The present invention relates to methods for designing a printed image for a security feature. A section of an original image used to produce the printed image may be mirrored in multiple directions, thereby providing a more distinctive design.
Many documents contain security features that assist with identifying counterfeit or forged documents. Many of these documents will contain security features that utilise micro-optics as such features are typically difficult to copy with the precision needed to produce a convincing forgery.
The micro-optics used in these documents often comprise an array of optical elements overlying a printed image made up of pixels. Viewing the printed image through the array of optical elements distorts the printed image and can lead to distinctive effects, particularly as the security feature is tilted to vary the angle between the viewer's eye and the plane of the security feature.
The more distinctive the effect produced by a security feature is, the more clearly it can be determined that the security feature (and its associated document) are genuine. Furthermore, the effects produced by security features are the product of complex interactions between the printed images and the array of optical elements. The arrangement of features in the printed image can lead to any number of effects, including magnification, implied depth, and animation. It can be difficult to ‘reverse engineer’ the interactions between printed images and arrays of optical elements which give rise to such effects, thereby making reproduction of the effects difficult to achieve. Nevertheless, especially with time and access to the security feature, forgery is possible.
The more effects that a printed image has, the more complex combinations of these effects can be. Combinations of animation and magnification, for example, may be more visually and mathematically complex than animation or magnification alone. In turn, it may be harder for a counterfeiter to recognise an effect or combination of effects and derive the arrangement of the printed image that gives rise to them. The more degrees of freedom that exist in the design of printed images, the broader the range of possible security features becomes. A broader range of possible security features leads to increased difficulty in ascertaining the underlying printed image, which is advantageous in deterring and defeating counterfeiting.
Therefore, there exists a need for improved printed image and security feature design, providing distinctive effects and underlying image/optical element interactions that are difficult to ascertain.
The invention is defined by the appended independent claims. Embodiments of the invention are defined by the dependent claims.
In a first aspect, there is provided a method for designing a first layer of a printed image in a security feature, the security feature comprising an array of optical elements overlaying the printed image, the method comprising: receiving an original image, the original image comprising rows of pixels extending in an x direction and columns of pixels extending in a y direction; selecting a first section of the original image; generating a first block by combining the pixels of the first section with pixels of the first section mirrored in both the x and y directions; and assigning to the first block a location within the first layer of the printed image, the location corresponding to the location of the first section within the original image.
In this way, the method provides a printed image with a unique arrangement, which can lead to distinctive effects when incorporated into a security feature. In particular, the mirroring of sections of the original image in both the x and the y direction ‘corrects’ for a phenomenon known as ‘frame skip’. Frame skip will be discussed in greater detail in due course. Briefly, frame skip occurs when a security feature is tilted by a viewer beyond a threshold angle, for example beyond 30° relative to the normal. Beyond this threshold angle, there is a mismatch between the printed image and the array of micro-optical elements overlaying it. This mismatch can be significant enough that each lens is focusing on a portion of the printed image not directly beneath the relevant lens, rather each is focusing on its neighbour's portion of the printed image. This leads to a particular visual characteristic in the security image.
By correcting ‘frame skip’, a smoother animation is achieved as the user rotates the security feature. This is not only distinctive and thus eases fast recognition of genuine security features, but also provides one further link in the chain between printed image and security feature appearance; the chain a counterfeiter must break in order to forge the security feature.
Generating a first block of the printed image may comprise: i) mirroring the pixels of the first section in the x direction, about the right edge of the first section; ii) mirroring the pixels of the result of step i in the y direction, about the lower edge of the result of step i; or i) mirroring the pixels of the first section in the y direction, about the lower edge of the first section; ii) mirroring the pixels of the result of step i in the x direction, about the right edge of the result of step i. It will be appreciated that mirroring might equivalently be performed about the left and upper edges, rather than the right and lower edges, respectively.
The method may further comprise: sizing the first block such that the size of the first block relative to the printed image is equal to the size of the first section relative to the original image.
In this way, certain patterns found in the original image can be replicated, albeit with appearance characteristics added, and appear at the same scale in the printed image. Maintaining the scale of recognisable objects in the original image can aid a viewer in determining the content of the printed image, thereby easing identification of genuine security features.
The first block may be sized to be overlaid by exactly one optical element of the array of optical elements.
The array of optical elements may comprise rows of optical elements extending in the x direction and columns of optical elements extending in the y direction, further comprising: rotating, by a rotation angle, the first layer of the printed image relative to the array of optical elements, such that respective rows and columns of blocks in the first layer and the rows and columns of the optical elements are offset by the rotation angle.
In this way, the method provides yet more distinctive characteristic to the printed image. By introducing a tilt to the printed image relative to the array of optical elements, a cyclical effect is generated for the security feature. Recognisable objects or patterns in the printed image no longer have vertical or horizontal alignment with the array of optical elements. Therefore, as the security feature is tilted, the viewer is presented with horizontally and vertically shifting elements of the printed image, which also cycle. The effect is demonstrated in the figures, with accompanying description to follow.
As with the correction for ‘frame skip’, this additional effect aids the distinctive character of the security feature, which is advantageous for fraud prevention and recognition of genuine security features.
The rotation angle may be between 0.1° and 5°, for example, between 0.1° and 2°, between 0.1° and 1°, or, preferably, between 0.1° and 0.6°. These angles have been found to be particularly effective at generating distinctive printed images, and thus distinctive security features.
In particular, these ranges are most effective for generating an oscillating effect in the security feature, somewhat visually akin to the movement of an object underwater. This underwater effect is especially recognisable for many, and provides a new category of distinctive character to compliment those such as magnification and animation.
The method may further comprise: selecting further sections of the original image; and, for each further section: generating a block, and assigning to the block a location within the printed image, the location corresponding to the respective location of the section in the original image, using the same generating and assigning steps applied to the first section and first block. Each block may correspond to one optical element in the array.
In this way, the entire original image can be transferred into a printed image, thereby retaining the content of the original image, such as any objects or patterns.
The method may further comprise: receiving a further original image; and designing a second layer of the printed image from the further original image, using the steps applied to the original image to design the first layer of the printed image, wherein the rotation angle applied to the first layer of the printed image is different to the rotation angle applied to the second layer of the printed image. The method may further comprise compositing the rotated first and second layers to form the printed image.
In this way, yet further distinctive character can be applied to the security feature, by varying the level of oscillation performed in different areas of the printed image. A background object of the printed image may, for example, be designed to oscillate more than a foreground object, thereby implying depth in the image. This is exemplary only, and any differing rotations applied to layers of the printed image will produce a more distinctive security feature, aiding recognition of genuine features and hindering counterfeiting. Indeed, a rotation angle of 0° may be applied to one layer and a non-zero rotation angle to another, thereby boosting the effect of the oscillations for objects in the rotated layer.
As used herein, compositing layers to form a printed image includes any physical or computational process by which the content of the layers are laid over one another and/or combined into a single printed image. For example, a physical process of compositing two layers is simply to print one on top of the other. Depending on the opacity of the inks used and other printing parameters selected by the designer, some or all of one layer may dominate or the colour values of the layers may combine. A computational compositing process may be performed, for example, using image processing software, such that a single printing process can be used to print the composite image. Any process by which visual elements from more than one layer are combined to produce a printed image is considered to be compositing those layers.
The original image may be an interlaced image. An interlaced image may be generated by interlacing an input image, and wherein interlacing an input image comprises: generating a plurality of frames of a multi-frame image, each frame comprising the input image at a different location within the frame; defining an arrangement of the plurality of frames, the arrangement comprising a grid; and interlacing the frames with one another according to the positions of the frames in the grid.
The first section may be selected to include only one portion of each interlaced frame.
The original image may be a multi-frame image comprising a plurality of frames and the first section of the original image may comprise one frame of the multi-frame image.
Each further section may comprise a distinct frame of the multi-frame image, and the method may further comprise interlacing the plurality of generated blocks according to their assigned locations to form the first layer. Generation of the multi-frame image as an original image may comprise generating a plurality of frames, each frame comprising an input image at a different location within the frame; and defining an arrangement of the plurality of frames, the arrangement comprising a grid.
In methods of the invention using interlacing, there are, in effect, three key processes being performed: frame generation; interlacing of portions of the frames with one another; and frame skip correction by mirroring. Frame generation takes place before interlacing (since interlacing is based on the existence of multiple frames in a multi-frame image). The frame skip correction by mirroring takes place after frame generation, but can occur before or after interlacing. The content of the image (input image) from which frames of the multi-frame image are generated and the content of the image (original image) from which first and further sections are selected to generate first and further blocks will differ depending on the timing of the correction by mirroring. In embodiments where correction by mirroring occurs after interlacing is complete, the input image may be an image not yet manipulated in any way and the original image is an interlaced version of that input image. In embodiments where correction by mirroring occurs during interlacing, the input image is the same (an image not yet manipulated in any way), the original image is the multi-frame image generated from the input image, and the first section is a frame (i.e., the first section may consist of one frame) of the multi-frame image, such that the first block is a mirrored frame (mirrored in both the x and y directions). Further blocks are further mirrored frames, and the interlacing is then performed on the blocks, which are mirrored frames.
It will be appreciated that defining an arrangement of the plurality of frames, that arrangement being a grid, could entail producing the grid as an actual entity stored in memory, or could entail merely assigning a data flag to each frame and its content such that the interlacing algorithm understands the position of each frame with respect to the interlacing steps. In other words, the arranged frames may exist as an arranged grid, for example as would be recognised by someone viewing the arrangement, or the frames may have associated metadata allowing the interlacing algorithm to derive the position of the frame within a nominal grid for the purposes of performing the steps of interlacing.
The first and/or further sections may be selected to be a square.
In a second aspect, there is provided a method for producing a printed image for a security feature, the method comprising: printing a printed image designed in accordance with the first aspect. Printing in this context comprises producing a physical representation of the printed image, the data for which may be stored on a computational device.
In a third aspect, there is provided a printed image for a security feature, the security feature comprising an array of optical elements overlaying the printed image, the printed image comprising: a first layer, the first layer comprising a first block, the first block comprising pixels of a first section of an original image mirrored in both x and y directions. Physically printed images designed in accordance with the methods of the first aspect are advantageous because they allow for security features which are more distinctive than security features based on known printed images, for the reasons described in relation to the first aspect.
The first layer may further comprise: one or more further blocks, each further block comprising pixels of a respective further section of the original image mirrored in both x and y directions.
The printed image may further comprise: a second layer, the second layer comprising a second block, the second block comprising pixels of a first section of a second original image mirrored in both x and y directions.
The first and/or second layer may be rotated relative to the x and y directions by a rotation angle, optionally wherein the rotation angle is between 0.1° and 5°, for example, between 0.1° and 2°, between 0.1° and 1°, or, preferably, between 0.1° and 0.6°.
In a fourth aspect, there is provided a security feature comprising: the printed image of the third aspect; and an array of identical optical elements overlaying the printed image.
In a fifth aspect, there is provided a security document comprising the security feature of the fourth aspect. A security document in this context may be any document for which a mark of authenticity may be useful or required in order that the document serve its purpose.
The security document may be one of a banknote, a passport, a driver's license, and an identification card, or the like.
In a sixth aspect, there is provided a non-transitory computer readable medium, storing computer readable instructions, which when executed, cause a machine comprising a processor to perform the method of any of the first aspect.
Certain exemplary embodiments will now be described to provide an overall understanding of the principles of the structure, function, manufacture, and use of the devices, systems, and methods disclosed herein. One or more examples of these embodiments are illustrated in the accompanying drawings. A person skilled in the art will understand that the devices, systems, and methods specifically described herein and illustrated in the accompanying drawings are non-limiting exemplary embodiments and that the scope of the present invention is defined solely by the claims. The features illustrated or described in connection with one exemplary embodiment may be combined with the features of other embodiments. Such modifications and variations are intended to be included within the scope of the present invention.
Typically, the security feature may be fabricated by printing the pixels onto a substrate to form the printed image and then overlying the substrate with an array of optical elements. In some embodiments the security feature may comprise printing the printed image on a first side of a polymer film and applying an array of optical elements to the other side of the polymer film. In some embodiments, an array of optical elements may be applied as sheets or directly cast on top of a printed image. In some embodiments the security feature may comprise an array of optical elements that focus onto an internal surface of the security feature.
In principle, it would be ideal to produce optical elements and pixels to the exact dimensions that are designed, and that the width of an optical element would be an integer multiple of the width of a pixel such that an integer number of pixels fit exactly under each optical element. For example, a typical optical element may have a nominal design size of 70 microns, and a pixel may have a nominal design size of 2.5 microns which would result in 28 rows (or columns) of pixels under each optical element. This would lead to the viewing experience described above, wherein a user will see a different frame depending on the angle from which they view the security feature 200, and they would see the same pixels from only one frame across the entire image.
The content of the printed image underlying the array of optical elements directs the appearance of the security feature when viewed through the optical elements. Integral images, being images created via an integral imaging process, allow for certain distinctive effects to appear in the security feature.
Integral imaging is a process by which three-dimensionality can be implied from a two-dimensional object. Crude integral imaging uses photography with a number of lenses and then arranging all of the photographed images through a single array to produce a three-dimensional effect. Photographic interlacing is labour intensive, and is restricted in the effects it can produce.
Computational integral imaging can be used to recreate simplified versions of three-dimensional objects, but it also provides a great deal of design freedom by which the image can be simplified further. Printed or displayed objects are perceived as three-dimensional in two ways: firstly, if they present slightly different views to each eye simultaneously, secondly if they appear to move in a way that is counter to the display medium, when the display medium is moved relative to the viewer.
The process of generating three-dimensional views can be simplified as such: two-dimensional objects will appear to be located on planes above or below the plane of a print if they move either faster than their backgrounds or in the opposite direction. These objects will also satisfy the binocular requirement of three-dimensionality, since they will appear slightly different to each eye in a manner consistent with their movement. Complex three-dimensional images composed of objects located on different planes can be built up in this manner.
Animating flat objects to move to give the appearance of depth does not require multiple three-dimensional views, but can be done from a single image. There are two ways to convert single images to such animations:
Two integral imaging processes are detailed herein: interlacing and sampling.
An interlacing process begins with generating a multi-frame image. The frames are selected to give rise to a particular effect in the security feature, as detailed with respect to
Once the frames are generated, each is split into a plurality of component parts, which are then reassembled as a larger output image.
Each repeating cycle of images can be designed to fit under a single lens in the output design so that when the user views the optic from an angle the identical frame will be magnified by all the lenses (e.g. from the normal, the viewer would see all pixels of the image frame denoted ‘5’).
A further step of pitch correction can be applied to correct for the fact that the lens and the print pitches are very unlikely to match, so the displayed frame may move as a viewer moves across the image. However, this step is not necessary and may in fact be deliberately omitted since the mismatch between the lens array and the print add to the sense of depth.
Formally, this relationship can be written as:
The output image size is equal to the total width and height of all the individual frames.
A sampling technique may also be used to produce an integral image. A sampling technique has the advantage of being faster and using fewer system resources; in this case, instead of generating multiple frames by moving the objects within an image around, a single image is used and sampled at positions which are incremented at intervals smaller than the frame size.
Designs created by this method and those created via interlacing a series of frames are intended to perform in the same way. The sampling method does not create any extra unwanted images and can be optimised to copy only specific colours (for example excluding white, which need not be copied), so the resulting processing can be faster with sampling than with interlacing.
Formally, the relationship is:
The input image may need to be resized to accommodate a particular increment size. The size is: width=mmaxIx+F×height=nmaxIy+F.
As can be seen from equation (2), this method is effectively another method of interlacing, but using a single image and interlacing with itself.
Sampling may introduce an error between the lenses and the printed image, i.e., a growing mismatch between the beginning of a pixel in the printed image and the beginning of a lens in the array of lenses; this can occur in both the x and y directions. If the error exceeds one pixel in width, the sampling algorithm may skip a column or row of the original image. In practice, this will have little effect on the finished feature, and need not be addressed at all, but it can be corrected by the simple process of copying the following row or column of pixels backwards.
The point of correction can be found when the following conditions are satisfied:
Finally, the direction of movement can be controlled by inverting the cut-outs before placing them; inversion can be one or both axes and is analogous to the negative/positive magnification parameters found in moiré magnifiers. The resulting effects are the reversal of movement with respect to tilting in one or both axes—rotating movement can be reversed from clockwise to anti-clockwise.
Computational integral images created in any way, for example via sampling and interlacing as detailed above, suffer from a further problem: if the optic is tilted too far, then the animation will jump from the last frame back to the first frame.
The phenomenon of frame skip arises where the security feature is tilted at an angle such that the viewer sees information printed under one of the adjacent lenses. The tilt angle at which frame skip, or frame jump, happens is determined by the lens design; for micro-optics this is usually +/−30°, but it can vary. Once the limit angle is exceeded, the viewer is no longer looking at information printed directly under each lens, but rather every lens is now focusing on information printed under adjacent lenses.
Frame skip is demonstrated in
Where simulated security features are referred to herein and where these are shown in the Figures, these are depicted as stills from an animation. The animation is a computational simulation of the appearance of a physical security feature as the ‘viewing angle’ at which it is viewed is varied. In all cases depicted herein, the simulated viewer is viewing orthogonal to the page, so varying the viewing angle is achieved by simulating a tilt of the security feature, although it will be appreciated that the effect would be identical for a stationary security feature and viewer moving in an arc around the security feature.
Both Figures present the progression of an animation as the viewer tilts the security feature from the normal (i.e., 0° to the viewer) in the horizontal plane only, with the left hand side of the security feature rotating into the page, the right rotating out of the page. There are minor differences between the leftmost and central stills for the uncorrected and corrected security features, which arise from the correction. However, in the final frame, at the most extreme angle of rotation to the viewer, the uncorrected security feature (
However, in the rightmost still of
The corrected security feature (
The jump from last frame to first frame will have a significance that is dependent upon design. However, rather than relying upon design to correct this, it is possible to create a general condition by which it can be controlled.
Instead of animating with the full 14 frames (the progression for which is shown in
This method results in simpler animations that take a quarter of the number of frames from the original. The frame progression graph becomes
Equation (2) becomes a series of four equations, overleaf, where:
The input image may need to be resized to mmaxIx+(F/2), nmaxIy+ (F/2).
As before, the cut-outs can be inverted to alter the movement of the feature in a manner analogous to the positive/negative magnification of moirés. For the corrected integral image, this can be done by either reflecting the cut-out across one or both axes, or by simply assembling the cut-out in a different order; both methods result in the same output design.
Integral imaging, via interlacing or sampling, changes the order in which the frames in an animation play from a linear one to a cyclic one; in a two-dimensional animation this changes in both axes. Rotating the design by a small amount creates a double relationship between the frames and position, which for a cyclic device generates a distinctive effect.
Design rotation is carried out by a standard image rotation matrix transform. The transformation matrix is shown in equation (8):
Which is a 2×2 matrix where the coefficients are:
Image transformation is usually performed using inverse matrices; the reason for this is that the transformed image is the target image, which if some coordinates have no pixels, will contain tears when an image is transformed. The solution is to start with the finished image and find pixels on the original image which, when transformed, fit the desired pixels on the target image.
A 2×2 matrix can be inverted using the formula:
Which, when applied to the x, y coordinates of an image:
Solving the matrix for x′ and y′ gives:
Since we wish to be able to control the central point of the transform and the destination, we need to add adjustment parameters, xs, ys (x and y source), and xd, yd (x and y destination).
Referring back to equations (8) and (9):
A further advantage of using the reverse transform is that the standard form of transform functions is usually as forward transform, so there is no further need to reverse the transform coefficients to add new types of transforms. Additionally, the rotation transform changes from anti-clockwise to clockwise.
If a small rotation, for example 0.2°, is implemented between the printed image and the lens array, then the x and y axes of the design will no longer match up with those of the lenses. The x axis of the design will interact with the y axis of the lens to a small degree—this adds a second animation cycle into the animation. In a physical security feature, the rotation can be affected on either the printed image, the lens array, or both. The effect of this can be seen for uncorrected and corrected security features in
The uncorrected grid (
The reason for this second axis relationship can be seen in
In reality, a viewer will apply tilt to security features in more than one axis, in a rolling motion. This is in part due to this being a well-known way to view features such as these, and also because it is impossible for a viewer manually to apply motion precise enough to tilt the feature in only one axis.
An original image 1502 is shown in
The combination of the content of the first section 1504 and the mirrored portions form the first block 1506. The first block 1506 is shown with boxes surrounding the content of the first section 1504 and the mirrored portions. It will be appreciated that this is to demonstrate the construction of the first block 1506, and that the box-lines may not be reproduced in the first block 1506 during operation of the method.
The first block 1506 may be resized and may be positioned in a first layer 1508 of the printed image, in a location corresponding to the location of the first section in the original image, as shown in
A rotation angle may then be applied to the first layer 1508, as shown in
In an alternative embodiment, using a method of frame-skip correction according to the invention, the original image is a multi-frame image comprising a plurality of frames. To illustrate this embodiment, the content of
The same process that was applied to first section 1504 in relation to
It will be appreciated that the interlacing to form the first layer 1610 can be performed in any order, i.e. the first layer 1610 may be populated with portions of the plurality of blocks in any order. As described in relation to other embodiments of the invention, the first layer 1610 may be comprised within a printed image, which is overlaid with an array of optical elements to create a security feature. Furthermore, the first layer 1610 may be rotated by a rotation angle in order to produce an offset between the printed image and the overlaid optical elements.
Number | Date | Country | Kind |
---|---|---|---|
2205377.1 | Apr 2022 | GB | national |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2023/059556 | 4/12/2023 | WO |