-
公开(公告)号:NZ597790A
公开(公告)日:2013-09-27
申请号:NZ59779010
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , SCHAEDE JOHANNES GEORG , GLOCK STEFAN , GILLICH EUGEN
Abstract: A method and a device for checking the authenticity of security documents are disclosed. The authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features. The digital processing includes performing a decomposition of the sample image by means of wavelet transform of the sample image and extracting classifying features from the decomposition of the sample image and deriving an authenticity rating of the candidate document based on the extracted classifying features. The decomposition of the sample image is based on an incomplete wavelet packet transform of the sample image and includes decomposition of the sample image into a wavelet packet tree comprising at least one approximation node and detail nodes and looking for the detail node within the wavelet packet tree that has the highest information content.
-
公开(公告)号:ZA201200588B
公开(公告)日:2013-05-29
申请号:ZA201200588
申请日:2012-01-24
Applicant: KBA-NOTASYS SA
Inventor: GLOCK STEFAN , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , LOHWEG VOLKER
IPC: G07D20060101 , G06F20060101
Abstract: There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R.o.I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT).
-