Digital watermarks and methods for security documents

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C283S074000

Reexamination Certificate

active

06345104

ABSTRACT:

FIELD OF THE INVENTION
The present invention relates to methods and systems for inconspicuously embedding binary data in security documents, and associated methods/systems for detecting/decoding such data. (“Security document” is used herein to refer to negotiable financial instruments (e.g. banknotes, travelers checks, bearer bonds), passports, visas, other immigration documents, stock certificates, postal stamps, lottery tickets, sports/concert tickets, etc.) One application of this the invention is in discouraging counterfeiting of security documents. Another is in transferring machine-readable information through such documents, without alerting human viewers to the presence of such information.
BACKGROUND AND SUMMARY OF THE INVENTION
Digital watermarking (sometimes termed “data hiding” or “data embedding” is a growing field of endeavor, with several different approaches. The present assignee's work is reflected in the patents and applications detailed above, together with laid-open PCT application WO97/43736. Other work is illustrated by U.S. Pat. Nos. 5,734,752, 5,646,997, 5,659,726, 5,664,018, 5,671,277, 5,687,191, 5,687,236, 5,689,587, 5,568,570, 5,572,247, 5,574,962, 5,579,124, 5,581,500, 5,613,004, 5,629,770, 5,461,426, 5,743,631, 5,488,664, 5,530,759, 5,539,735, 4,943,973, 5,337,361, 5,404,160, 5,404,377, 5,315,098, 5,319,735, 5,337,362, 4,972,471, 5,161,210, 5,243,423, 5,091,966, 5,113,437, 4,939,515, 5,374,976, 4,855,827, 4,876,617, 4,939,515, 4,963,998, 4,969,041, and published foreign applications WO 98/02864, EP 822,550, WO 97/39410, WO 96/36163, GB 2,196,167, EP 777,197, EP 736,860, EP 705,025, EP 766,468, EP 782,322, WO 95/20291, WO 96/26494, WO 96/36935, WO 96/42151, WO 97/22206, WO 97/26733. Some of the foregoing patents relate to visible watermarking techniques. Other visible watermarking techniques (e.g. data glyphs) are described in U.S. Pat. Nos. 5,706,364, 5,689,620, 5,684,885, 5,680,223, 5,668,636, 5,640,647, 5,594,809.
Much of the work in data embedding is not in the patent literature but rather is published in technical articles. In addition to the patentees of the foregoing patents, some of the other workers in this field (whose watermark-related writings can by found by an author search in the is INSPEC or NEXIS databases, among others) include I. Pitas, Eckhard Koch, Jian Zhao, Norishige Morimoto, Laurence Boney, Kineo Matsui, A. Z. Tirkel, Fred Mintzer, B. Macq, Ahmed H. Tewfik, Frederic Jordan, Naohisa Komatsu, Joseph O'Ruanaidh, Neil Johnson, Ingemar Cox, Minerva Yeung, and Lawrence O'Gonnan.
The artisan is assumed to be familiar with the foregoing prior art.
In the following disclosure it should be understood that references to watermarking encompass not only the assignee's watermarking technology, but can likewise be practiced with any other watermarking technology, such as those indicated above.
Watermarking can be applied to myriad forms of information. The present disclosure focuses on its applications to security documents. However, it should be recognized that the principles discussed below can also be applied outside this area.
Most of the prior art in image watermarking has focused on pixelated imagery (e.g. bit-mapped images, JPEG/MPEG imagery, VGA/SVGA display devices, etc.). In most watermarking techniques, the luminance or color values of component pixels are slightly changed to effect subliminal encoding of binary data through the image. (This encoding can be done directly in the pixel domain, or alter the signal has been processed and represented differently—e.g. as DCT or wavelet coefficients, or as compressed data, etc.)
While pixelated imagery is a relatively recent development, security documents—commonly employing line art—go back centuries. One familiar example is U.S. paper currency. On the one dollar banknote, for example, line art is used in several different ways. One is to form intricate webbing patterns (sometimes termed “guilloche patterns” around the margin of the note (generally comprised of light lines on dark background). Another is to form gray scale imagery, such as the portrait of George Washington (generally comprised of dark lines on a light background).
There are two basic ways to simulate grey-scales in security document line art. One is to change the relative
spacings
of the lines to effect a lightening or darkening of an image region.
FIG. 1A
shows such an arrangement; area B looks darker than area A due to the closer spacings of the component lines. The other technique is to change the
widths
of the component lines—wider lines resulting in darker areas and narrower lines resulting in lighter areas.
FIG. 1B
shows such an arrangement. Again, area B looks darker than area A, this time due to the greater widths of the component lines. These techniques are often used together. Ultimately, a given region simply has more or less ink.
In my application Ser. No. 08/438,159 I introduced, and in my application Ser. No. 09/074,034 I elaborated on, techniques for watermarking line art by making slight changes to the widths, or positions, of the component lines. Such techniques are further expanded in the present disclosure.
In several of my cited applications, I discussed various “calibration signals” that can be used to facilitate the decoding of watermark data despite corruption of the encoded image, such as by scaling or rotation. Common counterfeiting techniques—e.g. color photocopying, or scanning/inkjet printing—often introduce such corruption, whether deliberately or accidentally. Accordingly, it is important that watermarks embedded in security documents be detectable notwithstanding such effects. Calibration signals particularly suited for use with security documents are detailed in this disclosure.
In accordance with embodiments of the present invention, security documents are encoded to convey machine-readable multi-bit binary information (e.g. digital watermarks), usually in a manner not alerting human viewers that such information is present. The documents can be provided with overt or subliminal calibration patterns. When a document incorporating such a pattern is scanned (e.g. by a photocopier), the pattern facilitates detection of the encoded information notwithstanding possible scaling or rotation of the scan data. The calibration pattern can serve as a carrier for the watermark information, or the watermark can be encoded independently. In one embodiment, the watermark and the calibration pattern are formed on the document by an intaglio process, with or without ink. A photocopier responsive to such markings can take predetermined action if reproduction of a security document is attempted. A passport processing station responsive to such markings can use the decoded binary data to access a database having information concerning the passport holder. Some such apparatuses detect both the watermark data and the presence of a visible structure characteristic of a security document (e.g., the seal of the issuing central bank).
The foregoing and other features and advantages of the present technology will be more readily apparent from the following detailed description, which proceeds with reference to the accompanying drawings.


REFERENCES:
patent: 3918567 (1975-11-01), Kittredge
patent: 3969830 (1976-07-01), Grasham
patent: 4164745 (1979-08-01), Cielo et al.
patent: 4297729 (1981-10-01), Steynor et al.
patent: 4588212 (1986-05-01), Castagnoli
patent: 4723149 (1988-02-01), Harada
patent: 4739377 (1988-04-01), Allen
patent: 4908873 (1990-03-01), Philibert et al.
patent: 5040059 (1991-08-01), Leberl
patent: 5091966 (1992-02-01), Bloomberg et al.
patent: 5216724 (1993-06-01), Suzuki et al.
patent: 5284364 (1994-02-01), Jain
patent: 5305199 (1994-04-01), LoBiondo et al.
patent: 5315098 (1994-05-01), Tow
patent: 5321470 (1994-06-01), Hasuo et al.
patent: 5321773 (1994-06-01), Kopec et al.
patent: 5336871 (1994-08-01), Colgate, Jr.
patent: 5337361 (1994-08-01), Wang et al.
patent: 5367319 (1994-11-01), Graham
patent: 5390259 (1995-02-01), Withgott et al.
patent: 5416307 (1995-05

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Digital watermarks and methods for security documents does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Digital watermarks and methods for security documents, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Digital watermarks and methods for security documents will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2983552

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.