Secure documents with hidden signals, and related methods and systems
First Claim
1. A printed security document, the security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which line width and/or line spacing is adjusted to carry predefined data, the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork.
7 Assignments
0 Petitions
Accused Products
Abstract
A security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which lines width or line spacing is adjusted to carry predefined data. The artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork. Methods for detecting the security pattern include use of a frequency domain structure to detect the security pattern despite rotation and scaling of the document, use of signal tiling to improve signal detection, and use of statistical analyses to verify detection of the security pattern.
-
Citations
25 Claims
- 1. A printed security document, the security document comprising artwork including a security pattern, characterized in that the security pattern has the form of a line structure in which line width and/or line spacing is adjusted to carry predefined data, the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork.
-
7. A method of generating artwork for a security document, the method comprising:
-
providing a security pattern modulated to carry predefined data; and modifying width or line spacing of the artwork of the security document according to the security pattern, wherein the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A printed document, the document comprising artwork including a security pattern, characterized in that the security pattern has the form of a contour structure in which contours are provided in a manner that modulates at least one color of the artwork to carry predefined data, the artwork is generated by the modifying at least one color of at least a part of the artwork to embed the security pattern in the artwork.
-
15. In a system that processes visible light scan data acquired from a printed line art document, an improved method of operation including:
-
utilizing a processor or electronic processing circuitry, analyzing said scan data to detect a control signal steganographically represented by variations in width or placement of lines comprising the line art; and taking an action in response to detection of the control signal.
-
-
16. In a system that processes visible light electronic scan data acquired from a printed line art document, an improved method of operation including:
-
analyzing said electronic scan data to detect a control signal steganographically represented by variations in width or placement of lines comprising the line art, wherein the analyzing includes transforming the scan data to a complementary signal domain, and detecting a pattern in the transformed data; and taking an action in response to detection of the control signal. - View Dependent Claims (17)
-
-
18. A printed currency document, the printed currency document comprising a pattern, the pattern representing or defining a predefined signal, the presence of the predefined signal is not apparent to a human observer of the printed currency document, the predefined signal being determined from the printed currency document by obtaining image data utilizing visible light imaging, the image data corresponding to at least a portion of the printed currency document, transforming the image data to a complementary signal domain to yield transform data, the transforming generates the transform data based on a Fourier transform, and analyzing the transform data to determine the predefined signal.
-
19. In a system that processes visible light image data corresponding to a printed currency document, a method comprising:
-
obtaining visible light image data corresponding to at least a portion of a printed currency document; analyzing using a printer or electronic processor the visible light image data to detect;
i) a plural-bit signal steganographically hidden in the printed currency document through alterations to artwork or a graphic carried by the printed currency document;
or ii) a predefined signal represented or defined by a pattern carried by the printed currency document, the predefined signal being determined from transforming the visible light image data to a complementary signal domain to yield transform data and analyzing the transform data to determine the predefined signal; andtaking an action in response to detection of the;
i) plural-bit signal;
or ii) the predefined signal. - View Dependent Claims (20, 21, 22, 23)
-
-
24. A printed currency document comprising:
- i) a plural-bit signal steganographically hidden with alterations to artwork or a graphic carried by the printed currency document, the plural-bit signal being obtained through analysis of visible light image data corresponding to the artwork or graphic; and
ii) a pattern carried by the printed currency document, the pattern representing or defining a predefined signal, the predefined signal being determined from transforming the visible light image data to a complementary signal domain to yield transform data and analyzing the transform data to determine the predefined signal. - View Dependent Claims (25)
- i) a plural-bit signal steganographically hidden with alterations to artwork or a graphic carried by the printed currency document, the plural-bit signal being obtained through analysis of visible light image data corresponding to the artwork or graphic; and
Specification