G07D7/206

Evaluating Currency in Areas Using Image Processing
20200342704 · 2020-10-29 ·

A system evaluates currency in an area using image processing. In some examples, the system receives an image of an area from an image sensor, processes the image to identify at least one item of currency in the area, determine a value of the currency irrespective of validity, and counts the currency. In various examples, the system receives an image of an area from an image sensor; processes the image to identify at least one item of currency in the area; determines whether the currency has an error condition; and when the currency is determined to have the error condition, provides output on the error condition. In a number of examples, the system receives an image of an area from an image sensor; processes the image to identify at least one item of currency in the area; determines whether the currency is valid; and when the currency is determined to be suspect, provides output on the currency.

BANKNOTE MANAGEMENT METHOD AND SYSTEM

Provided in the present invention is a banknote management method. The method comprises: acquiring, identifying, and processing banknote features by a banknote information processing apparatus, so as to obtain banknote feature information; transmitting the banknote feature information, service information, and information about the banknote information processing apparatus together to a main control server; and the main control server processing the received information and classifying banknotes. Also provided is a banknote management system for the banknote management method. The method of the present invention can enhance robustness of identification while maintaining an operation speed, thus ensuring accuracy and practicability in actual applications.

BANKNOTE MANAGEMENT METHOD AND SYSTEM

Provided in the present invention is a banknote management method. The method comprises: acquiring, identifying, and processing banknote features by a banknote information processing apparatus, so as to obtain banknote feature information; transmitting the banknote feature information, service information, and information about the banknote information processing apparatus together to a main control server; and the main control server processing the received information and classifying banknotes. Also provided is a banknote management system for the banknote management method. The method of the present invention can enhance robustness of identification while maintaining an operation speed, thus ensuring accuracy and practicability in actual applications.

Abnormality detection for periodic patterns

Methods, apparatuses, and systems for image-based abnormality detection for periodic patterns are provided. The method includes receiving an image pattern T determined from an inspection image, wherein T comprises multiple periodic segments along a spatial direction; determining, by a processor, a first reference pattern R1 by rearranging the multiple periodic segments of T in a first manner and a second reference pattern R2 by rearranging the multiple periodic segments of T in a second manner; determining whether an abnormality exists in T by comparing a part of T with a part of R1 and a part of R2; and determining that the abnormality exists in T based on a determination that the part of T is different from the part of R1 and the part of R2.

Abnormality detection for periodic patterns

Methods, apparatuses, and systems for image-based abnormality detection for periodic patterns are provided. The method includes receiving an image pattern T determined from an inspection image, wherein T comprises multiple periodic segments along a spatial direction; determining, by a processor, a first reference pattern R1 by rearranging the multiple periodic segments of T in a first manner and a second reference pattern R2 by rearranging the multiple periodic segments of T in a second manner; determining whether an abnormality exists in T by comparing a part of T with a part of R1 and a part of R2; and determining that the abnormality exists in T based on a determination that the part of T is different from the part of R1 and the part of R2.

Document verification system, device, and method using a classification model

Disclosed in the application are document verification and identity verification methods and devices. A computer-implemented document verification method comprises: obtaining an image of a to-be-verified document; and verifying whether an anti-counterfeiting identifier exists in the image; verifying a source of the image; and obtaining a verification result for the to-be-verified document based on the verification of the anti-counterfeiting identifier and the verification of the source of the image. A computer-implemented identity verification method comprises: obtaining an image of an identity document of a to-be-verified user; obtaining a first verification result for the identity document based on the image of the identity document; verifying authenticity of identity information in the image of the identify document to obtain a second verification result; and determining an identity verification result for the to-be-verified user based on the first verification result and the second verification result.

Digital watermarking and signal encoding with activable compositions

The present disclosure relates to signal processing such as digital watermarking and other encoded signals. One claim recites a method of offsetting color casting for a printed object associated with a retail product. The method includes: providing a first additive that absorbs light energy at or around a center wavelength of an illumination source; providing a second additive that absorbs in the ultra-violet spectrum, yet fluoresces at or around the center wavelength of the illumination source, wherein a combination of spectral responses of the first additive and the second additive offset color casting; printing the first additive, second additive and a color on the printed object, wherein the printing conveys an encoded plural bit signal. Of course, other claims and combinations are provided in the specification with reference to specific implementations and related examples.

SYSTEMS AND METHODS FOR DETECTION OF COUNTERFEIT DOCUMENTS

A method of detecting a counterfeit item using a contactless scanner includes contactlessly scanning at least a portion of an item to generate a scanned image of the at least a portion of the item, wherein the at least a portion of the item comprises a graphic, identifying elements in the scanned image that correspond to elements in the graphic, measuring the identified elements to generate a plurality of element measurements, determining whether the item is counterfeit based on a comparison between at least one element measurement of the plurality of element measurements and at least one reference element measurement that is associated with an authentic version of the item, and in response to determining that the item is counterfeit, generating an alert indicating a detection of a counterfeit item.

Biometric authentication for paper-based transactions

Apparatus and methods for protecting biometric authentication information associated with a paper document are provided. A mobile device application may pre-associate the document with a biometric input. The mobile device application may generate a first composite hash value based on a combination of a numerical representation of a first image of the paper document and a numerical representation of a first biometric input. Subsequently, an authentication server may generate a second composite hash value based on a combination of a numerical representation of a second image of the paper document and a numerical representation of a second biometric input. The authentication server may determine whether an edit distance separating the second composite hash value and the first composite hash value is less than a threshold distance. If the edit distance is less than a threshold distance, the paper document may be authenticated.

Biometric authentication for paper-based transactions

Apparatus and methods for protecting biometric authentication information associated with a paper document are provided. A mobile device application may pre-associate the document with a biometric input. The mobile device application may generate a first composite hash value based on a combination of a numerical representation of a first image of the paper document and a numerical representation of a first biometric input. Subsequently, an authentication server may generate a second composite hash value based on a combination of a numerical representation of a second image of the paper document and a numerical representation of a second biometric input. The authentication server may determine whether an edit distance separating the second composite hash value and the first composite hash value is less than a threshold distance. If the edit distance is less than a threshold distance, the paper document may be authenticated.