G07D7/202

BANKNOTE CLASSIFICATION AND IDENTIFICATION METHOD AND DEVICE BASED ON LAB COLOR SPACE

A method and a device for banknote classification and recognition based on a Lab color space are provided for improving the denomination recognition rate. The method includes obtaining an RGB image of a banknote to be detected; calculating gray values Gray R, Gray G and Gray B of the RGB image in red (R), green (G) and blue (B) wavebands; converting the gray values Gray R, Gray G and Gray B into gray values Gray a and Gray b in the Lab color space; and substituting a product of Gray a and Gray b and a difference between the absolute value of Gray a and the absolute value of Gray b into preset formulas to determine a category of the banknote to be detected.

VALUABLE DOCUMENT HAVING A SUBSTRATE ELEMENT AND A FOIL ELEMENT, AND METHOD FOR CLASSIFYING A VALUABLE DOCUMENT
20230226841 · 2023-07-20 ·

A value document with a carrier element and a foil element arranged in a partial region of the carrier element. The carrier element has, at least in the partial region, a luminescence marker which is adapted to give off luminescence radiation which has at least a first wavelength and a second wavelength in each case in the infrared spectral region. The foil element has a reflection layer and a spectral selection layer. The selection layer is arranged between the carrier element and the reflection layer. The reflection layer is configured to reflect infrared radiation and the selection layer is configured to spectrally selectively inhibit transmission of infrared radiation. The inhibition of the transmission of the first wavelength and the inhibition of the transmission of the second wavelength differ by at least 10%.

Reproducing hash values from printed documents to validate with a blockchain
11550959 · 2023-01-10 ·

A system and method are disclosed for rendering printed documents tamper evident. Examples render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Examples enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Examples can use a document's prior registration date in a blockchain to establish a no-later than date-of-existence for that document. Examples can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Examples can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.

Reproducing hash values from printed documents to validate with a blockchain
11550959 · 2023-01-10 ·

A system and method are disclosed for rendering printed documents tamper evident. Examples render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Examples enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Examples can use a document's prior registration date in a blockchain to establish a no-later than date-of-existence for that document. Examples can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Examples can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.

Banknote imaging
11544985 · 2023-01-03 · ·

A method of obtaining a plurality of infrared images of a banknote that involves simultaneously illuminating the banknote with infrared light at a first wavelength and infrared light at a second wavelength, capturing an image of the banknote with an RGB camera, obtaining from both a first output channel signal and a second output channel signal of the RGB camera sensor where the intensity distribution of the infrared light at the first wavelength and the intensity distribution of the infrared light at the second wavelength uses a first calibration coefficient and a second calibration coefficient of the RGB camera sensor, producing separate infrared images of the banknote at the first wavelength and the second wavelength from the respective intensity distributions.

COMPUTER-IMPLEMENTED METHOD FOR COPY PROTECTION, DATA PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT
20220415111 · 2022-12-29 ·

A computer-implemented method for preventing unauthorized processing of a digital representation of at least a portion of a document, a device for data processing, and a computer program product are provided, wherein in particular the document is a banknote. The method comprises providing data, wherein the data is based on the digital representation of at least a portion of a test element. The digital representation may be an image file corresponding to the at least one portion of the test element. The method also involves analyzing the data with regard to data representing at least one characterizing feature of the at least one portion of the document. The method further comprises activating prohibiting means if the data being based on the digital representation of the at least one portion of the test element is similar to the data representing the at least one characterizing feature. The prohibiting means prohibit the data being based on the digital representation of the at least one portion of the test element to be further processed, in particular comprising copying and/or transmitting and/or printing and/or reproducing the data. Alternatively, the prohibiting means amend the data such that the data is prevented from being transmitted and/or printed and/or reproduced and/or further amended by data processing devices.

COMPUTER-IMPLEMENTED METHOD FOR COPY PROTECTION, DATA PROCESSING DEVICE AND COMPUTER PROGRAM PRODUCT
20220415111 · 2022-12-29 ·

A computer-implemented method for preventing unauthorized processing of a digital representation of at least a portion of a document, a device for data processing, and a computer program product are provided, wherein in particular the document is a banknote. The method comprises providing data, wherein the data is based on the digital representation of at least a portion of a test element. The digital representation may be an image file corresponding to the at least one portion of the test element. The method also involves analyzing the data with regard to data representing at least one characterizing feature of the at least one portion of the document. The method further comprises activating prohibiting means if the data being based on the digital representation of the at least one portion of the test element is similar to the data representing the at least one characterizing feature. The prohibiting means prohibit the data being based on the digital representation of the at least one portion of the test element to be further processed, in particular comprising copying and/or transmitting and/or printing and/or reproducing the data. Alternatively, the prohibiting means amend the data such that the data is prevented from being transmitted and/or printed and/or reproduced and/or further amended by data processing devices.

Method of enrolling data to control an identity, and identity-control method

The present invention comprises an enrolment method comprising steps of: acquisition (100) of an image showing a photograph itself showing an individual, extraction (102), from the image of a characteristic of the image other than a biometric model, obtaining (104) personal data of the individual other than by the image-processing algorithm, generation (106) of a reference datum (W) from the characteristic of the image and the obtained personal data, calculation (108) of an encoded datum (s) by application of an encoding procedure to the reference datum (W) and to a random datum (c), calculation (110) of a hash (h(c) of the random datum, storage (112) in a database of the datum encoded (s) in association with the hash. The invention also comprises an identity-control method using such stored data.

Machine-readable polymer security threads
11501593 · 2022-11-15 · ·

A method and associated system for authentication, including irradiating an item including a polymer security thread including a polymer material and a doping material within the polymer material and configured to produce a radiation spectrum in response to the irradiating, the doping material capable of absorbing, scattering, or emitting radiation, and detecting the produced radiation spectrum to confirm the presence of the polymer security thread.

DOCUMENT AUTHENTICATION
20220358806 · 2022-11-10 ·

Disclosed herein is a method comprising: exposing a document to radiation; capturing a first image with a portion of the radiation that has transmitted through the document, with a first characteristic X-ray emitted from the document caused by the radiation, or with both, using a radiation detector; determining a pattern from the first image; determining authenticity of the document based on the pattern.