Processing scanned security documents notwithstanding corruptions such as rotation
First Claim
1. A method of processing a security document, comprising:
- generating scan data corresponding to said document;
performing a domain transformation on the scan data to obtain corruption data related thereto; and
detecting embedded information from the processed scan data, said detecting employing said corruption data.
6 Assignments
0 Petitions
Accused Products
Abstract
Security documents (e.g. passports, currency, event tickets, and the like) are encoded to convey machine-readable multi-bit binary information (e.g. digital watermark), usually in a manner not alerting human viewers that such information is present. The documents can be provided with overt or subliminal calibration patterns. When a document incorporating such a pattern is scanned (e.g. by a photocopier), the pattern facilitates detection of the encoded information notwithstanding possible scaling or rotation of the scan data. The calibration pattern can serve as a carrier for the watermark information, or the watermark can be encoded independently. In one embodiment, the watermark and the calibration pattern are formed on the document by an intaglio process, with or without ink. A photocopier responsive to such markings can take predetermined action if reproduction of a security document is attempted. A passport processing station responsive to such markings can use the decoded binary data to access a database having information concerning the passport holder. Some such apparatuses detect both the watermark data and the presence of a visible structure characteristic of a security document (e.g., the seal of the issuing central bank).
169 Citations
5 Claims
-
1. A method of processing a security document, comprising:
-
generating scan data corresponding to said document;
performing a domain transformation on the scan data to obtain corruption data related thereto; and
detecting embedded information from the processed scan data, said detecting employing said corruption data. - View Dependent Claims (2, 3, 4)
the domain transformation is a Fourier-Mellin transform;
the corruption data is a scale or rotation factor; and
the detecting includes compensating the scan data in accordance with the corruption data.
-
-
3. The method of claim 1 in which the embedded information comprises multi-bit digital data.
-
4. The method of claim 1 which further includes using the detected information to access additional information in a database.
-
5. Apparatus for use with security documents, comprising:
-
a scanner for scanning a security document and producing scan data corresponding thereto;
a processor responsive to encoding on the security document for determining rotation of the scan data from a reference state and producing output data corresponding thereto;
a visible structure detector; and
a steganographic watermark detector;
said output data permitting the detectors to detect visible structures and steganographic watermarks associated with the security document notwithstanding at least certain rotations of the scan data.
-
Specification