-
公开(公告)号:AU2014210743A1
公开(公告)日:2015-07-30
申请号:AU2014210743
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:AU2010283454B2
公开(公告)日:2014-08-07
申请号:AU2010283454
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: GLOCK STEFAN , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , LOHWEG VOLKER
Abstract: There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R. o. I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT)
-
公开(公告)号:NZ597790A
公开(公告)日:2013-09-27
申请号:NZ59779010
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , SCHAEDE JOHANNES GEORG , GLOCK STEFAN , GILLICH EUGEN
Abstract: A method and a device for checking the authenticity of security documents are disclosed. The authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features. The digital processing includes performing a decomposition of the sample image by means of wavelet transform of the sample image and extracting classifying features from the decomposition of the sample image and deriving an authenticity rating of the candidate document based on the extracted classifying features. The decomposition of the sample image is based on an incomplete wavelet packet transform of the sample image and includes decomposition of the sample image into a wavelet packet tree comprising at least one approximation node and detail nodes and looking for the detail node within the wavelet packet tree that has the highest information content.
-
公开(公告)号:ZA201200588B
公开(公告)日:2013-05-29
申请号:ZA201200588
申请日:2012-01-24
Applicant: KBA-NOTASYS SA
Inventor: GLOCK STEFAN , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , LOHWEG VOLKER
IPC: G07D20060101 , G06F20060101
Abstract: There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R.o.I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT).
-
25.
公开(公告)号:NZ581538A
公开(公告)日:2012-08-31
申请号:NZ58153808
申请日:2008-06-02
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , GILLICH EUGEN , SCHAEDE JOHANNES
Abstract: Disclosed is a method for checking the authenticity of security documents using characteristic visual features intrinsic to the processes used for producing the security documents. Authentic security documents comprise security features printed, applied or otherwise provided on the security documents. The authentication method is performed by acquiring a sample image of at least one region of interest of the surface of a candidate document to be authorised. The region of interest is selected to encompass at least part of the security features. The sample image is then digitally processed by performing a decomposition of the image into at least one scale sub-space containing high resolution details of the sample image. Classifying features are then extracted from the scale sub-space. These extracted classifying features are used to derive an authenticity rating of the candidate document.
-
26.
公开(公告)号:ES2741773T3
公开(公告)日:2020-02-12
申请号:ES14706112
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN , DÖRKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JÜRG , SCHAEDE JOHANNES
Abstract: Un método de autenticación de documentos de seguridad, especialmente billetes, basado en un análisis de las características intrínsecas de los documentos de seguridad que son producidas por impresión por huecograbado , cuyo análisis implica una descomposición de una o más imágenes de muestra de por lo menos una parte de un documento candidato que se autenticará en base a las ondículas, siendo cada imagen de muestra procesada digitalmente mediante la realización de una transformada de ondícula de la imagen de muestra con el fin de obtener un conjunto de características de clasificación que permite una clasificación del documento candidato dentro de un espacio de características multidimensionales (f), en donde el método se basa en un enfoque de ondícula adaptativo, cuyo enfoque de ondícula adaptativo incluye las siguientes etapas: - antes de realizar la transformada de ondícula, definir un mapa de categorización (mapa C) que contiene la información local sobre diferentes estructuras de línea de huecograbado que se encuentran en los documentos de seguridad; caracterizado por - asignar un grupo de tipos de ondícula al mapa de categorización; - llevar a cabo una selección de ondícula entre un grupo de tipos de ondícula basada en el mapa de categorización (mapa C); y - realizar la transformada de ondícula de la imagen de muestra basada en la ondícula seleccionada; en donde la etapa de definir el mapa de categorización (mapa C) incluye la definición de un modelo estadístico de cada estructura de línea de huecograbado dada, en donde el modelo estadístico consiste en por lo menos un parámetro (k; kH,w, kH,d, kV,w, kV,d) que caracteriza por lo menos un histograma representativo de cada estructura de línea de calcografía dada; en donde el modelo estadístico se construye a partir de las mediciones de una anchura de línea (w) y de una distancia de línea (d) dentro de cada estructura de línea de huecograbado dada, donde el modelo estadístico incluye una cuádrupla de parámetros (kH,w, kH,d, kV,w, kV,d) que caracterizan cuatro histogramas representativos de cada estructura de línea de huecograbado dada, cuyos cuatro histogramas describen respectivamente un histograma de la distribución estadística de las anchuras de línea (w) en una dirección horizontal (H), un histograma de la distribución estadística de las distancias de línea (d) en la dirección horizontal (H), un histograma de la distribución estadística de las anchuras de línea (w) en una dirección vertical (V), y un histograma de la distribución estadística de las distancias de línea (d) en la dirección vertical (V); en donde la etapa de seleccionar un tipo de ondícula incluye generar una imagen de al menos una parte del documento candidato que va ser autenticado mediante una unidad de cámara y dividirla en hasta 360 (30 x 12) subimágenes de un tamaño comprendido entre 96 x 96 a 128 x 128 píxeles con una superposición de un cuarto de imagen en cada orientación, en donde las subimágenes son analizadas respecto a sus anchuras de línea y propiedades de distancias y para cada subimagen se determina una cuádrupla, en donde dependiendo de la cuádrupla es preseleccionado a priori un cierto tipo de ondícula.
-
27.
公开(公告)号:RU2563147C2
公开(公告)日:2015-09-20
申请号:RU2013102449
申请日:2011-06-23
Applicant: KBA NOTASYS SA
Inventor: PETKER DENIS , LOHWEG VOLKER , GILLICH EUGEN , TURKE THOMAS , WILLEKE HARALD HEINRICH , SCHAEDE JOHANNES GEORG
IPC: G06M9/00
Abstract: Изобретениеотноситсяк бесконтактномусчетуплоскихпредметов, вчастностибанкнот. Техническийрезультатзаключаетсяв повышенииточностисчетазасчетиспользованияанизотропнойдиффузии, обеспечивающейсохранениелинейныхструктурв обрабатываемомизображении. Получаютизображение-образецчастистороныстопкиподложек, содержащееинформациюо контрасте, представляющуюкраяподложек, которыепроходятвдольв основномпервогонаправленияв изображении-образце. Обработкаизображениявключаетв себяприменениек поменьшеймереоднойцелевойобласти (20) визображении-образце (10) анизотропнойдиффузиидляполученияобработанногоизображения, содержащегов основномсогласованныйнаборнепрерывныхлиний, представляющихкраяподложек; осуществляютсчетколичествакраевподложекв указанномобработанномизображении. 4 н. и 13 з.п. ф-лы, 4 ил.
-
公开(公告)号:SG11201505645TA
公开(公告)日:2015-08-28
申请号:SG11201505645T
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DÖRKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JÜRG , SCHAEDE JOHANNES GEORG
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps: —prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; —carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and —performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:AU2010283454A1
公开(公告)日:2012-02-23
申请号:AU2010283454
申请日:2010-08-11
Applicant: KBA NOTASYS SA
Inventor: GLOCK STEFAN , GILLICH EUGEN , SCHAEDE JOHANNES GEORG , LOHWEG VOLKER
Abstract: There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R. o. I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT)
-
-
-
-
-
-
-
-