-
公开(公告)号:SG178047A1
公开(公告)日:2012-03-29
申请号:SG2012003497
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: GLOCK STEFAN , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , LOHWEG VOLKER
Abstract: There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R. o. I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT)
-
公开(公告)号:HK1141355A1
公开(公告)日:2010-11-05
申请号:HK10107737
申请日:2010-08-13
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , GILLICH EUGEN , SCHAEDE JOHANNES
IPC: G07D20060101
Abstract: There is described a method of detecting security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on security documents, in particular banknotes, which security features (41-49; 30; 10; 51, 52) comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the steps of digitally processing a sample image (c 0 ) of at least one region of interest (R.o.I.) of the surface of a candidate document, which region of interest (R.o.I.) is selected to include at least a portion of said security features (41-49; 30; 10; 51, 52), which digital processing includes performing one or more iterations (N) of a multiresolution analysis (MRA) of the sample image (c 0 ) to extract classifying features (Ã 2 , C, ...) which are characteristic of said security features (41-49; 30; 10; 51, 52).
-
公开(公告)号:NZ710433A
公开(公告)日:2018-03-23
申请号:NZ71043314
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DÖRKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JÜRG , SCHAEDE JOHANNES GEORG
IPC: G07D7/00 , B42D25/337 , B42D25/342 , G06K9/36 , G06K9/46 , G06T7/168 , G07D7/20
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:MY156070A
公开(公告)日:2016-01-15
申请号:MYPI2012000519
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: GLOCK STEFAN , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , LOHWEG VOLKER
IPC: G06K9/00
Abstract: THERE IS DESCRIBED A METHOD FOR CHECKING THE AUTHENTICITY OF SECURITY DOCUMENTS, IN PARTICULAR BANKNOTES, WHEREIN AUTHENTIC SECURITY DOCUMENTS COMPRISE SECURITY FEATURES (41-49; 30; 10; 51, 52) PRINTED, APPLIED OR OTHERWISE PROVIDED ON THE SECURITY DOCUMENTS, WHICH SECURITY FEATURES COMPRISE CHARACTERISTIC VISUAL FEATURES INTRINSIC TO THE PROCESSES USED FOR PRODUCING THE SECURITY DOCUMENTS. THE METHOD COMPRISES THE STEP OF DIGITALLY PROCESSING A SAMPLE IMAGE OF AT LEAST ONE REGION OF INTEREST (R.O.I.) OF THE SURFACE OF A CANDIDATE DOCUMENT TO BE AUTHENTICATED, WHICH REGION OF INTEREST ENCOMPASSES AT LEAST PART OF THE SECURITY FEATURES, THE DIGITAL PROCESSING INCLUDING PERFORMING A DECOMPOSITION OF THE SAMPLE IMAGE BY MEANS OF WAVELET TRANSFORM (WT) OF THE SAMPLE IMAGE. SUCH DECOMPOSITION OF THE SAMPLE IMAGE IS BASED ON A WAVELET PACKET TRANSFORM (WPT) OF THE SAMPLE IMAGE, PREFERABLY A SO-CALLED TWO-DIMENSIONAL SHIFT INVARIANT WPT (2D-SIWPT)
-
公开(公告)号:PH12015501668B1
公开(公告)日:2015-10-19
申请号:PH12015501668
申请日:2015-07-27
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DRKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JRG , SCHAEDE JOHANNES GEORG
Abstract: Maintaining confidence in security documents, especially banknotes, is and remains a major concern for the central banks in order to maintain the stability of the economy around the world. In this application there is described an image; processing and pattern recognition approach which is based on the Sound-of-IntaglioT principle for the usage in smart devices such as smartphones. Today, in many world regions smartphones are in use. These devices become more and more computing units, equipped with resource-limited, but effective CPUs, cameras with illumination, and flexible operating systems. Hence, it is obvious to apply smartphones for banknote authentication, especially for visually impaired persons. The approach shows that those devices are capable of processing data under the constraints of image quality and processing power. Strictly a mobile device as such is not an industrial product for harsh environments, but it is possible to use mobile devices for banknote authentication. The concept is based on a new strategy for constructing adaptive Wavelets for the analysis of different print patterns on a banknote. Furthermore, a banknote specific feature vector is generated which describes an authentic banknote effectively under various illumination conditions. A multi-stage Linear-discriminant-analysis classifier generates stable and reliable output.
-
公开(公告)号:CA2899868A1
公开(公告)日:2014-08-07
申请号:CA2899868
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:AU2008256256B2
公开(公告)日:2014-05-08
申请号:AU2008256256
申请日:2008-06-02
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , SCHAEDE JOHANNES , GILLICH EUGEN
Abstract: There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the steps of (i) acquiring a sample image (c
-
公开(公告)号:MX2012001852A
公开(公告)日:2012-03-07
申请号:MX2012001852
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , GLOCK STEFAN
Abstract: Se describe un método para comprobar la autenticidad de los documentos de seguridad, particularmente billetes, en donde los documentos de seguridad auténticos comprenden los rasgos de seguridad (41-49; 30; 10; 51, 52) impresos, aplicados o proporcionados de otra manera en los documentos de seguridad, cuyos rasgos de seguridad comprenden rasgos visuales de características intrínsecas en los procesos utilizados para producir los documentos de seguridad. El método comprende la etapa del procesamiento digital de una imagen de muestra de por lo menos una región de interés (R.o.l.) de la superficie de un documento candidato a autentificarse, cuya región de interés comprende por lo menos parte de los rasgos de seguridad, procesamiento digital que incluye la realización de una descomposición de la imagen de muestra por medio de la transformada de ondículas (WT) de la muestra. Tal descomposición de la imagen de muestra se basa en una transformada del paquete de ondículas (WPT) de la imagen de muestra, preferiblemente un cambio invariante bidimensional WPT (2D-SIWPT) así llamado.
-
公开(公告)号:HUE045795T2
公开(公告)日:2020-01-28
申请号:HUE14706112
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN , DOERKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JUERG , SCHAEDE JOHANNES
-
公开(公告)号:CA2899868C
公开(公告)日:2019-12-31
申请号:CA2899868
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
IPC: G07D7/20
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
-
-
-
-
-
-
-
-