G07D7/2008

Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image

A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.

AUTHENTICATION METHOD AND SYSTEM
20220101029 · 2022-03-31 ·

A method for authenticating an object, comprising determining a physical dispersion pattern of a set of elements, determining a physical characteristic of the set of elements which is distinct from a physical characteristic producible by a transfer printing technology, determining a digital code associated with the object defining the physical dispersion pattern, and authenticating the object by verifying a correspondence of the digital code with the physical dispersion pattern, and verifying the physical characteristic.

Authentication method and system

Disclosed are computer-implemented methods, non-transitory computer-readable media, and systems for authentication. One computer-implemented method includes obtaining a first image, where the first image is an image of an identification (ID) document captured when the ID document is tilted at a first angle relative to a projected light source. A second image is obtained, where the second image is an image of the ID document captured when the ID document is tilted at a second angle relative to the projected light source. The ID document is authenticated based on identification of a first illuminated region and a second illuminated region, where the first illuminated region is associated with the first image and the second illuminated region is associated with the second image, and a comparison between a first position of the first illuminated region and a second position of the second illuminated region.

Method, system and computer program for comparing images
11120250 · 2021-09-14 · ·

A method of determining whether a user of a mobile device corresponds to a previously authenticated user. The method comprises: acquiring a first image from the identity document, the first image being a photographic image and or a digital image; causing a camera connected to or integral with the mobile device to capture a second image, the second image corresponding to a user of the mobile device; comparing data indicative of the first image and data indicative of the second image, whereby to determine whether the first image and the second image represent the same user; and responsive to determining that the first image and the second image represent the same user, forming an association between the previously authenticated user and the mobile device.

Method for Producing Security Elements in an Image Which are not Visible to the Human Eye and Cannot be Copied, and Printed Image
20210245542 · 2021-08-12 ·

A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.

Method for Checking the Authenticity of Products and Printed Image
20210248369 · 2021-08-12 ·

A method for checking the authenticity of products, by checking an image (A) of a product. The proof of authenticity is not visible to the human eye and cannot be copied. This is characterized in that a code stored in a halftone image by manipulation of dots and/or a manipulated field bounded in the halftone image can be read by means of an optical device and compared with a retrievable value in at least one database. In at least one field (F1 to F5) a part of a serial number is determined which describes the structure of the serial number and a hash function used for transmitting the serial number to the database, and this is also characterized in that the serial number is subsequently assembled and encrypted with the corresponding hash function.

APPARATUS AND METHODS FOR COMPUTERIZED AUTHENTICATION OF ELECTRONIC DOCUMENTS
20210152707 · 2021-05-20 · ·

A computerized method for authenticating documents having VIZ sections, the method comprising capturing an image of a document to be authenticated from a scanner and enhancing the captured image, and using a processor for identifying and cropping a VIZ section in the image.

Currency classification device and currency classification method

A currency classification device that classifies currency types using currency images includes a feature value calculator, a storage, and an output unit. The feature value calculator calculates feature values for every currency type that is a candidate for classification from an image area common in images of every currency type. The storage stores the feature values calculated by the feature value calculator from learning images, which are currency models, as templates for every currency type. The output unit outputs the currency type corresponding to the template having a highest value of similarity with the feature value calculated by the feature value calculator an input image, which is a currency image subject to classification, in the templates stored in the storage as a classification result.

Method and device for checking a value document
11004293 · 2021-05-11 · ·

A method for testing a valuable document including illuminating the valuable document line by line such that a first group of lines is illuminated with light of a first wavelength and a second group of lines is illuminated with light of a second wavelength, reflection light that is reflected from the lines and/or transmission light that passes through the lines. First data are representative of the reflection light and/or transmission light assigned to the lines of the first group and second data are representative of the reflection light and/or transmission light assigned to the lines of the second group. Further, processing the first data such that a first image generated from the first data has a first resolution, and the second data such that a further image generated from the second data has a second resolution, comparing the first and second images with first and further reference images.

Embedded variable line patterns for images

In some implementations, a system is capable of generating identifications that include distinctive line patterns corresponding to different portions of secure customer information. Data indicating an input image, and a dithering matrix representing a two-dimensional array of pixel values is obtained. Pixel values of pixels included in the input image are transformed using the dithering matrix. For each pixel within the input image, the transformation includes identifying a particular pixel value within the dithering matrix that represents a particular pixel within the input image, and adjusting an intensity value of the particular pixel based on attributes of the dithering matrix. A transformed image is generated based on the transformation and then provided for output.