The present disclosure relates to a method and system for the authentication of hologram protected identity (ID) documents.
The ways by which information is shared are constantly evolving. People exchange information via the Internet using text or speech, but they also share certain documents. Accordingly, it is more and more important to be able to verify one's identity through the Internet. The identity of a person is supposed to be validated using an identity (ID) document, for example a passport. Through the Internet only a photo of the ID document, conveyed as a digital image, can be exchanged. Consequently, the problem of person authentication has evolved and not only the person has to be identified but also their ID document must be authenticated using its digital image to detect falsified documents. The ID documents are designed so that they are difficult to forge. Some security elements are added and/or hidden in the background of the ID documents information, within the paper and the ink. Other security elements in the form of Radio Frequency Identification (RFID) tags added to the document, or holograms. Among the added security elements, some can be verified remotely while others cannot.
Accordingly, there is a need for a method and system for the authentication of hologram ID documents.
The present disclosure provides a method and system for the authentication of a hologram protected document, comprising the steps of:
There is also provided a method and system for the authentication of a hologram protected document wherein the document is an identity document, for example a passport or a consular card.
There is further provided a method and system for the authentication of a hologram protected document wherein the saturation threshold and the value threshold are determined from respective saturation and value histograms, for example by choosing a significant minimum higher than the mean value of the corresponding saturation and value histograms.
There is further still provided a method and system for the authentication of a hologram protected document wherein step a) includes expressing the at least two images in the HSV colors space.
There is also provided a method and system for the authentication of a hologram protected document wherein step d) includes for each of the at least two images:
There is further provided a method and system for the authentication of a hologram protected document wherein the specified connection number value at step d), the specified hue number value at step f) and the specified document score value at step i) are determined using a set of training images.
There is further still provided a method and system for the authentication of a hologram protected document wherein at step a) the at least two images are obtained by extracting frames from a video of the document.
There is also provided a method and system for the authentication of a hologram protected document wherein step g) if performed for all pairs of consecutive frames or for pairs of distant frames of the video.
There is further provided a method and system for the authentication of a hologram protected document further comprising the step of:
There is further still provided a method and system for the authentication of a hologram protected document wherein a step j) the associated frame transform is a transform of a video frame corresponding to each of the at least two images during fixed frame registration.
There is also provided a method and system for the authentication of a hologram protected document wherein the steps are in the form of executable code for execution by a processor of a smartphone or tablet.
Embodiments of the disclosure will be described by way of examples only with reference to the accompanying drawings, in which:
Similar references used in different Figures denote similar components.
Generally stated, the non-limitative illustrative embodiment of the present disclosure provides a method and system for the authentication of hologram protected identity (ID) documents such as, for example, passports, consular cards or other identity cards. It is to be understood that the disclosed method and system may also be used to authenticate other types of documents that include a hologram security element.
In an airport, for example, the verification of an ID document is performed by an accredited person that physically takes the ID document and manipulates it as needed to validate the different security elements that must be present. The number of security elements varies depending on the degree of confidence that is required with regard to the identity of the person and the validity of the ID document. When the authentication of the ID document is performed remotely, the tactile aspect of any security element is not available. As for the visual inspection, it can be performed only with the use of a camera that is managed by the end-user. Current smartphones and tablets are good candidates for use in this context as they enable the capture of photos as well as videos.
The disclosed method and system for the authentication of hologram protected ID documents addresses the problem of the authentication of ID documents rather than person authentication. It is less the person who carries out a transaction that requires authentication than the ID document that is produced to validate the person's identity. Referring to
In the context of a controlled setting, for example a customs counter at a border crossing or airport, the authentication of hologram protected ID documents is based on the use of specific lighting, for example a set of fixed well positioned LEDs of specific wavelengths, with the ID document being moved and manipulated in a specific way by experienced personnel. Of course, such solutions cannot be used in the case of remote authentication or authentication by non-experienced personnel. End-users have no specialized light sources; they cannot be asked to use several LEDs in a sophisticated manner or use a specific authentication protocol. The end-users usually have access only to non-specialized cameras which, nowadays, are mostly provided on smartphones or tablets. Such cameras provide functionalities such as still images and videos with or without a light/flash.
Existing commercial solutions focus on small holograms embedded in cards or notes. These solutions often take advantage of the a priori size and the precise position of the hologram in the document to be authenticated and rely on traditional image processing techniques with or without supervised learning phases. The present method and system for the authentication of hologram protected ID documents deal with documents that include very large and diverse holograms on parts of the whole of its surface. Thus, the authentication process also includes detection of the hologram security element. Accordingly, the disclose method and system allows for simultaneous detection and extraction of all the content of a hologram, taking advantage of the partial presence of the hologram depending on the point of view considered in successive images of a video of the ID document.
Looking at a hologram protected ID document, for example a passport or an image of a passport, the human eye does not see the entire hologram embedded in the document. Nevertheless, on a single image some parts of the hologram are visible. Firstly, the focus is on the detection of hologram parts on a single image, before addressing the complete hologram and concluding on the presence of a hologram. Furthermore, an analysis is performed at the pixel level before local and global approaches. A selection of pixels is carried out using a color histogram analysis, leading to hologram parts candidates, then the connected component of such pixels is analyzed both from their shapes and colors properties.
In this first part of the process, the aim is not to exactly identify the hologram pixels but to exploit general properties of such pixels, without missing too much true visible hologram pixels, and introducing too much false hologram pixels. Referring to
The threshold for one image is fixed so that the maximum number of hologram pixels is obtained. It is chosen at a minimum of the histogram, the significant minimum higher than the mean value of the histogram or more precisely the first maximum after the mean value to limit the number of false positive hologram pixels. The significance of the minimum and maximum are measured using morphological operations. The position of such a threshold is indicated by the dot T on the histogram H of
The same process is applied on the saturation and value channels leading to two thresholds Ts and Tv. The retained pixels in an image I are those for which the two constraints are holding. They constitute a set M defined as:
A white high luminance zone is not selected in M as a potential hologram; indeed, the saturation in such zone is not high enough to be selected in the thresholding phase. This can be seen in
Of course, as already indicated, in M are some false hologram pixels and the next objective is to eliminate them as they are considered as noise, nevertheless true hologram pixels must be preserved.
To achieve this, a more local approach is considered. In M each connected component is studied independently. Two aspects are considered, on the one hand, the shape of the candidate zones is analyzed and on the other hand, the hues of the components are analyzed. More specifically, the behavior of M and a dilation of M are compared using a square structuring element of radius 1, the result of the dilation will be a set noted Md.
The aim is to characterize zones in M according to their texture in zones different from line drawings or flat zones. It can be noticed that when a hologram zone is concerned, the edges of the zone are quite smooth whereas when some glint is present, the zone is not so coherent and appears most often as blobs that are near one from the other but spread on the zone. This effect can be seen in
Due to the porous aspect in some parts of M, the connected components of M are not all significant with respect of the extraction of a hologram. Md has been built in order to consider a smaller number of connected components and we consider the connected components of Md. The connected components in M are embedded in one of the connected components of Md:
The analysis is done for each connected component Ci in Md. This local observation level is a good comprise between the pixel study and a global study. The zones that are looked for in M are zones that appear quite porous. In that case, the connected components in M, thanks to the dilation become connected in Md.
This evolution is measured by the number of connected components in M included in one component of Md. Each time the number of connected components of M in Ci is too high, it can be concluded the Ci part is porous and cannot be considered as a potential hologram zone. So, it will be suppressed from M. The suppressed part Ss in M is obtained from the study of all connected components of Md:
Another characteristic of the holograms is the distribution of hues that distinguishes a hologram from any glittering surface. Globally, but also locally, the number of hues contained in a hologram is high whereas a glint has generally an only global color. So, locally, on each part of M limited by a connected component of Md, the number of hues is computed and normalized according to the size of the component evaluated. Here, we consider the area as the size of the component. This enables to define a set of pixels Sc that can be assumed not to be in a hologram:
where C(X) gives the number of different hues contained in a set X of pixels, |X| gives the area of X and c is a constant that has been fixed during training, using a set of training images.
At this stage of the process, in the image I, the hologram pixels extracted H(I) are those with high saturation and value but that do not form a porous region and are locally with several hues:
Of course, H(I) should be empty if the image I does not contain a hologram, this happens most often but some images can contain pixels that are selected in the process of a single image. The case is illustrated in
This last example shows that the study of a single image is not enough to extract with high confidence only hologram pixels. Then, at least two images are necessary to decide whether a document contains or not a hologram. Furthermore, to extract and reconstruct the hologram, it is necessary to analyze a larger number of images acquired from several points of view so that each part can be aggregated to reconstitute the hologram. A video can be used to that end, the video being obtained by the end-user using a smartphone or tablet camera.
The main objective of the present method and system is to authenticate ID documents thanks to the presence of a true hologram. This can be done in two steps, first the document must contain a hologram and this hologram must be a true one. Passports, consular cards or other identity cards of different countries do not contain the same hologram. First, the method and system for the authentication of hologram protected ID documents assert if a document D contains or not a hologram. A video can be considered as a series of images (li) Then, i=1 the extraction of the potential hologram will be performed thanks to the study of each frame of the video.
When looking at a hologram, the visual aspect of the image varies according to the angle between the document surface's orthogonal axis and the axis of view of the camera. This can be observed in
To emphasize the difference between documents with and without a hologram, this computation can be done on all pairs of consecutive frames or considering a set J of pairs of distant frames. Then, the score of a document D is defined as:
In case of a positive presence of a hologram in the document, it is possible to rebuild the hologram or part of the hologram from the study of each frame.
On each frame I of the video some part of the hologram is detected, extracted and associated with H(I). Nevertheless, it is not sufficient to consider the union of the H(Ii). For example, the document may be held by the end-user in a non-stable position, or the camera is held in hand and is mobile with respect to the document, or both the document and the camera are moving. Before the aggregation of the different parts, a registration process is performed between consecutive frames or, depending on the acquisition protocol, all frames can be registered on a single frame of the video. Let RI note the transform of frame I during the registration with a fixed frame of the video. Then the hologram of the document can be recovered by following process:
Referring to
The method and system for the authentication of hologram protected ID documents are suited for any type of document containing a hologram with no a priori information about the presence or not of a hologram.
The thresholds and constants can be set by performing the on a training set of videos of true passports of various nationalities, for example a set of 37 such videos, and on a set of videos of documents 26a, 26b without a hologram (see
For each video of the database, the aim is to determine whether the document contains or not a hologram. The evaluation is then performed with respect to precision, recall and F1-measure. Precision evaluates how false documents have been authenticated, recall evaluates how true documents have not been authenticated and F1-measure gives the harmonic mean of the previous two. Table °1 gathers together the three values.
The values in Table °1 mean only one of the holograms in the 37 videos containing one has not been detected. In this case the distance (during acquisition) between the camera and the document being too large explains the results. Some registration at detection level would be needed. The false positives are linked with the instability of the acquisition mode of the different videos. To improve such false positives, as well as for false negatives a registration could be used in the detection phase.
The confidence on the presence of the hologram is linked to the score value that is computed in Equation (7) and more precisely on the position of the score value and the threshold. It can be observed that the confidence is larger when the acquisition is performed with a distance between the document and the camera is rather small.
The method and system for the authentication of hologram protected ID documents allow the detection of a hologram remotely via images of the document acquired with a common smartphone or tablet and light. The acquisition is then possible by the end-user. As single image is not optimal for the method and system to provide a precise conclusion, a video is advantageously used with a relative movement between the document and the camera.
In an alternative embodiment, the retrieval of the hologram manages the different superimposed elements. Continuity in the appearance of the pattern can help to discriminate between the multi shape of the hologram. Furthermore, from the hologram extracted some recognition of the identity document can be achieved and thus confirm the authentication of the document.
Referring to
Referring now to
The process 200 starts at block 202 where an image of the ID document is acquired, advantageously 2 or more images. Alternatively, a video can be acquired and a series of two or more images extracted from the video frames. The image and video acquisition can be performed using, for example, camera 132 of the system for the authentication of hologram protected ID documents 100 of
At block 204, the process 200 performs a pixel level analysis, identifying in each acquired image pixels whose saturation and value are both above associate thresholds determined from respective saturation and value histograms. To facilitate these computations, each image may optionally be expressed in the HSV colors space instead of the RGB color space.
Then, at block 206, the process 200 performs a zone shape analysis for all pixels identified at block 204. This is done in order to identify pixel zones having a porous structure figured by small neighboring components and eliminate pixels from such zones as they do not belong to a hologram. This is performed by building a set M of connected components from the pixels identified at block 204 and a set Md of connected components from a dilation of M. Each time the number of connected components of M in a single connected component of Md is above a specified value, it can be concluded this connected component of Md is porous and cannot be considered as a potential hologram zone. So, it will be suppressed from M. The specified value can be fixed using a set of training images.
At block 208, the process 200 performs a color analysis by computing the number of hues present in each remaining connected components of M from block 206 and normalizing the result according to the size of the connected component evaluated. If the normalized number of hues is below a specified value, it can be concluded this connected component cannot be considered as a potential hologram zone. So, it will be suppressed from M. The specified value can be fixed using a set of training images.
At block 210, the process 200 performs the hologram identification. At this stage, the remaining extracted pixels are those with high saturation and value but that do not form a porous region and are locally with several hues. In order to identify a hologram, the difference between the color features of the remaining extracted pixels of different images is computed. The highest the difference is, the highest the probability that the document contains a true hologram. To emphasize the difference between documents with and without a hologram, this computation can be done on all pairs of consecutive frames of a video or considering a set of pairs of distant frames. Then, the score of a document is defined as the average of all the computed differences. When a hologram is present, the score must be high. In order to make a decision, a threshold has to be fixed according to a representative training set. The threshold depends on the number and nature of frame pairs involved in the computation of the score.
Finally, at block 212, the process 200 performs the hologram identification. The hologram of the document can be recovered by aggregating the remaining extracted pixels of each image. However, before the aggregation, a registration process is performed between consecutive frames or, depending on the acquisition protocol, all frames can be registered on a single frame of the video. Let RI note the transform of a given frame I during the registration with a fixed frame of the video. Then the hologram of the document can be recovered by aggregating the remaining extracted pixels of each image I to which is applied the corresponding transform RI.
Although the present disclosure has been described by way of particular non-limiting illustrative embodiments and examples thereof, it should be noted that it will be apparent to persons skilled in the art that modifications may be applied to the present particular embodiment without departing from the scope of the present disclosure as hereinafter claimed.
This application claims the benefits of U.S. provisional patent application No. 63/304,608 filed on Jan. 29, 2022, which is herein incorporated by reference.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/CA2023/050120 | 1/28/2023 | WO |
Number | Date | Country | |
---|---|---|---|
63304608 | Jan 2022 | US |