The present invention relates to the technical field of optical detection of the authenticity or non-authenticity of visual items. Particularly, the invention relates to the technical field of respectively encryption methods and authentication methods of a digital representation of a visual item using respectively an encryption device and an authentication device.
The problems of tampering documents or items of value are well known and are growing every day. For example, value documents such as ID card, passport, driving license, etc. usually contains a photo of the holder and a part with text based on personal information such as name, date of birth, etc. For this kind of documents, several techniques can be used to tamper them.
Indeed, in some situation the tampering can comprise a replacement of the visual item, for example the picture on an ID card. This substitution can imply only few modifications such as using a morphing process or can be a complete replacement of the picture. All these techniques can be very difficult to be detected by naked eye. Indeed, in case of human eyes, the replacement of the picture can be undetectable, and in case of a machine optical reader the morphing technique can be quite effective.
Regarding these technical problems, several solutions have been proposed by the prior art. The most used ones comprise material-based security features. These material-based security features can be based on security inks, for example.
Nevertheless, these solutions often imply to physically add features on the visual item or at least on the medium carrying said visual item, i.e. on the value document. This can lead to design problem or to an increase of the price to produce said value document. Moreover, some supply chain modification can be required.
Beyond the field of the value documents, the tampering of other kinds of visual items is also a problem. For example, paintings or collectible cards can be targeted. In this case, using material-based security features is still a solution. However, this solution can be expensive and cannot be implemented directly on the visual item itself in some situations.
Moreover, usually the use of material-based security features implies the use of dedicated reader devices configured to evaluate if the value document has been tampered or not. These dedicated reader devices are also costly and cannot be always owned by the final customer, for example.
It is therefore an object of the invention to solve at least partially some of these technical problems.
According to an aspect, the present invention relates to a method for authenticating a visual item VI using a stored digital fingerprint F0 and an authentication device AD, said authentication device AD comprising at least one optical unit OPT1 and at least one processing unit CPU1, said stored digital fingerprint F0 being previously generated from an authentic visual item AVI, said method comprising the following steps:
The present invention allows to detect the authenticity of a visual item based on a stored digital fingerprint. The present invention allows to authenticate a visual item based on a plurality of images of said visual item and on a stored digital fingerprint.
The present invention can be used regarding any kind of visual item.
The present invention uses advantageously likelihood functions to update a probability of authenticity, said update being based on each new image of the visual item that is processed by the invention.
The present invention allows to use a plurality of images of a visual item to compute the probability of authenticity of said visual item based on a stored digital fingerprint.
Advantageously, each new processed image of the visual item updates the probability of authenticity.
The present invention avoids the need of material-based security features to help a user to know if a visual item is authentic or not. Only some images of a visual item and a stored digital fingerprint of the authentic visual item are needed to confirm if the considered visual item is authentic or not
According to another aspect, the present invention relates to an authentication device AD configured to authenticate a visual item VI using a stored digital fingerprint F0, said stored digital signature F0 being previously generated from an authentic visual item VI, said authentication device AD comprising:
This allows a user to check the authenticity of a visual item using the present invention.
According to another aspect, the present invention relates to a digital fingerprint generation device GD configured to generate a digital signature F0 from an authentic visual item AVI, said digital fingerprint F0 being configured to be stored, said digital signature generator device GD comprising:
This allows to generate a digital fingerprint from an authentic visual item using only one image.
Before providing below a detailed review of embodiments of the invention, some optional characteristics that may be used in association or alternatively will be listed hereinafter:
According to an example, the computing step of the probability P(H) comprises the following steps:
and
wherein w is the number of spatially corrected image Ict of the plurality of spatially corrected image Ic and {Yi}(i=0, . . . w) are predetermined weights.
This allows to compute the probability P(H) of authenticity based on each new corrected image Ict.
This allows to compute the probability P(H) from a prior probability P0(H), said prior probability P0(H) is updated using each new corrected image Ict through the first and the second likelihood functions.
Each update applied to the probability P(H) is advantageously weighted, this allows to vary the impact of a corrected image Ict for example based on a quality score.
According to an example, the probability P(H) is computed from a probability distribution p(P(H)) and P(H) is related to at least one descriptive statistics of the probability distribution p(P(H)), and preferably P(H) is a mathematical expectation of p(P(H)) as follow:
Using a probability distribution allows to calculate more descriptive statistics for P(H).
According to an embodiment, this allows to calculate a confidence interval. This confidence interval can be used to make better decision than only a point-based probability estimate P(H), because using a probability distribution p(P(H)) allows to have the probability P(H) and an uncertainty of this probability P(H). Preferably, the confidence interval can be calculated using percentiles. For example, the 90% confidence interval of P(H) is between the 5% th and 95% th percentile of the probability distribution p(P(H).
According to an embodiment, the computing step of the probability P(H) comprises the following steps:
and
wherein w is the number of spatially corrected image Ict of the plurality of spatially corrected image Ic and {αi} (i=0, . . . w) are predetermined weights.
This allows to compute the probability P(H) of authenticity based on each new corrected image Ict.
This allows to compute a probability distribution p(P(H)) from a prior probability distribution p0(P(H)), said prior probability distribution p0(P(H)) is updated using each new corrected image Ict through the first and the second likelihood functions.
Each update applied to the probability distribution p(P(H)) is advantageously weighted, this allows to vary the impact of a corrected image Ict for example based on a quality score.
According to an example, the calculating step of the first likelihood function L(Ict|H) based on the distance metric D(Ict) comprises the following steps:
This allows to improve the computation of the probability P(H) by calculating the first and the second likelihood function based on the distance metric.
According to an example, the calculating step of the first likelihood function L(Ict|H) based on the distance metric D(Ict) comprises the following steps:
This allows to improve the computation of the probability distribution p(P(H)) by calculating the first and the second likelihood function based on the distance metric.
According to an example, the first likelihood function L(Ict|H) is at least partially generated by an artificial intelligence algorithm A1 using at least one set of training data SD1, said first likelihood function L(Ict|H) comprising at least a sub-function SF1 defined by a density of probabilities that the visual item VI is authentic, said sub-function SF1 being generated by the artificial intelligence algorithm A1 using said training data SD1, said training data SD1 corresponding to authentic visual items, said first sub-function SF1 corresponding to a mathematical model of authentic visual items;
Using an artificial intelligence algorithm allows to train the present invention to optimize the first and the second likelihood function.
This allows to adapt the first and the second likelihood function by training to different situations.
According to an example, the visual item VI is carried by a medium ME and the first likelihood function L(Ict|H) is at least partially generated using an artificial intelligence algorithm A2 configured to generate at least one linear combination of mathematical models of media for each spatially corrected image Ict based on at least a plurality of mathematical models of media, and the second likelihood function L(Ict|G) is at least partially generated using an artificial intelligence algorithm A2′ configured to generate at least one linear combination of mathematical models of media for each spatially corrected image Ict based on at least a plurality of mathematical models of media.
This allows to consider the nature of the medium in the calculations of the present invention.
This allows to extract some features from the medium and then to classify this medium based on training data
According to an example, the artificial intelligence algorithms A2 and A2′ comprise the following steps:
This allows to consider the nature of the medium in the calculations of the present invention.
This allows to extract some features from the medium and then to classify this medium based on training data.
This allows to improve the accuracy of the invention based on the nature of the medium.
According to an example, the method comprises, before the step of extracting the plurality of features from a spatially corrected image Ict of the plurality of spatially corrected images Ic, a step of calculating, by the processing unit CPU1, a quality score of each image Ict of the plurality of spatially corrected images Ic, and only if said quality score is higher than a predetermined threshold, the step of extracting from said image Ictthe plurality of features is executed.
This allows to class the corrected images based on their quality score.
This allows to eliminate corrected images having a bad quality score for example.
This allows to promote corrected images having a good quality score for example.
This allows to weight the probability Pt(H) and/or the probability distribution pt(P(H)) in the computation step of the probability P(H).
According to an example, the distance metric D(Ict) is calculated using a matrix Q as a mathematical operator between the stored digital fingerprint F0 and the digital fingerprint Ft, said matrix Q is generated using an artificial intelligence algorithm A3, said artificial intelligence algorithm A3 is configured to generate said matrix Q based at least two sets of training data SD3 and SD4 such as:
This allows to consider complex interactions when calculating the distance metric D(Ict) between the generated fingerprint Ft and the stored digital fingerprint F0.
According to an example, the predetermined set of rules are established based on an artificial intelligence algorithm A4 configured to generate respectively a prior probability P0(H) or a prior probability distribution p0(P(H)) based on at least one of these parameters:
a. a reputation score based on the nature of the visual item, and/or the location of the visual item and/or on metadata related to the visual item and/or an issuer of the visual item and/or an issuer of a medium carrying the visual item, a uniform law of distribution,
and/or based on at least one of the following processes:
This allows to consider various parameters to set the predetermined set of rules.
According to an example, the stored digital fingerprint F0 comprises a vector V0comprising a predetermined number N of elements, and the digital fingerprint Ft comprises a vector Vt comprising a number M of elements, wherein M≤N and wherein M is a function of the quality score of the spatially corrected image Ict.
This allows to adapt the calculation of the distance metric D(Ict) based on the length of the generated digital fingerprint Ft.
This allows to adapt the calculation of the distance metric D(Ict) based for example on the quality of the corrected image Ict.
The aims, objects, as well as the technical features and advantages of the invention will emerge better from the detailed description of an embodiment of the invention which is illustrated by the following figures in which:
The drawings are given by way of example and do not limit the invention. They constitute representations of principle intended to facilitate understanding of the invention and are not necessarily on the scale of practical applications.
The present disclosure is here described in detail with reference to non-limiting embodiments illustrated in the drawings.
The present invention relates to a method for authenticating a visual item using a stored digital fingerprint. Said stored digital fingerprint has been previously generated according to a digital fingerprint generation method described hereafter. Said stored digital fingerprint is generated from an authentic visual item. Said stored digital fingerprint is advantageously generated by an issuer, preferably an official issuer, accredited to issue a stored digital fingerprint, i.e. to establish the authenticity of an authentic visual item. For example, said issuer can be a governmental agency or a public administration, etc.
The present invention relates to a solution to check if a visual item is authentic or not. To do so, a digital fingerprint is generated from the visual item to be authenticated and is compared with the stored digital fingerprint coming from the authentic visual item, preferably issued by an official and/or accredited issuer.
According to an embodiment, and as described hereafter, the issuer of the stored digital fingerprint can use a digital fingerprint generation device to generate said stored digital fingerprint.
According to an embodiment, and as described hereafter, a user or a controller or an inspector can use an authentication device to authenticate if a visual item is authentic or not using on said stored digital fingerprint.
The present invention can be used in a lot of different cases. Some of them are described in detail hereafter. One of these cases can be a value document, such as an ID card, comprising the picture of the owner of said ID card and a stored digital fingerprint corresponding to the digital fingerprint of the picture of the owner of the ID card, said digital fingerprint, also called stored digital fingerprint, having been generated by the official issuer of said ID card.
According to an embodiment, in order to authenticate the ID card of a person, a user uses an authentication device to extract the stored digital fingerprint and to generate a digital fingerprint by itself from the picture carried by the ID card. Then, the generated digital fingerprint is compared to the stored digital fingerprint to notify the user that the picture carried by the ID card is authentic or not. According to an embodiment, the authentication device is configured to execute an authentication method comprising several steps in order to compare a generated digital fingerprint with said stored digital fingerprint. As described hereafter, the visual item can be taken among several items, such as a value document, an identity photo, a painting, a collectible card, etc.
The present invention is described hereafter using
According to an embodiment, the present invention relates to a method for authenticating 200 a visual item VI 50. Said authentication method 200 uses at least stored digital fingerprint F0 11. Said authentication method 200 is executed by an authentication device AD 40 described in
As described hereafter, said authentication device AD 40 comprises at least:
Advantageously, said processing unit CPU1 42 and said optical unit OPT1 41 are in communication with each other, i.e. data can be sent by the optical unit OPT1 41 to the processing unit CPU1 42 and/or data can be sent by the processing unit CPU1 42 to the optical unit OPT1 41.
According to an embodiment, said optical unit OPT1 41 can be a camera, a camera system, an optical sensor, a matrix of optical sensors, a network of optical sensors, etc.
According to an embodiment, said authentication device AD 40 can be a smartphone, a computer, a laptop, a dedicated reader, etc.
As previously described, and as illustrated by
According to an embodiment and as illustrated by
According to an embodiment, each image It of the plurality of images I 44 comprises an area comprising at least a portion of the visual item VI 50 to be authenticated, i.e. each image It of the plurality of images I 44 comprises at least partially one digital representation of said visual item VI 50. According to one embodiment, each image It are a frame extracted from a set of frames coming from a video, advantageously acquired by the optical unit OPT1 41, preferably in real time. Indeed, according to an embodiment, the optical unit OPT1 41 can be configured to acquire a video of an area comprising at least a portion of the visual item VI 50 to be authenticated, and each image It comes from said video. According to an embodiment, these images It are selected based on a random selection from said video and/or correspond to a continuous portion of frames of said video. According to another embodiment, based on the quality score discussed hereafter, some images It can be removed from the plurality of images I 44 and/or other images It can be extracted from the video and added to the plurality of images I 44.
According to an embodiment, the image It of the plurality of image I 44 is acquired during the processing of the image It by the processing unit CPU1 42, said processing comprising the steps of generating 220 a corrected image Ic, extracting 230 a plurality of features, generating 240 a digital fingerprint Ft−1 45, calculating 250 the distance metric D(ICt−1), calculating 260 the first likelihood function L(Ict−1|H) of authenticity H of the visual item VI 50 and a second likelihood function L(Ict−1|G) of non-authenticity G of the visual item VI 50 and computing 270 the probability P(H) that the visual item VI 50 is authentic.
Indeed, according to said embodiment, the step of generating 220 the corrected image It is executed whereas the step of acquiring 210 the plurality of images I 44 is still executed
According to an embodiment, at least some of the following steps of the authentication method 200 are executed in real time when the image It is acquired:
According to an embodiment, before acquiring the image It, the computing step 270 is executed based on the image It−1.
According to an embodiment, the processing steps regarding the image It can be done before, and/or during and/or after the acquisition of image It+1.
According to an embodiment, the plurality of images I 44 can be acquired from at least a digital file, for example by downloading at least one digital file. According to said embodiment, said optical unit OPT1 41 can comprise a module configured to download at least one image of at least one visual item, preferably using a QR code as a link for downloading said at least one image of at least one visual item.
According to an embodiment, the optical unit OPT1 41 can be at least one camera of a smartphone.
According to an embodiment, the step of generating 220 a corrected image Ict for each image It of the plurality of image I 44 is configured to identify at least one spatial feature on each digital representation of the visual item from the image It, and then to use this spatial feature to spatially correct the image It in order to create a plurality of spatially corrected images Ic. Several ways can be used to spatially correct the images It and are well-known by the skilled person in the art. These corrections can be needed due to the orientation of the optical unit OPT1 41 regarding the visual item VI 50. These corrections can be linked with perspective misalignment for example.
According to an embodiment, the step of generating 220 a corrected image Ict can comprise a step of detecting a contour, i.e. a border, and/or at least a portion of a contour and/or of a border, and/or at least a mark on the visual item VI 50 and/or and the medium 51 carrying it, allowing the processing unit CPU1 42 to determine the spatial orientation of the visual item VI 50 regarding the optical unit OPT1 41 and/or the spatial orientation of the optical unit OPT1 41 regarding the visual item VI 50. According to an embodiment, the processing unit CPU1 42 can use the optical unit OPT1 41 and at least one sensor to evaluate the orientation in space of the optical unit OPT1 41 with respect to the visual item VI 50, such as for example a gyroscope and/or an accelerometer.
According to an embodiment, the detection of a border, i.e. of a contour, in the digital representation of the visual item VI 50 can comprise the detection of at least three of the four corner points of a border, preferably the detection of the four corner points of a border or of a contour. This detection can be done using for example TensorFlow Lite's implementation of EfficientNet deep learning model which is common for the skilled person in the art. As this detection use deep learning, it can be trained using different set of images and/or borders and/or spatial orientations. According to an embodiment, the detection of a border, i.e. of a contour, in the digital representation of the visual item VI 50 can comprise the detection of at least a portion of corners of the corners of a polygon.
According to an embodiment, the step of generating 220 a corrected or spatially corrected image Ict can comprise a step of estimating the projective transform between the optical unit OPT1 41 coordinate system and the world coordinate system, i.e. the coordinate system wherein the visual item VI 50 is located. Once this projective transform is estimated, a step of warping the image It into the image Ict is executed, preferably by the processing unit CPU1 42, to generate a spatially corrected image Ict.
According to an embodiment, the main goal of correcting the images It is to calibrate the digital representation of the visual item VI 50 to be in the same perspective that the perspective of the authentic visual item during the step of generating 140 of the stored digital fingerprint F0 as described hereafter. Preferably, the correction of these images It allows to get corrected images Ict that are spatially oriented in a virtual plane parallel to the plane of the lens of the optical unit OPT1 41.
According to an embodiment, the step of generating 220 a corrected image Ict: can comprise a correction of some of the image It features such as luminosity, contrast, saturation, etc.
According to an embodiment, the step of extracting 230 a plurality of features from each corrected images Ict can comprise the extraction of at least one feature vector from each corrected image Ict, preferably from each digital representation of the visual item VI 50 comprised by each spatially corrected image Ict . For example, this feature vector can be based on Discrete Cosine Transform (DCT) and can be calculated on local regions, for example rectangle, of each corrected image Ict. For example, each region is resized to a predefined size, then a DCT is applied on that region, preferably a bidimensional DCT or even a three-dimensional DCT if the digital representation of the visual object comprises three-dimensional data, then the frequency response from the top-left of the DCT transform is taken and is used to form said feature vector. This is the feature vector of one region also called the feature of this region. The same process is repeated for different regions, and the present invention allows to extract a final vector that is advantageously the concatenation of feature vectors of all regions. According to an embodiment, each value of the feature vector is quantized using the feature vector median/percentiles. In this way, said feature vector becomes a binary vector. For example, considering a feature vector [1,2,3,4,5,6,7,8,9,10,11,12], if the median, which is equal to 6.5 in this example, is used to quantized said feature vector, i.e. to cut into two subranges said feature vectors, then said the feature vector becomes [0,0,0,0,0,0,1,1,1,1,1, 1], which is a binary vector. For example, if one considers the following percentiles: between 0% and 25%, between 25% and 50%, between 50% and 75% and between 75% and 100% to cut into 4 sub-ranges said feature vector, then the feature vector becomes [0,0,0,1,1,1,2,2,2,3,3,3], preferably then on can again binarize said feature vector into [00, 00, 00, 01, 01, 01, 10, 10, 10, 11, 11, 11].
According to an embodiment, these different regions can be all the regions of the corrected image Ict, i.e. all the image Ict is considered in this step 230. According to another embodiment, only one region can be used if the corrected image Ict, is relatively small, for example not more than a few hundred pixels times a few hundred pixels, in this example this only one region relates the whole corrected image Ict.
According to another embodiment, the corrected image Ict can be divided into a grid, and different regions of the corrected image Ict are therefore defined. All these regions can be used to generate the final vector or only a predetermined number of regions can be randomly selected forming a subset used to generate said vector. When there is several regions to be considered, the feature vector of the corrected image Ict from each region is concatenated to form only one final vector that represents all the considered feature vectors. According to an embodiment, and as described hereafter, a region of the corrected image Ict can be ignored during this step 230, said region comprising the stored digital fingerprint F0 11 for example. Indeed, as discussed hereafter, when the stored digital fingerprint F0 11 is located on the visual item itself, the region comprising it is not considered by the step of extracting 230 said plurality of features.
According to an embodiment, the step of generating 240 a digital fingerprint Ft 45 of the digital representation of the visual item VI 50 from a corrected image Ict is configured to use at least a portion of the extracted features, i.e. of the final vector, to generate said digital fingerprint Ft 45. Advantageously, the final vector of a corrected image Ict is the digital fingerprint Ft 45 of said corrected image Ict, i.e. of the digital representation of the visual item VI 50 from said corrected image Ict.
According to an embodiment, the step of generating 240 the digital fingerprint Ft 45 can comprise a step of selecting a subset of features from said plurality of features, i.e. a subset of elements from said final vector. According to an embodiment, said step of selecting a subset of features can comprise a step of reducing the dimension of the final vector, i.e. of the digital fingerprint Ft 45, to a predetermined number of bytes.
According to an embodiment, said step of selecting a subset of features from said plurality of features can be based on an artificial intelligence algorithm A0. Preferably, said artificial intelligence algorithm A0 is configured to select a subset of low-dimension from the high-dimensional final vector that best discriminates between authentic and non-authentic visual items.
According to an embodiment, said artificial intelligence algorithm A0 is configured to solve a one-zero trace ratio optimization problem, this method is well-known by the skilled person in the art.
According to another embodiment, said artificial intelligence algorithm A0 is configured to use a Random Forest algorithm to permutate the importance of the feature vectors.
In order to train said artificial intelligence algorithm A0, training data can be used. These training data can comprise two sets of verifications attempts: one set contains authentic verification attempts, where the visual item is authentic, the other set contains non-authentic verification attempts, where the visual item is not authentic.
According to an embodiment, the authentication method 200 can comprise, before the step of extracting 230 the plurality of features from a corrected image Ict , a step of calculating a quality score of each image Ict by the processing unit CPU1 42. Preferably, only if said quality score is higher than a predetermined threshold, the step of extracting 230 from said image Ict the plurality of features is executed. This allows to consider only images Ict wherein the quality of the digital representation of the visual item VI 50 is sufficient to the extraction 230 of the features used for the generation of the digital fingerprint Ft 45.
According to an embodiment, said quality score can be based on several parameters. For example, these parameters can comprise one of the following: luminosity of the corrected image Ict, contrast of the corrected image Ict, saturation of the corrected image Ict, scanning distance between the optical device OPT1 41 and the visual item VI 50 to be authenticated, scanning perspective between the optical device OPT1 41 and the visual item VI 50 to be authenticated, characteristics of the optical unit OPT1 41, the resolution of the corrected image Ict , etc.
Said quality score allows to eliminate the corrected images Ic having bad resolutions for example or having a bad quality that would negatively impact the calculation of the distance metrics D(Ict). As the same time, this quality score allows to weight, as described hereafter, the corrected images Ict based on their quality score to favorize the corrected images Ic with a better-quality score.
According to an embodiment, the stored digital fingerprint F0 11 can be in the form of a barcode, a QR code, a data matrix, a number, a sentence, a watermark, a metadata, a data stored in a memory, a data stored in a memory of a smartcard, etc. According to an embodiment, the stored digital fingerprint F0 11 can be stored in a server. For example, in this case, the value document comprising the visual item VI 50 can comprise any kind of mark or readable data allowing the authentication device AD 40 to download said stored digital fingerprint F0 11 from said server.
It has to be noticed, that the authentication method 200 can comprise a step of acquiring the stored digital fingerprint F0 11, preferably by the optical unit OPT1 41, then preferably a step of decoding said stored digital fingerprint F0 11 by the processing unit CPU1 42. These two steps can be executed directly one after the other or indirectly one after the other.
According to an embodiment, the step of acquiring the stored digital fingerprint F0 11 is executed as the same time that the step of acquiring 210 the plurality of images I 44 of the visual item VI 50.
According to an embodiment, the step of decoding the stored digital fingerprint F0 11 is executed before the step of generating 240 the digital fingerprint Ft 45.
According to another embodiment, the authentication device AD 40 can comprise a communication unit COM1 configured to communicate with at list one server and to download at least a stored digital fingerprint F0 11 from said server.
According to an embodiment, the authentication device AD 40 can comprise a communication unit COM1 configured to communicate with at list a smartcard wherein the stored digital fingerprint F0 11 is stored. For example, said smartcard can carry said visual item VI 50.
According to an embodiment, the authentication device AD 40 can comprise a communication unit COM1 configured to communicate with at list a RFID tag (Radio-frequency identification tag) wherein the stored digital fingerprint F0 11 is stored. For example, said RFID tag can be carried with said visual item VI 50 on a same medium 51.
According to an embodiment, the stored digital fingerprint F0 11 comprises a vector V0. Said vector V0 comprises a predetermined number N of elements, such as a predetermined number of bytes for example. The digital fingerprint Ft 45 comprises a vector Vt. Said vector Vt comprises a number M of elements. Preferably, the number M is lower or equal to the number N. Advantageously, the number M is a function of the quality score of the corrected image Ict. This allows to generate a digital fingerprint Ft 45 comprising a number of elements linked to the quality score of the corrected image Ict. In this way, if the quality score is low, then the length of the digital fingerprint Ft 45, and therefore its complexity, is reduced, i.e. the digital fingerprint Ft 45 is less sensible to the details of the corrected image Ic. In the case where the quality score is high, then all the length of the digital fingerprint Ft 45 can be considered According to an embodiment, for the calculation of the distance metrics D(Ict: ) described hereafter, the stored digital fingerprint F0 11 can be cut in order to consider the same amount of element, i.e. the same length, as the generated digital fingerprint Ft 45. For example, if the generated digital fingerprint Ft 45 comprises only 32 bytes, for example because of the quality score of the corrected image Ict, then the processing unit CPU1 42 calculate the distance metrics D(Ict) based on these 32 bytes and on the first 32 bytes of the stored digital fingerprint F0 11.
The
According to an embodiment, the digital fingerprint Ft 45 is constructed from a top-left part of the DCT coefficient matrix as illustrated in
Preferably, based on the quality of the corrected image Ict which is given by its quality score, all the information comprised by this matrix is not necessary used. Indeed, for example, if the corrected image Ict is of very good quality, the whole matrix can be used, for example a 24 by 24 matrix, resulting in a generated digital fingerprint Ft 45 having a length of 72 bytes However, if the corrected image Ict is of lower quality, only a portion of the matrix is used, preferably the top-left portion, for example the top-left portion of 24 by 24 matrix, resulting in a generated digital fingerprint Ft 45 having a length of 48, or 32 or even 16 bytes, which is determined preferably by the quality score.
According to an embodiment, the quality score can consider also if the corrected image Ict comprises noise such as scratch/dust on the presentation medium. Advantageously, to calculate the distance metrics D(Ict) between the stored digital fingerprint F0 11 having N elements, for example 72 bytes, and the generated digital fingerprint Ft 45 of the corrected image Ict having M elements, for example less than 72 bytes, only the corresponding first elements M of the vector V0 are considered, and only the top-left part of the matrix Q is used, as described hereafter.
To facilitate this adaptive length, the cells in I times I blocks is ordered in a zig-zag way as illustrated in
As described hereafter and due to the stored digital fingerprint F0 11 generation method 100, the stored digital fingerprint F0 11 is calculated by using a larger part of the matrix to take into consideration of higher frequencies, i.e. more details of the authentic visual item AVI 10. According to an embodiment, the method uses 24×24 block, resulting in a vector V0, i.e. the stored digital fingerprint F0 11, of 576 bits, i.e. of 72 bytes, as usually the digital representation of the authentic visual item AVI 10 is a digital image with high quality, i.e. the image I used to generate the stored digital fingerprint F0 11 is a digital image with the highest quality score for example.
According to an embodiment, after the generation of the digital fingerprint Ft 45 of a corrected image Ict, the authentication method comprises the step of calculating 250, by the processing unit CPU1 42, at least one distance metric D(Ict) between said digital fingerprint Ft 45 and said stored digital fingerprint F0 11. Said distance metric D(Ict) can be calculated using different solutions. According to a preferred embodiment, said distance metric D(Ict) is a mahalanobis distance metric. A mahalanobis distance metric between two vectors x and y can be written as follow.
Advantageously, in the implementation of the invention, the vector x can be replaced by the stored digital fingerprint F0 11 and the vector y can be replaced by the generated digital fingerprint Ft 45.
According to an embodiment, the distance metric D(Ict) is preferably calculated using a matrix Q as a mathematical operator between the stored digital fingerprint F0 11 and the digital fingerprint Ft 45. Preferably, the matrix Q is a positive semi-definite matrix.
According to an embodiment, if the matrix Q is an identity matrix, then the distance metric degenerates to an Euclidean distance, if the matrix Q is a diagonal matrix, then the distance degenerates to a weighted Euclidean distance, if the matrix Q is a general matrix, then the distance metric can capture very complex interactions between different feature dimensions and the distance metric is a mahalanobis distance metric
Advantageously, the present invention comprises a step of training an artificial intelligence algorithm A3 configured to optimize said matrix Q using at least a set of data SD3 and a set of data SD4. The set of data SD3 preferably contains authentic verification attempts, where the visual item is authentic, and the set of data SD4 preferably contains non-authentic verification attempts, where the visual item is not authentic. This training step is configured to optimize the matrix Q in a way that:
Indeed, the main goal of this artificial intelligence algorithm A3 is to obtain a matrix Q that:
According to an embodiment, this training step can use a method called a trace-ratio optimization problem or an improvement of the trace ratio optimization with sparse representation constraints. Using one of these technics allows this training step to optimize said matrix Q.
According to an embodiment, the step of calculating 260 a first likelihood function L(Ict|H) of authenticity H of the visual item VI 50 from its digital representation from the corrected image Ict based on said calculated distance metric D(Ict) comprises the following steps
According to an embodiment, the first likelihood function L(Ict|H) can be partially generated by an artificial intelligence algorithm A1 using at least the first set of training data SD1. According to this embodiment, the first likelihood function L(Ict|H) can comprise at least a sub-function SF1. Said sub-function SF1 is preferably defined by a density of probabilities that the visual item VI 50 is authentic. Advantageously, said sub-function SF1 can be generated by the artificial intelligence algorithm A1 using said set of data SD1. According to an embodiment, said first sub-function SF1 corresponds to a mathematical model of authentic visual items, i.e. a mathematical model of the probability distribution or probability density function regarding the authentication of authentic visual items.
According to an embodiment, when the visual item VI 50 is carried by a medium 12, the present invention can consider the nature of medium 12 in order to optimize its execution, i.e. in order to optimize the computation of the probability P(H). For example, the visual item VI 50 can be a picture printed on a paper or on a plastic sheet or can be displayed by a screen for example. Based on the nature of the medium 12, the generated digital fingerprint Ft 45 can be different. The present invention is preferably configured to consider the nature of the medium 12 in its calculations
According to an embodiment, the first likelihood function L(Ict|H) can be partially generated using an artificial intelligence algorithm A2 configured to generate at least one linear combination of mathematical models of media for each corrected image Ict based on at least a plurality of mathematical models of media.
According to this embodiment, the artificial intelligence algorithm A2 is configured to classify the medium 12 carrying the visual item VI 50 according to a linear combination of mathematical models of media. Said artificial intelligence algorithm A2 can comprise the following steps:
According to an embodiment, the first likelihood function L(Ict|H) can be partially generated using an artificial intelligence algorithm A5. Said artificial intelligence algorithm A5 can be configured to classify the quality of each corrected image Ict of the plurality of corrected images Ic. According to an embodiment, said artificial intelligence algorithm A5 can use well known solutions such as a TensorFlow lite model, through a convolutional neural network CNN.
According to an embodiment, the second likelihood function L(Ict|G) can be partially generated by an artificial intelligence algorithm A1′ using at least the set of training data SD2. According to this embodiment, the second likelihood function L(Ict|G) can comprise at least a sub-function SF2. Said sub-function SF2 is preferably defined by a density of probabilities that the visual item VI 50 is not authentic. Advantageously, said sub-function SF2 can be generated by the artificial intelligence algorithm A1′ using the set of data SD2. According to an embodiment, said second sub-function SF2 corresponds to a mathematical model of non-authentic visual items, i.e. a mathematical model of the probability distribution or probability density function regarding the authentication of non-authentic visual items
According to an embodiment, the second likelihood function L(Ict|G) can be partially generated using an artificial intelligence algorithm A2′ configured to generate at least one linear combination of mathematical models of media for each corrected image Ict based on at least a plurality of mathematical models of media. According to this embodiment, the artificial intelligence algorithm A2′ is configured to classify the medium carrying the visual item according to a linear combination of mathematical models of media. Said artificial intelligence algorithm A2 the artificial intelligence algorithms A2′ can comprise the same steps that the artificial intelligence algorithm A2.
According to an embodiment, the second likelihood function L(Ict |G) can be partially generated using an artificial intelligence algorithm A5′. Said artificial intelligence algorithm A5′ can be configured to classify the quality of each corrected image Ict of the plurality of corrected images Ic according to the previous described artificial intelligence algorithm A5.
The
Regarding these likelihood functions, according to an embodiment and as previously described, each corrected image Ict will be analyze by the processing unit CPU1 41. The event H corresponds to the detection of an authentic visual item, and the event G correspond to the detection of a non-authentic visual item. Therefore, the probability P(H) is the probability that the visual item VI 50 is authentic, and the probability P(G)=1−P(H) is the probability that the visual item VI 50 is not authentic. The probability distribution p(P(H)) is the probability distribution of the probability that the visual item VI 50 is authentic, and the probability distribution p(P(G)) is the probability distribution of the probability that the visual item VI 50 is not authentic. Based on that, the first likelihood function L(Ict|H) corresponds to how probable to observe the corrected image Ict: if the visual item VI 50 is authentic, and the second likelihood function L(Ict|G) corresponds to how probable to observe the corrected image Ict if the visual item VI 50 is not authentic.
According to an embodiment, the first likelihood function and/or the second likelihood function can be at least partially generated based on features of the optical unit OPT1 41. Indeed, for example, based on the nature of the optical unit OPT1 41, for example based on its model, the likelihood functions can be trained through an artificial intelligence algorithm. According to this embodiment, for each model of camera, a specific first likelihood function can be considered and/or a specific second likelihood function can be considered.
According to an embodiment, the step of computing 270 the probability P(H) that the visual item VI 50 is authentic using the first likelihood function L(Ict|H) and the second likelihood function L(Ict|G) can comprise the following steps:
According to an embodiment, each predetermined weight applied to each of the corrected image Ict is a function of the quality score of said corrected image Ict. Advantageously, each predetermined weight {γi} (i=0 . . . w) applied to each of the corrected image Ict is a function of the quality score of the corrected image Ict, preferably corresponding to the predetermined weight {γi} (i=0, . . . w). Preferably, higher the quality score is, higher the weight is, and lower the quality score is, lower the weight is. This allows to give more credit to the corrected images Ic having a better-quality score than the ones having a bad quality score
According to an embodiment, said prior probability P0(H) is set based on a predetermined set of rules. This predetermined set of rules can be established based on an artificial intelligence algorithm A4 for example, preferably using at least a decision tree. Said artificial intelligence algorithm A4 can be advantageously configured to generate a prior probability P0(H) based on at least one of these parameters: a reputation score based on the nature of the visual item, and/or the location of the visual item and/or on metadata related to the visual item and/or the issuer of the visual item and/or the issuer of a medium carrying the visual item, a uniform law of distribution, etc.
For example, and as described hereafter regarding the ID card implementation, the prior probability can be set according to the issuer of the card, preferably using historical data, for example for each issuer and/or country, the prior probability can be set to the percentage of authentic ID cards issued by this issuer and/or country over a predetermined number of time, such as a predetermined number of past years.
According to an embodiment, said artificial intelligence algorithm A4 uses a decision tree process and/or forests process consisting of decision trees process to generate said prior probability P0(H). For example, using said historical data, a decision tree model can be trained to generate the prior probability of a given issuer and/or a given country, which was not in the historical data
According to an embodiment, the probability P(H) can be computed from a probability distribution p(P(H)) as described hereafter. In this case, the probability P(H) is related to at least one descriptive statistic of said probability distribution p(P(H)). Preferably the descriptive statistics of said probability distribution p(P(H)) can comprise, the mean, median, mode, range, IQR (Interquartile range), variance, standard deviation, a surface, a moment, etc.
According to another embodiment, the step of computing 270 a probability P(H) that the visual item VI 50 is authentic using the first likelihood function L(Ict|H) and the second likelihood function L(Ict|G) can comprise the following steps:
wherein w is the number of spatially corrected image Ict of the plurality of spatially corrected image Ic and {αi} (i=0, . . . w) are predetermined weights.
As previously described, according to an embodiment, each predetermined weight applied to each of the corrected image Ict is a function of the quality score of said corrected image Ict. Advantageously, each predetermined weight {αi} (i=0, . . . w) applied to each of the corrected image Ict is a function of the quality score of the corrected image Ict, preferably corresponding to the predetermined weight {αi} (i=0, . . . w). Preferably, higher the quality score is, higher the predetermined weight is, and lower the quality score is, lower the predetermined weight is. This allows to give more credit to the corrected images Ic having a better-quality score than the ones having a bad quality score.
According to an embodiment, the predetermined set of rules used to set the prior probability distribution p0(P(H)) can be based on the artificial intelligence algorithm A4 as previously discussed.
According to an embodiment, the authentication of the visual item VI 50 is confirmed if P(H) is greater than a predetermined threshold. For example, if the probability of authenticity P(H) is greater than 75%, preferably than 85% and advantageously than 95% then the visual item VI 50 is considered as being authentic.
According to an embodiment, said predetermined threshold can be defined according to the use case of the present invention. Preferably, said predetermined threshold determines the trade-off between potential false matches and false non-matches, i.e. between false confirmation of authenticity and false confirmation of non-authenticity. For example, in use cases where false match is a more serious problem than false non-match, e.g. in a high security facility, a stricter threshold, i.e. a higher value of threshold, can be used. For another example, in use cases where non-false match is a more serious problem than false match, e.g. in a low security facility, a less strict threshold, i.e. a lower value of threshold, can be used. According to an embodiment, said predetermined threshold can be determined using a mathematical relation between the rate of false match, the rate of false non-match and the value of the predetermined threshold. For example,
According to an embodiment, said predetermined threshold can be based on the predetermined set of rules
According to an embodiment, the probability P(H) is equal to at least one descriptive statistic of said probability distribution p(P(H). P(H) is advantageously the mathematical expectation of p(P(H)), such as:
According to an embodiment, the present invention relates to a computer program comprising instructions which, when the program is executed by the processing unit CPU1 42, cause the processing unit CPU1 42 to out the authentication method 200, i.e the steps of the authentication method 200.
Preferably, the processing unit CPU1 42 is configured to control the optical unit OPT1 41
According to an embodiment, the present invention relates to a computer-readable storage medium comprising instructions which, when the program is executed by the processing unit CPU1 42, cause the processing unit CPU1 42 to carry out the authentication method 200, i.e. the steps of the authentication method 200.
According to an embodiment, the authentication process can be implemented by a smartphone through an application for example that can be downloaded from an application store for example.
The present invention allows to determine if a visual item, preferably of any kind, is authentic or not based on a stored digital fingerprint, preferably a certified stored digital fingerprint, generated by an issuer, preferably a certified issuer.
The use of a plurality of images allows a user to determine if a visual item is authentic or not without the need of a dedicated reader, but simply using an application on his smartphone.
The present invention uses smartly several technics combined in an advantageously way allowing to evaluate with a high level of accuracy if a visual item is authentic or not.
Using artificial intelligence allows to overcome several technical issues such as the optical conditions of the acquisition of the plurality of images, the nature of the medium carrying the visual item, the nature of the visual item itself for example.
According to an embodiment, the present invention relates to an authentication device AD 40 configured to execute the authentication method 200 described here before.
According to a preferred embodiment, and as described in
According to an embodiment, the authentication device AD 40 is a smartphone and/or a laptop and/or a tablet.
As described by the
According to an embodiment, the display unit can display the corrected image Ict and/or its digital fingerprint Ft 45 and/or the image of the stored digital fingerprint F0 11, for example the barcode encoding said stored digital fingerprint F0 11, and/or the decoding stored digital fingerprint F0 11 and/or the probability P(H).
According to an embodiment, the display unit of the authentication device AD 40 can display information, preferably in real-time, about the image quality, and/or messages for the user to move the authentication device AD 40 relatively to the visual item VI 50 in order to increase the quality score of the corrected images Ic. For example, these messages can comprise at least one among a word, a sentence, a drawing, a figure, a symbol, etc.
According to an embodiment, said processing unit CPU1 42 comprises at least one processor configured to execute at least one series of instructions, preferably stored by a memory. Said memory is preferably a non-transitory memory. Said memory advantageously stores a computer program as previously described.
According to an embodiment, the present invention relates to a digital fingerprint generation method 100 configured to generate a digital signature F0 11 from an authentic visual item AVI 10, preferably using a digital fingerprint generation device GD 20 disclosed hereafter, said digital fingerprint generation device GD 21 comprising at least an optical unit OPT2 21, a processing unit CPU2 22 and preferably a storage unit SU2. Advantageously, said digital fingerprint F0 11 is configured to be stored, this storage can use different forms as previously described.
According to an embodiment, the digital fingerprint generation method 100 uses several similar features than the authentication method 200, advantageously regarding the generation of the digital fingerprint Ft 45. As it will be explained, according to an embodiment, due to the stored digital fingerprint F0 11 is generated from a visual item 10 considered as authentic by the issuer, only one image I is sufficient to generate the stored digital fingerprint F0 11, whereas in the case of the digital fingerprint Ft 45, the visual item VI 50 may be not authentic, therefore several images I have to be taken and considered to evaluate a probability P(H) that the visual item VI 50 is authentic.
According to an embodiment, and as described in
As previously described, the optical unit OPT2 21 is configured to acquire 110 at least one image I of the authentic visual item AVI 10. According to an embodiment, the optical conditions of this acquisition permit to acquire only one image I of the authentic visual item AVI 10, preferably a high-resolution image I. Advantageously, said optical unit OPT2 21 is a scanner.
According to an embodiment, the at least one image I of the authentic visual item AVI 10 can be acquired from at least a digital file, for example by downloading at least one digital file. According to said embodiment, said optical unit OPT2 21 can comprise a module configured to download at least one image I of at least said authentic visual item AVI 10. According to said embodiment, said optical unit OPT2 21 can comprise a module configured to download at least one image of at least one authentic visual item AVI 10, preferably using a QR code as a link for downloading said at least one image of said at least one authentic visual item AVI 10.
As previously described, the processing unit CPU2 22 is configured to:
According to an embodiment, the present invention relates to a computer program comprising instructions which, when the program is executed by the processing unit CPU2 22, cause the processing unit CPU2 22 to carry out the digital fingerprint generation method 100, i.e. the steps of the digital fingerprint generation method 100.
Preferably, the processing unit CPU2 22 is configured to control the optical unit OPT2 21.
According to an embodiment, the present invention relates to a computer-readable storage medium comprising instructions which, when the program is executed by the processing unit CPU2 22, cause the processing unit CPU2 22 to carry out the digital fingerprint generation method 100, i.e. the steps of the digital fingerprint generation method 100.
The present invention allows to easily generate a digital fingerprint of a visual item, and then this digital fingerprint can be used to compare it with another digital fingerprint generated from a visual item. If these two digital fingerprints are closed enough from each other, then these visual items are in fact the same visual item, i.e. the visual item is authentic.
According to an embodiment, the present invention relates to a digital fingerprint generation device GD 20. Said digital fingerprint generation device GD 20 is configured to execute the previously described digital fingerprint generation method 100. Said digital fingerprint generation device GD 20 is advantageously configured to generate the digital signature F0 11 from an authentic visual item AVI 10, and preferably to store said digital fingerprint F0 11, advantageously in at least one of the forms previously discussed.
According to an embodiment, said digital signature generator device GD 20 comprises:
According to an embodiment, the digital fingerprint generation device GD 20 can be a computer connected a scanner. In another embodiment, it can be a mobile device such as a smartphone for example.
Preferably, said digital fingerprint generation method 100 has several steps in common with the authentication method 200. In particular the steps that are different are mainly based on the fact that in the case of the generation of the stored digital fingerprint F0 11 the visual item considered is authentic and preferably the optical condition to acquire an image of this authentic visual item allow to have a high resolution digital representation of said authentic visual item, i.e. an image I with the highest quality score possible, whereas in the case of the generation of the digital fingerprint Ft 45, the considered visual item VI 50 is maybe not authentic, and the conditions to acquire the images I are not perfect, resulting in a more advanced process to generate the digital fingerprint Ft 45 that allows to compensate these conditions.
According to an embodiment, said processing unit CPU1 42 comprises at least one processor configured to execute at least one series of instructions, preferably stored by a memory. Said memory is preferably a non-transitory memory. Said memory advantageously stores a computer program as previously described.
According to a first example, and as illustrated by
According to an embodiment, this ID card 10b is issued by a government agency. To realize this ID card 10b, the future owner of this ID card 10b to be issued has to provide the official agency with a picture of himself. Said picture is considered to be authentic by the issuer of the ID card 10b. Said picture can be the visual item carried by said ID card 10b. According to an embodiment, said picture of the future owner can be a digital file, preferably downloaded or received in a digital form by the official agency.
The issuer uses the digital fingerprint generation method 100 to generate the digital fingerprint F0 11 associated to said picture. Then, said digital fingerprint F0 11 is preferably stored at least in a printed way on the ID card, for example using a barcode, a data matrix, a QR code and/or even a watermark, or a digital watermark, or a metadata, or data stored on a memory, etc. According to an embodiment, a watermark can comprise steganographic data, preferably encoding said stored digital fingerprint F0 11.
According to an embodiment, to use a steganographic process to store the digital fingerprint F0 11 inside at least a portion of a visual item, a predetermined area of said visual item can be chosen to store said digital fingerprint F0 11 in a steganographic form. Preferably, in this case, said stored digital fingerprint F0 11 is generated using another area than the predetermined area in order to avoid any perturbations due to the addition of the stored digital fingerprint F0 11 in its steganographic form inside the visual item. Therefore, the processing unit CPU1 42 can be configured to avoid considering said predetermined area to calculate a digital fingerprint Ft 45. Preferably, said another area is considered by the processing unit CPU1 42 to generate said digital fingerprint Ft 45 and said predetermined area is used to extract said stored digital fingerprint F0 11. Advantageously, a watermark can be used in a predetermined area configured to be avoided by the processing unit CPU1 42 to generate said digital fingerprint Ft 45, and to be considered by the processing unit CPU1 42 to extract said stored digital fingerprint F0 11. For example, said predetermined area can be at least a part of the border, or of the contour, of the visual item.
According to another embodiment, the processing unit CPU1 42 can be configured to use an artificial intelligence algorithm A7 trained to identified steganographic data from a visual item. Preferably, said artificial intelligence algorithm A7 can be trained using a dataset comprising a plurality of visual items, a plurality of stored digital fingerprints F0, each stored digital fingerprint F0 of said plurality of stored digital fingerprint F0 being associated to a visual item of said plurality of visual items, and a plurality of visual items comprising steganographic data. Each visual item comprising a steganographic data corresponds to a visual item of the plurality of visual items and each of these steganographic data encodes a stored digital fingerprint F0 of the plurality of stored digital fingerprint F0. Using said dataset, the artificial intelligence algorithm A7 is advantageously trained to extract from a given visual item comprising steganographic data, said steganographic data and to generate from said visual item a digital fingerprint Ft, preferably without considering said steganographic data for the generation of the digital fingerprint Ft. Said artificial intelligence algorithm A7 is preferably trained to generate a digital fingerprint Ft from a visual item comprising its stored digital fingerprint F0 encoding in steganographic data, said generated digital fingerprint Ft being configured to correspond to said stored digital fingerprint F0, i.e. to said steganographically encoding stored digital fingerprint F0.
Therefore, the issuer uses a digital fingerprint generation device GD 20 such as a computer and a scanner, the computer being the processing unit CPU2 22 and the scanner being the optical unit OPT2 21. The issuer uses the scanner to acquire at least one image I of the picture of the future owner of the ID card. The processing unit CPU2 22 extracts from said image I at least a plurality of feature based on the previous discussed method. These features, in the form of a vector, are then used to generate a digital fingerprint F0 11 associated to the picture of the future owner, preferably intrinsically bounded to said picture. Indeed, any modification of the picture will generate a different digital fingerprint F0 11. Then, the ID card is printed and carries said image I as well as said digital fingerprint F0 11 which is now printed, i.e. stored on the ID card, for example in the form of a QR code.
Then, if a user wants to authenticate the picture of the owner of the ID card, he can use an authentication device AD 40 as previously described, such as his smartphone for example using a dedicated application. Using his smartphone, the user captures a plurality of images of the picture located on the ID card, preferably the user acquires in real time a video of this picture. According to an embodiment, for each frame acquired or at least for some of these acquired frames from said video, the authentication method 200 is applied in order to correct the images I generating the plurality of images Ic. Advantageously, this correction step is very useful. Indeed, for the generation of the stored digital fingerprint F0 11 the picture of the owner was steady and perfectly aligned with the lenses of the optical unit OPT2 21, in this case, this picture has been scanned using a scanner. Whereas, when the user is acquiring said plurality of images I, the position of the authentication device AD 40, his smartphone, regarding the position of the ID card cannot be perfect, there is some perspective issues that have to be corrected for example. Each image It are therefore spatially corrected in order that the digital representation of the visual item VI 50, i.e. the picture of the owner of the ID card, is in a virtual plane parallel to the plane of the lenses of the optical unit OPT1 41, the camera of the smartphone of the user. Then for each corrected image Ict, preferably spatially corrected images Ict, the processing unit CPU1 42 of the smartphone extracts some features and generates a digital fingerprint Ft 45 associated to the considered image Ict.
Based on this generated digital fingerprint Ft 45, the processing unit CPU1 42, i.e. the smartphone of the user, estimates a distance metrics D(Ict) between said generated digital fingerprint Ft 45 and the stored digital fingerprint F0 11. Indeed, before or during the acquisition of the images It, the optical unit OPT1 41 acquires at least one image of the stored digital fingerprint F0 11, and the processing unit CPU1 42, if necessary, decodes the stored digital fingerprint F0 11 from this image Ict.
Then a first likelihood function L(Ict|H) and a second likelihood function L(Ict|G) are calculated as previously described. The first likelihood function relates L(Ict|H) to the event that the picture, i.e. the visual item VI 50, is authentic and the second likelihood function L(Ict|G) relates to the event that the picture, i.e. the visual item VI 50, is not authentic.
Then, as previously described, using these two likelihood functions, a probability P(H) that the visual item VI 50 illustrated in the image Ict is authentic is computed based on a prior probability P0(H) and/or on a prior probability distribution p0(P(H).
Advantageously, for each new corrected image Ict considered, the probability P(H) is updated.
Preferably, each image Ict does not have the same weight, i.e. the same impact, regarding the update of the probability P(H). Indeed, as previously described, and according to a preferred embodiment, depending of the quality score of each corrected image Ict, its weight is not the same in the calculation of the average of the probability P(H). This allows to have a high consideration for corrected images Ict with a better-quality score, for example higher than a predetermined threshold, and to have a low consideration for corrected images Ict with a lower quality score, for example lower than a predetermined threshold.
Preferably, in real time, the user can see on the display of his smartphone the confirmation or the non-confirmation that the picture on the ID card is authentic or not.
According to an embodiment, the authentication method 200 can comprise a step of guiding the user to move in the space the authentication device AD 40 in order to increase the quality of the images I 44 acquired by the optical unit OPT1 41. For example, the authentication device Ad 40 can notify to the user to move the optical unit OPT1 41 closer to the visual item VI 50 and/or to move the optical unit OPT1 41 farther from the visual item VI 50. For another example, the authentication device AD 40 can notify to the user to rotate the optical unit OPT1 41 regarding to the visual item VI 50 to reduce or avoid some perspective mismatch or defect or error for example. For another example, the authentication device AD 40 can notify to the user that the conditions of light are insufficient to correctly capture the images I 44 of the visual item VI 50.
According to an embodiment, after a predetermined number of corrected images Ict and/or after a predetermined time t of acquisition of images.
According to an embodiment, and as illustrated in
According to this use case, the visual item VI 50 can be a part or even the whole value document, depending of the use case.
As for the ID card, the value document is considered as authentic by the issuer of said value document, such as a diploma for example. Said issuer scans it, and/or download it from a server in a digital form, and generate a digital fingerprint F0 11 from it or at least from a portion of it. Said digital fingerprint can be printed F0 11 on a dedicated place of the diploma, for example on the contour or on the back, or even on a region designed to be avoid by the authentication device AD 40 for the generation 240 of the fingerprint Ft 45 for example. According to an embodiment, the digital fingerprint F0 11 can be stored in a server and the diploma can comprise a QR code for example allowing the authentication device AD 40 to download said digital fingerprint F0 11 from said server during the authentication method 200. This allows for example the whole value document to be considered to generate the digital fingerprint Ft 45.
As previously, the authentication method 200 comprises the acquisition of a plurality of images It, the generation of a digital fingerprint Ft 45 for each of the corrected images Ict, preferably if its quality score is higher than a predetermined threshold, and the notification to the user if the visual item VI 50, i.e. the value document in this case, is authentic or not.
According to a third example, and as illustrated by
According to an embodiment, a painting 10c or at least a part of a painting can be a visual item VI 50 regarding the present invention.
Therefore, an authority can generate a stored digital fingerprint F0 11 from a painting, or at least from a portion of a painting. Then, this stored digital fingerprint F0 11 can be stored in a server or located near the painting, on the contour, the border, the frame or even on the back of the painting.
According to an embodiment, the optical unit OPT2 21 of the digital fingerprint generation device GD 20 can be a three-dimensional scanner and/or camera configured to acquire the relief of the painting, preferably as well as its image. According to an embodiment, the stored digital fingerprint F0 11 can then be generated using three-dimensional discrete cosines transforms to extract a plurality of features vectors forming the stored digital fingerprint F0 11 as previously described.
According to an embodiment, the authentication method can be executed by an authentication device, as previously described, wherein the optical unit OPT1 41 is a three-dimensional scanner and/or camera, and/or wherein the optical unit OPT1 41 is a bi-dimensional scanner and/or camera.
According to a fourth example, and as illustrated in
According to said embodiment, it has to be noticed that the visual item can be more than just a picture, it can be a text and/or a picture and a text. Indeed, a visual item is simply an optical element that allow an optical unit to acquire at least one picture of it.
Therefore, according to said example, the visual item can be a collectible card 10d, or at least a portion of it allowing the rest of the card to carry the stored digital fingerprint F0 11 in a printed form for example
According to said example, the issuer of the card 10d acquires an image of it using a scanner for example, or downloading it from a server for example, and then generate a digital fingerprint F0 11 that is stored on the card and/or in a server, as previously described.
The user that wants to authenticate a collectible card, uses then its smartphone for example as the authentication device AD 40, and acquire a plurality of images I of the collectible card, preferably through a real time video, and the processing unit CPU1 42 of the smartphone generate for each considered images Ict a digital fingerprint Ft 45 that is compared with the stored digital fingerprint F0 11 using the distance metrics D(Ict), this allows to calculate the first and the second likelihood functions that update a probability P(H) that the collectible card is authentic.
According to a fifth example, the present invention can be implemented in the field of the Non-Fungible Tokens, also called NFTs, regarding the art domain for example. Indeed, according to said example, if the NFT is a picture or even a three-dimensional object, the present invention can be applied to generate a stored digital fingerprint F0 11 of an authentic visual item represented by an NFT. Then the present invention can be implemented to authenticate if the visual item represented by an NFT is authentic or not. Indeed, based on the NFT process, an NFT is always authentic but the visual item, 2D or 3D, that is represented by said NFT can be not authentic.
A NFT is simply a smart contract associated with a digital item. Said digital item can be a visual item such as a picture, a video or even a three-dimensional object.
The present invention can be used to generate the stored digital fingerprint F0 11 of a visual item represented by an NFT to allow a user to authenticate that said NFT is related to a visual item that is authentic. In this case, the medium carrying said visual item can be a digital screen, the screen of a smartphone, the screen of a computer, the screen of a tablet, etc.
According to an embodiment, the stored digital fingerprint F0 can be stored in the metadata of an NFT. Usually, an NFT comprises metadata, for example comprising a link to a server wherein the visual item represented by the NFT is stored. Having the stored digital fingerprint F0 in the metadata of an NFT allows a user to authenticate the visual item represented by an NFT without the need to access to the authentic visual item stored in a server. According to said embodiment, the stored digital fingerprint F0 can be used as a compressed version of the visual item represented by the NFT is case for example wherein the link to the server, where the visual item represented by the NFT is stored, is not anymore active and/or alive; i.e. is dead
The user can use here again his smartphone as an authentication device AD 40 to execute the authentication method 200 to determine if the displayed visual item is authentic or not.
According to another example, the present invention can be applied to a video. Indeed, a video comprises a plurality of frame, each of these frames can be or can comprise a visual item, therefore the present invention can be used to authenticate a video, or at least a portion of a video.
For example, each frame of the video can be authenticated.
According to another embodiment, only some of the frames of the video are used according to the present invention to authenticate the whole video.
According to another embodiment, a stored digital fingerprint is generated for the whole video based on a plurality of sub-stored digital fingerprints regarding each or some of the frames of the video.
According to an embodiment, the authentication method 200 can be applied to a plurality of frames from a video. Each frame considered can therefore allow the authentication device to compute the probability P(H) that the video is authentic.
As previously described, the present invention can be applied to a wide range of use cases. These described examples are not a limitation of the present invention.
The invention is not limited to the embodiments described above and extends to all the embodiments covered by the claims.
Number | Date | Country | Kind |
---|---|---|---|
21217643.2 | Dec 2021 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/086374 | 12/16/2022 | WO |