 7a (where Aa, Da, Ad and Dd respectively correspond to sub-images c 1 , d 1 1 , d 2 1 and d 3 1 ) .
  • sub-image Aa (which corresponds to sub-image c1) is similarly processed starting with the rows and then the columns, resulting in the same decomposition as illustrated in Figure 7b (where AaAa, AaDa, AaAd and AaDd respectively correspond to sub-images c 2 , d 1 2 , d 2 2 and d 3 2 ) .
  • non-standard decomposition An alternative to the above-discussed "non-standard decomposition” method is the so-called “standard decomposition” method which is carried out by performing all required iterations along the rows and then only the required iterations along the columns. This method is schematically illustrated in Figure 9 .
  • non-standard decomposition necessitates more memory accesses in comparison to the other method, it has the advantage that it requires less computation time, since, during each iteration, only a quarter of the data resulting from the preceding iteration has to be processed. Furthermore, the horizontal and vertical details are extracted separately by means of the "non-standard decomposition" method as this can be readily understood from comparing Figures 8 and 9 .
  • DCTs discrete wavelet transforms
  • Successful tests have in particular been carried out by making use of the so-called Haar-, Daubechies- and Pascal-wavelet transforms which are known as such in the art.
  • the Haar-wavelet transform is actually the first known wavelet transform. This wavelet transform (while not designated as such at the time) was discovered in 1909 by Hungarian mathematician Alfred Haar. This wavelet transform is also known as a special case of the so-called Daubechies-wavelet transform.
  • the corresponding high-pass and low-pass filters of the Haar-wavelet transform each consist of two coefficients, namely :
  • the Daubechies-wavelet transform (see [Dau92]) is named after Ingrid Daubechies, a Belgian physicist and mathematician.
  • the Daubechies-wavelets are a family of orthogonal wavelets and are characterised by a maximal number of so-called vanishing moments (or taps).
  • Daubechies-wavelet transforms the so-called Daubechies 4 tap wavelet (or db4 transform), where the filter coefficients consists of four coefficients, namely :
  • An advantage of the Daubechies-db4 transform over the Haar-wavelet transform resides in particular in the increased filtering efficiency of the Daubechies transform, i.e. the cut-off frequencies of the low-pass and high-pass filters are more sharply defined.
  • the Pascal-wavelet transform is based on the binomial coefficients of Pascal's triangle (named after the French philosopher and mathematician Blaise Pascal). Although the Pascal-wavelet transform has less sharply-defined cut-off frequencies than the Haar- and Daubechies wavelet transforms, this transform can better approximate continuous signals than the Haar-wavelet transform and requires less computation time than the Daubechies-wavelet transform.
  • the Pascal-wavelet transform is a non-orthogonal wavelet.
  • the signal i.e. the image data of the region of interest
  • the signal does not need to be completely decomposed into wavelet components. Accordingly, it suffice to perform one or more iterations of the wavelet transformation of the image data in order to extract the relevant features that will enable to built representative classifying data about the candidate document to be authenticated, as this will be appreciated from the following.
  • the most relevant scales of the image to be considered are those corresponding to the fine, high resolution details which are first derived in the course of the multiresolution analysis.
  • Figure 10a illustrates the result of the first iteration of a two-dimensional wavelet transform as applied to the image shown in Figure 2b of an original banknote specimen.
  • the original image had a size of 252 x 252 pixels and use was made of the Haar-wavelet transform mentioned above to process the image.
  • the approximation image c 1 resulting from low-pass filtering is shown in the upper left corner of Figure 10a .
  • the detail images d 1 1 , d 2 1 and d 3 1 resulting from high-pass filtering are shown as substantially dark regions, due to the fact that the wavelet coefficients have small values and also include negative coefficients (the wavelet coefficients therefore appear as substantially "black" pixels when directly visualized).
  • the images can be normalized so that the coefficients are comprised within the range of values 0 to 255 (i.e. the 8-bit value range of a greyscale image).
  • d 1 1 N , d 2 1 N and d 3 1 N respectively designate normalized versions of detail images d 1 1 , d 2 1 and d 3 1 . From looking at Figure 10b , one can see that the wavelet-transform adequately detects the sharp transitions of the intaglio patterns.
  • Figure 11a shows a normalized image d G 1 N resulting from the combination of the three detail images d 1 1 , d 2 1 and d 3 1 of Figures 10a , 10b .
  • Figures 11b and 11c illustrate the corresponding normalized image d G 1 N obtained as a result of the wavelet transform of the images of the first and second colour copies of Figures 3b and 4b , respectively.
  • Figure 12 is an illustration of nine histograms showing the statistical distributions of the wavelet coefficients for the horizontal, vertical and diagonal details (i.e. the wavelet coefficients of detail images d 1 1 , d 2 1 and d 3 1 ) for each one of the images of Figures 2b , 3b and 4b . More precisely, the left, middle and right columns of Figure 12 respectively show the corresponding histograms derived for the images of Figures 2b , 3b and 4b , while the upper, middle and bottom rows of Figure 12 respectively shown the corresponding histograms for the horizontal, vertical and diagonal details.
  • the histograms derived from the image of the original specimen are wider than the histograms derived from the images of the colour copies (middle and right columns in Figure 12 ).
  • the variance ⁇ 2 i.e. the measure of the dispersion of the wavelet coefficients, can conveniently be used to categorize the statistical distribution of the wavelet coefficients.
  • the variance ⁇ 2 is also referred to in statistics as the "second moment".
  • the above-listed moments shall be normalized to enable proper comparison and classification of the various candidate documents.
  • Figure 13 illustrates the notions of skewness and excess.
  • a "positive skewness” (as illustrated) is understood to characterize a statistical distribution wherein the right tail of the distribution is longer and wherein the "mass" of the distribution is concentrated on the left. The converse is a “negative skewness”.
  • a “positive/high excess” or “negative/low excess” (as illustrated) is understood to characterize a statistical distribution comprising a sharper peak and fatter tails, respectively a more rounded peak and wider "shoulders”.
  • Figures 14a to 14c are three bar charts illustrating the variance ⁇ 2 of the statistical distributions of the wavelet coefficients illustrated by the diagrams of Figure 12 .
  • Reference numerals 1, 2, 3 in Figures 14a to 14c respectively refer to the three candidate documents that have been processed, namely the original specimen ( Figures 2a and 2b ), the first colour copy ( Figures 3a and 3b ) and the second colour copy ( Figures 4a and 4b ).
  • the variance ⁇ 2 is shown for the horizontal details
  • Figures 14b and 14c respectively show the variance ⁇ 2 for the vertical and diagonal details.
  • the variance ⁇ 2 is substantially higher in the case of the distribution of the wavelet coefficients deriving from the image of the original specimen than that computed from the statistical distributions of the wavelet coefficients deriving from the images of the colour copies.
  • Tests have been carried out on various original (i.e. authentic) specimens of banknotes and colour copies (i.e. counterfeits) thereof. These tests have shown that the method according to the present invention is very robust, especially when the image data of the region of interest being processed contains a relatively high density of intaglio-printed features, such as in the case of a portion of the portrait or of any other similarly dense pictorial representation that can be found on most banknotes (such as the intaglio-printed patterns representing architectural objects on the Euro banknotes). The tests have also shown that area containing a lesser amount of intaglio feature still lead to good results.
  • Figures 15a and 15b are two enlarged views of a part of the intaglio-printed portrait of Bettina von Arnim as it appears on the recto side of the DM 5 banknote which was issued during the years 1991 to 2001 in Germany prior to the introduction of the Euro.
  • Figure 15b in particular shows an example of a possible region of interest that was exploited for the purpose of authentication according to the above-described method.
  • FIG 16a shows for the purpose of illustration six similar images of the same region of interest taken from an original specimen in very good condition (illustration A), an original specimen with a relatively high degree of wear (illustration B), a colour-copy produced by inkjet printing on photo-quality paper at a resolution of 5600 dpi (illustration C), a colour-copy produced by inkjet printing on normal paper at a resolution of 5600 dpi (illustration D), a colour-copy produced by thermo-sublimation on photo-quality paper at a resolution of 300 dpi (illustration E) and a colour-copy produced by laser printing on normal paper at a resolution of 1200 dpi (illustration F).
  • Figure 16b shows the corresponding histograms of the statistical distributions of the wavelet coefficients (in Figure 16b the histograms are derived from the combination of the three detail images resulting from low-pass filtering of the images of Figure 16a ).
  • the histograms computed from the images of the two original specimens are highly similar, despite the different degrees of wear of the specimens (and the presence of a wrinkle in the region of interest of the image of the second original specimen - see image B in Figure 16a ).
  • the statistical distribution of the wavelet coefficients derived from the image of the two inkjet-printed copies and the thermo-sublimation copy (histograms C to E) are clearly different.
  • Figure 17 shows the superposition of the histograms corresponding to the first original specimen (histogram A in Figure 16b ) and to the laser-printed colour copy (histogram F in Figure 16b ).
  • Figure 18a and 18b are two bar charts illustrating the variance ⁇ 2 and the excess C, respectively, computed from the statistical distribution of the wavelet coefficients derived from images of substantially the same region of interest of eleven candidate documents comprising five original specimens with different degrees of wear (candidates 1 to 5) and six colour copies (candidates 6 to 11) produced by inkjet-printing, thermo-sublimation, or colour-laser-printing.
  • the variance ⁇ 2 and the excess C clearly show that a distinction between the authentic documents and the counterfeits is possible using these two statistical parameters as classifying data.
  • Figure 19 is an illustration of a corresponding feature space using the variance ⁇ 2 and the excess C as (X; Y) coordinates in the feature space, where the results derived from candidate documents can be positioned.
  • a borderline can clearly be drawn between the points corresponding to original specimens (located on the upper right corner of the feature space) and those corresponding to colour copies (located on the lower left corner of the feature space).
  • Figure 20 is a view of a feature space similar to that of Figure 19 where the variance ⁇ 2 and the excess C are again used as (X; Y) coordinates and which shows the results that were obtained by processing additional candidate documents, including original Euro banknotes. These results confirm the robustness and efficiency of the authentication method according to the present invention.
  • the method according to the invention does as such require that the selected region of interest be strictly one and a same area of the candidate documents. As a matter of fact, deviations regarding the actual position of the region of interest from one candidate document to another do not substantially affect the results.
  • the method according to the present invention is accordingly also advantageous in that it does not require precise identification and positioning of the region of interest prior to signal processing. This greatly simplifies the whole authentication process and its implementation (especially in ATM machines and the like) as one merely has to ensure that the selected region of interest more or less covers an area comprising a sufficiently representative amount of intrinsic features (in particular intaglio features).
  • FIG 21 schematically illustrates an implementation of a device for checking the authenticity of security documents, in particular banknotes, according to the above-described method.
  • This device comprises an optical system 100 for acquiring a sample image (image c 0 ) of the region of interest R.o.l. on a candidate document 1 to be authenticated, and a digital signal processing (DSP) unit 200 programmed for performing the digital processing of the sample image.
  • the DSP 200 may in particular advantageously be implemented as a Freely-Programmable-Gate-Array (FPGA) unit.
  • FPGA Freely-Programmable-Gate-Array
  • the authentication principle is preferably based on the processing of an image containing (or supposed to be containing) intaglio-printed patterns
  • the invention can be applied by analogy to the processing of an image containing other security features comprising characteristic visual features intrinsic to the processes used for producing the security documents, in particular line offset patterns, letterpress patterns, optically-diffractive structures and/or combinations thereof.

Landscapes

  • Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Spectroscopy & Molecular Physics (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Abstract

There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the steps of (i) acquiring a sample image (c 0 ) of at least one region of interest (R.o.I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, (ii) digitally processing the sample image (c 0 ) by performing a decomposition of the sample image (c 0 ) into at least one sub-space containing high resolution details d 1 1 ¢ d 2 1 ¢ d 3 1 €¦ of the sample image (c 0 ) and extracting classifying features (à 2 , C, ...) from the sub-space, and (iii) deriving an authenticity rating of the candidate document based on the extracted classifying features (à 2 , C, ...).

Description

    TECHNICAL FIELD
  • The present invention generally relates to the authentication of security documents, in particular of banknotes. More precisely, the present invention relates to a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The invention further relates to a digital signal processing unit adapted for carrying out part of the authentication method, a device for carrying out the authentication method, as well as to a method for producing security documents aimed at optimising the authentication of the security documents according to the authentication method.
  • BACKGROUND OF THE INVENTION
  • Counterfeiting of security documents, especially of banknotes, is and remains a major concern for the industry and the economy around the world. Most counterfeited banknotes are produced using common imaging and printing equipment that is readily available to any user on the consumer market. The advent of scanners and colour copiers, as well as high-resolution colour printers making use of widespread printing processes, such as ink-jet printing, thermal printing and laser printing, makes it easier and easier to produce substantial volumes of counterfeited security papers. Most banknote counterfeits are produced by means of the above-mentioned imaging and printing equipment and can be designated as "colour copies".
  • Offset-printed forgeries, or "offset counterfeits" printed using commercial offset printing presses do also exist. These counterfeits are often printed in screen offset (i.e. with multicolour screen or raster combinations that are characteristic of commercial offset printing) and/or line offset (i.e. without any screen or raster combinations).
  • Most genuine banknotes combine high quality printed features created by intaglio printing, line offset printing with high precision recto-verso register, and letterpress printing. Intaglio and line offset in particular allow the creation of high resolution patterns with great print sharpness. Letterpress printing is typically used for printing variable information, such as serial numbers. Further printing or processing techniques are also exploited to print or apply other features on banknotes, such as silk-screen printing, foil stamping, laser marking or perforating, etc.
  • Skilled persons having some knowledge of the processes involved in the context of the production of banknotes and like security documents do not as such have much difficulty in differentiating most forged documents from a genuine document. A close look at a forged document using simple means such as a magnifying glass typically makes it possible to immediately identify the characteristic features intrinsic to genuine security documents, such as the intaglio-printed security patterns that are present on most banknotes as already mentioned. This however requires some expertise and knowledge about security printing which is not necessarily present amongst the public at large. In practice, most individuals are relatively easily deceived by forgeries as long as the general look of the counterfeit or copy is substantially similar to that of the genuine document. This represents not only a problem in the context of banknote counterfeiting, but also as regards forgery of other types of valuable documents, such as checks, duty stamps, identification and travel documents, etc.
  • Machine-based authentication of security documents, i.e. automatic recognition in document processing systems such as vending machines, automatic teller machines (ATM), note acceptors and similar financial transaction machines, is also affected by counterfeiting. Indeed, it is not unusual to discover rather more advanced forgeries of security documents which also replicate the machine-readable security features present on genuine documents, such as infrared, luminescent and/or magnetic markings. As a matter of fact, most machine-based authentication systems essentially focus on such machine-readable features and do not or barely proceed to an actual visual inspection of the visible security features printed, applied or otherwise provided onto the security documents.
  • In other words, the characteristic visual features intrinsic to the processes used for producing the security documents (especially intaglio patterns, line offset patterns, letterpress patterns and/or optically-diffractive structures) have barely been exploited in the context of machine-based authentication.
  • An exception is the so-called ISARD technology, which was invented and developed by TNO Institute of Applied Physics in the late sixties on behalf of the National Bank of the Netherlands. ISARD stands for Intaglio Scanning And Recognition Device and is based on a measurement of the characteristic relief profile of intaglio-printed features. A discussion of this authentication principle may for instance be found in the following papers :
  • [Ren96]
    Rudolf L. van Renesse, "Optical Inspection techniques for Security Instrumentation", IS&T/SPIE's Symposium on Electronic Imaging, Optical Security and Counterfeit Deterrence Techniques I, San José, California, USA (January 28 - February 2, 1996), Proceedings of SPIE vol. 2659, pp. 159-167 ;
    [Hei00]
    Hans A.M. de Heij, De Nederlandsche Bank NV, Amsterdam, the Netherlands, "The design methodology of Dutch banknotes", IS&T/SPIE's 12th International Symposium on Electronic Imaging, Optical Security and Counterfeit Deterrence Techniques III, San José, California, USA (January 27-28, 2000), Proceedings of SPIE vol. 3973, pp. 2-22 ; and
    [Hei06]
    Hans A.M. de Heij, De Nederlandsche Bank NV, Amsterdam, the Netherlands, "Public feedback for better banknote design", IS&T/SPIE's International Symposium on Electronic Imaging, Optical Security and Counterfeit Deterrence Techniques VI, San José, California, USA (January 17-19, 2006), Proceedings of SPIE vol. 6075, 607501, pp. 1-40.
  • The ISARD authentication principle and a device for carrying out this principle are also disclosed in patent publications GB 1 379 764 (corresponding to NL 7017662 ), NL 7410463 , NL 9401796 and NL 9401933 .
  • A problem with the ISARD approach is that it is highly dependent on the degree of wear and use of the documents and the presence of wrinkles in the substrate of the banknotes, which elements directly affect the actual relief profile on the intaglio imprints and its detection by ISARD. ISARD technology was for instance applied as a pattern of parallel intaglio-printed lines on the Dutch 50 guilder "Sunflower" note (issued in 1982), as well as on the current issue of Euro banknotes (see [Hei06]). In practice, the ISARD was and is mainly exploited by the public at large to perform a nail scratching test (i.e. by scratching a nail over the pattern of parallel intaglio lines).
  • Further solutions to fight counterfeiting and possibly enable machine-based authentication may consist in integrating specific authentication coding in the security document itself, for instance by using specific taggant materials, such as rare-earth components incorporated in the inks or embedded in the paper, or by hiding the authentication coding in the printed patterns themselves using so-called digital watermarking techniques. The integration of specific authentication coding in the security document however implies a specific processing of the document during the design and/or production phase, and a corresponding specifically-designed authentication technique. This accordingly increases the burden on the designer and/or printer to adapt the design process and/or production process of the security documents, and also means that specific detection technology has to be used for the purpose of the authentication process.
  • There is therefore a need for a simpler and more efficient approach, especially one that does not as such make use of new design and/or production processes, but rather tries to exploit the intrinsic features of security features that are already typically present on most banknotes, especially the characteristic and intrinsic features of intaglio-printed patterns.
  • SUMMARY OF THE INVENTION
  • A general aim of the invention is therefore to improve the known methods for checking the authenticity of security documents, in particular banknotes.
  • More precisely, a further aim of the invention is to provide a method that exploits the intrinsic features of the security features that are already typically printed, applied or otherwise provided on the security documents, especially the intrinsic features of intaglio-printed patterns.
  • A further aim of the present invention is to provide a solution that enables a robust and efficient differentiation between authentic (genuine) security documents and copies or counterfeits thereof.
  • Still another aim of the present invention is to provide a solution that can be implemented in automatic document processing systems (such as vending machines, ATMs, etc.) in a more simple manner than the currently known solutions.
  • These aims are achieved thanks to the solution defined in the claims.
  • According to the invention, there is provided a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents, the method comprising the steps of :
    • acquiring a sample image of at least one region of interest of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features ;
    • digitally processing the sample image by performing a decomposition of the sample image into at least one sub-space containing high resolution details of the sample image and extracting classifying features from this sub-space ; and
    • deriving an authenticity rating of the candidate document based on the extracted classifying features.
  • Preferably, the digital processing of the sample image includes (i) performing a transform of the sample image to derive at least one set of spectral coefficients representative of the high resolution details of the sample image, and (ii) processing the spectral coefficients to extract the classifying features.
  • Even more preferably, the transform is a wavelet-transform, advantageously a discrete wavelet transform (DWT) selected from the group comprising Haar-wavelet transform, Daubechies-wavelet transform, and Pascal-wavelet transform.
  • The processing of the spectral coefficients (referred to as "wavelet coefficients" in the context of wavelet transforms) preferably includes performing a processing of the statistical distribution of the spectral coefficients. This statistical processing can in particular include the computing of at least one statistical parameter selected from the group comprising the arithmetic mean (first moment in statistics), the variance (second moment in statistics), the skewness (third moment in statistics), the excess (fourth moment in statistics), and the entropy of the statistical distribution of said spectral coefficients.
  • The decomposition of the sample image is advantageously performed as a result of one or more iterations of a multiresolution analysis (MRA) of the sample image.
  • The method may provide for the performance of a decomposition of a plurality of images corresponding to several regions of interest of the same candidate document.
  • According to a preferred embodiment of the invention, the sample image can be acquired at a relatively low-resolution, i.e. lower than 600 dpi, preferably of 300 dpi. Tests have indeed shown that a high scanning resolution for the sample image is not at all necessary. This is particularly advantageous in that the low resolution shortens the time necessary for performing the acquisition of the sample image and reduces the amount of data to be processed for a given surface area, which accordingly substantially facilitates a practical implementation of the method.
  • Within the scope of the present invention, the security features that are exploited for the purpose of authentication preferably mainly include intaglio patterns. Nevertheless, the security features may include intaglio patterns, line offset patterns, letterpress patterns, optically-diffractive structures (i.e. patterns or structures that are intrinsic to the processes carried out by the security printer) and/or combinations thereof.
  • Maximization of the authentication rating is achieved by ensuring that the selected region of interest includes a high density (high spatial frequency) of patterns (preferably linear or curvilinear intaglio-printed patterns). The patterns can in particular be patterns of a pictorial representation, such as a portrait, provided on the candidate document.
  • There is also claimed a digital signal processing unit for processing image data of a sample image of at least one region of interest of the surface of a candidate document to be authenticated according to the above method, the digital signal processing unit being programmed for performing the digital processing of the sample image, which digital signal processing unit can advantageously be implemented as an FPGA (Freely-Programmable-Gate-Array) unit.
  • There is similarly claimed a device for checking the authenticity of security documents, in particular banknotes, according to the above method, comprising an optical system for acquiring the sample image and a digital signal processing unit programmed for performing the digital processing of the sample image.
  • Lastly, there is claimed a method for producing security documents, in particular banknotes, comprising the step of designing security features to be printed, applied, or otherwise provided on the security documents, wherein the security features are designed in such a way as to optimise an authenticity rating computed according to the above method by producing a characteristic response in the said at least one sub-space.
  • The use of wavelet transform for the authentication of security documents, in particular banknotes, is also claimed.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • Other features and advantages of the present invention will appear more clearly from reading the following detailed description of embodiments of the invention which are presented solely by way of non-restrictive examples and illustrated by the attached drawings in which:
    • Figure 1a is a greyscale scan of an exemplary banknote specimen ;
    • Figure 1b is a greyscale photograph of part of the upper right corner of the banknote specimen of Figure 1 a ;
    • Figures 2a and 2b are enlarged views of the banknote specimen of Figure 1a, Figure 2b corresponding to the area indicated by a white square in Figure 2a ;
    • Figures 3a and 3b are enlarged views of a first colour copy of the banknote specimen of Figure 1a, Figure 3b corresponding to the area indicated by a white square in Figure 3a ;
    • Figures 4a and 4b are enlarged views of a second colour copy of the banknote specimen of Figure 1a, Figure 4b corresponding to the area indicated by a white square in Figure 4a ;
    • Figure 5a is a schematic diagram of a one-level (one iteration) discrete wavelet transform ;
    • Figure 5b is a schematic diagram of a three-level (three iterations) discrete wavelet transform ;
    • Figure 6 is a schematic diagram illustrating the principle of multiresolution analysis (MRA) ;
    • Figure 7a illustrates a first iteration of a two-dimensional wavelet transform ;
    • Figure 7b illustrates a second iteration of the two-dimensional wavelet transform following the first iteration illustrated in Figure 7a ;
    • Figure 8 is a schematic illustration of the so-called "non-standard decomposition" method for performing two-dimensional wavelet transform ;
    • Figure 9 is a schematic illustration of the so-called "standard decomposition" method for performing two-dimensional wavelet transform ;
    • Figure 10a is an illustration of the result of the first iteration of a two-dimensional wavelet transform applied on image data corresponding to the region of interest illustrated in Figure 2b ;
    • Figure 10b is an illustration of the result of the first iteration of a two-dimensional wavelet transform applied on image data corresponding to the region of interest illustrated in Figure 2b as shown in Figure 10a, wherein the detail sub-images have been normalized for better visual representation ;
    • Figures 11a to 11c are three illustrations of the result of a combination of the detail sub-images (as illustrated in Figure 10b), normalized for better visual representation, wherein Figures 11a, 11b and 11c respectively show the result of the processing of the images of Figures 2b, 3b and 4b ;
    • Figure 12 shows nine histograms illustrating the statistical distribution of the wavelet coefficients resulting from a one level wavelet transform of the images of Figures 2b, 3b and 4b, the upper line, middle line and bottom line of three histograms being respectively representative of the horizontal details, the vertical details and the diagonal details resulting from the wavelet transform ;
    • Figure 13 is a schematic illustration of two statistical parameters, namely skewness (also referred to as the third moment in statistics) and excess kurtosis (also referred to as the fourth moment in statistics) that can be used to characterize the statistical distribution of wavelet coefficients ;
    • Figures 14a to 14b are three bar charts illustrating the variance, i.e. the measure of the dispersion, of the statistical distribution of the wavelet coefficients derived from the one-level wavelet transform of the images of Figures 2b, 3b and 4b, respectively, for horizontal details, vertical details and diagonal details ;
    • Figures 15a and 15b are two enlarged views of a part of the intaglio-printed portrait of Bettina von Arnim as it appears on the recto side of the DM 5 banknote which was issued during the years 1991 to 2001 in Germany prior to the introduction of the Euro;
    • Figure 16a is a view showing six greyscale scans of substantially the same region of two original specimens (illustrations A and B) and four colour copies (illustrations C to F) of the DM 5 banknote ;
    • Figure 16b shows six histograms illustrating the statistical distribution of the wavelet coefficients resulting from a one level wavelet transform of the images of Figure 16a, each histogram showing the statistical distribution of combined wavelet coefficients (i.e. the combination of the horizontal details, the vertical details and the diagonal details) ;
    • Figure 17 is an illustrative superposition of the histograms of the upper left and lower right corners of Figure 16b ;
    • Figure 18a is a bar chart illustrating the variance of the statistical distribution of the wavelet coefficients derived from the one-level wavelet transform of image data corresponding to the same region of interest (as illustrated in Figure 15b and 16a) of eleven candidate documents comprising five original specimens (candidates 1 to 5) and six colour copies (candidates 6 to 11) of the DM 5 banknote ;
    • Figure 18b is a bar chart illustrating the excess kurtosis, i.e. the measure of the "peakedness", of the statistical distribution of the wavelet coefficients derived from the one-level wavelet transform of image data corresponding to the same region of interest (as illustrated in Figure 15b and 16a) of the same eleven candidate documents of the DM 5 banknote as in Figure 18a ;
    • Figure 19 is a schematic representation of an exemplary feature space used to classify candidate documents, wherein the variance and the excess kurtosis of the statistical distribution of the wavelet coefficients are used as (X; Y) coordinates to position the candidate documents in the said feature space ;
    • Figure 20 is a schematic representation of an exemplary feature space similar to that of Figure 19 where a plurality of candidates documents including original specimens and colour copies have been represented in the feature space using the variance and excess kurtosis as (X; Y) coordinates ;
    • Figure 21 is a schematic diagram of a device for checking the authenticity of security documents according to the method of the present invention; and
    • Figure 20 is a summarizing flow-chart of the method according to the invention.
    DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
  • The present invention stems from the observation that security features printed, applied or otherwise provided on security documents using the specific production processes that are only available to the security printer, in particular intaglio-printed features, exhibits highly characteristic visual features (hereinafter referred to as "intrinsic features") that are recognizable by a qualified person having knowledge about the specific production processes involved.
  • The following discussion will focus on the analysis of intrinsic features produced by intaglio printing. It shall however be appreciated that the same approach is applicable to other intrinsic features of banknotes, in particular line offset-printed features, letterpress-printed features and/or optically-diffractive structures. The results of the tests which have been carried out by the Applicant have shown that intaglio-printed features are very well suited for the purpose of authentication according to the invention and furthermore give the best results. This is especially due to the fact that intaglio printing enables the printing of very fine, high resolution and sharply-defined patterns. Intaglio printing is therefore a preferred process for producing the intrinsic features that are exploited in the context of the present invention.
  • Figure 1a is a greyscale scan of an illustrative banknote specimen 1 showing the portrait of Jules Verne which was produced during the year 2004 by the present Applicant. This banknote specimen was produced using a combination of printing and processing techniques specific to banknote production, including in particular line offset printing for printing the multicolour background 10 of the note, silk-screen printing for printing optically-variable ink patterns, including motifs of a planisphere 20 and of a sextant 21, foil stamping techniques for applying optically-variables devices, including a strip of material 30 carrying optically-diffractive structures extending vertically along the height of the banknote (which strip 30 is schematically delimited by two dashed lines in Figure 1 a), intaglio printing for printing several intaglio patterns 41 to 49, including the portrait 41 of Jules Verne, letterpress printing for printing two serial numbers 51, 52, and varnishing for varnishing the note with a layer of protective varnish. In the illustrated example, the portrait 41 (together with the vertical year designation 2004 and the pictorial motifs surrounding the portrait), a logo of "KBA-GIORI" with the Pegasus 42, indications "KBA-GIORI" 43 and "Specimen" 44, and tactile patterns 45 to 49 on three corners of the note and on the righthand side and left-hand side of the note were printed by intaglio printing on top of the line offset background 10, the silk-screen-printed motifs 20, 21 and the strip of material 30. The serial numbers 51, 52 were printed and the varnishing was performed following the intaglio printing phase. It shall further be understood that the banknote specimen was produced on sheet-fed printing and processing equipment (as supplied by the present Applicant), each printed sheet carrying an array of multiple banknote specimens (as is usual in the art) that were ultimately cut into individual notes at the end of the production process.
  • Figure 1b is a greyscale photograph of the upper right corner of the banknote specimen of Figure 1a showing in greater detail the intaglio-printed logo of "KBA-GIORI" with the Pegasus 42 and tactile pattern 45 which comprises a set of parallel lines at forty-five degrees partly overlapping with the Pegasus 42. The characteristic embossing and relief effect of the intaglio printing as well as the sharpness of the print can clearly be seen in this photograph.
  • Figure 2a is a more detailed view of a left-hand side portion of the portrait 41 of Figure 1a ( patterns 20, 21 and 44 being also partly visible in Figure 2a). Figure 2b is an enlarged view of a square portion (or region of interest R.o.l.) of the portrait 41, which square portion is illustrated by a white square in Figure 2a. Figure 2b shows some of the characteristic intrinsic features of the intaglio patterns constituting the portrait 41. The region of interest R.o.l. used for subsequent signal processing does not need to cover a large surface area of the document. Rather, tests have shown that a surface area of less than 5 cm2 is already sufficient for the purpose of the authentication.
  • Figures 3a, 3b and 4a, 4b are greyscale images similar to Figures 2a, 2b of two colour copies of the banknote specimen shown in Figure 1a, which copies were produced using commercial colour copying equipment. In each of Figures 3a and 4a, the depicted white square indicates the corresponding region of interest R.o.I. of the portrait which is shown in enlarged view in Figures 3b and 4b, respectively. The first colour copy illustrated in Figures 3a, 3b was produced using an Epson ink-jet printer and Epson photo-paper. The second colour copy illustrated in Figures 4a, 4b was produced using a Canon ink-jet printer and normal paper. A high-resolution scanner was used to scan the original specimen and provide the necessary input for the ink-jet printers.
  • While the general visual aspect of both colour copies looks similar to the original specimen, a closer look at the structures of the copied intaglio pattern forming the portrait, as illustrated in Figures 3b and 4b, shows that the structures are not as sharply defined as in the original specimen (see Figure 2b) and that these structures appear to be somewhat blurred and smoothed as a result of the ink-jet printing process and the nature of the paper used. The image information contained in Figures 3b and 4b is clearly different from that of the original specimen illustrated in Figure 2b. The present invention accordingly concerns a method defining how this difference can be brought forward and exploited in order to differentiate between the original and authentic specimen of Figures 2a, 2b and the copies of Figures 3a, 3b and 4a, 4b. The below discussion will address this issue.
  • As hinted above, an intrinsic and characteristic feature of intaglio-printed patterns is in particular the high sharpness of the print, whereas the ink-jet-printed copies exhibit a substantially lower sharpness of print due in particular to the digital processing and printing. The same can be said of colour-laser-printed copies, as well as of copies obtained by thermo-sublimation processes. This difference can be brought forward by performing a decomposition of the image data contained in an enlarged view (or region of interest) of the candidate document to be authenticated, such as the views of Figures 2b, 3b and 4b, into at least one sub-space containing high resolution details of the image, and extracting representative classifying data from this sub-space as this will be explained in greater detail hereinafter.
  • Preferably, the decomposition of the image is carried out by performing digital signal processing techniques based on so-called wavelets ("ondelettes" in French). A wavelet is a mathematical function used to divide a given function or signal into different scale components. A wavelet transformation (or wavelet transform) is the representation of the function or signal by wavelets. Wavelet transforms have advantages over traditional Fourier transforms for representing functions and signals that have discontinuities and sharp peaks. According to the present invention, one in particular exploits the properties of so-called discrete wavelet transforms (DWTs) as this will be discussed in the following.
  • Wavelet theory will not be discussed in-depth in the present description as this theory is as such well-known in the art and is extensively discussed and described in several textbooks on the subject. The interested reader may for instance refer to the following books and papers about wavelet theory :
  • [Mal89]
    Stéphane G. Mallat, "A Theory for Multiresolution Signal Decomposition: The Wavelet Representation", IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 11, No. 7 (July 7, 1989), pp. 674-693 ;
    [Dau92]
    Ingrid Daubechies, "Ten Lectures on Wavelets", CBMS-NSF Regional Conference Series in Applied Mathematics 61, SIAM (Society for Industrial and Applied Mathematics), 2nd edition, 1992, ISBN 0-89871-274-2 ;
    [Bur98]
    Sidney C. Burrus, Ramesh A. Gopinath and Haitao Guo, "Introduction to Wavelets and Wavelet Transforms: A Primer", Prentice-Hall, Inc., 1998, ISBN 0-13-489600-9 ;
    [Hub98]
    Barbara Burke Hubbard, "The World According to Wavelets: The Story of a Mathematical Technique in the Making", A K Peters, Ltd., 2nd edition, 1998, ISBN 1-56881-072-5 ;
    [Mal99]
    MALLAT, Stéphane, "A wavelet tour of signal processing", Academic Press, 2nd edition, 1999, ISBN 0-12-466606-X ; and
    [Wal04]
    WALNUT, David F. "An Introduction to Wavelet Analysis", Birkhäuser Boston, 2nd edition, 2004, ISBN 0-8176-3962-4.
  • It suffice to understand that a wavelet can conveniently be expressed by a wavelet function (or "mother wavelet") ψ and a scaling function (or "father wavelet") ϕ. The wavelet function ψ can in effect be expressed as a band-pass/high-pass filter which filters an upper half of the signal scale/spectrum, while the scaling function ϕ can be expressed as a low-pass filter which filters the remaining lower half of the signal scale/spectrum. This principle is schematically illustrated in Figure 5a as a one-level digital filter bank comprising a low-pass filter with function h(n) and a high-pass filter with function g(n) which split the signal scale/spectrum in two parts of equal spectral range. We can consider a one-level wavelet transform of a discrete sample signal x(n) as passing this sample signal x(n) through the filter bank of Figure 5a. The output yLOW(n) of the low-pass filter, which basically is the result of the convolution * of signal x(n) and function h(n), comprises the scaling function transform coefficients, or simply "scaling coefficients" (also referred to as the approximation coefficients), while the output yHIGH(n) of the high-pass filter, which is similarly the result of the convolution * of signal x(n) and function g(n), comprises the wavelet function transform coefficients, or simply "wavelet coefficients" (also referred to as the detail coefficients).
  • As each filter filters half the spectral components of signal x(n), half of the filtered samples can be discarded according to Nyquist's rule. In Figure 2, the outputs of the low-pass and high pass filters are therefore downsampled by two (hence the downsampling operator "↓2" following each filter in Figure 5a), meaning that every two sample is discarded.
  • Following this approach, a signal can be decomposed into a plurality of wavelet coefficients corresponding to different scales (or resolutions) by iteratively repeating the process, i.e. by passing the approximation coefficients outputted by the low-pass filter to a subsequent similar filter stage. This approach is known as a multiresolution analysis or MRA (see [MaI89]) and is schematically illustrated in Figure 5b in the case of a three-level multiresolution analysis. As this can be appreciated in Figure 5b, the filter bank is in effect a three-level filter bank wherein the low-pass filtered output of a preceding filter stage is again filtered by the subsequent filter stage.
  • In Figure 5b, the signal x(n) is in effect decomposed in four signal components corresponding to three distinct scales, namely (i) detail coefficients at a first scale (the level 1 coefficients) which comprise half the number of samples as compared to signal x(n), (ii) detail coefficients at a second scale different from the first (the level 2 coefficients) which comprise 1/4 of the number of samples as compared to signal x(n), and (iii) approximation coefficients and (iv) detail coefficients at a third scale (the level 3 coefficients) which each comprise 1/8 of the number of samples as compared to signal x(n).
  • As a matter of fact, a discrete sample signal can eventually be completely decomposed in a set of detail coefficients (wavelet coefficients) at different scales as long as the sample signal includes 2N samples, where N would be the number of iterations or levels required to completely decompose the signals into wavelet coefficients.
  • In summary, multiresolution analysis (MRA), or multi-scale analysis, refers to a signal processing technique based on wavelet transforms, whereby a signal is decomposed in a plurality of nested subspaces of different scales ranging from fine details (high resolution components) to coarse details (low resolution components) of the signal as schematically illustrated by the diagram of Figure 6.
  • According to the present invention, the intrinsic features of genuine security features, especially the intrinsic feature of intaglio patterns, will be identified by looking especially at the fine high resolution details of an image of the candidate document to be authenticated, rather than at the coarser low resolution details of the image of the candidate document.
  • Up to now, one has discussed the wavelet theory in the context of the processing of one-dimensional signal only. Images are however to be regarded as two-dimensional signals which accordingly require a two-dimensional processing. One will accordingly briefly discuss the concept of two-dimensional wavelet transform before turning to the actual description of preferred embodiments of the invention.
  • The above-discussed wavelet theory can easily be extended to the decomposition of two-dimensional signals as for instance discussed in [Mal89]. Two-dimensional wavelet transform basically involves a row-wise and column-wise processing of the two-dimensional signal wherein the rows and columns of the signal are processed separately using the above-discussed one-dimensional wavelet algorithm. This will be explained in reference to Figures 7a, 7b, 8 and 9.
  • In Figure 7a, there is schematically illustrated an original image (i.e. an image corresponding to a selected region of interest of a sample image of a candidate document to be authenticated - such as for instance the image of Figures 2b, 3b or 4b), which original image is designated as c°. This original image c° consists of a matrix of n x n pixels, where n is dividable by 2N, N being an integer corresponding to the number N of wavelet iterations one wishes to perform. In practice, the image size should be sufficiently big so as to encompass a relatively high number of features. For the sake of illustration, the original image c° may for instance consist of a matrix of 256 x 256 pixels. Other images sizes are however perfectly possible. At a sampling resolution of 300 dpi, it will be appreciated that such an image size corresponding to a surface area on the candidate document to be authenticated of approximately 2x2 cm2.
  • As a result of the first iteration of the wavelet transform, as illustrated in Figure 7a, the original image c° is decomposed in four sub-images c1, d 1 1 ,
    Figure imgb0001
    d 2 1
    Figure imgb0002
    and d 3 1
    Figure imgb0003
    each having a size of (n/2) x (n/2) pixels. Sub-image c1 contains the approximation of the original image c° resulting from low-pass filtering along both the rows and columns of the original image c°. On the other hand, sub-images d 1 1 ,
    Figure imgb0004
    d 2 1
    Figure imgb0005
    and d 3 1
    Figure imgb0006
    contain the details of the original image c° resulting from high-pass filtering along the rows and/or columns of the original image c°. More precisely :
    • d 1 1
      Figure imgb0007
      is the result of high-pass filtering along the rows and low-pass filtering along the columns of the original image c° and contains horizontal details of the original image c0;
    • d 2 1
      Figure imgb0008
      is the result of low-pass filtering along the rows and high-pass filtering along the columns of the original image c° and contains vertical details of the original image c0 ; and
    • d 3 1
      Figure imgb0009
      is the result of high-pass filtering along both the rows and columns of the original image c° and contains diagonal details of the original image c°.
  • The process can be repeated during a subsequent iteration by similarly decomposing sub-image c1 in four additional sub-images c2, d 1 2 ,
    Figure imgb0010
    d 2 2
    Figure imgb0011
    and d 3 2
    Figure imgb0012
    each having a size of (n/4) x (n/4) pixels, as schematically illustrated in Figure 7b. In Figure 7b, sub-images d 1 1 ,
    Figure imgb0013
    d 2 1
    Figure imgb0014
    and d 3 1
    Figure imgb0015
    are representative of details of the image c° at a first resolution (or scale), while sub-images d 1 2 ,
    Figure imgb0016
    d 2 2
    Figure imgb0017
    and d 3 2
    Figure imgb0018
    are representative of details of the image c° at a second resolution, half that of the first resolution.
  • Following N iterations, the original image c° will thus be decomposed into 3 N + 1 sub-images d 1 m ,
    Figure imgb0019
    d 2 m ,
    Figure imgb0020
    d 3 m ,
    Figure imgb0021
    and cN, where m = 1, 2, ..., N. As already hinted above, sub-images d 1 m
    Figure imgb0022
    will each contain the horizontal details of the original image at different scales (or resolutions), whereas sub-images d 2 m
    Figure imgb0023
    and d 3 m
    Figure imgb0024
    will each respectively contain the vertical and diagonal details of the original image at different scales.
  • The two-dimensional wavelet transform is preferably carried out according to the so-called "non-standard decomposition" method, which method is schematically illustrated in Figure 8. According to this decomposition method, one-dimensional wavelet transform is alternately performed on the rows and the columns of the image. In Figure 8, references A, D, a, d respectively designate :
    • A: the approximation (i.e. low-pass filtered) coefficients of the rows of the image ;
    • D: the detail (i.e. high-pass filtered) coefficients of the rows of the image;
    • a: the approximation (i.e. low-pass filtered) coefficients of the columns of the image ; and
    • d: the detail (i.e. high-pass filtered) coefficients of the columns of the image.
  • As illustrated in the upper part of Figure 8, the rows of the original image are first processed and then the columns, such as to yield to the result illustrated in Figure 7a (where Aa, Da, Ad and Dd respectively correspond to sub-images c1, d 1 1 ,
    Figure imgb0025
    d 2 1
    Figure imgb0026
    and d 3 1 ) .
    Figure imgb0027
    As illustrated in the lower part of Figure 8, sub-image Aa (which corresponds to sub-image c1) is similarly processed starting with the rows and then the columns, resulting in the same decomposition as illustrated in Figure 7b (where AaAa, AaDa, AaAd and AaDd respectively correspond to sub-images c2, d 1 2 ,
    Figure imgb0028
    d 2 2
    Figure imgb0029
    and d 3 2 ) .
    Figure imgb0030
  • An alternative to the above-discussed "non-standard decomposition" method is the so-called "standard decomposition" method which is carried out by performing all required iterations along the rows and then only the required iterations along the columns. This method is schematically illustrated in Figure 9.
  • An advantage of the "standard decomposition" method resides in the fact that each row and column of the image only needs to be loaded from memory only once in order to transform the whole image. This method accordingly requires a minimal number of memory accesses which is favourable in the context of an FPGA (Freely Programmable Gate Array) implementation.
  • While the "non-standard decomposition" method necessitates more memory accesses in comparison to the other method, it has the advantage that it requires less computation time, since, during each iteration, only a quarter of the data resulting from the preceding iteration has to be processed. Furthermore, the horizontal and vertical details are extracted separately by means of the "non-standard decomposition" method as this can be readily understood from comparing Figures 8 and 9.
  • Different types of discrete wavelet transforms (DWTs) are suitable in the context of the present invention. Successful tests have in particular been carried out by making use of the so-called Haar-, Daubechies- and Pascal-wavelet transforms which are known as such in the art.
  • The Haar-wavelet transform is actually the first known wavelet transform. This wavelet transform (while not designated as such at the time) was discovered in 1909 by Hungarian mathematician Alfred Haar. This wavelet transform is also known as a special case of the so-called Daubechies-wavelet transform. The corresponding high-pass and low-pass filters of the Haar-wavelet transform each consist of two coefficients, namely :
    • for the low-pass filter : h 1 = 1 2
      Figure imgb0031
      and h 2 = 1 2
      Figure imgb0032
      and for the high-pass filter : g 1 = 1 2
      Figure imgb0033
      and g 2 = - 1 2
      Figure imgb0034
  • The Daubechies-wavelet transform (see [Dau92]) is named after Ingrid Daubechies, a Belgian physicist and mathematician. The Daubechies-wavelets are a family of orthogonal wavelets and are characterised by a maximal number of so-called vanishing moments (or taps).
  • Among the family of Daubechies-wavelet transforms, one for instance knows the so-called Daubechies 4 tap wavelet (or db4 transform), where the filter coefficients consists of four coefficients, namely :
    • for the low-pass filter : h 1 = 1 + 3 4 = 0 , 6830127
      Figure imgb0035
      h 2 = 3 + 3 4 = 1 , 1830127
      Figure imgb0036
      h 3 = 3 - 3 4 = 0 , 3169873
      Figure imgb0037
      and h 4 = 1 - 3 4 = - 0 , 1830127
      Figure imgb0038
      and for the high-pass filter : g 1 = 1 - 3 4 = - 0 , 1830127
      Figure imgb0039
      g 2 = - 3 - 3 4 = - 0 , 3169873
      Figure imgb0040
      g 3 = 3 + 3 4 = 1 , 1830127
      Figure imgb0041
      and g 4 = - 1 + 3 4 = - 0 , 6830127
      Figure imgb0042
  • An advantage of the Daubechies-db4 transform over the Haar-wavelet transform resides in particular in the increased filtering efficiency of the Daubechies transform, i.e. the cut-off frequencies of the low-pass and high-pass filters are more sharply defined.
  • The Pascal-wavelet transform is based on the binomial coefficients of Pascal's triangle (named after the French philosopher and mathematician Blaise Pascal). Although the Pascal-wavelet transform has less sharply-defined cut-off frequencies than the Haar- and Daubechies wavelet transforms, this transform can better approximate continuous signals than the Haar-wavelet transform and requires less computation time than the Daubechies-wavelet transform.
  • For the sake of example, the following Pascal-wavelet transform can be used, where the low-pass and high-pass filters are each defined with the following three filter coefficients :
    • for the low-pass filter : h 1 = 2 4 = 0 , 35355
      Figure imgb0043
      h 2 = 1 2 = 0 , 7071
      Figure imgb0044
      and h 3 = 2 4 = 0 , 35355
      Figure imgb0045
      and for the high-pass filter : g 1 = 2 4 = 0 , 35355
      Figure imgb0046
      g 2 = - 1 2 = - 0 , 7071
      Figure imgb0047
      and g 3 = 2 4 = 0 , 35355
      Figure imgb0048
  • In contrast to the Haar- and Daubechies-wavelet transforms, the Pascal-wavelet transform is a non-orthogonal wavelet.
  • While the Haar-, Daubechies- and Pascal-wavelet transforms have been mentioned hereinabove as possible discrete wavelet transforms that can be used in the context of the present invention, these shall only be considered as preferred examples. Other discrete wavelet transforms are further known in the art (see for instance [Ma199]).
  • According to the present invention, one shall again appreciate that one is mainly interested in the fine, high resolution details of the selected region of interest of the sample image of the candidate document. In other words, according to the present invention, the signal (i.e. the image data of the region of interest) does not need to be completely decomposed into wavelet components. Accordingly, it suffice to perform one or more iterations of the wavelet transformation of the image data in order to extract the relevant features that will enable to built representative classifying data about the candidate document to be authenticated, as this will be appreciated from the following. This means that the most relevant scales of the image to be considered are those corresponding to the fine, high resolution details which are first derived in the course of the multiresolution analysis.
  • Tests carried out by the Applicant have shown that one iteration of the wavelet transform (i.e. a one-level resolution analysis as schematically illustrated by Figure 5a) is sufficient in most cases to extract the necessary features enabling a classification (and thus differentiation) of the candidate document being authenticated into the class of genuine, or presumably genuine, documents or of copied/counterfeited documents.
  • Within the scope of the present invention, it is however perfectly possible to perform more than one iteration of the wavelet transform, i.e. extract multiple sets of detail coefficients (or wavelet coefficients) corresponding to more than one high-resolution scale of the image data. For the sake of computing and processing efficiency, it is preferable to keep the number of iterations as low as possible. Furthermore, as already stated above, a complete decomposition of the signal into wavelet components is not necessary according to the present invention, as the last wavelet components to be derived correspond to the low-resolution, coarse content of the image, which content is expected to be relatively similar between a genuine document and a counterfeit thereof. Indeed, this is part of the explanation as to why an unskilled person having no particular knowledge about security printing can so easily be deceived by the general visual appearance and look of a counterfeited document.
  • The following discussion will therefore focus on the case of one-level wavelet transformation involving only one iteration of a two-dimensional wavelet transform as schematically illustrated in Figure 7a, i.e. the region of interest will be decomposed into four sub-images c1, d 1 1 ,
    Figure imgb0049
    d 2 1
    Figure imgb0050
    and d 3 1 .
    Figure imgb0051
  • Figure 10a illustrates the result of the first iteration of a two-dimensional wavelet transform as applied to the image shown in Figure 2b of an original banknote specimen. In this example, the original image had a size of 252 x 252 pixels and use was made of the Haar-wavelet transform mentioned above to process the image.
  • The approximation image c1 resulting from low-pass filtering is shown in the upper left corner of Figure 10a. The detail images d 1 1 ,
    Figure imgb0052
    d 2 1
    Figure imgb0053
    and d 3 1
    Figure imgb0054
    resulting from high-pass filtering are shown as substantially dark regions, due to the fact that the wavelet coefficients have small values and also include negative coefficients (the wavelet coefficients therefore appear as substantially "black" pixels when directly visualized).
  • For a better view of the wavelet coefficients of images d 1 1 ,
    Figure imgb0055
    d 2 1
    Figure imgb0056
    and d 3 1 ,
    Figure imgb0057
    the images can be normalized so that the coefficients are comprised within the range of values 0 to 255 (i.e. the 8-bit value range of a greyscale image). Such a view is illustrated in Figure 10b where d 1 1 N ,
    Figure imgb0058
    d 2 1 N
    Figure imgb0059
    and d 3 1 N
    Figure imgb0060
    respectively designate normalized versions of detail images d 1 1 ,
    Figure imgb0061
    d 2 1
    Figure imgb0062
    and d 3 1 .
    Figure imgb0063
    From looking at Figure 10b, one can see that the wavelet-transform adequately detects the sharp transitions of the intaglio patterns.
  • Figure 11a shows a normalized image d G 1 N
    Figure imgb0064
    resulting from the combination of the three detail images d 1 1 ,
    Figure imgb0065
    d 2 1
    Figure imgb0066
    and d 3 1
    Figure imgb0067
    of Figures 10a, 10b. Figures 11b and 11c illustrate the corresponding normalized image d G 1 N
    Figure imgb0068
    obtained as a result of the wavelet transform of the images of the first and second colour copies of Figures 3b and 4b, respectively.
  • One can see that there exists a substantial visual difference between the image of Figure 11a and those of Figures 11b and 11c. One can in particular sees that edges of the pattern appear more clearly in Figure 11a, than in Figures 11b and 11c.
  • Now that images of various candidate documents have been processed, one will explained how representative features can be extracted from these processed images in order to classify and differentiate the documents.
  • Figure 12 is an illustration of nine histograms showing the statistical distributions of the wavelet coefficients for the horizontal, vertical and diagonal details (i.e. the wavelet coefficients of detail images d 1 1 ,
    Figure imgb0069
    d 2 1
    Figure imgb0070
    and d 3 1 )
    Figure imgb0071
    for each one of the images of Figures 2b, 3b and 4b. More precisely, the left, middle and right columns of Figure 12 respectively show the corresponding histograms derived for the images of Figures 2b, 3b and 4b, while the upper, middle and bottom rows of Figure 12 respectively shown the corresponding histograms for the horizontal, vertical and diagonal details.
  • It may be seen from Figure 12 that the histograms derived from the image of the original specimen (left column in Figure 12) are wider than the histograms derived from the images of the colour copies (middle and right columns in Figure 12). In other words, the variance σ2, i.e. the measure of the dispersion of the wavelet coefficients, can conveniently be used to categorize the statistical distribution of the wavelet coefficients. The variance σ2 is also referred to in statistics as the "second moment". Alternatively, one may use the so-called standard deviation σ which is the square root of the variance σ2.
  • Beside the variance σ2 and the standard deviation σ, further statistical parameters might be used to characterized the statistical distribution of the wavelet coefficients, namely :
    • the arithmetic mean of the wavelet coefficients - also referred to in statistics as the "first moment" ;
    • the skewness of the statistical distribution of the wavelet coefficients - also referred to in statistics as the "third moment" - which is a measure of the asymmetry of the statistical distribution ;
    • the excess, or excess kurtosis, (or simply "kurtosis") - also referred to in statistics as the "fourth moment" - which is a measure of the "peakedness" of the statistical distribution ; and/or
    • the statistical entropy, which is a measure of changes in the statistical distribution.
  • For the purpose of feature extraction, the above-listed moments (including the variance) shall be normalized to enable proper comparison and classification of the various candidate documents.
  • Figure 13 illustrates the notions of skewness and excess. A "positive skewness" (as illustrated) is understood to characterize a statistical distribution wherein the right tail of the distribution is longer and wherein the "mass" of the distribution is concentrated on the left. The converse is a "negative skewness". On the other hand, a "positive/high excess" or "negative/low excess" (as illustrated) is understood to characterize a statistical distribution comprising a sharper peak and fatter tails, respectively a more rounded peak and wider "shoulders".
  • In the following, one will in particular exploit the excess (hereinafter designated by reference C) as a further categorizing feature, together with the variance σ2.
  • Figures 14a to 14c are three bar charts illustrating the variance σ2 of the statistical distributions of the wavelet coefficients illustrated by the diagrams of Figure 12. Reference numerals 1, 2, 3 in Figures 14a to 14c respectively refer to the three candidate documents that have been processed, namely the original specimen (Figures 2a and 2b), the first colour copy (Figures 3a and 3b) and the second colour copy (Figures 4a and 4b). In Figure 14a, the variance σ2 is shown for the horizontal details, while Figures 14b and 14c respectively show the variance σ2 for the vertical and diagonal details.
  • As expected, the variance σ2 is substantially higher in the case of the distribution of the wavelet coefficients deriving from the image of the original specimen than that computed from the statistical distributions of the wavelet coefficients deriving from the images of the colour copies.
  • Tests have been carried out on various original (i.e. authentic) specimens of banknotes and colour copies (i.e. counterfeits) thereof. These tests have shown that the method according to the present invention is very robust, especially when the image data of the region of interest being processed contains a relatively high density of intaglio-printed features, such as in the case of a portion of the portrait or of any other similarly dense pictorial representation that can be found on most banknotes (such as the intaglio-printed patterns representing architectural objects on the Euro banknotes). The tests have also shown that area containing a lesser amount of intaglio feature still lead to good results.
  • Figures 15a and 15b are two enlarged views of a part of the intaglio-printed portrait of Bettina von Arnim as it appears on the recto side of the DM 5 banknote which was issued during the years 1991 to 2001 in Germany prior to the introduction of the Euro. Figure 15b in particular shows an example of a possible region of interest that was exploited for the purpose of authentication according to the above-described method.
  • Several candidate documents have been tested including both original banknotes with different degrees of wear and colour copies of the banknotes which were produced using inkjet-, thermo-sublimation- as well as colour laser-copying and printing equipment. Figure 16a shows for the purpose of illustration six similar images of the same region of interest taken from an original specimen in very good condition (illustration A), an original specimen with a relatively high degree of wear (illustration B), a colour-copy produced by inkjet printing on photo-quality paper at a resolution of 5600 dpi (illustration C), a colour-copy produced by inkjet printing on normal paper at a resolution of 5600 dpi (illustration D), a colour-copy produced by thermo-sublimation on photo-quality paper at a resolution of 300 dpi (illustration E) and a colour-copy produced by laser printing on normal paper at a resolution of 1200 dpi (illustration F).
  • Figure 16b shows the corresponding histograms of the statistical distributions of the wavelet coefficients (in Figure 16b the histograms are derived from the combination of the three detail images resulting from low-pass filtering of the images of Figure 16a). One can see that the histograms computed from the images of the two original specimens (histograms A and B in Figure 16b) are highly similar, despite the different degrees of wear of the specimens (and the presence of a wrinkle in the region of interest of the image of the second original specimen - see image B in Figure 16a). The statistical distribution of the wavelet coefficients derived from the image of the two inkjet-printed copies and the thermo-sublimation copy (histograms C to E) are clearly different. The statistical distribution of the wavelet coefficients derived from the image of the laser-printed copy (histogram F) appears to be somewhat closer to that of the original specimens. However, the dispersion of the histogram corresponding to the laser-printed copy is still less than that of the original specimen. Moreover, all histograms corresponding to the colour copies (histograms C to F) exhibit clearly different amplitudes and peak shapes as compared to the histograms of the original specimens (histograms A and B).
  • For the sake of illustration, Figure 17 shows the superposition of the histograms corresponding to the first original specimen (histogram A in Figure 16b) and to the laser-printed colour copy (histogram F in Figure 16b).
  • Figure 18a and 18b are two bar charts illustrating the variance σ2 and the excess C, respectively, computed from the statistical distribution of the wavelet coefficients derived from images of substantially the same region of interest of eleven candidate documents comprising five original specimens with different degrees of wear (candidates 1 to 5) and six colour copies (candidates 6 to 11) produced by inkjet-printing, thermo-sublimation, or colour-laser-printing. In both cases, the variance σ2 and the excess C clearly show that a distinction between the authentic documents and the counterfeits is possible using these two statistical parameters as classifying data.
  • For the sake of illustration, Figure 19 is an illustration of a corresponding feature space using the variance σ2 and the excess C as (X; Y) coordinates in the feature space, where the results derived from candidate documents can be positioned. A borderline can clearly be drawn between the points corresponding to original specimens (located on the upper right corner of the feature space) and those corresponding to colour copies (located on the lower left corner of the feature space).
  • Figure 20 is a view of a feature space similar to that of Figure 19 where the variance σ2 and the excess C are again used as (X; Y) coordinates and which shows the results that were obtained by processing additional candidate documents, including original Euro banknotes. These results confirm the robustness and efficiency of the authentication method according to the present invention.
  • It shall be appreciated that the method according to the invention does as such require that the selected region of interest be strictly one and a same area of the candidate documents. As a matter of fact, deviations regarding the actual position of the region of interest from one candidate document to another do not substantially affect the results. The method according to the present invention is accordingly also advantageous in that it does not require precise identification and positioning of the region of interest prior to signal processing. This greatly simplifies the whole authentication process and its implementation (especially in ATM machines and the like) as one merely has to ensure that the selected region of interest more or less covers an area comprising a sufficiently representative amount of intrinsic features (in particular intaglio features).
  • The above-described authentication method can thus be summarized, as illustrated by the flow chart of Figure 22, as comprising the steps of :
    • acquiring a sample image (i.e. image c0) of at least one region of interest R.o.l. of the surface of a candidate document to be authenticated, which region of interest R.o.l. encompasses at least part of the security features ;
    • digitally processing the sample image c0 by performing a decomposition of the sample image into at least one sub-space containing high resolution details of the sample image (e.g. at least one of the sub-images d 1 m ,
      Figure imgb0072
      d 2 m ,
      Figure imgb0073
      d 3 m ,
      Figure imgb0074
      where m = 1, 2, ..., N, and N is the number of iterations performed) and extracting classifying features from the sub-space (e.g. the statistical parameter(s) about the statistical distribution of spectral coefficients) ; and
    • deriving an authenticity rating (or classification) of the candidate document based on the extracted classifying features.
  • Figure 21 schematically illustrates an implementation of a device for checking the authenticity of security documents, in particular banknotes, according to the above-described method. This device comprises an optical system 100 for acquiring a sample image (image c0) of the region of interest R.o.l. on a candidate document 1 to be authenticated, and a digital signal processing (DSP) unit 200 programmed for performing the digital processing of the sample image. The DSP 200 may in particular advantageously be implemented as a Freely-Programmable-Gate-Array (FPGA) unit.
  • Various modifications and/or improvements may be made to the above-described embodiments without departing from the scope of the invention as defined by the annexed claims.
  • For instance, as already mentioned, while the authentication principle is preferably based on the processing of an image containing (or supposed to be containing) intaglio-printed patterns, the invention can be applied by analogy to the processing of an image containing other security features comprising characteristic visual features intrinsic to the processes used for producing the security documents, in particular line offset patterns, letterpress patterns, optically-diffractive structures and/or combinations thereof.

Claims (20)

  1. A method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents,
    wherein the method comprises the steps of :
    - acquiring a sample image (c0) of at least one region of interest (R.o.I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of said security features ;
    - digitally processing said sample image (c0) by performing a decomposition of the sample image (c0) into at least one sub-space containing high resolution details ( d 1 1 ,
    Figure imgb0075
    d 2 1 ,
    Figure imgb0076
    d 3 1 ,
    Figure imgb0077
    ...) of the sample image (c°) and extracting classifying features (σ2, C, ...) from said sub-space ; and
    - deriving an authenticity rating of the candidate document based on the extracted classifying features (σ2, C, ...).
  2. The method according to claim 1, wherein digitally processing the sample image includes:
    - performing a transform of said sample image (c0) to derive at least one set of spectral coefficients representative of the said high resolution details ( d 1 1 ,
    Figure imgb0078
    d 2 1 ,
    Figure imgb0079
    d 3 1 ,
    Figure imgb0080
    ... ) of the sample image (c0) ; and
    - processing said spectral coefficients to extract said classifying features (σ2, C, ...).
  3. The method according to claim 2, wherein said processing of the spectral coefficients includes performing a processing of the statistical distribution of the spectral coefficients.
  4. The method according to claim 3, wherein said statistical processing includes computing at least one statistical parameter selected from the group comprising the arithmetic mean (first moment in statistics), the variance (σ2, second moment in statistics), the skewness (third moment in statistics), the excess (C, fourth moment in statistics), and the entropy of the statistical distribution of said spectral coefficients.
  5. The method according to any one of claims 2 to 4, wherein said transform is a wavelet-transform.
  6. The method according to claim 5, wherein said wavelet-transform is a discrete wavelet transform (DWT), preferably selected from the group comprising Haar-wavelet transform, Daubechies-wavelet transform, and Pascal-wavelet transform.
  7. The method according to any one of the preceding claims, wherein said decomposition of the sample image (c0) is performed as a result of one or more iterations (N) of a multiresolution analysis (MRA) of the sample image.
  8. The method according to any one of the preceding claims, comprising performing a decomposition of a plurality of images corresponding to several regions of interest (R.o.I.) of the same candidate document.
  9. The method according to any one of the preceding claims, wherein said sample image (c0) is acquired at a resolution lower than 600 dpi, preferably of 300 dpi.
  10. The method according to any one of the preceding claims, wherein said security features include intaglio patterns (41-49), line offset patterns (10), letterpress patterns (51, 52), optically-diffractive structures (30) and/or combinations thereof.
  11. The method according to any one of the preceding claims, wherein said security features include linear or curvilinear patterns of varying width, length and spacing.
  12. The method according to any one of the preceding claims, wherein said at least one region of interest (R.o.l.) is selected to include a high density of patterns, preferably linear or curvilinear intaglio-printed patterns (Figure 2b).
  13. The method according to claim 12, wherein said at least one region of interest (R.o.l.) is selected to include patterns of a pictorial representation, such as a portrait, provided on the candidate document (Figures 2a, 2b).
  14. A digital signal processing unit (200) for processing image data of a sample image (c0) of at least one region of interest (R.o.l.) of the surface of a candidate document (1) to be authenticated according to the method of any one of the preceding claims, said digital signal processing unit (200) being programmed for performing said digital processing of the sample image (c0).
  15. The digital signal processing unit (200) of claim 14, implemented as an FPGA (Freely-Programmable-Gate-Array) unit.
  16. A device for checking the authenticity of security documents, in particular banknotes, according to the method of any one of claims 1 to 13, comprising an optical system (100) for acquiring the sample image (c0) of the region of interest (R.o.I.) and a digital signal processing unit (200) programmed for performing the digital processing of the sample image (c0).
  17. A method for producing security documents, in particular banknotes, comprising the step of designing security features to be printed, applied, or otherwise provided on the security documents, wherein said security features are designed in such a way as to optimise an authenticity rating computed according to the method of any one of claims 1 to 13 by producing a characteristic response in the said at least one sub-space.
  18. The method according to claim 17, wherein said security features include intaglio patterns (41-49), line offset patterns (10), letterpress patterns (51, 52), optically-diffractive structures (30) and/or combinations thereof.
  19. The method according to claim 17 or 18, wherein said security features are designed such as to include a high density of patterns, preferably linear or curvilinear intaglio-printed patterns (Figure 2b).
  20. Use of wavelet transform for the authentication of security documents, in particular of banknotes.
EP07109470A 2007-06-01 2007-06-01 Authentication of security documents, in particular of banknotes Withdrawn EP2000992A1 (en)

Priority Applications (19)

Application Number Priority Date Filing Date Title
EP07109470A EP2000992A1 (en) 2007-06-01 2007-06-01 Authentication of security documents, in particular of banknotes
EP13172170.6A EP2639773B1 (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
KR1020097027358A KR101461208B1 (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
MX2009012963A MX2009012963A (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes.
JP2010509940A JP5314007B2 (en) 2007-06-01 2008-06-02 Authentication of security documents, especially banknotes
US12/602,227 US8781204B2 (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
PCT/IB2008/052135 WO2008146262A2 (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
CA2689270A CA2689270C (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
CN2008800252965A CN101755290B (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
NZ581538A NZ581538A (en) 2007-06-01 2008-06-02 Authentication of security documents by analysis of features characteristic to printing methods
EP08751322.2A EP2153423B1 (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
CN2012104086816A CN102930632A (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
RU2009147707/08A RU2476936C2 (en) 2007-06-01 2008-06-02 Authentication of protected documents, particularly banknotes
BRPI0812240-7A BRPI0812240B1 (en) 2007-06-01 2008-06-02 METHOD FOR VERIFYING AUTHENTICITY OF SAFETY DOCUMENTS
MYPI20095095A MY183641A (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
EP13172172.2A EP2639774B1 (en) 2007-06-01 2008-06-02 Detection of security features provided on security documents
AU2008256256A AU2008256256B2 (en) 2007-06-01 2008-06-02 Authentication of security documents, in particular of banknotes
ZA2009/08451A ZA200908451B (en) 2007-06-01 2009-11-30 Authentication of security documents,in particular of banknotes
HK10107737.1A HK1141355A1 (en) 2007-06-01 2010-08-13 Authentication of security documents, in particular of banknotes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP07109470A EP2000992A1 (en) 2007-06-01 2007-06-01 Authentication of security documents, in particular of banknotes

Publications (1)

Publication Number Publication Date
EP2000992A1 true EP2000992A1 (en) 2008-12-10

Family

ID=39345185

Family Applications (1)

Application Number Title Priority Date Filing Date
EP07109470A Withdrawn EP2000992A1 (en) 2007-06-01 2007-06-01 Authentication of security documents, in particular of banknotes

Country Status (1)

Country Link
EP (1) EP2000992A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010089157A1 (en) 2009-02-05 2010-08-12 Bundesdruckerei Gmbh Method and device for verifying document using a wavelet transformation
WO2011018764A3 (en) * 2009-08-11 2011-05-05 Kba-Notasys Sa Authentication of security documents, in particular of banknotes
DE102012017398A1 (en) 2012-09-03 2013-02-21 Heidelberger Druckmaschinen Ag Security tag for use on base of random pattern, particularly copper wire pattern, has base body with unit, by which comparative information or comparison data is detected to identify differences between random pattern and representation
WO2014118763A1 (en) 2013-02-04 2014-08-07 Kba-Notasys Sa Authentication of security documents and mobile device to carry out the authentication

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884296A (en) * 1995-03-13 1999-03-16 Minolta Co., Ltd. Network and image area attribute discriminating device and method for use with said neural network
EP1484719A2 (en) * 2003-06-06 2004-12-08 Ncr International Inc. Currency validation
WO2006106677A1 (en) * 2005-03-30 2006-10-12 National Printing Bureau, Incorporated Administrative Agency Printed matter, method and device for detecting such printed matter, and authentication method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5884296A (en) * 1995-03-13 1999-03-16 Minolta Co., Ltd. Network and image area attribute discriminating device and method for use with said neural network
EP1484719A2 (en) * 2003-06-06 2004-12-08 Ncr International Inc. Currency validation
WO2006106677A1 (en) * 2005-03-30 2006-10-12 National Printing Bureau, Incorporated Administrative Agency Printed matter, method and device for detecting such printed matter, and authentication method and device
EP1864825A1 (en) * 2005-03-30 2007-12-12 National Printing Bureau, Incorporated Administrative Agency Printed matter, method and device for detecting such printed matter, and authentication method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010089157A1 (en) 2009-02-05 2010-08-12 Bundesdruckerei Gmbh Method and device for verifying document using a wavelet transformation
WO2011018764A3 (en) * 2009-08-11 2011-05-05 Kba-Notasys Sa Authentication of security documents, in particular of banknotes
CN102473329A (en) * 2009-08-11 2012-05-23 卡巴-诺塔赛斯有限公司 Authentication of security documents, in particular of banknotes
RU2543931C2 (en) * 2009-08-11 2015-03-10 КБА-НотаСис СА Authentication protected documents, in particular banknotes
DE102012017398A1 (en) 2012-09-03 2013-02-21 Heidelberger Druckmaschinen Ag Security tag for use on base of random pattern, particularly copper wire pattern, has base body with unit, by which comparative information or comparison data is detected to identify differences between random pattern and representation
WO2014118763A1 (en) 2013-02-04 2014-08-07 Kba-Notasys Sa Authentication of security documents and mobile device to carry out the authentication

Similar Documents

Publication Publication Date Title
EP2153423B1 (en) Authentication of security documents, in particular of banknotes
JP4898999B2 (en) Printed matter, detection method and detection device for the printed matter, and authentication method and authentication device
KR101811361B1 (en) Authenticatioin of security documents, in particular of banknotes
MX2014009891A (en) Security element and method to inspect authenticity of a print.
EP2000992A1 (en) Authentication of security documents, in particular of banknotes
JP4288998B2 (en) Paper authentication method
Chhabra et al. Indian currency database for forensic research
Garain et al. Machine authentication of security documents
Lohweg Renaissance of intaglio

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC MT NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK RS

AKX Designation fees paid
REG Reference to a national code

Ref country code: DE

Ref legal event code: 8566

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20090611