Methods and devices for recognizing banknotes and responding accordingly
First Claim
1. A method of deterring reproduction of a security document, comprising:
- encoding the security document with plural-bit digital data, said encoding not being apparent to a human observer of the security document;
providing sampled image data corresponding to said security document as scanned by a visible light scanning device;
analyzing said image data to detect the digital data therein, said detection signifying that the image data likely corresponds to a security document; and
intervening in response to detection of the digital data.
6 Assignments
0 Petitions
Accused Products
Abstract
Line art on a banknote or other security document is slightly changed to effect the encoding of plural-bit digital data (i.e. the banknote is digitally watermarked). When such a banknote is thereafter scanned, the resulting image data can be recognized as corresponding to a banknote by detection of the encoded data. (Alternatively, the image data can be recognized as corresponding to a banknote by machine detection of other forms of watermarking, or by reference to visible structures characteristic of banknotes.) In response to detection of a banknote, the detecting apparatus (e.g., a scanner, photocopier, or printer) can intervene so as to prevent or deter counterfeiting. For example, the apparatus can interrupt a copying operation, and display a message reminding the operator that it is illegal to reproduce currency. Another option is to dial a remote service and report the attempted reproduction of a banknote. Yet another option is to permit the copying, but to insert forensic tracer data (e.g. steganographically encoded binary data) in the resultant copy. The tracer data can memorialize the serial number of the machine that made the copy and/or the date and time the copy was made. To address privacy concerns, such tracer data is not normally inserted in photocopied output, but is so inserted only when the subject being photocopied is detected as being a banknote.
-
Citations
23 Claims
-
1. A method of deterring reproduction of a security document, comprising:
-
encoding the security document with plural-bit digital data, said encoding not being apparent to a human observer of the security document;
providing sampled image data corresponding to said security document as scanned by a visible light scanning device;
analyzing said image data to detect the digital data therein, said detection signifying that the image data likely corresponds to a security document; and
intervening in response to detection of the digital data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
analyzing said image data to detect a visible structure characteristic of a security document; and
intervening in response to detection of the visible structure;
wherein detection of either the visible structure or the digital data serves to trigger the intervention.
-
-
4. The method of claim 1 in which the intervening comprises preventing reproduction of the image data.
-
5. The method of claim 1 in which the intervening comprises sending a message to a remote location to signal processing of security document data.
-
6. The method of claim 1 in which the intervening comprises inserting forensic tracing data in the image data.
-
7. The method of claim 6 in which the intervening comprises inserting first and second plural-bit digital watermarks in the image data, one of said watermarks serving to convey data identifying an apparatus involved in attempted reproduction of the security document.
-
8. The method of claim 7 in which the first and second digital watermarks are of different robustness.
-
9. The method of claim 7 in which the first and second watermarks are encoded in accordance with different code signals.
-
10. The method of claim 1 in which said encoding encompasses regions of the document distinct from any text or visible security pattern thereon.
-
11. A method of deterring reproduction of a security document, comprising:
-
at a first site, examining suspect image data corresponding to an object as sampled by a visible light scanning device;
determining at said first site whether said suspect image data corresponds to a security document by reference to plural-bit digital data steganographically encoded in the security document, said steganographic encoding not being apparent to a human observer of the security document; and
if so, contacting a second site and reporting detection of security document-related data. - View Dependent Claims (12)
-
-
13. An apparatus for validating a security document comprising:
-
a visible light optical scanner for producing image data corresponding to a note input to the apparatus;
a processor for detecting a digital watermark within the image data, the watermark representing plural digital bits of auxiliary information, the detection of such watermark indicating that the note is a security document; and
a control unit that responds in a first manner if the processor detects a watermark within the image data, and that responds in a second, different, manner if the processor does not detect a watermark within the image data. - View Dependent Claims (14, 15, 16, 17)
the processor also analyzes the image data for a visible structure characteristic of a security document; and
the control unit responds in the first manner only if both the watermark and the visible structure are detected in the image data by the processor.
-
-
16. An automatic teller machine according to claim 15, said machine serving both to dispense and accept security documents from users thereof.
-
17. The apparatus of claim 13 in which said watermark encompasses image data corresponding to regions of said note apart from any text or security pattern represented therein.
-
18. Apparatus for detecting the attempted counterfeiting of security documents, comprising:
-
a security document having line art thereon;
a visible light scanner for scanning the security document; and
a steganographic watermark detector for decoding binary data encoded within the security document line art and scanned by the scanner, the encoding of said line art with binary data not being apparent to a human observer of the security document, the presence of said decoded binary data indicating the attempted counterfeiting of a security document. - View Dependent Claims (19, 20, 21, 22, 23)
-
Specification