Method and apparatus for protecting the legitimacy of an article
First Claim
1. A method of embedding linked watermarks in an article requiring protection against forgery, said method including the steps of:
- extracting information from a first portion of said article;
encrypting said extracted information from said first portion;
generating a watermark using said encrypted information;
rendering said watermark to a second portion of said article; and
repeating the extracting, encrypting, generating and rendering steps with another portion of said article until all relevant information of said article has been processed and a cryptographic link is formed thereby.
3 Assignments
0 Petitions
Accused Products
Abstract
A method, an apparatus and a computer program product are disclosed for protecting the legitimacy of an article (100), and in particular an electronic document, against forgery or fraud. Such articles include passports, credit cards, bank notes, lottery tickets, secure forms. The method includes the following steps: several watermarks (204, 224, 244) are generated independently (304, 306, 308) by different cryptographic watermarking mechanisms controlled utilising information permanently associated within the article or product (100); and each watermark is embedded in a linked cryptographic manner (160, 162, 164). Subsequently, the watermarks can be scanned and digitised (410). The authenticity of the article (100) can be determined by verifying the correctness of extracted watermarks and the encryption links (160, 162, 164) among them. Also disclosed is a method of embedding an invisible watermark (714) in an official seal (712) incorporated in an electronic article or document (700).
241 Citations
84 Claims
-
1. A method of embedding linked watermarks in an article requiring protection against forgery, said method including the steps of:
-
extracting information from a first portion of said article;
encrypting said extracted information from said first portion;
generating a watermark using said encrypted information;
rendering said watermark to a second portion of said article; and
repeating the extracting, encrypting, generating and rendering steps with another portion of said article until all relevant information of said article has been processed and a cryptographic link is formed thereby. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus for embedding linked watermarks in an article requiring protection against forgery, said apparatus including:
-
means for extracting information from a first portion of said article;
means for encrypting said extracted information from said first portion;
means for generating a watermark using said encrypted information;
means for rendering said watermark to a second portion of said article; and
means for repeating the extracting, encrypting, generating and rendering steps with another portion of said article until all relevant information of said article has been processed and a cryptographic link is formed thereby. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product having a computer readable medium having a computer program recorded therein for embedding linked watermarks in an article requiring protection against forgery, said computer program product including:
-
means for extracting information from a first portion of said article;
means for encrypting said extracted information from said first portion;
means for generating a watermark using said encrypted information;
means for rendering said watermark to a second portion of said article; and
means for repeating the extracting, encrypting, generating and rendering steps with another portion of said article until all relevant information of said article has been processed and a cryptographic link is formed thereby. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
-
25. An article requiring protection against forgery or fraud, said article including:
-
two or more portions for containing information, said information including text, biometric data, or both; and
two or more watermarks, each watermark printed in a respective one of said portions and being dependent upon information in a different portion, whereby a cryptographic link is formed between said two or more portions. - View Dependent Claims (26)
-
-
27. An article requiring protection against forgery or fraud, said article formed by the steps of:
-
extracting information from a first portion of said article, said article having two or more portions for containing information, said information including text, biometric data, or both;
encrypting said extracted information from said first portion;
generating a watermark using said encrypted information;
rendering said watermark to a second portion of said article; and
repeating the extracting, encrypting, generating and rendering steps with another portion of said article until all relevant information of said article has been processed so that two or more watermarks are formed, each watermark being rendered in a respective one of said portions and being dependent upon information extracted from a different portion, whereby a cryptographic link is formed between said two or more portions.
-
-
28. A method of forming an article requiring protection against forgery, said method including the steps of:
-
generating an invisible watermark dependent upon information contained in said article; and
rendering said watermark within an official seal placed on said article, said official seal being a securely controlled item of an authority. - View Dependent Claims (29, 30, 31, 32, 33)
extracting information from a portion of said article; and
encrypting said extracted information.
-
-
31. The method according to claim 30, wherein said information is extracted directly from text.
-
32. The method according to claim 30, wherein said information is extracted from one or more invariant features of an image.
-
33. The method according to claim 32, wherein said image depicts biometric data of a person associated with the article.
-
34. An apparatus for forming an article requiring protection against forgery, said apparatus including:
-
means for generating an invisible watermark dependent upon information contained in said article; and
means for rendering said watermark within an official seal placed on said article, said official seal being a securely controlled item of an authority. - View Dependent Claims (35, 36, 37, 38, 39)
means for extracting information from a portion of said article; and
means for encrypting said extracted information.
-
-
37. The apparatus according to claim 36, wherein said information is extracted directly from text.
-
38. The apparatus according to claim 36, wherein said information is extracted from one or more invariant features of an image.
-
39. The apparatus according to claim 38, wherein said image depicts biometric data of a person associated with the article.
-
40. A computer program product having a computer readable medium having a computer program recorded therein for forming an article requiring protection against forgery, said computer program product including:
-
means for generating an invisible watermark dependent upon information contained in said article; and
means for rendering said watermark within an official seal placed on said article, said official seal being a securely controlled item of an authority. - View Dependent Claims (41, 42, 43, 44, 45)
means for extracting information from a portion of said article; and
means for encrypting said extracted information.
-
-
43. The computer program product according to claim 42, wherein said information is extracted directly from text.
-
44. The computer program product according to claim 42, wherein said information is extracted from one or more invariant features of an image.
-
45. The computer program product according to claim 44, wherein said image depicts biometric data of a person associated with the article.
-
46. An article requiring protection against forgery or fraud, said article including:
-
a portion containing information, said information including text, biometric data, or both;
an official seal placed on said article, said official seal being a securely controlled item of an authority; and
an invisible watermark dependent upon said information and being rendered within said official seal. - View Dependent Claims (47)
-
-
48. An article requiring protection against forgery or fraud, said article formed by the steps of:
-
generating an invisible watermark dependent upon information contained in said article, said information including text, biometric data, or both; and
rendering said watermark within an official seal placed on said article, said official seal being a securely controlled item of an authority.
-
-
49. A method of verifying the legitimacy of an article against forgery, said method including the steps of:
-
inputting said article as two or more portions;
extracting at least one watermark from each portion;
determining a watermark from information in each portion;
comparing said extracted watermark from one portion with said determined watermark from a different portion to determine if a corresponding cryptographic link is found; and
repeating said comparing step until all portions of said article have been processed, said article being verified as a legitimate article if all cryptographic links are found between said two or more portions. - View Dependent Claims (50, 51, 52, 53, 54, 55)
scanning said product; and
dividing said scanned product into two or more portions.
-
-
51. The method according to claim 50, further including the step of:
scanning information from a portion of said product to reconstruct a seed to a generated watermark using a cryptographic technique carried out in a process of embedding a watermark in said portion.
-
52. The method according to claim 51, further including the step of:
extracting an invariant feature from said scanned information to reconstruct said seed.
-
53. The method according to claim 52, wherein said extracted, invariant feature includes biometric data.
-
54. The method according to claim 51, further including the step of:
decrypting said scanned information to reconstruct said seed.
-
55. The method according to claim 49, wherein a cryptographic link is a self-circle.
-
56. An apparatus for verifying the legitimacy of an article against forgery, said apparatus including:
-
means for inputting said article as two or more portions;
means for extracting at least one watermark from each portion;
means for determining a watermark from information in each portion;
means for comparing said extracted watermark from one portion with said determined watermark from a different portion to determine if a corresponding cryptographic link is found; and
means for repeating said comparing step until all portions of said article have been processed, said article being verified as a legitimate article if all cryptographic links are found between said two or more portions. - View Dependent Claims (57, 58, 59, 60, 61, 62)
means for scanning said product; and
means for dividing said scanned product into two or more portions.
-
-
58. The apparatus according to claim 57, further including:
means for scanning information from a portion of said product to reconstruct a seed to a generated watermark using a cryptographic technique carried out in a process of embedding a watermark in said portion.
-
59. The apparatus according to claim 58, further including:
means for extracting an invariant feature from said scanned information to reconstruct said seed.
-
60. The apparatus according to claim 59, wherein said extracted, invariant feature includes biometric data.
-
61. The apparatus according to claim 58, further including:
means for decrypting said scanned information to reconstruct said seed.
-
62. The apparatus according to claim 56, wherein a cryptographic link is a self-circle.
-
63. A computer program product having a computer readable medium having a computer program recorded therein for verifying the legitimacy of an article against forgery, said computer program product including:
-
means for inputting said article as two or more portions;
means for extracting at least one watermark from each portion;
means for determining a watermark from information in each portion;
means for comparing said extracted watermark from one portion with said determined watermark from a different portion to determine if a corresponding cryptographic link is found; and
means for repeating said comparing step until all portions of said article have been processed, said article being verified as a legitimate article if all cryptographic links are found between said two or more portions. - View Dependent Claims (64, 65, 66, 67, 68, 69)
means for scanning said product; and
means for dividing said scanned product into two or more portions.
-
-
65. The computer program product according to claim 64, further including:
means for scanning information from a portion of said product to reconstruct a seed to a generated watermark using a cryptographic technique carried out in a process of embedding a watermark in said portion.
-
66. The computer program product according to claim 65, further including:
means for extracting an invariant feature from said scanned information to reconstruct said seed.
-
67. The computer program product according to claim 66, wherein said extracted, invariant feature includes biometric data.
-
68. The computer program product according to claim 65, further including:
means for decrypting said scanned information to reconstruct said seed.
-
69. The computer program product according to claim 63, wherein a cryptographic link is a self-circle.
-
70. A method of verifying the legitimacy of an article against forgery, said method including the steps of:
-
extracting at least one invisible watermark from an official seal, said official seal being a securely controlled item of an authority; and
comparing said extracted watermark with verification information to determine if said extracted watermark matches said verification information indicating that said article is legitimate. - View Dependent Claims (71, 72, 73, 74)
generating a watermark dependent upon information forming part of said article to provide said verification information.
-
-
73. The method according to claim 72, wherein said information forming part of said article is biometrics data.
-
74. The method according to claim 71, further including the step of:
decrypting said watermark.
-
75. An apparatus for verifying the legitimacy of an article against forgery, said apparatus including:
-
means for-extracting at least one invisible watermark from an official seal, said official seal being a securely controlled item of an authority; and
means for comparing said extracted watermark with verification information to determine if said extracted watermark matches said verification information indicating that-said article is legitimate. - View Dependent Claims (76, 77, 78, 79)
means for generating a watermark dependent upon information forming part of said article to provide said verification information.
-
-
78. The apparatus according to claim 77, wherein said information forming part of said article is biometrics data.
-
79. The apparatus according to claim 76, further including:
means for decrypting said watermark.
-
80. A computer program product having a computer readable medium having a computer program recorded therein for verifying the legitimacy of an article against forgery, said computer program product including:
-
means for extracting at least one invisible watermark from an official seal, said official seal being a securely controlled item of an authority; and
means for comparing said extracted watermark with verification information to determine if said extracted watermark matches said verification information indicating that said article is legitimate. - View Dependent Claims (81, 82, 83, 84)
means for generating a watermark dependent upon information forming part of said article to provide said verification information.
-
-
83. The computer program product according to claim 82, wherein said information forming part of said article is biometrics data.
-
84. The computer program product according to claim 81, further including:
means for decrypting said watermark.
Specification