Abstract:
There is described a method for touchless counting of substantially planar substrates, especially banknotes, which are stacked in the form of stacks of substrates, said method comprising the following steps: taking at least one sample image of a portion of a side of a stack of substrates, which sample image contains contrast information representing substrate edges that extend along substantially a first direction in the sample image; processing the contrast information representing the substrate edges within the sample image (10), which processing includes subjecting at least one area of interest (20) within the sample image (10) to anisotropic diffusion to produce a processed image containing a substantially coherent set of continuous lines representing the substrate edges; and counting the number of substrate edges in said processed image.
Abstract:
There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R. o. I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT)
Abstract:
There is described a new coding approach for printed document authentication, one objective of which is to increase the difficulty of copying. In addition, this new coding approach provides better performance compared to other 2D coding technologies under certain constraints. The new coding technique requires less print space in comparison to other coding techniques. This is achieved by optimising some of the features which are used in standard 2D-codes for stabilisation and which are necessary for e.g. mobile applications. Furthermore, the code can be decomposed in elementary units, or "byte-units" which can be widely spread over a text document. Such "byte-units" can in particular be used for integration in text symbols. If a document protected with such a coding is copied, at least some of these symbols will be extensively degraded by the copying process. Therefore, copy detection is intrinsically achieved thanks to the new coding technique.
Abstract:
A method of authenticating security documents and a mobile device, especially a smartphone, programmed to carry out the method, based on an analysis of features which are produced by intaglio printing, which analysis involves a decomposition of sample images of a candidate document to be authenticated based on Wavelets, each sample image being digitally processed by performing a Wavelet transform of the sample image in order to derive a set of classification features. The method is based on an adaptive approach, which includes the following steps : - prior to carrying out the Wavelet transform, defining a categorization map containing local information about different intaglio line structures that are found on the security documents; - carrying out a Wavelet selection amongst a pool of Wavelet types based on the categorization map; and - performing the Wavelet transform of the sample image on the basis of the selected Wavelet.
Abstract:
There is described a sheet inspection system for a sheet-fed recto-verso printing press of the type comprising two printing cylinders (10, 20) for carrying out simultaneous recto-verso printing of the sheets, said sheet inspection system comprising at least one inspection device (200; 300; 400) for taking an image of one side of the printed sheets. The sheet inspection system comprises first and second transfer cylinders (60, 65) interposed between a first (10) of the two printing cylinders (10, 20) and a chain gripper system (5) of the printing press, printed sheets being transferred successively from the first printing cylinder (10) to the first transfer cylinder (60), to the second transfer cylinder (65), and to the chain gripper system (5). The inspection device (200; 300; 400) comprises a line image sensor (210; 310; 410) for performing line-scanning image acquisition of the one side of the printed sheets, this line image sensor (210; 310; 410) visually acquiring an image of a printed sheet while the printed sheet is being transported on the first or second transfer cylinder (60; 65).
Abstract:
There is described a method of detecting security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on security documents, in particular banknotes, which security features (41-49; 30; 10; 51, 52) comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the steps of digitally processing a sample image (c 0 ) of at least one region of interest (R.o.I.) of the surface of a candidate document, which region of interest (R.o.I.) is selected to include at least a portion of said security features (41-49; 30; 10; 51, 52), which digital processing includes performing one or more iterations (N) of a multiresolution analysis (MRA) of the sample image (c 0 ) to extract classifying features (Ã 2 , C, ...) which are characteristic of said security features (41-49; 30; 10; 51, 52).
Abstract:
There is described a new coding approach for printed document authentication, one objective of which is to increase the difficulty of copying. In addition, this new coding approach provides better performance compared to other 2D coding technologies under certain constraints. The new coding technique requires less print space in comparison to other coding techniques. This is achieved by optimizing some of the features which are used in standard 2D-codes for stabilization and which are necessary for e.g. mobile applications. Furthermore, the code can be decomposed in elementary units, or “byte-units” which can be widely spread over a text document. Such “byte-units” can in particular be used for integration in text symbols. If a document protected with such a coding is copied, at least some of these symbols will be extensively degraded by the copying process. Therefore, copy detection is intrinsically achieved thanks to the new coding technique.
Abstract:
There is described a method for checking the authenticity of security documents, in particular banknotes, wherein authentic security documents comprise security features (41-49; 30; 10; 51, 52) printed, applied or otherwise provided on the security documents, which security features comprise characteristic visual features intrinsic to the processes used for producing the security documents. The method comprises the step of digitally processing a sample image of at least one region of interest (R.o.I.) of the surface of a candidate document to be authenticated, which region of interest encompasses at least part of the security features, the digital processing including performing a decomposition of the sample image by means of wavelet transform (WT) of the sample image. Such decomposition of the sample image is based on a wavelet packet transform (WPT) of the sample image, preferably a so-called two-dimensional shift invariant WPT (2D-SIWPT).