METHOD OF GENERATING A SECURE IMAGE
20220272225 · 2022-08-25
Inventors
Cpc classification
H04N1/4055
ELECTRICITY
H04N1/4057
ELECTRICITY
International classification
H04N1/32
ELECTRICITY
Abstract
A secure image for a security document is generated by performing a rasterization process for each of a plurality of mono-color base images using a plurality of different threshold functions. For each base image, the plurality of threshold functions cover different intensity regions and result in a complex rasterization pattern depending on the intensity of the input image. The resulting binary images obtained by the rasterization process are combined using offset printing with fluorescent inks of different colors, to result in a multi-color fluorescent output image including a plurality of different complex rasterization patterns.
Claims
1-15. (canceled)
16. A non-transitory computer readable medium comprising executable code, that when executed by one or more processors, causes the one or more processors to: separate a multi-color input image comprising a plurality of pixels into a plurality of mono-color base images, each pixel in each base image having an intensity value I(x, y) between a minimum intensity value I.sub.min and a maximum intensity value I.sub.max; for each base image: divide the base image into a plurality of cells; provide at least two two-dimensional threshold functions T.sub.1(x, y), T.sub.2(x, y), . . . , T.sub.n(x, y) for each cell, wherein the threshold functions do not intersect each other and define a plurality of intervals between I.sub.max and I.sub.min; and generate a binary image by, for each cell: comparing the intensity value I(x, y) of each pixel to the at least two threshold functions to determine an interval including the intensity value of the pixel; and setting the intensity value of each pixel to one of a first value or a second value associated with the interval, the first value and the second value being alternatingly associated with adjacent intervals; and generate the secure image by combining all the binary images generated for all the base images.
17. The non-transitory computer readable medium of claim 16, wherein setting the intensity value of each pixel comprises: setting the intensity value of each pixel to the first value when I(x, y)≥T.sub.1(x, y); setting the intensity value of each pixel to the second value when T.sub.2(x, y)≤I(x, y)<T.sub.1(x, y); and setting the intensity value of each pixel to the first value when I(x, y)<T.sub.2(x, y).
18. The non-transitory computer readable medium of claim 16, wherein three two-dimensional threshold functions T.sub.1(x, y), T.sub.2(x, y), and T.sub.3(x, y) are provided, and setting the intensity value of each pixel comprises: setting the intensity value of each pixel to the first value when I(x, y)≥T.sub.1(x, y); setting the intensity value of each pixel to the second value when T.sub.2(x, y)≤I(x, y)<T.sub.1(x, y); and setting the intensity value of each pixel to the first value when T.sub.3(x, y)≤I(x, y)<T.sub.2(x, y).
19. The non-transitory computer readable medium of claim 18, wherein setting the intensity value of each pixel further comprises setting the intensity value of each pixel to the second value when I(x, y)<T.sub.3(x, y).
20. The non-transitory computer readable medium of claim 16, wherein, in a three-dimensional plot of the plurality of two-dimensional threshold functions, a distance between adjacent two-dimensional threshold functions in a direction perpendicular to the z-axis becomes larger as z becomes smaller.
21. The non-transitory computer readable medium of claim 16, wherein the at least two two-dimensional threshold functions are the same for each cell of a given base image.
22. The non-transitory computer readable medium of claim 16, wherein the at least two two-dimensional threshold functions are different for different cells of a given base image.
23. The non-transitory computer readable medium of claim 16, wherein the at least two two-dimensional threshold functions are different for each of the base images.
24. The non-transitory computer readable medium of claim 16, wherein a number of two-dimensional threshold functions used for different base images is different.
25. The non-transitory computer readable medium of claim 16, wherein at least one of: the at least two two-dimensional threshold functions are symmetric with respect to a center of each cell, or the at least two two-dimensional threshold functions each include a plurality of local maxima at same positions.
26. The non-transitory computer readable medium of claim 16, wherein the executable code, when executed by the one or more processors, causes the one or more processors to further form the mono-color base images by inverting base component images of the multi-color input image.
27. The non-transitory computer readable medium of claim 16, wherein the first value is 1 and the second value is 0.
28. The non-transitory computer readable medium of claim 16, wherein generating the secure image comprises printing the binary images superimposed on each other.
29. The non-transitory computer readable medium of claim 28, wherein printing the binary images superimposed on each other comprises printing the binary images by offset printing using different fluorescent inks respectively associated with the binary images.
30. A method of generating a secure image for a security document, the method comprising: separating a multi-color input image comprising a plurality of pixels into a plurality of mono-color base images, each pixel in each base image having an intensity value I(x, y) between a minimum intensity value I.sub.min and a maximum intensity value I.sub.max; for each base image: dividing the base image into a plurality of cells; providing at least two two-dimensional threshold functions T.sub.1(x, y), T.sub.2(x, y), . . . , T.sub.n(x, y) for each cell, wherein the threshold functions do not intersect each other and define a plurality of intervals between I.sub.max and I.sub.min; and generating a binary image by, for each cell: comparing the intensity value I(x, y) of each pixel to the at least two threshold functions to determine an interval including the intensity value of the pixel; and setting the intensity value of each pixel to one of a first value or a second value associated with the interval, the first value and the second value being alternatingly associated with adjacent intervals; and generating the secure image by combining all the binary images generated for all the base images.
31. The method of claim 30, wherein, in a three-dimensional plot of the plurality of two-dimensional threshold functions, a distance between adjacent two-dimensional threshold functions in a direction perpendicular to the z-axis becomes larger as z becomes smaller.
32. The method of claim 30, wherein the at least two two-dimensional threshold functions are different for each of the base images.
33. The method of claim 30, wherein the first value is 1 and the second value is 0.
34. A security document comprising a security image generated by a method comprising: separating a multi-color input image comprising a plurality of pixels into a plurality of mono-color base images, each pixel in each base image having an intensity value I(x, y) between a minimum intensity value I.sub.min and a maximum intensity value I.sub.max; for each base image: dividing the base image into a plurality of cells; providing at least two two-dimensional threshold functions T.sub.1(x, y), T.sub.2(x, y), . . . , T.sub.n(x, y) for each cell, wherein the threshold functions do not intersect each other and define a plurality of intervals between I.sub.max and I.sub.min; and generating a binary image by, for each cell: comparing the intensity value I(x, y) of each pixel to the at least two threshold functions to determine an interval including the intensity value of the pixel; and setting the intensity value of each pixel to one of a first value or a second value associated with the interval, the first value and the second value being alternatingly associated with adjacent intervals; and generating the secure image by combining all the binary images generated for all the base images.
35. The security document of claim 34, wherein the security document is an ID card or a passport.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
DETAILED DESCRIPTION
[0020] The following is a detailed description of exemplary embodiments of the present disclosure. The exemplary embodiments described herein are intended to teach the principles of the present disclosure, enabling those of ordinary skill in the art to implement and use the present disclosure in many different environments and for many different applications. Therefore, the exemplary embodiments are not intended to be, and should not be considered as, a limiting description of the scope of protection. Rather, the scope of protection shall be defined by the appended claims.
[0021] The present disclosure is based at least in part on the realization that a secure rasterization process suitable for offset printing and for relatively small images used in passport and ID card applications can be obtained by separating a fluorescent color image into mono-color base images, each of which is subjected to a rasterization process using at least two threshold functions. The threshold functions are applied to the original image in such a way that the original image gets first separated into channels representing the base colors. Advantageously, each channel gets inverted, and each inverted channel gets transferred into a binary image by means of the at least two non-identical threshold functions. The three resulting binary images can be printed on top of each other using fluorescent inks, for example, red, green and blue, resulting in a fluorescent color image which consists of a varying ornamental pattern and comprises a large number of different ornaments.
[0022] Further, it has been realized that, by using different threshold functions for different channels, a plurality of different, complex rasterization patterns can be obtained, which are present in the combined image. This makes it even harder to reproduce the rasterization pattern of the color image.
[0023] In addition, it has been realized that, by using at least two non-identical threshold functions, gradients of the input image can be reflected within one cell of the output rasterization. Therefore, the representation of details does not require a large number of cells, which supports images with relatively small dimensions, as is the case in ID card and passport applications. In particular, by using additional thresholds, the maximum gradient is not limited by the size of the raster cell, but remains relatively independent from the cell size.
[0024] The present disclosure is further based on the realization that, by using a plurality of threshold functions that are nested within each other, different intensity ranges can be addressed. For example, a first threshold function covers the full intensity range, while additional threshold functions cover smaller portions of the intensity range. As a result, the rasterization patterns specific to the individual threshold functions become effective only in their respective intensity ranges. This results in raster images, which show different raster shapes in different intensity ranges. Without having knowledge of the different threshold functions used to generate the image, it is highly difficult, if not impossible, to reproduce the different raster shapes. This greatly increases the security of the image.
[0025] In addition, it has been realized that, in order to avoid in image inversion, the distance between adjacent threshold functions should become larger the lower the intensity. This can be achieved, for example, by the outer threshold functions (covering the larger intensity ranges) have smaller gradients than the inner threshold functions covering the lower intensity regions.
[0026] An exemplary method of generating a secure image for a security document will be described in the following with reference to the drawings.
[0027]
[0028] In some embodiments, as shown in
[0029] In the next step of the process, each of the mono-color base images 14, 15, 17 is subjected to a rasterization process, which will be described in the following in an exemplary manner for the red base image 14.
[0030]
[0031] For each cell 16, a plurality of two-dimensional threshold functions T.sub.1(x, y), T.sub.2(x, y), . . . , T.sub.n(x, y) are provided. The threshold functions do not intersect each other, and they define a plurality of intervals between I.sub.max and I.sub.min. This is described in the following with respect to
[0032]
[0033]
[0034] Subsequently, the position of each pixel in cell 16 is determined, and the intensity value of said pixel is compared to the respective threshold functions to determine the interval in which it is included. Based on the determined interval, one of a first value and a second value is associated with the pixel as its new intensity value. In the example shown in
[0035] It will also be appreciated that the example with two threshold functions is not limiting, and any arbitrary number of threshold functions that do not intersect each other and define a plurality of intervals between I.sub.max and I.sub.min can be used. For example,
[0036] It will be appreciated that, although this is not shown in
[0037] In the example shown in
[0038] In another way of describing the method of the present application, in case two threshold functions are used, as in
[0039] Likewise, in the example where three or more threshold functions are used, the binary image 18 is generated by setting the intensity value of each pixel to the first value when I(x, y)≥T.sub.1(x, y), setting the intensity value of each pixel to the second value when T.sub.2(x, y)≤I(x, y)≤T.sub.1(x, y), and setting the intensity value of each pixel to the first value when T.sub.3(x, y)≤I(x, y)<T.sub.2(x, y). In case no further threshold functions are present, the intensity value of each pixel is set to the second value when I(x, y)<T.sub.3(x, y). This corresponds to the case that is shown in
[0040] It will be appreciated that the threshold functions shown in
[0041] The above process is repeated for the remaining mono-color base image 15 and 17, i.e., the green and blue components. In this respect, it is advantageous that the at least two two-dimensional threshold functions that are used for each base image are different from each other. In this manner, a different rasterization pattern can be generated for each color component. In other words, the binary images 18 obtained on the basis of the mono-color base images 15 and 17 can show a rasterization pattern that is different from the pattern that is shown in
[0042] After the binary images 18 have been obtained for all three base images 14, 15, 17, a secure image 10 can be generated by combining the binary images 18. Here, it will be appreciated that the color information associated with each binary image 18 will be used. An exemplary secure image 10 is shown, for example, in
[0043] In the above example, the at least two two-dimensional threshold functions are the same for each cell 18 of a given base image 14, 15, 17. However, in other embodiments, it is also contemplated that the at least two two-dimensional threshold functions are different for different cells 18 of a given base image. For example, a cell pattern could be used, and different threshold functions could be used for different cells of such a pattern (for example, a checkerboard pattern or the like). This can further increase the number of different rasterizations included in the output image.
[0044] Further, although it has been described that the threshold functions are different for each of the base images 14, 15, 17, in other embodiments, identical threshold functions could be used for two or more of the base images 14, 15, 17. Of course, this will result in a decreased security of the output image 10.
[0045] In other examples, the number of two-dimensional threshold functions used for different base images may be different. This also may allow for a further customization of the resulting rasterization patterns.
[0046] Although in the examples shown above, the threshold functions are symmetric with respect to a center of each cell 16, it will be understood that, in other embodiments, threshold functions that are not symmetric could be used. For example, a two-dimensional sawtooth function or the like could also be used.
[0047] In some embodiments, the binary images 18 are printed superimposed on each other by offset printing. In particular, the printing can be performed using different fluorescent inks respectively associated with the binary images 18. For example, a red, a green, and a blue fluorescent ink can be used.
INDUSTRIAL APPLICABILITY
[0048] As described above, with the teachings described herein, a secure image 10 for a security document such as a passport or an ID card can be generated, which allows for a complex rasterization pattern, more particularly, a plurality of complex rasterization patterns included in the secure image, which are difficult to recreate.
[0049] An exemplary method for forming the secure image 10 is described with respect to the flow chart shown in
[0050] In step 110, a multi-color input image 1 is separated into a plurality of base component images 4, 5, 7, as shown in
[0051] In step 112, the plurality of base component images 4, 5, 7 are inverted, to obtain the plurality of mono-color base images 14, 15, 17 shown in
[0052] In steps 114, 116 and 118, a plurality of threshold functions are applied to each mono-color base image. As shown in
[0053] In step 120, the three binary images 18 are combined, in particular, by offset printing the same using fluorescent inks of corresponding colors. At the end of the process, the secure image 10 shown in
[0054] It will be appreciated that the foregoing description provides examples of the disclosed systems and methods. However, it is contemplated that other implementations of the disclosure may differ in detail from the foregoing examples. All references to the disclosure or examples thereof are intended to reference the particular example being discussed at that point and are not intended to imply any limitation as to the general disclosure.
[0055] Recitation of ranges of values herein are merely intended to serve as a shorthand method for referring individually to each separate value falling within the range, unless otherwise indicated herein, and each separate value is incorporated into the specification as if it were individually recited herein. All method steps described herein can be performed in any suitable order, unless otherwise indicated or clearly contradicted by the context.
[0056] Although the preferred embodiments of the present disclosure have been described herein, improvements and modifications may be incorporated without departing from the scope of the following claims.