Identification document and related methods
First Claim
1. A security document comprising:
- a substrate;
a first graphic carried by the substrate, the first graphic conveying a photographic image to human viewers thereof, the first graphic being steganographically encoded to convey first plural bits of data recoverable by computer analysis of said first graphic; and
a second graphic carried by the substrate, the second graphic conveying a visual image to human viewers thereof, wherein the second graphic is steganographically encoded to convey second plural bits of data recoverable by computer analysis of said second graphic; and
wherein the steganographically encoded first plural bits of data and the steganographically encoded second plural bits of data cooperate to evidence authenticity of the security document.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention provides methods and systems for authenticating identification documents. We also teach an identification document including two or more digital watermarks. The watermarks correspond with each other or with indicia carried by the identification document. The correspondence can be verified to determine authenticity. We also provide digital watermark detection methods and systems to identify the different watermarks through embedded orientation components. We then focus watermark message-decoding efforts on areas identified as likely including watermark orientation components. In one implementation we provide a watermark detection trigger to identify so-called legacy documents. The trigger may indicate the presence or expected absence of a digital watermark. In other implementations we provide a versatile document authenticator to toggle between watermarking and non-watermarking authentication processes depending on a detection trigger.
-
Citations
72 Claims
-
1. A security document comprising:
-
a substrate;
a first graphic carried by the substrate, the first graphic conveying a photographic image to human viewers thereof, the first graphic being steganographically encoded to convey first plural bits of data recoverable by computer analysis of said first graphic; and
a second graphic carried by the substrate, the second graphic conveying a visual image to human viewers thereof, wherein the second graphic is steganographically encoded to convey second plural bits of data recoverable by computer analysis of said second graphic; and
wherein the steganographically encoded first plural bits of data and the steganographically encoded second plural bits of data cooperate to evidence authenticity of the security document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method to detect swapping of first artwork from a first identification document with second artwork from a second identification document, the swapping resulting in the first artwork being carried on the second identification document instead of the second artwork, wherein the first artwork comprises a first digital watermark embedded therein, and wherein the second identification document comprises a second digital watermark embedded in a first region, said method comprising:
-
receiving scan data associated with at least a portion of the first artwork and at least a portion of the first region;
analyzing the scan data to detect the first digital watermark and the second digital watermark; and
comparing the first digital watermark with the second digital watermark to detect swapping of the first artwork with the second artwork. - View Dependent Claims (22, 23, 24, 25)
-
-
26. A method to determine whether to authenticate an identification document through a digital watermarking authentication process or through an alternative authentication process, wherein the digital watermark authentication process utilizes at least first and second digital watermarks while the alternative authentication process utilizes bearer or document specific information, and wherein the identification document comprises a detection trigger, said method comprises the steps of:
-
receiving data corresponding to the detection trigger;
if the received data indicates an expected presence of digital watermarks, analyzing optical scan data that corresponds to the identification document to attempt to obtain information conveyed by the first and second digital watermarks; and
if the information is obtained, cross-correlating at least some of the information conveyed by the first digital watermark with at least some of the information conveyed by the second digital watermark, and providing a signal corresponding to a result of the cross-correlation of the watermark information; and
if the information is not obtained providing a signal representing that the identification document is considered suspect; and
if the received data indicates an expected absence of digital watermarks, attempting to obtain the specific information from at least two sources related to the identification document; and
if the specific information is obtained, cross-correlating the specific information, and providing a signal corresponding to a result of the cross-correlation of the specific information; and
if the specific information in not obtained, providing a signal representing that the identification document is suspect. - View Dependent Claims (27, 28, 29, 30, 31, 32, 33, 34, 35)
-
-
36. A security document comprising:
-
a substrate;
a first graphic carried by the substrate, the first graphic conveying a photographic image to human viewers thereof, the first graphic being steganographically encoded to convey first plural bits of digital data recoverable by computer analysis of said first graphic;
a second graphic carried by the substrate, the second graphic conveying a visual image to human viewers thereof; and
a detection trigger;
wherein the second graphic is steganographically encoded to convey second plural bits of digital data recoverable by computer analysis of said second graphic, wherein the steganographically encoded first plural bits of digital data and the steganographically encoded second plural bits of digital data cooperate to verify authenticity of the security document, and wherein the detection trigger serves to indicate a presence of steganographic encoding. - View Dependent Claims (37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57)
-
-
58. A method of identifying portions of digital data, the digital data corresponding to a printed document, the printed document including first and second different areas conveying first and second different digital watermarks, respectively, wherein the first digital watermark includes a first orientation component and the second digital watermark includes a second orientation component, and wherein the identified portions of the digital data are suspected to include digital watermark data, the method comprising:
-
segregating the digital data into a plurality of widows;
for each of the plurality of windows, determining an orientation measure;
grouping the windows based on orientation measure; and
selecting at least two of the groups based on at least one of a number of windows assigned to a group and a collective watermark strength for a group, wherein the windows within the selected groups include the portions of the digital data that are suspected to include digital watermark data. - View Dependent Claims (59, 60, 61, 62, 63, 64, 65, 66)
-
-
67. A method of identifying a first area and a second area of a printed document that are likely to include, respectively, a first digital watermark and a second digital watermark, wherein the first digital watermark includes a first orientation component and the second digital watermark includes a second orientation component, the method comprising:
-
receiving optically scanned image data that corresponds with at least a portion of the printed document;
segmenting the image data into a plurality of image portions;
determining an orientation measure relative to a predetermined orientation for each of the image portions;
identifying the first area by associating image portions having a first orientation measure; and
identifying the second area by associating image portions having a second orientation measure. - View Dependent Claims (68, 69, 70, 71, 72)
-
Specification