The present invention proposes a method for preventing counterfeiting or alteration of a printed or engraved surface.
Common systems for the prevention of counterfeiting or alteration of printed or engraved documents can be grouped as follows:
Holograms, special motifs and other decorative features are difficult to reproduce because they require special equipment. They were specially designed to interfere with traditional copy systems so that the copy features significant visual differences from the original. They can be verified through visual inspection without the help of particular devices but have the drawback of being expensive, sufficiently known to be reproduced by counterfeiting experts, and their visual appearance disturbs the aesthetic of the protected products (for example packaging of cosmetics). The fact that these security features are visible also contributes to their limited efficiency because they can easily be identified by a counterfeiter and copied or physically removed.
Printing processes with special inks exploit particular chemical characteristics of the ink to provide determined reactions for given stimulations. As an example, fluorescent ink becomes very shiny when exposed to light with a particular wavelength. Some inks are invisible under natural light, other ink change their color depending on their viewing angle or temperature (and can be revealed by heating the paper with a finger) etc. The common point of special inks is their high price and the need to modify the industrial production chain for their usage, (for example the introduction of an additional plate in offset printing). Although being more robust against counterfeiting than the previous group, it is also possible for a counterfeiter to reproduce the effects of the inks and even verify the quality of the counterfeits by comparing them to the original if he is in possession of the appropriate device to make the ink react.
Printed codes using invisible ink are different from the previous groups in that they can carry digital information. The information can for example represent numbers, characters, barcodes, or 2D codes. In addition to the high price, these systems have two major disadvantages. Firstly, due to the nature of the codes used, it is localized in a specific part of the document or packaging and can therefore easily be destroyed without altering the entire surface. Secondly, the codes are easily identifiable anti-copy features due to their geometrical characteristics, such as bars, geometrical figures, and characters. This makes the job of finding and reproducing the ink for a counterfeiter much easier. In addition, if a counterfeiter is able to reproduce the ink, then he has ipso facto also the means to reproduce the code.
At last, systems based on memory or on-board processors have the disadvantage of being very expensive, not visually pleasing, and localized. Their main application serves to secure communication/access, or dynamically store information to distinguish an original from a copy.
One goal of the present invention is to remedy the weaknesses of the known processes to prevent counterfeiting or alteration of printed or engraved documents through a digital approach.
For this, the present invention addresses a process to prevent counterfeiting or alteration of a printed or engraved surface by inserting a digital mark into parts or the entire document.
Digital marking technologies, also known by the name digital watermarks, are methods by which information can be hidden in digital multimedia, such as music, video, images, and documents, in an imperceptible and robust way. The hidden information is called signature. This signature can for example represent a number, a name, or even an image. After protecting multimedia data with a digital watermark we refer to the protected data as signed image, signed video, etc.
Until today, digital watermarking methods were only used with the goal of retrieving a signature from an eventual copy to prove the origin of the data.
“Hiding” carries a very specific meaning in this context: for example in the case of an image, the color values of certain pixels would be changed during the hiding process, for music the sound would be slightly changed from time to time.
“Imperceptible” means that the modifications introduced during the hiding process are such that it is not possible for a human to distinguish the original from the signed data with its own senses. As an example, a signed image must have the exact same visual appearance as the original image, a piece of signed music sounds absolutely normal, and the same applies to video or any other data. The problem consists in deriving a process allowing a computer to detect the hidden information, while it is not perceptible by our senses. There exist also applications in which a visible mark is acceptable or even desirable. This allows for increased robustness and a visual verification of the inserted mark. The principle here is to design a visible mark having a non-disturbing appearance.
“Robustness” of a digital mark means that it should be possible to retrieve the embedded information after any modification of the signed data. Taking the example of an image, it should be possible to compress, print and scan, and rotate the signed image without losing the signature.
Numerous publications were made in the past covering different technologies to hide a mark in images, video, or audio signals. With respect to the images, the methods can be grouped according the technological approach used for marking: some apply modifications directly in the spatial domain (see for example [1] M. Kutter, F. Jordan, F. Bossen, “Digital watermaking of color images using amplitude modulation”, Journal of Electronic Imaging, vol. 7, no 2, pp. 326-332, April 1998.), others apply modification in a transformation domain (for example the frequency domain), or intermediate domains such as wavelets (see [2] Shelby Pereira, Sviatoslav Voloshynovskiy and Thierry Pun, Optimized wavelet domain watermark embedding strategy using linear programming, In Harold H. Szu and Martin Vetterli eds., Wavelet Applications VII (part of SPIE AeroSense 2000), Orlando, Fla. USA, Apr. 26-28, 2000.).
These methods can also be used to mark video after some slight adaptations. Other methods specifically designed for video also exist and often work in advanced transformation domains, such as 3D sub-bands, or motion vectors (for examples. see [3] U.S. Pat. No. 5,960,081, Video watermarking using motion vectors and [4] European patent application EP 0762417 A2, Video watermarking in the compressed domain).
Until today and as already mentioned, digital watermarking methods were used to retrieve a signature from a suspected copy with the goal of identifying the origin of the copy thanks to the presence of the watermark which can be retrieved on the copy. In all cases, this implies the usage of a robust watermark.
In the method of the present invention, the goal of inserting a digital mark on a surface is different because the presence of the mark serves to prevent counterfeiting or altering the concerned surface. In other words, the presence of the mark proves that the surface is authentic, and the absence of the mark indicates that it is a copy or that the surface was altered. In the case where the mark is used to authenticate the surface relatively to copies, the robustness of the digital mark must be reduced such that a copy of the surface results in a failure of the detection of the mark. We refer to these types of marks as “fragile”. A typical application of fragile marks is the protection of valuable papers, such as banknotes, against counterfeiting. The mark may be both robust and fragile in the cases where it is inserted in order to detect alteration of parts or the entire document.
The present invention simultaneously encompasses features that are only present in an isolated manner in the known systems destined to prevent counterfeiting or alteration of printed or engraved documents mentioned above:
Invisibility
The mark is printed using a combination of color and printing resolutions such that it is not visible by the naked eye. This for example allows the protection of a packaging without visually altering the graphical design, a very important requirement for marketing reasons.
Non-localized
The mark can cover the entire surface of a printed document. Hence, it is not possible to erase it without altering the entire document, for example through scratching the surface. In practice, this property allows to avoid gray markets, that is, reselling of products by non-authorized distributors. In fact, malicious distributors often erase codes identifying their resellers (for instance invisible 2D codes) through milling the surface of the packaging where the code was applied.
Price
The mark is printed using traditional printing systems. With respect to industrial printing (offset, etc.), the mark fully integrates into the production process and does not introduce additional costs. With respect to personal printing (inkjet, laser, etc.), the technology is fully compliant with common commercially available printers. In both cases, the mark is read using a standard digital scanner. The low cost opens new markets. For industrial printing this includes among others packaging of luxury products and pharmaceutics, certificates, checks, and tickets. For personal printing, the digital mark allows anybody owning standard equipment to create and verify secured and personalized documents. As an example, physicians can hide the name of the medication on the prescription paper. It is also possible to program a printer so that it hides a digital mark on each printed document indicating the printing date and user.
Information Storage
In addition to authenticating the original, the mark contains digital information (typically tens of bits per square centimeter) encoded and decoded using a digital key. In practice, this storage for example helps to secure information printed in visible text (and therefore prone to being modified). With the mark it is possible to detect any modification of the text on the document by encoding the same information in the mark (date, amount, identity, etc.). One application addresses contracts where we want to be sure of the date. A different example is for banknotes where the serial number can be hidden in the mark making it impossible to forge bills with different serials numbers because the counterfeiter would need to create for each bill the corresponding mark.
Key Dependent Encoding and Decoding
To create and read a mark, the same key has to be used. By controlling access to the key one can control when and by whom a mark is created and read. This is essential because it significantly complicates forging a mark by a counterfeiter (the easiest approach is still copying an existing mark). In addition, a counterfeiter is not able to verify the quality of a counterfeit because he does not know the key used to create the original mark. The security of the system is therefore higher than for example for systems printing information using invisible ultraviolet ink where the counterfeiter can easily verify and therefore enhance the counterfeits.
Difficult to Identify Visually
Even when using special devices (filters, microscopes) it is difficult to identify a mark because it has a visual appearance that is similar to the paper grain. The mark has no simple geometrical characteristics and is meaningless for a detection program without the appropriate key. This is a crucial feature for marks on all value paper subject to a thorough analysis by counterfeiters.
Difficult to Copy
The use of certain colors (e.g. yellow on a white paper) and high-resolution printing (e.g. 1200 dpi) makes it very difficult or impossible to copy the mark on classical copy equipment.
Digital methods usually hide marks by slightly increasing or decreasing the color intensities of certain points, which means that certain pixels are brightened and others darkened, as shown in
There exist certain cases where a symmetric modulation is not possible for either mathematical reasons (e.g. image to mark is entirely white or black) or practical reasons (related to the printing technology).
The present invention proposes to asymmetrically modulate the pixel colors.
Thus another object of the present invention proposes a process to hide and/or retrieve a digital mark, characterized by using an asymmetric modulation of the amplitude of a visible or invisible luminous component.
The following description is given as an example and refers to the figures in the annex:
An example of a symmetric modulation is illustrated in
An example of an asymmetric modulation is illustrated in
Printing of the Mark
Depending on whether a positive or a negative modulation is used, different approaches can be considered to print an asymmetrically modulated mark. In addition, it is possible to choose either a separate printing or a simultaneous printing together with another visual printed motif (background, text, or graphics).
One way to obtain or positive asymmetric modulation consists in using an overprinting technology where the mark is printed over the colors of the material and other already printed information, and thus without taking into account the local color variations of the colors on the surface of the material. This approach implies that the color components of the material can only be darkened at the time of the signature because additional ink is added. Mathematically speaking this corresponds to a positive asymmetric modulation of the spot colors. In principle, this approach can be applied to any printing process. Some specialties of printing the mark may depend on the printing process. The particular cases of offset and inkjet printing for the realization of a positive modulation are detailed below.
A different alternative consists in using a separate mask for the digital mark, as illustrated in
A different printing process that can be used is of type inkjet, as illustrated in
The realization of a negative modulation can be achieved though a simultaneous printing and following the same principles as described before since it is always possible to subtract color from a digital file: in the motif to be printed, the points corresponding to the mark are lightened. To realize a separated printing with a negative modulation, it is however necessary to use a special ink, for example when using a visible ink, one solution consists in using a covering, that is opaque ink. A synthesis of the different solutions to print a digital mark is presented in the following table:
Parameters Controlling the Visibility of the Digital Mark
Independent of the modulation and printing type chosen, the final visibility as well as the fragility to duplication of the digital mark is controlled by a set of the common parameters:
The influence of certain of these parameters is illustrated in
Reading the Mark
The main difficulty relies in retrieving the asymmetric digital mark. In general, the majority of watermarking technologies can extract the information from the signed image without using the original image. Certain methods first compute a prediction of what was the original image from the signed image and can then derive the signature. This technology is still being used at present. It is possible to eliminate this prediction in the case where the material initially has a known uniform color. In particular, this applies for a white sheet of paper. It allows the increase of the reliability of the detection and thus the decrease of the visibility of the digital mark down to the optical sensitivity limit of the scanner. Consequently, it renders duplication of the signed material very difficult, for example through photocopying, because generally the inherent losses of any reproduction system weaken the digital mark below the detection threshold. An application consists in including a digital mark on paper sheets that we want to protect against copying, such as banknotes.
In addition, to increase the detection reliability it is also possible to code the signature by using the difference between pairs of pixels and then compute the average of these differences. From a statistical point of view, this increases the correlation of the detection and results in a more reliable signature.
Realization of the Invention
One way of realizing the invention consists in using as a base a spatial domain digital watermarking algorithm with symmetric amplitude modulation, as for example described in [1]. We refer to a symmetric amplitude modulation of a signal if the values of the signal are increased at some points and decreased at others. In this technique, the color components from a set of pixels c(k) are modified by a value v corresponding to the amplitude of the modulation, a function of the sign of the bit b={−1, 1} to be hidden, and a pseudo-random number generator a(k) initialized by a key and generating two values {−1, 1}:
c(k)′=c(k)+v.b.a(k) (1)
In equation (1), the set of points defined by v.b.a(k) constitute the digital mark (
In the case of an asymmetric positive modulation (for instance digital mark with over-printing) it is not anymore the image c(k)′ but directly the digital mark v.b.a(k) that is printed over an image c(k). The component c of a support (blue, luminance, etc.) already has an initial value o(k) and can only be increase during over-printing. Therefore, the following equation applies:
Iff b.a(k)>0 then c(k)′=o(k)+v.b.a(k) otherwise c(k)′=o(k) (2)
In the case where the digital mark deployed simultaneously with the printing, the process can even be improved by operating in such a manner that the digital mark dominates the original mask. Mathematically speaking, this concept can be formalized in the following manner:
c(k)′=0 iff b.a(k)<0
c(k)′=M otherwise
where M is the maximum allowable value of the mask, that is, the value corresponding to the color of the document before signing it. The equation clearly shows the positive modulation with respect to zero and illustrates that the underlying image is not taken into account at the positions where the digital mark is hidden (domination of the digital mark over the original values). This procedure has the advantage that the effective number of points contributing to the digital mark increases and can reach a factor of 2 in the best case.
It is also possible to obtain a negative modulation by printing a uniform color u <<punched>> by the digital mark. Equation (2) then becomes
Iff b.a(k)<0 then c(k)′=o(k)+u−v.b.a(k) otherwise c(k)′=o(k) (3)
If the pseudo-random number generator a(k) produces the same number of positive and negative values, then from a statistical point of view it results that half of the pixels c(k) are being modified (in both cases: positive or negative asymmetric modulation). If the value of v is chosen sufficiently small and the printing resolution is sufficiently high, then the points can be produced in an invisible way.
The new values of the points c(k)′ can be measured on the printed paper sheet by using an optical scanner. Depending on whether the color of the material is uniform or not, two cases occur.
In the first case, the information b is easily found as o(k)=Constant, and both v and a(k) are known in advance. The large number of modified pixels creates a redundancy assuring the robustness to noise of the technology through a statistical correlation.
This method can be generalized to several bits b to code any digital information, such as a number or a string of characters.
The second case is illustrated in the block diagram of
In practice, it can also be useful to print visible information over the digital mark. This is for example the case for a white paper sheet containing a digital mark and on which text is printed. This can be realized by choosing distinct colors or intensities for the digital mark and the visual information. It is then possible to filter the image before detecting the digital mark (
Finally, the realization of the detection requires an optical scanner capable of digitizing the document on which the digital mark is printed. As the positioning of the document on the scanner is never perfect, it is necessary to be able to detect the information coded in the digital mark even after eventual translations and rotations.
One suitable method consists in using the method described in [5], which is based on an auto-correlated digital mark (to compensate for rotations) and a method the cross-correlation (to compensate for translations).
Other Applications
The process can also be applied to other sectors than printing. For instance, it is possible to use laser engraving to apply a digital mark to metallic surfaces, stone, ceramics, etc. Applications addressed are for example industrial parts for the automobile and aeronautic industry, luxury objects in the sectors of jewelries, or value object. One can also imagine hiding digital marks on CD-ROMs or audio CDs, on both the label surface and the engraving side (ink or laser).
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CH01/00560 | 9/17/2001 | WO | 00 | 8/4/2003 |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO02/25599 | 3/28/2002 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
3984624 | Waggener | Oct 1976 | A |
4237484 | Brown et al. | Dec 1980 | A |
4495526 | Baranoff-Rossine | Jan 1985 | A |
5091966 | Bloomberg et al. | Feb 1992 | A |
5103459 | Gilhousen et al. | Apr 1992 | A |
5257119 | Funada et al. | Oct 1993 | A |
5315098 | Tow | May 1994 | A |
5363202 | Udagawa et al. | Nov 1994 | A |
5421869 | Gundjian et al. | Jun 1995 | A |
5488664 | Shamir | Jan 1996 | A |
5530751 | Morris | Jun 1996 | A |
5754674 | Ott et al. | May 1998 | A |
5872834 | Teitelbaum | Feb 1999 | A |
5946414 | Cass et al. | Aug 1999 | A |
5960081 | Vynne et al. | Sep 1999 | A |
6039257 | Berson et al. | Mar 2000 | A |
6076738 | Bloomberg et al. | Jun 2000 | A |
6104812 | Koltai et al. | Aug 2000 | A |
6166750 | Negishi | Dec 2000 | A |
6289108 | Rhoads | Sep 2001 | B1 |
6343138 | Rhoads | Jan 2002 | B1 |
6345104 | Rhoads | Feb 2002 | B1 |
6351815 | Adams | Feb 2002 | B1 |
6404898 | Rhoads | Jun 2002 | B1 |
6421145 | Kurita et al. | Jul 2002 | B1 |
6442555 | Shmueli et al. | Aug 2002 | B1 |
6542629 | Wu et al. | Apr 2003 | B1 |
6546114 | Venkatesan et al. | Apr 2003 | B1 |
6614914 | Rhoads et al. | Sep 2003 | B1 |
6708894 | Mazaika | Mar 2004 | B2 |
6731776 | Fujiwara | May 2004 | B1 |
6750902 | Steinberg et al. | Jun 2004 | B1 |
6754377 | Rhoads | Jun 2004 | B2 |
6988202 | Rhoads et al. | Jan 2006 | B1 |
7068811 | Powell et al. | Jun 2006 | B2 |
7076084 | Davis et al. | Jul 2006 | B2 |
7116781 | Rhoads | Oct 2006 | B2 |
7171018 | Rhoads et al. | Jan 2007 | B2 |
7171020 | Rhoads et al. | Jan 2007 | B2 |
7280672 | Powell et al. | Oct 2007 | B2 |
7310168 | Trelewicz et al. | Dec 2007 | B2 |
7412074 | Powell et al. | Aug 2008 | B2 |
7424132 | Rhoads | Sep 2008 | B2 |
20030063318 | Trelewicz et al. | Apr 2003 | A1 |
Number | Date | Country |
---|---|---|
0 298 691 | Jan 1989 | EP |
0 372 601 | Jun 1990 | EP |
0 493 091 | Jul 1992 | EP |
0 762 417 | Mar 1997 | EP |
0 961 239 | Dec 1999 | EP |
1 003 324 | May 2000 | EP |
1 137251 | Sep 2001 | EP |
1 389 011 | Feb 2004 | EP |
2217258 | Oct 1989 | GB |
WO 8908915 | Sep 1989 | WO |
Number | Date | Country | |
---|---|---|---|
20040013285 A1 | Jan 2004 | US |