-
公开(公告)号:AU2014210743B2
公开(公告)日:2017-03-09
申请号:AU2014210743
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:CA2899868A1
公开(公告)日:2014-08-07
申请号:CA2899868
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:CA2899868C
公开(公告)日:2019-12-31
申请号:CA2899868
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
IPC: G07D7/20
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
公开(公告)号:AU2014210743A1
公开(公告)日:2015-07-30
申请号:AU2014210743
申请日:2014-02-04
Applicant: KBA NOTASYS SA
Inventor: LOHWEG VOLKER , HOFFMANN JAN LEIF , DORKSEN HELENE , HILDEBRAND ROLAND , GILLICH EUGEN , HOFMANN JURG , SCHAEDE JOHANNES GEORG
Abstract: A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
-
-
-