Secure Documents With Hidden Signals, and Related Methods and Systems
First Claim
1. A printed security document, the security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which line width and/or line spacing is adjusted to carry predefined data, the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork.
7 Assignments
0 Petitions
Accused Products
Abstract
A security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which lines width or line spacing is adjusted to carry predefined data. The artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork. Methods for detecting the security pattern include use of a frequency domain structure to detect the security pattern despite rotation and scaling of the document, use of signal tiling to improve signal detection, and use of statistical analyses to verify detection of the security pattern.
-
Citations
33 Claims
- 1. A printed security document, the security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which line width and/or line spacing is adjusted to carry predefined data, the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork.
-
6. A method of generating artwork for a security document, the method comprising:
-
providing a security pattern modulated to carry predefined data; and modifying width or line spacing of the artwork of the security document according to the security pattern, wherein the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork. - View Dependent Claims (7, 8, 9, 10, 11, 12)
-
-
13. A method of detecting a security pattern embedded in a security document, the method comprising:
-
performing a frequency domain transform of artwork in the security document, the line width or spacing of line structures of the artwork being modified to incorporate the security pattern; and correlating the transformed artwork with a predefined signal to detect the security pattern, the security pattern having frequency domain attributes enabling detection of the security pattern despite rotation of the security document. - View Dependent Claims (14, 15)
-
-
16. A method of detecting a security pattern embedded in a security document, the method comprising:
-
analyzing artwork to detect the security pattern in modifications of the line width or spacing of line structures of the artwork; and performing plural statistical analyses on the detected security pattern to read predefined data carried in the security pattern. - View Dependent Claims (17)
-
-
18. A printed document, the document comprising artwork including a pattern, characterized in that the security pattern has the form of a line structure in which lines are drawn in a manner that modulates at least one color of the artwork to carry predefined data, the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the pattern in the artwork.
- 19. A printed article, characterized by inclusion of a machine-detectable signal represented in a marking formed on the surface of said article, the signal being based on a rotationally symmetric pattern and being machine-detectable from visible light scan data taken from said article, but said signal being imperceptible upon human inspection of said article, said signal indicating to a compliant apparatus that said article should not be reproduced.
-
22. A method of sensing and responding to a hidden signal embodied on a printed article, the method including:
-
collecting visible light scan data from the article; transforming the scan data to a complementary domain; inspecting the transformed data for a telltale pattern, said telltale pattern being rotationally symmetric, wherein presence of said pattern indicates presence of said signal; and taking an action based on presence of said signal. - View Dependent Claims (23, 24, 25)
-
-
26. A method of representing a signal in a printed document, so that the signal can readily be machine-sensed from visible light scan data acquired from the document no matter what orientation the document is in when the scan data is acquired, characterized by printing the document with a pattern that hides the signal as a subtle noise-like pattern that modulates width or placement of lines defining line art on said document, said noise-like pattern being derived from a rotationally symmetric pattern, wherein presence of said pattern in a printed document serves to indicate to compliant apparatus that the document should not be reproduced.
-
27. In an system that processes visible light scan data acquired from a printed line art document, an improved method of operation including:
-
analyzing said scan data to detect a control signal steganographically represented by variations in width or placement of lines comprising the line art; and taking an action in response to detection of the control signal. - View Dependent Claims (28, 29)
-
- 30. A printed line art document having a pattern formed over at least a portion thereof, characterized in that the pattern hides a signal that indicates, to compliant equipment, that the document should not be copied, the signal-hiding pattern being detectable by computer analysis of visible light scan data corresponding to said document, the pattern being based on a rotationally symmetric feature.
Specification