Security element and method to inspect authenticity of a print

09594994 · 2017-03-14

Assignee

Inventors

Cpc classification

International classification

Abstract

The invention relates to a security element applied onto printing substrates (bank notes, securities, product packagings, identity cards/labels or other similar documents) by printing, comprising a unique identifier as primary information visible to the naked eye and secondary information protecting against copying non-visible to the naked eye. The unique identifier is typically a point code. Said secondary information is represented by a structure with the largest dimension of 2 to 40 microns, and due to printing distortions arising when the security element is applied onto a printing substrate, said secondary information is non-reconstructable from the print of the security element and a statistically analyzable inherent feature is associated to it. The invention also relates to a printed matter with such an inventive security element and to a method to check authenticity of a printed matter with the inventive security element in visible light (380-750 nm).

Claims

1. Security element as originally applied by a printing technology to a substrate as a print, the security element comprising a code carrying primary information and detectable to the naked eye in visible light within the wavelength range of 380 to 750 nm, as well as a code carrying secondary information and that is undetectable in the naked eye, wherein the largest dimension of the code carrying secondary information in at least one planar direction is 2 to 40 microns, wherein the largest dimension of the code carrying secondary information is chosen based on resolution of the printing technology in such a way that the code carrying secondary information is distorted as a result of printing onto the substrate to render the code carrying secondary information non-reconstructable from the print and the code carrying secondary information attributes the security element with a predetermined statistically analyzable feature.

2. The security element according to claim 1, characterized in that the statistically analyzable feature is provided by grayscale values of portions of a digital representation of the print of said security element taken in visible light within the wavelength range of 380 to 750 nm, said portions being selected according to a preset coding concept.

3. The security element according to claim 1, characterized in that the code carrying primary information is chosen from a group consisting of: bar codes, QR codes, Data Matrix codes, and uniquely developed point codes with non-public coding.

4. The security element according to claim 1, characterized in that the printing substrate is provided with an ornamental graphical illustration and said code carrying primary information is hidden in said illustration.

5. The security element according to claim 1, characterized in that the secondary information can be derived from the primary information.

6. The security element according to claim 1, characterized in that the printing substrate is chosen from a group consisting of: banknotes, securities, invoices, product packagings, identity cards/labels, covers, entrance tickets, certificates, personal documents, vouchers or any other similar documents or object surfaces to be equipped with copy protection.

7. A printed matter, characterized in that said printing matter comprises a printing substrate and at least one security element according to claim 1, applied onto the printing substrate by printing.

8. A method to inspect authenticity of a printed matter with a security element according to claim 1, comprising the steps of: recording an image of the code carrying primary information of the security element along with illumination by visible light within the wavelength range of 380 to 750 nm; converting the obtained image into a grayscale image and storing the grayscale image; segmenting the grayscale image stored; sorting segments of the segmented grayscale image into a given number of classes based on a number of pixels forming a left out area in each segment; assigning a grayscale mean value, as a statistically analyzable feature, to each class by subjecting said classes one after the other to statistical analysis; generating a trend from the obtained grayscale mean values from class to class; confirming authenticity of said printed matter when said trend matches a predetermined trend of increasing grayscale mean values; and denying authenticity of said printed matter when said trend does not match the predetermined trend of increasing grayscale mean values.

9. The method according to claim 8, wherein said image is generated by an imaging device with a resolution of 300 to 1200 dpi.

10. The method according to claim 8, also comprising the step of separating the image of the code carrying primary information from an ornamental illustration if said code is hidden in the ornamental illustration before converting said recorded image of the code into the grayscale image.

11. The method according to claim 8, wherein said statistical analysis of classes is performed by two-sample t-test of pairs of the classes.

12. The security element according to claim 1, wherein the code carrying secondary information is generated by areas of the code carrying primary information not printed upon directly.

Description

(1) In what follows, the invention is discussed in more detail with reference to the attached drawing, wherein

(2) FIG. 1A shows the block diagram of a method to generate a security element according to the invention and to apply it on a printing substrate;

(3) FIG. 1B illustrates the block diagram of an authenticity inspection method based on the application of a security element according to the invention;

(4) FIG. 2 shows schematically the way of generating a combined code, that constitutes the security element, from codes carrying primary and secondary information;

(5) FIG. 3 shows a portion of the combined code of FIG. 2 in enlarged view;

(6) FIG. 4 illustrates the decomposition of the combined code portion shown in FIG. 3 into classes in terms of the secondary information, performed along with a coding concept set by the manufacturer;

(7) FIG. 5 shows a generalized code cell applicable when the secondary information is introduced into a point code;

(8) FIG. 6 illustrates a couple of possible preferred embodiments of the left-out area(s) (pixels) representing secondary information that are applicable in a security element according to the invention;

(9) FIG. 7 shows several exemplary point codes (visible to the naked eye) carrying primary information that have the largest dimension greater than 50 microns;

(10) FIG. 8 illustrates the theoretical appearance (as formed in a printing plate) and the actual appearance (as seen after having printed onto a printing substrate) of a portion of the security element provided by the combined code; and

(11) FIGS. 9A and 9B illustrate a piece of secondary (latent) information that has a dimension of at most 50 microns along at least one direction, hidden into a point like and a line like design, respectively, before and after printing.

(12) A general method to generate a security element according to the invention formed by a combined code is shown in FIG. 1A. According to this, a code that carries information is chosen (step 100) which is formed by a well-known code sign (e.g. a bar code, a QR code, a Data Matrix code, a mobile code) or a uniquely coded line or point code. According to a yet further possibility, the code carrying primary information can also be formed by a line or point code hidden within an ornamental graphical illustration of the print. Moreover, the code carrying primary information can be the primary information itself, printed simply onto the printing substrate in an uncoded manner. The printing substrate can be any document or the surface of an object to be protected; in particular, e.g. banknotes, securities, invoices, product packagings, identity cards/labels, covers, entrance tickets, certificates, personal documents, vouchers or any other similar documents. Primary information means a piece of information that relates to the document to be protected, generally, the data identifying the document itself. It is of importance that the code carrying primary information could be segmented, i.e. could be covered by a mesh of cells of given size and typically of regular shape (in particular, rectangular shape), being optionally rotated with a given angle relative to the code carrying primary information. Due to the constructional design, this latter requirement is automatically fulfilled for the above mentioned well-known code signs.

(13) After selecting the code carrying primary information, a code that carries secondary information is generated (step 110). This step is performed in harmony with a preset coding concept/algorithm in a way discussed for a specific example in what follows with reference to FIGS. 2 to 4 in more detail. In particular, the secondary information is carried by the areas left out from the print of the code carrying primary information. Due to its size, the code carrying secondary information is a piece of latent information, i.e. it is not visible when inspected by the naked eye. Such exemplary secondary information defined by the left-out areas are illustrated in FIGS. 3 and 6. The secondary information preferably results from the primary information, e.g. from an element/data thereof.

(14) After generating the code carrying secondary information, the codes carrying primary and secondary information are combined together (step 120), as a result of which a combined code that corresponds to the inventive security element is obtained.

(15) Finally, the printed matter with the security element is produced by applying the thus obtained security element onto the printing substrate via the selected printing technology (step 130).

(16) The security element of the printed matter produced by the method shown in FIG. 1A, on the one hand, contains data that can be used to identify said printed matter (primary information) and, on the other hand, is suitable for protecting said printing matter against copying, as the secondary information is a latent information that is not visible to the naked eye and disappears or gets distorted in a detectable manner when being printed/copied.

(17) FIGS. 2 to 4 illustrates the steps of combining together the codes carrying first and second information in a specific case, wherein the code carrying primary information is provided by a point code (see FIG. 2) formed by ink dots 20 and representing a figure 0 printed at the resolution of 600 dpi, wherein segmenting is performed by means of a mesh 30 of square shaped cells 34 (see FIG. 3). Here, the size of each cell 34 is at least 300 microns along both the X and Y directions. It was found that the size of 300 microns is sufficient to ensure that each individual ink dot 20 fall into a separate cell 34 and far away from the borders of said cell 34 (that is, practically to the middle of the cell 34). Furthermore, each cell 34 is divided into seven pixels 40 (in this specific case); the pixels 40 forming units of said division are the building blocks for the left-out areas 42 encoding secondary information. It is apparent to a skilled person in the art that segmenting can be performed with different cell sizes and/or with different numbers of pixels along the X, Y directions per cells for a different type of code sign. A common rectangular mesh 50 and its (i,j)-th cell 52 applicable for segmenting are shown in FIG. 5. It is also noted here that if higher resolution is used, the pixel number along each of the directions has to be increased proportionally.

(18) Having segmented the code that carries primary information, introduction of the code that carries secondary information is performed. To this end, the cells 34 of the code carrying primary information obtained by the segmentation and containing an ink dot, are sorted into several classes. Here, the number of various classes is chosen to fall between four and six, however, any other number of classes can be equally used. Since after printing the inventive security element, the secondary information leads to a feature that can be analyzed by statistical techniques, preferably there are at least ten cells 34 in each class. Said sorting may take place on a regular basis or in a random manner, however, it always follows from the code carrying primary information. In the present example, classification is performed in terms of the number of pixels forming the left-out area within each cell. Here, the number inscribed into a given cell corresponds to the size of the left-out area within the cell, expressed in pixels. The size of the left-out area changes from class to class in a strictly increasing manner. Consequently, for example, the first class remains unaltered (i.e. there is no left-out area therein), the second class will have a left-out area of one pixel, the third class will have a left-out area of at least two pixels, the forth class will have a left-out area of at least three pixels, and so on.

(19) The size of the left-out area in each cell 34 depends on the printing technology to be applied: the size/dimension of the left-out area is always chosen in such a manner that the printing technology applied is just inadequate to print said left-out area sharply. Consequently, due to printing uncertainty of the left-out areas, said areas will not at all be visible in the printed security element when inspected by the naked eye. Furthermore, the ordered nature of the secondary information is not recognizable by a loupe (at a magnification of 2-20) either.

(20) Several examples for the possible shape of the left-out areas formed of pixels are shown in FIG. 6. Shape and dimension of the left-out area cannot be arbitrary, the latter is limited by the printing technology to be applied, as discussed above. In Table 1 below, a couple of white printability line widths proposed for the preparation of the inventive security element, obtained empirically by performing ink wetting experiments on a printing substrate is collected for different printing technologies. The ink wetting measurements were carried out with printing inks tailored to various printing technologies, that is, e.g. with a black printing ink from Hewlett Packard, with a black printing ink from MEMJET, with the KODAK Prosper press black ink and a black printing ink from EPSON, wherein fibrous paper used typically for security printing was applied as the printing substrate at the temperature of 18-22 C. (room temperature) and at 101 kPa ambient pressure. It is noted here that the values enlisted in Table 1 are valid for other kinds of paper as well, although the required resolution generally changes. In particular, if the printing substrate is e.g. a glossy paper, printing has to be performed at the resolution of at least 600-1200 dpi instead of 300-600 dpi.

(21) In line with the above, when a novel printing technology becomes available, the ink wetting can be determined on a pilot print and then a proposed white printability line width for the left-out area expressed in number of pixels can be derived for the novel technology. To this end the following empirical equations can also be used:
Line width [micron]=1.2*ink wetting [micron].
Line width [pix]=the greatest integer of {(1.2*ink wetting [micron]*resolution [dpi]/25.4)/1000+0.5}, but at least 1.

(22) TABLE-US-00001 TABLE 1 Line width of left-out areas carrying secondary information. Ink wetting White printability line Typical [micron] width (of an area left out resolution (paper from direct printing) Technology [dpi] dependent) [micron] [pix] Ink jet printing 600 10-50 12-60 1-2 Laser printing 720 30-40 36-48 2-3 Offset printing 8000 10-20 12-24 4-8

(23) Although the areas left out from direct printing are not visible to the naked eye in the print of the security element, due to printing uncertainties they change the grayscale of the cell defined by the expression of
grayscale value=(number of black pixels in the cell)/(number of total pixels in the cell);
here, the change is inversely proportional to the increase in the number of pixels of the left-out area within the class considered. Hence, the inventive security element provided by the combined code discussed above exhibits an inherent feature in the form of the above defined grayscale values that can be associated with the latent secondary information; after printing out the security element and generating a digital representation of the obtained print said inherent feature can be analyzed statistically.

(24) Decoding the inventive security element applied on a printing substrate and, as a result of this, deciding on the authenticity of the printed matter concerned are performed in line with the scheme shown in FIG. 1B. According to this, in a first step a digital representation of the code sign carrying primary information of said security element is generated (step 160) in visible light falling into the wavelength range of 380 to 750 nm or by making use of a light source providing illumination that spectrally corresponds to natural light falling into said wavelength range by means of a suitable digital imaging means, such as a mobile phone, a smartphone, a (hand) scanner, a web camera, optionally a camera, having typically a medium resolution.

(25) After this step, pre-processing of the image of the code sign is performed (step 170), wherein at first the quality of the image is inspected: in case of an image with inadequate quality (due to e.g. insufficient illumination), the image of the code sign is disregarded and a new code sign image is recorded. If said code sign is hidden into an ornamental illustration, separating the image of the code sign from the ornamental illustration is also performed during pre-processing. The manner of executing the separation depends on the way of hiding; in this respect, International Publication Pamphlet No. WO99/35819, mentioned earlier, discloses a possible exemplary solution in detail. Further separation methods are known to a skilled person in the art and, hence, are not discussed here in more detail. As a finishing step of pre-processing, the image of the code sign is converted into a gray shaded image and the thus obtained grayscale image is then stored for further analysis.

(26) After completing the above pre-processing steps in good order, a check of the secondary information introduced into the code carrying primary information at the time of generating the security element applied to the printed matter is carried out (step 180). To this end, the classification of dots based on the code carrying primary information is performed again. After completion of the classification, a statistical analysis of the grayscale values of the obtained classes is carried out. For the image taken of a genuine print, the grayscale values of the classes have to decrease continuously. The statistical analysis is required because of the camera distortion. Here, the two-sample t-test is a suitable method with the hypothesis of mean1=mean2 against the alternative hypothesis of mean1<mean2 with a significance level of p=0.05. To a skilled person in the art it is clear that, instead of t-test, other statistical tests are equally applicable in this case.

(27) Upon copying, the pixel islands forming the tiny left-out area get closed up, and thus an increase in grayscale mean values of the classes no longer maintains. The closing-up is caused by the steps during copying. As far as this process is concerned, the number of pixels forming the left-out area and the arrangement of said pixels are of high importance. Said left-out area has to exhibit a width, along at least one of its dimensions, that corresponds to the white printability line width given in Table 1 in order that the used scanner or photocopying machine could remove the pixels of the left-out area for sure. In such a case, the inspected printed matter is considered to be a counterfeit. If, as a result of the statistical analysis, it can be stated that the increase in grayscale mean values of the classes maintains, the inspected printed matter provided with the inventive security element is considered to be genuine.

(28) FIG. 7 illustrates a couple of exemplary point codes carrying primary information (visible to the naked eye), in particular, from left to right, a bar code, a QR code, a Data Matrix code and a so-called design code, wherein each of them exhibits a greatest dimension exceeding 50 microns. To generate the security element according to the invention, all of them can be used.

(29) The closing-up of white islands carrying secondary information of a print produced by an ink jet printer is shown in FIG. 8 taken by a field microscope at a magnification of 50. While the left-out area of the printing plate on the left side exhibits sharp borderlines, the left-out areas can be hardly detected in the print on the right side. Moreover, upon copying, these uncertain spots are closed by the photocopying machine, and the photocopy becomes black in 100%.

(30) FIGS. 9A and 9B illustrate some examples for a piece of secondary information hidden into designs.

(31) Briefly summarized: to accomplish the present invention in practice, a specific inspection device is not absolutely necessary; to this end, a photo taken by e.g. an ordinary smartphone and a decoding and analyzing software based on the method shown in FIG. 1B installed in the phone are sufficient. (Nevertheless, the photo or the digital representation of the security element can be taken by any other camera as well, and the analyzing software can be executed by any computer with appropriate computing capacity.) The inspection device can be a custom-built device; it should contain a reader unit (CCD, CMOS), for example a digital camera, for generating a digital representation of the security element, a data processing unit, for example a microcontroller or a processor, preferably a memory unit, as well as the decoding software itself. Application of the inventive security element on a printing substrate does not require a printing machine of high-precision; to this end an ink jet printer with the resolution of even 600 dpi is appropriate. This allows a wide range applicability for the solution according to the present invention.

(32) As the secondary information, in general, is not stored in a database, to inspect authenticity of a printed matter with the security element according to the invention, there is no need for a data communication link. The latent (secondary) information can be deduced from the primary information, and hence, it is merely the inspection device that is actually needed for the authenticity check.

(33) For a skilled person in the art it is, however, apparent that the previously selected coding concept for the secondary information (or its generating key) can be stored in a remote database. In such a case, within the framework of the method for authenticity inspection, the inspection device establishes a connection with the database through an appropriate data communication channel, interrogates the generating key needed, and then performs the authenticity check of the printed matter challenged. A further advantage of such an embodiment is that said inspection device can also provide precise information for the data-base about the geographical location of the key interrogation as a consequence of the data communication established. If the inspection device is a mobile phone or a smartphone, said information can easily be provided in the form of either the mobile base data or GPS coordinates.

(34) Furthermore, when a security element according to the present invention is to be applied, neither expensive printing ink(s) of specific composition nor specifically produced expensive printing substrates are required. As it is also apparent to a skilled person in the art, the inventive security element can also be formed on/in a surface of the object to be protected by laser ablation instead of ink printing. In case of such applications, the paper-based substrate is replaced by any materials that can be machined by laser ablation.

(35) It is also clear for a skilled person in the art that the security element according to the present invention can be used alone or in combination with other security elements as an additional element thereto.