This invention relates to methods of protecting documents and tokens from counterfeiting, to security documents or tokens, which are protected from counterfeiting, and to methods of determining the authenticity of documents and tokens.
It is known to provide security documents, such as banknotes or the like, with a wide variety of security elements which can provide verification of authenticity and protection against copying and counterfeiting. Such security elements include overt security elements which are visible to observers, but difficult to reproduce, such as security threads, strips and holograms, and covert security elements which may be concealed or embedded within the security document, such as fluorescent inks or taggants and which are only detectable using particular equipment or when the document is exposed to light of a particular wavelength, e.g. UV light. However, many different types of overt and covert security elements can be expensive to produce and/or can require relatively expensive equipment for authentication.
It is, therefore, desirable to provide a method of testing the authenticity of documents or tokens which does not require expensive security elements that substantially increase the cost of manufacture of the documents.
It is also desirable to provide a security document or token which is protected from counterfeiting by at least one covert security element that is difficult to reproduce by photocopying or printing.
According to one aspect of the invention, there is provided a method of protecting a security document from counterfeiting comprising applying at least one security element containing a concealed Fourier pattern to the document wherein the concealed Fourier pattern is produced from a master Fourier profile and wherein the concealed Fourier pattern is applied to the document by embossing, engraving, laser ablation or chemical etching, such that when a counterfeit security document produced without knowledge of the master Fourier profile is scanned and subjected to a Fourier transform, the resulting Fourier pattern differs from a master Fourier pattern corresponding to the master Fourier profile for the authentic security document.
According to another aspect of the invention there is provided a security document protected from counterfeiting comprising a substrate and including at least one security element, wherein the security element contains a concealed Fourier pattern produced from a master Fourier profile and wherein the concealed Fourier pattern is applied to the document by embossing, engraving, laser ablation or chemical etching, such that when a counterfeit document is produced without knowledge of the master Fourier profile and the counterfeit document is scanned and subjected to a Fourier transform, a test Fourier pattern is produced which differs from a master Fourier pattern corresponding to the master Fourier profile.
According to another aspect of the invention, there is provided a method of protecting a security document from counterfeiting comprising applying at least one security element containing a concealed Fourier pattern to the document wherein the concealed Fourier pattern is produced from a master Fourier profile and wherein the concealed Fourier pattern is applied to the document by a cylinder or plate bearing the master Fourier profile, such that when a counterfeit security document produced without knowledge of the master Fourier profile is scanned and subjected to a Fourier transform, the resulting Fourier pattern differs from a master Fourier pattern corresponding to the master Fourier profile for the authentic security document.
According to another aspect of the invention there is provided a security document protected from counterfeiting comprising a substrate and including at least one security element, wherein the security element contains a concealed Fourier pattern produced from a master Fourier profile and wherein the concealed Fourier pattern is applied to the document by a cylinder or plate bearing the master Fourier profile, such that when a counterfeit document is produced without knowledge of the master Fourier profile and the counterfeit document is scanned and subjected to a Fourier transform, a test Fourier pattern is produced which differs from a master Fourier pattern corresponding to the master Fourier profile.
According to a further aspect of the invention, there is provided a method of testing the authenticity of a document, wherein an authentic document is protected from the counterfeiting in accordance with either of the methods above and includes a security element containing a concealed Fourier pattern produced from a master Fourier profile, said method of testing including selecting an area of a document to be tested corresponding to where the security element is located on the authentic security document, scanning or imaging said selected area of the document to be tested, performing a Fourier transform on the scanned or imaged area to obtain a test Fourier pattern, and comparing the test Fourier pattern with a master Fourier pattern corresponding to the master Fourier profile to determine whether the document is authentic or a counterfeit.
The concealed Fourier pattern may be applied to the security document by printing, but it is possible that the Fourier pattern could be applied by other methods such as embossing or engraving, laser ablation or chemical etching. The concealed pattern may be [[is]] applied by a printing or embossing cylinder or plate bearing the master Fourier profile. The concealed Fourier pattern may be applied to the security document by rotogravure printing.
Rotogravure printing involves the use of a printing cylinder which is engraved with a pattern or image corresponding to the pattern or image to be printed on the substrate. The engraved pattern or image may comprise a plurality of small recessed cells that act as tiny ink wells. The depth and size of the cells control the amount of ink that is transferred to the substrate via a process of pressure, osmosis and electrostatic pull.
Rotogravure is sometimes confused with photogravure which is a type of intaglio printing that uses a flat copper plate etched deeply to provide a relief structure on the printed document which may have a variety of tones caused by the variable depth of etch on the photogravure printing plate. In contrast, a rotary cylinder used in rotogravure printing is only lightly engraved.
According to another aspect of the invention, there is provided a method of protecting a security document from counterfeiting comprising producing a rotogravure printing cylinder with a predetermined cell pattern providing a master Fourier profile, printing at least one layer of the security document with the rotogravure printing cylinder to form a concealed Fourier pattern corresponding to the predetermined cell pattern, wherein when a counterfeit security document produced without knowledge of the predetermined cell pattern is scanned or imaged and subjected to a Fourier transform, the resulting test Fourier pattern differs from a master Fourier pattern corresponding to the authentic security document protected from counterfeiting.
According to yet another aspect of the invention there is provided a security document protected from counterfeiting which is produced by the method above.
According to a still further aspect of the invention, there is provided a method of testing whether a document is an authentic document or a counterfeit copy, wherein the authentic document is produced in accordance with the method above and includes at least one layer applied to the document by printing with a rotogravure cylinder having a predetermined cell pattern providing a master Fourier profile, the method including performing a Fourier transform on a selected area of an authentic document to obtain a master Fourier pattern corresponding to the predetermined cell pattern of the rotogravure cylinder, scanning an area of a test document corresponding to the selected area of the authentic document, performing a Fourier transform on the scanned area of the test document to obtain a test Fourier pattern, and comparing the test Fourier pattern with the master Fourier pattern to determine whether the test document is authentic or a counterfeit copy of the authentic document.
The Fourier transform performed on the scanned area of the test document may be a Fast Fourier Transform (FFT). In one method of the invention, the concealed Fourier pattern represents a hidden message or image.
A Fourier transform, e.g., an inverse Fourier transform may be performed on the message or image to be hidden within the concealed Fourier pattern, and the transformed message or image may be engraved on the printing cylinder or plate for printing onto the security document.
In another embodiment, an engraved rotogravure printing cylinder having a predetermined engraved pattern may be used to produce a concealed Fourier pattern or image on a printed document, the Fourier pattern being known only to the authorised manufacturer of the security document.
If a counterfeiter attempts to copy or reproduce an authentic security document without knowledge of the predetermined engraved pattern on the printing cylinder, the counterfeit copy is readily detectable by the method of the present invention. For example, a counterfeit copy produced by photocopying or another form of printing either will not produce a Fourier pattern or image during testing or will not produce the same test Fourier image or pattern as the master Fourier image or pattern of the authentic security document. Even if the counterfeit document is produced by rotogravure printing, it will still be detectable as a fake because any slight variations to the size, spacing or frequency of the predetermined cell pattern of the authentic rotogravure cylinder will produce a different Fourier pattern or image.
A security document protected from counterfeiting in accordance with the invention may be formed from a substrate of plastics material, and more specifically from a transparent polymeric material. However, the invention is also applicable to documents formed from substrate of other materials, such as paper or fibrous materials, and to laminated substrates.
A plurality of security elements, each including a concealed Fourier pattern or image, may be applied to the authentic security document to provide greater security to the document. The plurality of security elements may be applied at different locations on the security document. Alternatively or additionally, the plurality of security elements may be applied in different layers of the security document.
For example, when the security document is formed from a substrate of transparent polymeric material to which one or more layers of opacifying material are applied, at least one security element including a concealed Fourier pattern or image may be applied to the polymeric substrate, in or to the at least one opacifying layer and/or may be formed in a printed layer applied to the substrate or to an opacifying layer.
Further features of the present invention will be apparent to those skilled in the art from the following description of the illustrated embodiments of the invention. It will be understood, however, that the embodiments are not limiting of the scope of the invention as defined in any of the preceding statements. The embodiments are described with reference to the accompanying drawings, in which:
The security document 10 has a substrate 20 which may be formed from one or more layers of a transparent polymeric material, such as biaxially oriented polypropylene. It will, however, be appreciated that other substrates may be used in the invention, such as polyethylene, polyethylene terephthalate (PET), or even substrates of paper or fibrous material.
As shown in
The opacifying layers 21-24 may comprise any one or more of a variety of opacifying coatings. The opacifying coatings may be adapted for printing with a rotogravure printing cylinder, and one form of coating comprises a pigment, such as titanium dioxide, dispersed with a binder or carrier of cross-linkable polymeric material.
The security document 10 also has printed ink layers 25, 26 applied to the opacifying layers 21, 22 on one side of the substrate 20 and further printed ink layers 27, 28 applied to the opacifying layers 23, 24 on the opposite side of the substrate 10 which may be used to provide the printed indicia 16. At least one of the printed ink layers 25, 26 may be applied by rotogravure printing.
As shown in
Each of the security elements includes a concealed Fourier pattern of a predetermined master image or pattern which may be determined by the engraved pattern on a rotogravure printing cylinder used to print the security element.
Different methods of forming the concealed Fourier pattern or images and subsequently testing the authenticity of a security document to determine whether it is an authentic document provided with the concealed Fourier pattern or image will now be described with reference to
Referring to
One method of generating the Fourier profile for the rotogravure printing cylinder for printing the concealed Fourier pattern or image is to produce an inverse Fourier transform of the required pattern or image. This may be superposed onto a background region so that the concealed Fourier pattern printed from the Fourier profile is not distinguishable from the background region to the human eye and is concealed in the background region.
Referring to
If the decision algorithm 102,106 determines that the test Fourier pattern 100 is not the same as the master, the test document 90, is determined to be counterfeit 110. For example, if the counterfeit document has been produced by photocopying or by other forms of printing than rotogravure printing, although the images on the counterfeit document visible to the human eye may appear the same as those of an authentic document, the concealed Fourier pattern of the authentic document will not be reproduced and the counterfeit document will be detected by the method described above. Further, even if the counterfeit document has been produced by rotogravure printing, even very slight differences in the engraving pattern on the rotogravure cylinder from the original cylinder used to produce the authentic document will result in a test Fourier pattern which differs from the master Fourier pattern or image.
Several of the steps of the method of
Alternatively, an authentic security document 120 may be provided to the testing organisation which is subjected to the steps 92-98 described with reference to
The security of authentic documents in accordance with the invention may be further increased by the manner in which the concealed Fourier pattern is incorporated within the document. The Fourier pattern may be concealed within a background. For example, in the security document of
It will also be appreciated that the concealed Fourier patterns may represent a wide variety of images, designs, patterns and messages, and any combinations thereof. It is a particular advantage that different images, designs, patterns and messages may be provided in different security documents. For example, in the case of banknotes, different denominations can contain different images or messages. Further, the ability to provide a plurality of different concealed Fourier patterns in different layers of a multi-layer security document increases the protection of the document from counterfeiting.
An alternative embodiment of the invention will now be described with reference to
Authentic security documents printed with the concealed master Fourier pattern and counterfeit copies produced without using the same rotogravure printing cylinder may be tested for authenticity using the same method described with reference to
In each of the embodiments described above, the testing equipment for determining the authenticity of security documents may be linked to a central database. This is particularly useful in the case of banknotes when soiled banknotes are collected after circulation. The soiled banknotes may be tested for authenticity using the Fourier analysis described above to determine the percentage of counterfeit documents in the soiled notes collected by the banknote issuing authority.
It will be appreciated that various modifications and alterations may be made to the various embodiments of the present invention described above without departing from the scope and spirit of the present invention. For example, whilst the embodiments of the drawings have been described with reference to security documents in the form of banknotes, it will be appreciated that the invention has application to a wide variety of other types of security and identification documents and tokens including, but not limited to the following: credit cards, cheques, identity cards, passports, securities and share certificates, drivers licences, deed of title, travel documents such as airline and train tickets, entrance cards and tickets, birth, death and marriage certificates, and academic transcripts.
Number | Date | Country | Kind |
---|---|---|---|
2006906364 | Nov 2006 | AU | national |
The present application claims the benefit of priority to International Patent Application No. PCT/AU2007/001750 filed 14 Nov. 2007, which claims priority to Australian Patent Application No. 2006906364 filed 14 Nov. 2006, the contents of which are incorporated herein by reference in their entirety.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/AU2007/001750 | 11/14/2007 | WO | 00 | 7/1/2009 |