Method for the insertion of guilloche patterns, method for the extraction of guilloche patterns, method for the authentication of these guilloche patterns and devices for implementation
11065905 · 2021-07-20
Assignee
Inventors
- Joseph Leibenguth (Meudon, FR)
- Michel Jourlin (Meudon, FR)
- Maxime Carré (Meudon, FR)
- Mohamed Bouabdellah (Meudon, FR)
Cpc classification
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
International classification
B42D25/305
PERFORMING OPERATIONS; TRANSPORTING
Abstract
A method of inserting guilloche patterns in a document, each guilloche pattern being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure using an operation of determining an insertion intensity of each guilloche pattern previously generated on the basis of a mid-gray level of the document near said guilloche pattern. A device for implementing this insertion method. The method further provides for extracting guilloche patterns from a secure document likely to be degraded by determining a contrast card of at least one portion of the secure document that includes the guilloche patterns, identifying, on this contrast card an optimal percolation trajectory, and extracting the optimal percolation trajectory, said trajectory corresponding to the guilloche pattern. The method further provides for authentication of the guilloche patterns of a secure document likely to be degraded, by the extraction operations, and comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.
Claims
1. A method of inserting guilloche patterns in a document, each guilloche pattern consisting of a plurality of pixels and being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure, the method comprising: determining an insertion intensity of each guilloche pattern previously generated based on a mid-gray level of the document adjacent to said guilloche pattern and the insertion intensity of said guilloche pattern comprises a contrast value and a thickness of said guilloche pattern, the determination comprising calculating, in each pixel of said guilloche pattern, the contrast value between an internal area of the guilloche pattern and an external area adjacent to said internal area.
2. The method of inserting guilloche patterns according to claim 1, wherein the contrast value is obtained by comparing the mid-gray level of the internal area and the mid-gray area of the external area.
3. The method of inserting guilloche patterns according to claim 2, wherein the comparison between the mid-gray level of the internal area and the mid-gray level of the external area is achieved by logarithmic image processing.
4. The method of inserting guilloche patterns according claim 1, wherein determining the insertion intensity of the guilloche pattern comprises selecting a thickness of the guilloche pattern.
5. The method of inserting guilloche patterns according to claim 1, wherein the external area is an area of pixels adjacent to the internal area.
6. The method of inserting guilloche patterns according to claim 1, wherein the guilloche pattern is a sinusoidal pattern, affixed substantially horizontally to the document, the external area being positioned vertical to the pixel of the guilloche pattern.
7. The method of inserting guilloche patterns according to claim 1, wherein the guilloche pattern is a series of pixels located on curves corresponding to a digital fingerprint, the internal and external areas being positioned along a normal to the curve at the pixel in question.
8. A device for inserting guilloche patterns into a document, comprising: a computer containing a set of instructions that prompt said computer to implement a method for inserting guilloche patterns in a document, each guilloche pattern consisting of a plurality of pixels and being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure, by determining an insertion intensity of each guilloche pattern previously generated based on a mid-gray level of the document adjacent to said guilloche pattern and in that the insertion intensity of said guilloche pattern involves a contrast value and a thickness of said guilloche pattern calculating, in each pixel of said guilloche pattern, the contrast value between an internal area of the guilloche pattern and an external area adjacent said internal area.
9. A secure document onto which are affixed guilloche patterns encoding alphanumeric data, wherein the guilloche patterns are inserted into the document by a method for inserting guilloche patterns in a document, each guilloche pattern consisting of a plurality of pixels and being capable of encoding variable alphanumeric data ensuring a different aspect at each guilloche pattern so as to render said document secure, by determining an insertion intensity of each guilloche pattern previously generated based on a mid-gray level of the document adjacent to said guilloche pattern and the insertion intensity of said guilloche pattern comprises a contrast value and a thickness of said guilloche pattern, said determination comprises calculating, in each pixel of said guilloche pattern, the contrast value between an internal area of the guilloche pattern and an external area adjacent said internal area.
10. The secure document of claim 9 wherein the secure document is an identity document.
11. A method for extracting guilloche patterns from a secure document prone to be degraded, the method comprising: determining a contrast card of at least one portion of the secure document that includes the guilloche patterns; identifying, on this contrast card an optimal percolation trajectory; and extracting the optimal percolation trajectory, said optimal percolation trajectory is deemed to correspond to the guilloche patterns.
12. The method for extracting guilloche patterns according to claim 11, wherein the contrast card is created by means of a logarithmic image processing model.
13. The method for extracting guilloche patterns according to claim 11, wherein the operation of identifying the optimal percolation trajectory further involves: identifying, on the contrast card, all trajectories likely to pass across the secure document in order to connect a point of departure of a guilloche pattern to a point of arrival of said pattern; determining a contrast at each point of each said all trajectories; determining a cost function of each of said all trajectories, said cost function assessing a variability of the contrast between the contrast determined at each point of each said trajectory and an expected contrast at each said point of said trajectory; comparing the cost functions of all of the trajectories; and extracting a guilloche pattern by determining which of said all trajectories has the minimal cost function, the trajectory having the minimal cost function deemed to correspond to the guilloche pattern.
14. The method for extracting guilloche patterns according to any of claim 11, wherein when the secure document is in color, the contrast card is calculated based on a luminance image associated with the color document.
15. The method of extracting guilloche patterns, according to claim 11, further comprising: authenticating the guilloche patterns of the secure document prone to be degraded by comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.
16. The method of extracting guilloche patterns according to claim 15, wherein each guilloche pattern encodes variable alphanumeric data mentioned in said secure document, wherein the theoretical guilloche pattern is obtained by optical character recognition of the alphanumeric data mentioned in the secure document and by generating the corresponding theoretical patterns.
17. The method of extracting guilloche patterns according to claim 15, wherein the secure document comprises an electronic chip, wherein the theoretical guilloche pattern is an original guilloche pattern, previously stored in the chip when generating the guilloche pattern affixed to the secure document.
18. The method of extracting guilloche patterns according to any of claim 15, wherein the operation of comparing the extracted and theoretical patterns involves estimating a score based on a distance between each point of the extracted guilloche pattern and a corresponding point of the theoretical guilloche pattern.
19. The method of extracting guilloche patterns according to claim 18, wherein the score is calculated by accumulating the distances for all of the points of the guilloche pattern.
20. The method of extracting guilloche patterns according to claim 18, wherein the distance between each point of the extracted guilloche pattern and the corresponding point of the theoretical guilloche pattern is calculated as the number of pixels between each point of the extracted guilloche pattern and the corresponding point of the theoretical guilloche pattern.
21. The method of extracting guilloche patterns according to claim 18, wherein a weight is assigned to each distance, depending on the length of the each distance.
22. The method of extracting guilloche patterns according to claim 21, wherein the weight assigned to each distance can be adjusted.
23. A computer containing a set of instructions that prompt said computer to implement a method for authenticating guilloche patterns of a secure document prone to be degraded by: determining a contrast card of at least one portion of the secure document that includes the guilloche patterns; identifying, on this contrast card an optimal percolation trajectory; extracting the optimal percolation trajectory, said trajectory corresponding to the guilloche pattern; and authenticating the guilloche patterns of the secure document prone to be degraded by comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.
24. An identity document comprising alphanumeric data relating to a holder associated with the identity document and an identity photograph to which are affixed guilloche patterns encoding the alphanumeric data, wherein the guilloche patterns can be authenticated by determining a contrast card of at least one portion of the secure document that includes the guilloche patterns; identifying, on this contrast card an optimal percolation trajectory; extracting optimal percolation trajectory, said trajectory corresponding to the guilloche pattern; and authenticating the guilloche patterns of the secure document prone to be degraded by comparing each extracted guilloche pattern with a corresponding theoretical guilloche pattern.
Description
BRIEF DESCRIPTION OF THE FIGURES
(1) Further features and advantages of the invention will emerge from reading the description, illustrated by the Figures in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
DETAILED DESCRIPTION OF AT LEAST ONE EMBODIMENT
(12) An example of an embodiment of a method for inserting guilloche patterns in a secure document is described in detail below, with reference to the accompanying drawings. An example of an embodiment of a method for authenticating guilloche patterns of a secure document, even when said secure document is degraded, is also described in detail below, with reference to the accompanying drawings. These examples show the features and advantages of the invention. It should be remembered, however, that the invention is not limited to these examples.
(13) In the Figures, identical elements bear the same reference numerals. For ease of readability of the Figures, no size scale between the elements shown is observed.
(14) The method of the invention proposes to insert guilloche patterns such as those previously mentioned in one portion of or over the entire secure document. In the following description, the method will be described when it is applied to a portion of a secure document such as a photograph on which are superimposed the guilloche patterns, also called guilloches. In the description, the word “photograph” shall be understood as referring indiscriminately to a portion of secure document or an underlying content. A person skilled in the art will also understand that the method as it will be described can also be implemented for a document of which the entirety of said document comprises guilloche patterns.
(15) These guilloche patterns are, for example, one-dimensional patterns, or 1D guilloche patterns, adapted to encode alphanumeric data such as the personal data of the holder that are mentioned in the identity documents. Each 1D guilloche pattern is in the form of a variable undulating line, visible to the naked eye, on an underlying content, and in particular on a photograph.
(16) According to the invention, the visual prominence is of sufficiently low intensity as not to interfere with the visual perception of the underlying content, namely the portion of the secure document located beneath the guilloche patterns—for example the photograph—although it is sufficiently marked to enable an automatic extraction even when the secure document is degraded for reasons like those previously mentioned.
(17) Examples of a photograph of a secure document are represented in
(18) So that the guilloche patterns are inserted into the photograph in a sufficiently marked manner to ensure security level 3 while enabling readability of the photograph, the method of the invention proposes that the insertion intensity of each guilloche pattern be adapted on the basis of the gray level of the photograph. The insertion intensity is determined, for each pixel of the guilloche pattern, on the basis of the gray level of the pixels of the photograph around said guilloche pattern. According to the invention, the insertion intensity is defined by the thickness of the guilloche pattern and by the level of contrast between the photograph and said guilloche pattern.
(19) In the method of the invention, the thickness is the number of pixels aligned in the same direction (horizontal or vertical for example) to form the guilloche pattern inserted in the photograph.
(20) Generally speaking, the contrast is a property of an image that quantifies the difference in luminosity between the light and dark parts of the image. In the method of the invention, the contrast is the difference in luminosity between the guilloche pattern and the area of the photograph near said guilloche pattern. The contrast is a unitless value, calculated for each pixel of each guilloche pattern.
(21) In order to calculate the contrast, the method of the invention proposes to calculate the contrast between the mid-gray level of an area inside the guilloche pattern and the mid-gray level of at least one area outside said guilloche pattern.
(22) The portion of photograph in
(23) The portion of photograph in
(24) In fact, a person skilled in the art will understand that if the guilloche pattern is affixed in a horizontal direction on the photograph, a slice of said guilloche pattern contains vertically aligned pixels; the internal and external areas are then aligned vertically, as in the example shown in
(25) In certain embodiments, the guilloche pattern is a sinusoidal pattern, extending across the photograph horizontally or vertically, or even slanting. If the guilloche pattern is sinusoidal, the direction of said pattern is the overall crossing direction of the photograph.
(26) In certain embodiments, the guilloche pattern can consist of ridges of an imprint, for example a fingerprint of the holder. In this case, the internal and external areas are positioned along a normal to the curve at the point in question, i.e. orthogonally to an estimated tangent direction near said point.
(27) According to the invention, the contrast is calculated for each pixel of the internal area zi by comparing the mid-gray level of the internal area zi and the mid-gray level of the external areas ze. In the case of a color image, the mid-gray level is determined from the luminance image associated with the color image.
(28) The comparison between the mid-gray level of the internal zone and the mid-gray level of the external zone is achieved by Logarithmic Image Processing (LIP), which is described, for example, in the publication by M. Jourlin and J-C. Pinoli, “A Model for Logarithmic Image Processing,” Journal of Microscopy, 149 (1), pages 21-35, 1988 or in the publication by M. Jourlin, “Logarithmic Image Processing: Theory and Applications,” Advances in Imaging and Electron Physics, Vol. 195, 253 p. 2016.
(29) Thus, in each pixel of the guilloche pattern, a contrast value is calculated that is added to or subtracted from the image by LIP so as to obtain an additional LIP contrast chosen from the mid-gray levels of the internal area zi and external areas ze. The same contrast value will then be applied to all the points of the internal area zi. Thus the pixels of the same slice of guilloche pattern all have the same contrast value. However, the guilloche pattern can have a contrast value that varies from one slice to another. In other words, the same guilloche pattern can have a contrast that varies along its length. In the example shown in
(30)
(31) Images (a2), (b2) and (c2) in
(32)
(33) The guilloche patterns generated are then positioned—step 200—on the photograph (or other document) with a predefined spacing that depends, for example, on the number of guilloche patterns to be affixed and/or the amount of modulation used during the generation of the guilloche patterns.
(34) The method then involves step 300 of selection and application of a guilloche thickness. When the guilloche is generated and its thickness has been defined, a step 400 of calculation of the contrast value is performed for each pixel of the guilloche. Operation 400 of calculation of the contrast value is repeated for the next n pixel (steps 410 and 420) until all of the N pixels of the guilloche pattern have been processed.
(35) When the contrast value is determined, the guilloche is inserted in the document at step 500. The method is repeated from step 300 of application of the thickness for the next k guilloche until all of the K guilloches have been inserted in the document (steps 510 and 520). When all of the guilloches have been inserted (step 510), the document is secure (step 600).
(36) The contrast value determined, associated with the chosen thickness of the guilloche pattern, constitutes the insertion intensity of a guilloche. The insertion intensity enables a more or less intense marking of each guilloche pattern, which directly depends on the gray level of the document onto which it is affixed. The intensity of marking is therefore directly dependent on the gray level of the document near the guilloche. This allows the underlying content to be readable with the naked eye, whatever the state of the document, and the guilloche patterns can be detected and the encoded data authenticated.
(37) The insertion method as it has just been described can be implemented in a device for the insertion of guilloche patterns in a document. This device comprises at least one computer performing a set of instructions that prompts said computer to implement this guilloche insertion method.
(38) The method of the invention proposes to authenticate the guilloche patterns inserted in a portion or in the entirety of a secure document such as those previously mentioned. In the description that follows, the method will be described when it is applied to a portion of a secure document such as a photograph onto which are superimposed guilloche patterns, also called guilloches. A person skilled in the art will understand that the method as it will be described can also be implemented for a document of which the entirety of said document comprises guilloche patterns. These guilloche patterns are, for example, one-dimensional patterns, or 1D guilloche patterns, adapted to encode alphanumeric data such as the personal data of the holder, mentioned in identity documents. Each 1D guilloche pattern is in the form of a variable undulating line, visible to the naked eye, on an underlying content, and in particular on a photograph, but of which the visual prominence is of sufficiently low intensity as not to interfere with the visual perception of the underlying content, namely the portion of the secure document located beneath the guilloche patterns.
(39) An example of a document rendered secure by guilloche patterns 601-608 is represented in image (a) of
(40) In the rest of the description, the underlying content onto which the guilloche patterns are affixed will be called indiscriminately photograph, underlying content or image (a).
(41) An example of the authentication method according to the invention is represented in
(42) Firstly, the extraction method according to the invention comprises an operation 710 of determination of a contrast card of the portion 600 of the secure document. This operation, which serves to reveal the contrasts along the guilloche patterns of image (b), comprises a calculation, at each point of each guilloche pattern, of the contrast between the mid-gray level of an internal area and the mid-gray level of an external area of said point. The internal area of the guilloche pattern is defined as the vertical neighborhood of the pixel in question, with a predetermined thickness, for example of two pixels, on either side of said pixel. The external area of the guilloche pattern is defined as the vertical neighborhood around the internal area, with a predetermined thickness, for example of four pixels, around said internal area.
(43) Calculation of the contrast, according to certain embodiments, is based on LIP (Logarithmic Image Processing) described, for example, in the publication of M. Jourlin and J-C. Pinoli, “A Model for Logarithmic Image Processing,” Journal of Microscopy, 149 (1), pages 21-35, 1988 or in the publication of M. Jourlin, “Logarithmic Image Processing: Theory and Applications,” Advances in Imaging and Electron Physics, Vol. 195, 253 p. 2016. The general principle of this calculation of the contrast is that, in each pixel of the guilloche pattern, the supplementary LIP contrast chosen between the mid-gray values of the internal area of the guilloche pattern and the external area is calculated.
(44) The calculation of the contrast at each point of the guilloche patterns enables a contrast card to be created, as represented by image (c) of
(45) When the document, and particularly the photograph, is in color, the contrast card is calculated on the basis of the luminance image associated with the color image. For this, a luminance image (in gray levels) calculated on the basis of the three color planes is extracted beforehand.
(46) The extraction method then involves an identification operation 720, on this contrast card, of the optimal percolation trajectory. According to certain embodiments, this operation 720 involves an identification of all of the percolation trajectories likely to cross the image (c) in order to connect a point of departure of a guilloche pattern to a point of arrival of said guilloche pattern. In fact, the 1D guilloche patterns are positioned, in the secure document, according to a horizontal overall direction. Each guilloche pattern therefore crosses the image from one side to the other, from left to right. The method then proposes to find, within the contrast image (c), all of the trajectories that cross the image from left to right. A person skilled in the art will understand that in the case where the guilloche patterns have a non-horizontal overall direction, for example vertical or slanting, the points of departure and the points of arrival of the percolation trajectories sought are not necessarily on the left and right of the image but, for example, at the top and bottom of the image.
(47) The method then proposes to determine, among all of the detected percolation trajectories, the optimal percolation trajectory, i.e. the trajectory that has the most preferred direction. This detection of the optimal percolation trajectory is achieved by calculating a cost function for each of the trajectories and by determining the minimal cost function. The cost function of a trajectory corresponds to the variability of the contrast between the contrast determined for each trajectory and an expected contrast, previously determined. The closer the contrast to the expected contrast, the lower the cost function. The cost function therefore favors points that have contrast levels near the contrast value chosen for the insertion of the guilloche pattern into the secure document. The optimal percolation trajectory is therefore, among all the detected percolation trajectories, the one that has the smallest cost function.
(48) According to the method, this optimal percolation trajectory is deemed to be the guilloche pattern. The guilloche pattern is then extracted (step 730 of
(49) The authentication method according to the invention comprises an operation 740 of comparison of each extracted guilloche pattern with the corresponding theoretical guilloche pattern. According to certain embodiments, the theoretical guilloche pattern is the original guilloche pattern, i.e. the one that was generated initially and affixed onto the content of the document to be rendered secure. At the moment of authentication of the guilloche pattern, the extracted guilloche pattern (for example pattern 618) is compared to the corresponding guilloche pattern that is stored in the chip (for example pattern 608). The comparison of each of the extracted guilloche patterns with the original guilloche patterns makes it possible to determine whether the secure document has been forged.
(50) In other embodiments, the theoretical guilloche pattern is obtained by means of optical character recognition (OCR), achieved for example during scanning of the secure document. In these embodiments, the alphanumeric data mentioned in the secure document alongside the image (a) are determined by optical recognition and theoretical guilloche patterns are generated on the basis of these recognized alphanumeric data. The extracted guilloche patterns are then compared to these theoretical guilloche patterns and their comparison makes it possible to determine whether the secure document has been forged.
(51) Whatever the technique used to obtain theoretical guilloche patterns, the extracted guilloche patterns are compared with the theoretical guilloche patterns, for example by superimposing said extracted patterns and said theoretical patterns. This comparison can be based on an estimation of a score calculated for each pair of guilloche patterns, a pair consisting of one extracted guilloche pattern and one theoretical pattern. This operation of estimating the score, referenced 741 in
(52) The scores of all of the pairs of guilloche patterns can also be added together to authenticate or not authenticate the secure document as a whole. Two examples of images (b) after print-scan are shown in
(53) In certain embodiments, a weight is assigned to each score before being totaled. In fact, as the extraction is not usually perfect, it is normal that small distances exist between the two patterns of the same pair of guilloche patterns, as is the case in the example of images (e) of
(54) It is in this way that, in certain variations, the points assigned to the scores can be adjustable. For example, they can be proportional to the square of the distance, to its exponential, etc. such as to maximize the aggregate score and make forged guilloche patterns easier to detect.
(55) Although described through a certain number of examples, variations and embodiments, the method of insertion of guilloche patterns according to the invention comprises different variations, modifications and improvements that will appear clear to a person skilled in the art, it being understood that these variations, modifications and improvements form part of the scope of the invention.
(56) Although described through a certain number of examples, variations and embodiments, the methods of extraction and authentication of guilloche patterns according to the invention comprise different variations, modifications and improvements that will appear clear to a person skilled in the art, it being understood that these variations, modifications and improvements form part of the scope of the invention.