US10467491B2 - System and method for detecting forgeries - Google Patents
System and method for detecting forgeries Download PDFInfo
- Publication number
- US10467491B2 US10467491B2 US15/590,480 US201715590480A US10467491B2 US 10467491 B2 US10467491 B2 US 10467491B2 US 201715590480 A US201715590480 A US 201715590480A US 10467491 B2 US10467491 B2 US 10467491B2
- Authority
- US
- United States
- Prior art keywords
- image
- histogram
- evaluating
- monotony
- text
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims description 102
- 238000012545 processing Methods 0.000 claims abstract description 25
- 238000001514 detection method Methods 0.000 claims abstract description 10
- 238000005516 engineering process Methods 0.000 claims description 23
- 238000004590 computer program Methods 0.000 claims description 11
- 230000008569 process Effects 0.000 claims description 10
- 230000015654 memory Effects 0.000 description 11
- 230000000007 visual effect Effects 0.000 description 9
- 230000006870 function Effects 0.000 description 7
- 238000004458 analytical method Methods 0.000 description 5
- 238000004891 communication Methods 0.000 description 5
- 238000013500 data storage Methods 0.000 description 4
- 238000010801 machine learning Methods 0.000 description 4
- 239000000758 substrate Substances 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 238000012935 Averaging Methods 0.000 description 3
- 238000010606 normalization Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 238000012805 post-processing Methods 0.000 description 2
- 230000007704 transition Effects 0.000 description 2
- 108010068977 Golgi membrane glycoproteins Proteins 0.000 description 1
- 241000577979 Peromyscus spicilegus Species 0.000 description 1
- 101150055297 SET1 gene Proteins 0.000 description 1
- 241000124033 Salix Species 0.000 description 1
- 101150117538 Set2 gene Proteins 0.000 description 1
- 238000011111 UV-scan method Methods 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000012512 characterization method Methods 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 239000000796 flavoring agent Substances 0.000 description 1
- 235000019634 flavors Nutrition 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 230000008570 general process Effects 0.000 description 1
- 238000005286 illumination Methods 0.000 description 1
- 238000002513 implantation Methods 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000003121 nonmonotonic effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000000638 solvent extraction Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
- G07D7/205—Matching spectral properties
-
- G06K9/2054—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/40—Document-oriented image-based pattern recognition
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B42—BOOKBINDING; ALBUMS; FILES; SPECIAL PRINTED MATTER
- B42D—BOOKS; BOOK COVERS; LOOSE LEAVES; PRINTED MATTER CHARACTERISED BY IDENTIFICATION OR SECURITY FEATURES; PRINTED MATTER OF SPECIAL FORMAT OR STYLE NOT OTHERWISE PROVIDED FOR; DEVICES FOR USE THEREWITH AND NOT OTHERWISE PROVIDED FOR; MOVABLE-STRIP WRITING OR READING APPARATUS
- B42D25/00—Information-bearing cards or sheet-like structures characterised by identification or security features; Manufacture thereof
- B42D25/30—Identification or security features, e.g. for preventing forgery
-
- G06K9/00483—
-
- G06K9/2018—
-
- G06K9/344—
-
- G06K9/38—
-
- G06K9/4642—
-
- G06K9/4652—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/95—Pattern authentication; Markers therefor; Forgery detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
- G06V30/14—Image acquisition
- G06V30/148—Segmentation of character regions
- G06V30/153—Segmentation of character regions using recognition of characters or words
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
- G06V30/16—Image preprocessing
- G06V30/162—Quantising the image signal
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
- G06V30/18—Extraction of features or characteristics of the image
- G06V30/18086—Extraction of features or characteristics of the image by performing operations within image blocks or by using histograms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
- G06V30/18—Extraction of features or characteristics of the image
- G06V30/18105—Extraction of features or characteristics of the image related to colour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/40—Document-oriented image-based pattern recognition
- G06V30/41—Analysis of document content
- G06V30/418—Document matching, e.g. of document images
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/003—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using security elements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
- G07D7/1205—Testing spectral properties
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
-
- G06K2009/0059—
-
- G06K2209/01—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V30/00—Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
- G06V30/10—Character recognition
Definitions
- the present invention relates generally to authentication and more particularly to computerized authentication.
- Certain embodiments of the present invention seek to provide an image processing procedure to detect text replacement forgeries using visual (VIS) images of documents in which text may have been replaced.
- VIS visual
- Certain embodiments of the present invention seek to provide a system and method configured to determine whether or not a text field in a document is forged.
- Certain embodiments of the present invention seek to provide forgery detection in documents arriving over channels which are unsupervised and electronic.
- Certain embodiments of the present invention seek to analyze at least a portion of a digital image including treating at least some of the image's pixels as a population where each of the pixels in the population is characterized by a characteristic such as but not limited to that pixel's gray level.
- Certain embodiments of the present invention seek to provide at least one processor in data communication with at least one memory, with instructions stored in such memory executed by the processor to provide functionalities which are described herein in detail.
- Embodiment 1 typically includes at least the following embodiments: Embodiment 1: according to any of the preceding embodiments.
- a document forgery detection method comprising using at least one processor for:
- a method according to any of the preceding embodiments wherein the image processing at least a portion of an image comprises identifying an image portion by identifying at least one line of text in the image.
- a method according to any of the preceding embodiments wherein the evaluating monotony of at least a portion of the at least one histogram includes identifying plural peaks in at least a portion of the histogram using an automated technology for dividing a dataset into clusters.
- a method according to any of the preceding embodiments wherein the automated technology for dividing a dataset into clusters is used to determine a cut-off point separating the histogram into plural classes, for each of multiple positions of a moving window passing over at least a portion of the image.
- the image processing comprises identifying at least one line of text in the image and wherein the moving window passes over the line of text.
- a method according to any of the preceding embodiments wherein the evaluating monotony comprises computing entropy of at least a portion of a second histogram derivable from the at least one histogram and comparing a value derivable from the entropy to a predetermined threshold.
- a method according to any of the preceding embodiments wherein the automated technology for dividing a dataset into clusters comprises at least one of the following data clustering technologies: Otsu, Jenks, Jenks-Fisher.
- a method wherein the image processing and the evaluating are performed for plural portions of at least one channel of the image, thereby to define plural outputs of the evaluating and wherein the determining includes combining the plural outputs.
- Any suitable process may be used for combining the plural outputs e.g. averaging, or determining authentic/forged for each portion from among the plural portions separately, then deeming the image authentic only if none of the portions are deemed forged.
- a method wherein the image processing and the evaluating are performed for at least one portion of plural channels of the image, thereby to define plural outputs of the evaluating and wherein the determining includes combining the plural outputs.
- Any suitable process may be used for combining the plural outputs e.g. averaging, or determining authentic/forged for each channel from among the plural channels separately, then deeming the image authentic only if none of the channels are deemed forged.
- a document forgery detection system operative in conjunction with an online service and a computer network, the system comprising:
- An image processor configured to image process at least a portion of at least one channel of an image assumed to represent a document including text, the image having been sent by a remote end user to the online service over the computer network, the image processing including generating at least one histogram of gray level values occurring in at least a portion of at least one channel of the image;
- an output generator operative to make a determination of whether the image is authentic or forged based on at least one output of a monotony evaluating processor configured to evaluate monotony of at least a portion of the at least one histogram; and to provide the determination to the online service.
- a system comprising a monotony evaluating processor configured to evaluate monotony of at least a portion of the at least one histogram and to provide at least one output accordingly, to the output generator.
- a system according to any of the preceding embodiments wherein the monotony evaluating processor uses entropy as a diversity indicator.
- the providing comprises image processing at least a portion of at least one channel of an image assumed to represent a document including text, the image having been sent by a remote end user to an online service over a computer network, thereby to generate the at least one histogram of gray level values occurring in at least a portion of at least one channel of the image.
- a computer program product comprising a non-transitory tangible computer readable medium having computer readable program code embodied therein, the computer readable program code adapted to be executed to implement a document forgery detection method comprising using at least one processor for:
- a computer program comprising computer program code configured to perform any of the methods shown and described herein when said program is run on at least one computer; and a computer program product, comprising a typically non-transitory computer-usable or -readable medium e.g. non-transitory computer-usable or -readable storage medium, typically tangible, having a computer readable program code embodied therein, said computer readable program code adapted to be executed to implement any or all of the methods shown and described herein.
- the operations in accordance with the teachings herein may be performed by at least one computer specially constructed for the desired purposes or general purpose computer specially configured for the desired purpose by at least one computer program stored in a typically non-transitory computer readable storage medium.
- the term “non-transitory” is used herein to exclude transitory, propagating signals or waves, but to otherwise include any volatile or non-volatile computer memory technology suitable to the application.
- processor/s, display and input device/s may be used to process, display e.g. on a computer screen or other computer output device, store, and accept information such as information used by or generated by any of the methods and apparatus shown and described herein; the above processor/s, display and input device/s including computer programs, in accordance with some or all of the embodiments of the present invention.
- Any or all functionalities of the invention shown and described herein, such as but not limited to operations within flowcharts, may be performed by any one or more of: at least one conventional personal computer processor, workstation or other programmable device or computer or electronic computing device or processor, either general-purpose or specifically constructed, used for processing; a computer display screen and/or printer and/or speaker for displaying; machine-readable memory such as optical disks, CDROMs, DVDs, BluRays, magnetic-optical discs or other discs; RAMs, ROMs, EPROMs, EEPROMs, magnetic or optical or other cards, for storing, and keyboard or mouse for accepting.
- Modules shown and described herein may include any one or combination or plurality of: a server, a data processor, a memory/computer storage, a communication interface, a computer program stored in memory/computer storage.
- processor includes a single processing unit or a plurality of distributed or remote such units.
- the above devices may communicate via any conventional wired or wireless digital communication device/s, e.g. via a wired or cellular telephone network or a computer network such as the Internet.
- the apparatus of the present invention may include, according to certain embodiments of the invention, machine readable memory containing or otherwise storing a program of instructions which, when executed by the machine, implements some or all of the apparatus, methods, features and functionalities of the invention shown and described herein.
- the apparatus of the present invention may include, according to certain embodiments of the invention, a program as above which may be written in any conventional programming language, and optionally a machine for executing the program such as but not limited to a general purpose computer which may optionally be configured or activated in accordance with the teachings of the present invention. Any of the teachings incorporated herein may, wherever suitable, operate on signals representative of physical objects or substances.
- the term “computer” should be broadly construed to cover any kind of electronic device with data processing capabilities, including, by way of non-limiting example, personal computers, servers, embedded cores, computing system, communication devices, processors (e.g. digital signal processor (DSP), microcontrollers, field programmable gate array (FPGA), application specific integrated circuit (ASIC), etc.) and other electronic computing devices.
- processors e.g. digital signal processor (DSP), microcontrollers, field programmable gate array (FPGA), application specific integrated circuit (ASIC), etc.
- DSP digital signal processor
- FPGA field programmable gate array
- ASIC application specific integrated circuit
- an element or feature may exist is intended to include (a) embodiments in which the element or feature exists; (b) embodiments in which the element or feature does not exist; and (c) embodiments in which the element or feature exist selectably e.g. a user may configure or select whether the element or feature does or does not exist.
- Any suitable input device such as but not limited to a sensor, may be used to generate or otherwise provide information received by the apparatus and methods shown and described herein.
- Any suitable output device or display may be used to display or output information generated by the apparatus and methods shown and described herein.
- Any suitable processor/s may be employed to compute or generate information as described herein and/or to perform functionalities described herein and/or to implement any engine, interface or other system described herein.
- Any suitable computerized data storage e.g. computer memory may be used to store information received by or generated by the systems shown and described herein.
- Functionalities shown and described herein may be divided between a server computer and a plurality of client computers. These or any other computerized components shown and described herein may communicate between themselves via a suitable computer network.
- FIG. 1 is a simplified flowchart illustration of a method for detection of replacement text, in accordance with certain embodiments.
- FIG. 2 is a simplified flowchart illustration of a method for entropy-based authentic/forged decision making.
- FIG. 3 is a simplified flowchart illustration of an entropy normalization method.
- Methods and systems included in the scope of the present invention may include some (e.g. any suitable subset) or all of the functional blocks shown in the specifically illustrated implementations by way of example, in any suitable order e.g. as shown.
- Computational, functional or logical components described and illustrated herein can be implemented in various forms, for example, as hardware circuits such as but not limited to custom VLSI circuits or gate arrays or programmable hardware devices such as but not limited to FPGAs, or as software program code stored on at least one tangible or intangible computer readable medium and executable by at least one processor, or any suitable combination thereof.
- a specific functional component may be formed by one particular sequence of software code, or by a plurality of such, which collectively act or behave or act as described herein with reference to the functional component in question.
- the component may be distributed over several code sequences such as but not limited to objects, procedures, functions, routines and programs and may originate from several computer files which typically operate synergistically.
- Each functionality or method herein may be implemented in software, firmware, hardware or any combination thereof. Functionality or operations stipulated as being software-implemented may alternatively be wholly or fully implemented by an equivalent hardware or firmware component and vice-versa. Any logical functionality described herein may be implemented as a real time application if and as appropriate and which may employ any suitable architectural option such as but not limited to SPGA, ASIC or DSP or any suitable combination thereof.
- Any hardware component mentioned herein may in fact include either one or more hardware devices e.g. chips, which may be co-located or remote from one another.
- Any method described herein is intended to include within the scope of the embodiments of the present invention also any software or computer program performing some or all of the method's operations, including a mobile application, platform or operating system e.g. as stored in a medium, as well as combining the computer program with a hardware device to perform some or all of the operations of the method.
- Data can be stored on one or more tangible or intangible computer readable media stored at one or more different locations, different network nodes or different storage devices at a single node or location.
- Suitable computer data storage or information retention apparatus may include apparatus which is primary, secondary, tertiary or off-line; which is of any type or level or amount or category of volatility, differentiation, mutability, accessibility, addressability, capacity, performance and energy use; and which is based on any suitable technologies such as semiconductor, magnetic, optical, paper and others.
- an authentication system and method which relies on empirical observation, that in a forgery, the contrast between an alphanumeric character and its surroundings is normally small relative to the contrast between an alphanumeric character and its surroundings in an authentic document.
- An entropy-based authentication method may then differentiate authentic documents from forged documents by identifying documents for which entropy is relatively small since an empirical observation indicates that sharp edges of alphanumeric characters are characteristic of forgeries, whereas soft edges of alphanumeric characters are characteristic of authentic documents.
- Authentication techniques capable of detecting remotely presented ID documents which are partially or completely forged are useful e.g. because their existence would force would-be imposters to simply purchase documents, issued with particulars suitable for their needs, from corrupt government or corporate officials, a problem which is more tractable for law enforcement officials to handle.
- authenticating remotely presented ID documents might be expected to be simple, since authentication is a well established field, upon examination the task becomes more elusive.
- Security patterns cannot be easily identified, nor can forgery tests based on features visible only in IR or UV normally be performed, if end users are doing their own scanning of their own documents in visible light, and no IR or UV scans are available. Illumination is non-uniform over documents and often poor when mobile phones or tablets are used outside or in an artificially lit room to scan ID documents. Also, the end-user may have availed her- or himself of the opportunity to post-process her or his document.
- a document may be presented for remote authentication after using a graphic editor such as but not limited to GIMP, Adobe Photoshop, Pizap, Microsoft Publisher, Picasa, to electronically post-process an input digital image e.g. to type new text data to replace a text data field to be forged in the input image, and then to send the electronically post-processed image over a computer network e.g. www or Internet, for remote authentication.
- a graphic editor such as but not limited to GIMP, Adobe Photoshop, Pizap, Microsoft Publisher, Picasa
- a DLN field may be regarded as including two images, foreground (text) and background (non-text). Examination of authentic vs. forged DLN fields may yield that an authentic field has a relatively continual/continuous appearance (e.g. edges between text and background are soft) while the forged image does not; typically the background is smooth whereas the foreground is a graphic layout which is not smoothed.
- Diversity indices are known, e.g. Shannon (and other measures of) entropy is a known diversity index especially in the ecological literature, and according to certain embodiments, a forgery test may be performed based on use of entropy to distinguish between post-processed hence forged images (e.g. of ID documents) and smoother raw hence authentic images (e.g. of ID documents).
- Such forgeries may be detected using image-processing by histogramming the color values of the DLN field, e.g. generating a histogram of the color values of the DLN field, separately for each of the 3 channels included in each color value i.e. separately for the r, g and b channels.
- the histogram for the green channel of an image may have 256 (2 exp 8) bins, or less, each corresponding to one, or more, of the possible green values that a pixel might have.
- the histogram may for example have 256 columns, respectively graphing the number of pixels in the image with the 1 st , 2 nd , . . . 256 th green values. These pixels are said to respectively belong to the 1 st , 2 nd , . . . 256 th “bins”.
- a forged/authentic indication may then be obtained by inspecting (manually or using a suitably configured processor) to determine how monotonic the histogram is.
- a monotonic histogram (having a relatively high monotony parameter M) may drive a conclusion that the DLN field from which the monotonic histogram was generated, is authentic.
- a histogram has 2 peaks, this indicates that the DLN field from which the non-monotonic double-peaked histogram was generated, includes two separate images with no data (no color values) between the two images. This may drive a conclusion that the DLN field from which the monotonic histogram was generated, is forged. In such cases, the value of monotony parameter M is typically relatively low.
- high monotony is intended herein to include a characterization of a document in which the transition between foreground and background (e.g. between text and non-text) is gradual or continuous as opposed to a document characterized by ‘low monotony’ in which the transition between foreground and background (e.g. between text and non-text) is sharp or discontinuous.
- FIG. 1 is a simplified flowchart illustration of a method for detection of replacement text, in accordance with certain embodiments.
- the method of FIG. 1 may include all of or any subset of the following operations 10 - 110 , suitably ordered e.g. as shown.
- Operation 10 Set-up analysis to determine and store in computer data storage, suitable threshold value for monotony parameter M, preferably separately for each of documents known to be of plural document types e.g. French passport series 3, Spanish driving license series 4.
- suitable threshold value for monotony parameter M preferably separately for each of documents known to be of plural document types e.g. French passport series 3, Spanish driving license series 4.
- Operation 20 For each document in stream of documents received by a server of an online service, from remote persons, via a computer network, do steps 30 - 110 e.g. at the server
- Operation 30 recognize document type e.g. using any suitable machine-learning based technique such as any of those described in co-owned Published European Patent Application EP2737437, entitled “System And Methods For Computerized Machine-Learning Based Authentication Of Electronic Documents . . . ” and retrieve threshold value for monotony parameter M accordingly using values stored in operation 10 .
- Operation 50 identify “field/s to be checked” within visual image of passport (say) e.g. by using text-identification technology to find at least one string of blobs believed to be a text.
- Operation 80 use at least one and typically all 3 of the 3 channels in visual image (r, g, b) to make an entropy-based authentic/forged decision (e.g. as per FIG. 2 ) for each of plural positions 1 , . . . P, P+1, . . . of the window. decisions may include a third interim value e.g. authentic/inconclusive/forged.
- Operation 90 combine authentic/forged decisions over all positions 1 , . . . P, P+1, . . . of the window within the channel/each of the channels, thereby to yield a per-field, per-channel entropy-based authentic/forged decision.
- Operation 100 if plural channels from among the 3 channels in the visual image (r, g, b) were used, suitably combine the channels' entropy-based authentic/forged decisions per field. For example, the method may output that a certain field is “forged” if at least one of the 3 channels yields a “forged” decision in operation G (when FIG. 2 is used to perform operation 80 in the current iteration).
- Operation 110 if all fields are deemed authentic, output “document is authentic”. Else, output “document is forged”.
- This operation may include set-up analysis to determine a suitable threshold value for monotony parameter M. For example, a first set of documents known to be authentic and a second set of documents known to be forged (e.g. by actually forging electronic representations of authentic documents using post-processing), may be provided.
- Suitable candidate M threshold values may for example be values which suitably span a range of 0.5-0.7, or a range of 0.4-0.8, or any other suitable range which is believed to include the desired optimized M threshold value.
- first and second (electronic) document sets as above may be generated separately for each of many known types of documents such as a French driving license, series 3 or an Indonesian passport, series 4.
- first and second document sets as above may be generated separately for each of many known document substrates e.g. documents known to be printed on paper vs. those known to be printed on plastic.
- the first and second sets of documents may be electronic documents previously categorized (by an “oracle” process e.g. suitable machine (forensic) or human inspection) as belonging to certain document types or document substrates and as being authentic or forged.
- the first (authentic) set of documents may include authentic physical documents of various types or substrates to be supported which are procured and scanned.
- electronic documents known to be authentic copies of physical documents of various types or substrates may be forged using post-processing, thereby to generate the second (forged) set of documents.
- the gray level values in each document in each of the first and second sets is clustered, using a suitable data clustering technology such as but not limited to: Otsu, Jenks, Jenks-Fisher, subject to various values for monotony parameter M in operation G described herein, and select the value for M which minimizes type 1 and/or type 2 errors e.g. maximizes probability of finding real forgeries and simultaneously minimizes probability of false alarms.
- a suitable data clustering technology such as but not limited to: Otsu, Jenks, Jenks-Fisher, subject to various values for monotony parameter M in operation G described herein, and select the value for M which minimizes type 1 and/or type 2 errors e.g. maximizes probability of finding real forgeries and simultaneously minimizes probability of false alarms.
- any suitable criterion may be employed to determine which of several tested values of M is optimal. For example, clearly inferior values of M may first be filtered out e.g. if two values 1, 2 for M are tested and the second value has a higher rate of type 1 errors and a higher rate of type 2 errors than the first value does, the second value for M may be deemed inferior and removed from further consideration. To select a final value for M from among a remaining set of values of M none of which are clearly inferior to any other, the cost of type 1 errors relative to the cost of type 2 errors for a specific application or use-case may be determined; this allows the cost effectiveness of the various values of M to be determined and the most cost effective value for M to be selected.
- Operation 50 This operation may include identifying “field to be checked” within visual image of passport (say) e.g. by using text-identification technology to find a string of blobs believed to be a text.
- Any suitable conventional connected component labeling may be employed to detect blobs each of which represents a separate letter, e.g. any suitable text-identification technologies used in an OCR context.
- OpenCV supported by Willow Garage and Itseez
- EasyOCR commercially available e.g. by contacting [email protected]
- Computer Vision System ToolboxTM is a commercially available software product which includes an OCR function which recognizes text in images for various computer vision applications.
- Operation 70 This operation may use at least one and typically all 3 of the 3 channels in visual image (r, g, b) to make an entropy-based authentic/forged decision e.g. using all or any subset of the operations included in the method of FIG. 2 .
- the pixel values in the 3 channels may be suitably combined into a single pixel value.
- the method of FIG. 2 may be performed for only one of, or each of, the 3 channels in visual image.
- any suitable method may be employed at any suitable stage in this workflow, to determine the mean character width for use in operation 70 .
- this parameter may be pre-stored per document type, or may be determined on the fly using image processing in real time (e.g. determine average width of blobs identified in operation 50 .
- a predetermined cut-off percentage threshold such as 40% or 60% or some predetermined cut-off percentage threshold therebetween
- the predetermined cut-off percentage threshold is 50% (although this is of course a parameter which may be determined entirely independently of the value of x2) and the values computed are 0.9; 0.8; 0.75; 0.9; 0.55; 0.65 then the document may be deemed to be authentic because most of the 7 windows' monotony parameters (more than 50%) exceed x1. If the values are 0.9; 0.8; 0.75; 0.9; 0.45; 0.9 the document is forged because one value is below 0.5. If the values are 0.6; 0.6; 0.75; 0.9; 0.55; 0.65 the document is deemed forged because most of the 7 windows' monotony parameters (more than 50%) are between x1 and x2
- Operation 100 if plural channels from among the 3 channels in the visual image (r, g, b) were used to make an entropy-based authentic/forged decision, the method may suitably combine the decisions. For example, the method may output “forged” if at least one of the 3 channels yields a “forged” decision in operation G.
- FIG. 2 is a simplified flowchart illustration of a method for entropy-based authentic/forged decision making.
- the method of FIG. 2 may include all of or any subset of the following operations AA, A-H, suitably ordered e.g. as shown:
- Operation A Compute the histogram of all gray level values of all pixels in the field to be checked.
- Operation B compute a threshold which best separates the histogram of operation A two classes.
- Otsu's method is a method known in the art for binarizing an input graylevel image by performing clustering-based thresholding.
- the input graylevel image typically contains 2 relatively well differentiated classes of pixels: foreground pixels and background pixels.
- Otsu's method computes a threshold which is suitable for separating the pixels into two classes:
- Operation C partition the histogram according to the threshold thereby to define left and right histograms. Assume the left histogram is the foreground (text) whereas the right histogram is the background (non-text, which is normally to the right because the non-text is normally bright whereas the text is normally darker (e.g. black)).
- Operation D normalize the text (e.g. Left) histogram by dividing each of the pixel values in the text (e.g. Left) histogram by the sum of all pixel values in the text (e.g. Left) histogram
- Operation E extract text monotony indicator typically from text (e.g. Left) histogram e.g. compute entropy of the text (e.g. Left) histogram
- Operation F normalize the text monotony indicator so artifacts of the text monotony indicator computation process do not affect the text monotony indicator's value. For example, if a e.g. left histogram entropy value is used, normalize same to the number of the bins in the left histogram e.g. e.g. as described in FIG. 3 , so that the number of bins does not affect the entropy value.
- Operation G compare normalized entropy (say) found in operation F to monotony parameter Threshold/s (or more generally, text monotony indicator threshold/s) determined in operation 10 , thereby to make a binary authentic/forged decision (or tertiary authentic/inconclusive/forged decision
- This operation may include computing the histogram of the field to be checked (or of a portion of the field e.g. only 2-3 characters therein) e.g. by histogramming the gray level values of the pixels included in the field to be checked (or of a portion of the field e.g. only 2-3 characters therein)
- This operation may include computing a cut-off point which best separates the histogram generated in operation A, into two classes.
- Otsu's method is a method known in the art for binarizing an input graylevel image by performing clustering-based thresholding.
- the input graylevel image typically contains 2 relatively well differentiated classes of pixels: foreground pixels and background pixels.
- Otsu's method computes a cut-off point which is suitable for separating the pixels into two classes (clusters), one below the cut-off point (left cluster) and one above (right cluster) because the cut-off point
- I, ii may be equivalent criteria of cut-off point bestness e.g. if the sum of pairwise squared distances is constant.
- An Otsu-generated cut-off point may be applied to the color values of the pixels in the input gray-level image e.g. if it is desired to generate an output binary image for forgery checking purposes.
- application of Otsu's method to a line of text includes using a moving window and then applying Otsu repeatedly, to each position of the moving window. For example, if a two-character moving window is used on a line of text including 10 alphanumeric characters, an Otsu cut-off point is determined separately for the first 2 characters, then for characters 2 and 3, then for characters 3 and 4, and finally for characters 9 and 10.
- the window may be 2 or 3 alphanumerical characters wide or any other suitable integer, or may have a predetermined width measured in pixels e.g. 30 (5 ⁇ 6) pixels or 60 (6 ⁇ 10) pixels per character.
- a “final” Otsu cut-off point for a line of text may then be determined by suitably combining cut-off points over all positions of the moving window e.g. by averaging cut-off points over all positions of the moving window passing over the line of text.
- Otsu's method is applied to the imaged document (or r/g/b component thereof) as originally received rather than to the imaged document (or r/g/b component thereof) as subsequently cropped, rotated and/or binarized.
- This operation may include partitioning the histogram (“total histogram”) according to the threshold thereby to define left and right partial histograms. Assume the left partial histogram is predominantly associated with the foreground (text) whereas the right partial histogram is predominantly associated with the background (non-text, which is normally to the right because the non-text is normally bright whereas the text is normally darker (e.g. black)). It is appreciated however that even the left partial histogram may be associated with a certain amount of background i.e. that which borders on the text. However, the background portions included in the partial histogram predominantly associated with the foreground may be desirable since these portions, rather than creating noise, may in fact contribute to the entropy-based forgery test herein.
- the “twilight area” between text and background may be particularly indicative in that the monotony of the “twilight area” may differ between forgeries and authentic documents, typically in that the “twilight area” is more dichotomous in post-processed (and sometimes other) forgeries vs. being smoother in authentic documents e.g. which have not been post-processed. Therefore, M may be selected so as to retain at least some, or as many as possible, “twilight” pixels in the partial histogram predominantly associated with the foreground. This may be achieved either directly or, e.g. as described herein, indirectly e.g. by finding M values which cause least type 1 and/or 2 errors (possibly inter alia due to the “twilight” pixels' indicative level of monotony).
- This operation may include normalizing the text (e.g. Left) histogram by dividing each of the pixel values in the text (e.g. Left) histogram by the sum of all pixel values in the text (e.g. Left) histogram (such that the sum of all normalized pixel values in the text (e.g. Left) histogram, will be 1).
- the default assumption may be that the left portion of the histogram is that related to the text (that is predominantly associated with the foreground).
- a data repository may be maintained indicating whether certain types of documents are characterized by light text on dark background in which case if an image is pre-recognized as being one of these (e.g. using machine learning techniques such as any of those described in co-owned Published European Patent Application EP2737437, entitled “System And Methods For Computerized Machine-Learning Based Authentication Of Electronic Documents . . . ” then the right histogram, rather than the left histogram, is normalized.
- any other technology may be employed to determine whether a particular document or document-type is characterized by light text on dark background or by the more conventional dark text on light background, such as counting dark and light pixels and determining whether the total number of dark pixels is larger than (suggesting light text on dark background) or smaller than (suggesting dark text on light background) the total number of light pixels.
- the method may compute the entropy (e.g. Renyi entroy, or Shannon entropy may be used for quantifying uncertainty) of the text (e.g. Left) histogram, e.g. using:
- H - ⁇ i ⁇ p i ⁇ ( log 2 ⁇ p i )
- i index over events
- p_i probabilities
- Each outcome may for example correspond to one of the bins or intervals or bars of the histogram.
- Any log (any base) may be employed such as but not limited to base 2.
- the entropy of the entire histogram may be computed.
- an extent to which a histogram is monotonic is generally indicative that the data histogrammed comes from an authentic ID document.
- the entropy of the left cluster e.g. portion of the histogram associated with lower gray values which normally are characteristic of text—as opposed to background which is normally associated with higher gray values indicates an extent to which the text is monotonic which is particularly indicative that the data histogrammed comes from an authentic ID document.
- Operation F This operation may include normalizing the entropy to the number of bins in the histogram so that the number of bins does not affect the entropy value.
- operations f 1 , f 2 in FIG. 3 may be employed.
- Operation G the method may apply the monotony threshold determined in operation 10 of FIG. 1 , to normalized entropy value found in operation F, thereby to make a binary authentic/forged decision either for the image as a whole or for a single line of text therein or a single channel (r, g, or b) thereof.
- steps A-G are typically performed repeatedly, typically p times for the p positions of the moving window. Any suitable interval may be employed between consecutive positions of the moving window, such as the width of 1 character.
- an advantage of defining “inconclusive” values is that each organization may thereby be able to easily introduce its own flavor of the general process by configuring its own desired treatment of “inconclusive” entropy values at each level, possibly from among preprogrammed options procedure such as but not limited to: send to manual inspection by human operator, ask end user to re-scan, utilize or attempt to utilize other tests or criteria if it is known that such exist or may exist, lump together with forged, lump together with authentic, or logical combinations of these.
- there is no “inconclusive” sub-range and instead, the range of possible values includes only 2 subranges: authentic and forged.
- FIG. 3 is a simplified flowchart illustration of an entropy normalization method.
- the method of FIG. 3 may include operation F 1 and/or F 2 , suitably ordered e.g. as shown.
- Operation F 1 typically, the width of some predetermined percentage lower than 100%, such as 70%6, 80%, 90%, 95%, 99%, is computed, to avoid noise by disregarding outlying pixel values.
- the width (W) of the middle 90% (say) of the bins in the text (e.g. Left) histogram may be computed. For example, after normalization of 100% of bins (operation D in FIG. 2 ) determine the % of gray values in each bin in the leftmost end of the left partial-histogram (and/or in each bin in the rightmost end of the right partial-histogram).
- Operation f 1 may be performed for each incoming identity document provided by a remote end-user, or may be performed during set-up for representative members of each or certain supported document types.
- operations 10 - 80 of FIG. 1 and the method of FIG. 2 are performed during set-up analysis for each document in sets 1 and 2 , but operation g in FIG. 2 is performed several times for each of several possible values for m. It is appreciated that typically, both during set-up and in real time functioning, operations a-g are performed for each window (for each position of a moving window).
- any suitable logic may be employed to combine per-window position, per-channel, per-field authentic/inconclusive/forged decisions, or authentic/forged decisions, over window positions (“windows”), channels and fields; the particular logic illustrated in FIGS. 1-3 , in which a single “forged” decision at any level (e.g. for any one window position, channel or field) overrules many “authentic” decisions at the same level, is not intended to be limiting.
- the per-window position, per-channel, per-field outputs may each comprise a continuous value for combination with other continuous values in other window positions, channels or fields, rather than combining, over window positions, channels or fields, values which have been pre-thresholded into 2 (authentic/forged) or 3 (authentic/inconclusive/forged) categories.
- combination of data over window positions, channels or fields may occur in any suitable order, for example, data may be combined over window positions then over fields then over channels, or over window positions then over channels then over fields.
- data repositories are maintained storing locations of various fields in various types of ID documents. Then, entropy may be quantified throughout extensive areas in the document. If low-entropy areas coincide with previously known locations of areas likely to be forged, a “score” determining whether the document is genuine or is forged may be adjusted in the “forged” direction. For example, if the lowest entropy area in the document coincides with the previously known location of the ID document bearer's last name or year of birth (in its entirety or last two digits thereof), the document's score may reflect a higher likelihood that the document is forged, since the “last name” and year of birth fields are among the fields most likely to be forged.
- Certain embodiments of the method and system described herein are particularly useful for digital photos of, or scans of, ID documents produced by remote end-users using a plethora of often poor quality digital imagining devices such as smart-phone cameras, digital cameras, home or office scanners, or webcams, operated in sub-optimal lighting conditions, and subsequently emailed or uploaded (via online applications or websites) to a remote server operative for authenticating the document image thus received rather than authenticating a physical document scanned en situ using quality equipment and optimal lighting conditions.
- a remote server operative for authenticating the document image thus received rather than authenticating a physical document scanned en situ using quality equipment and optimal lighting conditions.
- Certain embodiments of the method and system described herein allow fully automated authentication which in turn allows on-line services to respond to end-users in real time rather than after hours or even more than a day, due to the need to rely on slow manual (human) authentication.
- Certain embodiments of the method and system described herein are useful in identifying those post-processed forgeries which are effected using a graphic tool e.g. mouse and working at a resolution which merely causes the forged text to appear genuine at normal magnification to the naked eye but is not accurate at the pixel level, or one order of magnitude above or below pixel level.
- a graphic tool e.g. mouse and working at a resolution which merely causes the forged text to appear genuine at normal magnification to the naked eye but is not accurate at the pixel level, or one order of magnitude above or below pixel level.
- Certain embodiments of the method and system described herein are useful in identifying those post-processed forgeries which use a low-resolution input image of a document to be forged and are effected at that low resolution.
- the low-resolution input image of a document to be forged may be generated by a mobile phone whose resolution is coarser than the dpi of the printer which generated the document.
- Devices used to image digital documents to be provided to the server performing the method/s shown and described herein may include inter alia any mobile communication device such as but not be limited to any of the following: mobile telephone, smart phone, playstation, iPad, TV, remote desktop computer, game console, tablet, mobile e.g. laptop or other computer terminal, embedded remote unit.
- any mobile communication device such as but not be limited to any of the following: mobile telephone, smart phone, playstation, iPad, TV, remote desktop computer, game console, tablet, mobile e.g. laptop or other computer terminal, embedded remote unit.
- the methods shown and described herein are particularly useful in processing e.g. in real time or near real time, of incoming document streams including hundreds, thousands, tens of thousands, or hundreds of thousands of electronic documents using computerized technology.
- Each module or component or processor may be centralized in a single physical location or physical device or distributed over several physical locations or physical devices.
- electromagnetic signals in accordance with the description herein.
- These may carry computer-readable instructions for performing any or all of the operations of any of the methods shown and described herein, in any suitable order including simultaneous performance of suitable groups of operations as appropriate; machine-readable instructions for performing any or all of the operations of any of the methods shown and described herein, in any suitable order; program storage devices readable by machine, tangibly embodying a program of instructions executable by the machine to perform any or all of the operations of any of the methods shown and described herein, in any suitable order; a computer program product comprising a computer useable medium having computer readable program code, such as executable code, having embodied therein, and/or including computer readable program code for performing, any or all of the operations of any of the methods shown and described herein, in any suitable order; any technical effects brought about by any or all of the operations of any of the methods shown and described herein, when performed in any suitable order; any suitable apparatus or device or combination of such, programmed to perform, alone
- Any computer-readable or machine-readable media described herein is intended to include non-transitory computer- or machine-readable media.
- Any computations or other forms of analysis described herein may be performed by a suitable computerized method. Any operation or functionality described herein may be wholly or partially computer-implemented e.g. by one or more processors.
- the invention shown and described herein may include (a) using a computerized method to identify a solution to any of the problems or for any of the objectives described herein, the solution optionally include at least one of a decision, an action, a product, a service or any other information described herein that impacts, in a positive manner, a problem or objectives described herein; and (b) outputting the solution.
- the system may, if desired, be implemented as a web-based system employing software, computers, routers and telecommunications equipment as appropriate.
- a server may store certain applications, for download to clients, which are executed at the client side, the server side serving only as a storehouse.
- Some or all functionalities e.g. software functionalities shown and described herein may be deployed in a cloud environment.
- Clients e.g. mobile communication devices such as smartphones may be operatively associated with, but external to, the cloud.
- the scope of the present invention is not limited to structures and functions specifically described herein and is also intended to include devices which have the capacity to yield a structure, or perform a function, described herein, such that even though users of the device may not use the capacity, they are if they so desire able to modify the device to obtain the structure or function.
- a system embodiment is intended to include a corresponding process embodiment and vice versa.
- each system embodiment is intended to include a server-centered “view” or client centered “view”, or “view” from any other node of the system, of the entire functionality of the system, computer-readable medium, apparatus, including only those functionalities performed at that server or client or node.
- Features may also be combined with features known in the art and particularly although not limited to those described in the Background section or in publications mentioned therein.
- features of the invention including operations, which are described for brevity in the context of a single embodiment or in a certain order may be provided separately or in any suitable subcombination, including with features known in the art (particularly although not limited to those described in the Background section or in publications mentioned therein) or in a different order.
- “e.g.” is used herein in the sense of a specific example which is not intended to be limiting.
- Each method may comprise some or all of the operations illustrated or described, suitably ordered e.g. as illustrated or described herein.
- Devices, apparatus or systems shown coupled in any of the drawings may in fact be integrated into a single platform in certain embodiments or may be coupled via any appropriate wired or wireless coupling such as but not limited to optical fiber, Ethernet, Wireless LAN, HomePNA, power line communication, cell phone, Smart Phone (e.g. iPhone), Tablet, Laptop, PDA, Blackberry GPRS, Satellite including GPS, or other mobile delivery.
- any appropriate wired or wireless coupling such as but not limited to optical fiber, Ethernet, Wireless LAN, HomePNA, power line communication, cell phone, Smart Phone (e.g. iPhone), Tablet, Laptop, PDA, Blackberry GPRS, Satellite including GPS, or other mobile delivery.
- functionalities described or illustrated as systems and sub-units thereof can also be provided as methods and operations therewithin
- functionalities described or illustrated as methods and operations therewithin can also be provided as systems and sub-units thereof.
- the scale used to illustrate various elements in the drawings is merely exemplary and/or appropriate for clarity of presentation and is not intended to be limiting.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Spectroscopy & Molecular Physics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Computer Security & Cryptography (AREA)
- Artificial Intelligence (AREA)
- Image Analysis (AREA)
- Character Input (AREA)
Abstract
Description
-
- i. minimizes intra-class variance e.g. minimizes the standard deviation (std) of each of the two clusters, or
- ii. maximizes inter-class variance.
-
- i. minimizes intra-class variance e.g. minimizes the standard deviation (std) of each of the two clusters, or
- ii. maximizes inter-class variance.
Where the possible outcomes i (index over events) have probabilities p_i. Each outcome may for example correspond to one of the bins or intervals or bars of the histogram. Any log (any base) may be employed such as but not limited to
Claims (15)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL245623 | 2016-05-11 | ||
IL245623A IL245623B (en) | 2016-05-11 | 2016-05-11 | System and method for detecting forgeries |
Publications (2)
Publication Number | Publication Date |
---|---|
US20170330047A1 US20170330047A1 (en) | 2017-11-16 |
US10467491B2 true US10467491B2 (en) | 2019-11-05 |
Family
ID=59053872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/590,480 Active 2038-04-27 US10467491B2 (en) | 2016-05-11 | 2017-05-09 | System and method for detecting forgeries |
Country Status (3)
Country | Link |
---|---|
US (1) | US10467491B2 (en) |
EP (1) | EP3244349B1 (en) |
IL (1) | IL245623B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021229568A1 (en) | 2020-05-11 | 2021-11-18 | Au10Tix Ltd. | System, method and computer program product for mitigating customer onboarding risk |
WO2021255720A1 (en) | 2020-06-14 | 2021-12-23 | Au10Tix Ltd. | System, method and computer program product for effective document capture e.g. during onboarding |
WO2022097132A1 (en) | 2020-11-03 | 2022-05-12 | Au10Tix Ltd. | System, method and computer program product for detecting forged documents based on image analysis |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016133911A1 (en) * | 2015-02-19 | 2016-08-25 | Troy Group, Inc. | Covert secure document registration system |
IL237548B (en) * | 2015-03-04 | 2020-05-31 | Au10Tix Ltd | Methods for categorizing input images for use e.g. as a gateway to authentication systems |
CN108389309B (en) * | 2018-02-06 | 2021-01-01 | 深圳怡化电脑股份有限公司 | Method and system for identifying authenticity of paper money |
US11308492B2 (en) * | 2019-07-03 | 2022-04-19 | Sap Se | Anomaly and fraud detection with fake event detection using pixel intensity testing |
US12039615B2 (en) | 2019-07-03 | 2024-07-16 | Sap Se | Anomaly and fraud detection with fake event detection using machine learning |
CN112950556B (en) * | 2021-02-07 | 2024-05-10 | 深圳力维智联技术有限公司 | Image authenticity assessment method, device, system and computer-readable storage medium |
US11872832B2 (en) * | 2021-12-22 | 2024-01-16 | Idemia Identity & Security France | Texture-based authentication of digital identity documents |
CN117591815B (en) * | 2023-10-31 | 2024-09-03 | 中国科学院空天信息创新研究院 | Comprehensive quality assessment method and device for multimodal generated data |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070047008A1 (en) * | 2005-08-23 | 2007-03-01 | Jamey Graham | System and methods for use of voice mail and email in a mixed media environment |
US20080025556A1 (en) | 2006-07-31 | 2008-01-31 | Canadian Bank Note Company, Limited | Method and system for document comparison using cross plane comparison |
WO2011058554A1 (en) | 2009-11-10 | 2011-05-19 | Au10Tix Limited | Computerized integrated authentication/ document bearer verification system and methods useful in conjunction therewith |
WO2013014667A2 (en) | 2011-07-28 | 2013-01-31 | Au10Tix Limited | System and methods for computerized machine-learning based authentication of electronic documents including use of linear programming for classification |
US9081988B2 (en) | 2009-11-10 | 2015-07-14 | Au10Tix Limited | Apparatus and methods for computerized authentication of electronic documents |
US20160014301A1 (en) | 2014-07-10 | 2016-01-14 | Csr Imaging Us, Lp | Image processing system of background removal and white/black point compensation |
-
2016
- 2016-05-11 IL IL245623A patent/IL245623B/en active IP Right Grant
-
2017
- 2017-05-08 EP EP17169958.0A patent/EP3244349B1/en active Active
- 2017-05-09 US US15/590,480 patent/US10467491B2/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070047008A1 (en) * | 2005-08-23 | 2007-03-01 | Jamey Graham | System and methods for use of voice mail and email in a mixed media environment |
US20080025556A1 (en) | 2006-07-31 | 2008-01-31 | Canadian Bank Note Company, Limited | Method and system for document comparison using cross plane comparison |
WO2011058554A1 (en) | 2009-11-10 | 2011-05-19 | Au10Tix Limited | Computerized integrated authentication/ document bearer verification system and methods useful in conjunction therewith |
US9081988B2 (en) | 2009-11-10 | 2015-07-14 | Au10Tix Limited | Apparatus and methods for computerized authentication of electronic documents |
WO2013014667A2 (en) | 2011-07-28 | 2013-01-31 | Au10Tix Limited | System and methods for computerized machine-learning based authentication of electronic documents including use of linear programming for classification |
US20140180981A1 (en) | 2011-07-28 | 2014-06-26 | Au10Tix Limited | System and methods for computerized machine-learning based authentication of electronic documents including use of linear programming for classification |
US20160014301A1 (en) | 2014-07-10 | 2016-01-14 | Csr Imaging Us, Lp | Image processing system of background removal and white/black point compensation |
Non-Patent Citations (3)
Title |
---|
CHRISTOPH H. LAMPERT ; LIN MEI ; THOMAS M. BREUEL: "Printing Technique Classification for Document Counterfeit Detection", COMPUTATIONAL INTELLIGENCE AND SECURITY, 2006 INTERNATIONAL CONFERENCE ON, IEEE, PI, 1 November 2006 (2006-11-01), Pi, pages 639 - 644, XP031012876, ISBN: 978-1-4244-0604-3 |
Coaxlink Quad G3 DF, [email protected], Retrieved Nov. 29, 2017. |
Lampert et al., Christoph H.: "Printing Technique Classification for Document Counterfeit Detection", Computational Intelligence and Security, 2006 International Conference on, IEEE, PI, Nov. 1, 2006 (Nov. 1, 2006), pp. 639-644, XP031012876, ISBN: 978-1-4244-0604-3. |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021229568A1 (en) | 2020-05-11 | 2021-11-18 | Au10Tix Ltd. | System, method and computer program product for mitigating customer onboarding risk |
US12272166B2 (en) | 2020-05-11 | 2025-04-08 | Au10Tix Ltd. | System, method and computer program product for mitigating customer onboarding risk |
WO2021255720A1 (en) | 2020-06-14 | 2021-12-23 | Au10Tix Ltd. | System, method and computer program product for effective document capture e.g. during onboarding |
WO2022097132A1 (en) | 2020-11-03 | 2022-05-12 | Au10Tix Ltd. | System, method and computer program product for detecting forged documents based on image analysis |
US12056978B2 (en) | 2020-11-03 | 2024-08-06 | Au10Tix Ltd. | System, method and computer program product for ascertaining document liveness |
Also Published As
Publication number | Publication date |
---|---|
EP3244349B1 (en) | 2022-07-20 |
EP3244349A1 (en) | 2017-11-15 |
IL245623A0 (en) | 2016-08-31 |
IL245623B (en) | 2020-03-31 |
US20170330047A1 (en) | 2017-11-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10467491B2 (en) | System and method for detecting forgeries | |
US20220406029A1 (en) | Tamper detection for identification documents | |
US9406030B2 (en) | System and methods for computerized machine-learning based authentication of electronic documents including use of linear programming for classification | |
US10354472B2 (en) | Self-learning system and methods for automatic document recognition, authentication, and information extraction | |
US20200175290A1 (en) | Detection of manipulated images | |
US20170262472A1 (en) | Systems and methods for recognition of faces e.g. from mobile-device-generated images of faces | |
US10043071B1 (en) | Automated document classification | |
US12217405B2 (en) | System, method and computer program product for differentiating images comprising original scans of documents, from images of documents that are not original scans | |
CN111178147B (en) | Screen crushing and grading method, device, equipment and computer readable storage medium | |
US10956744B2 (en) | Methods for categorizing input images for use e.g. as a gateway to authentication systems | |
AU2017200935A1 (en) | Method for securing and verifying a document | |
CN110770711A (en) | Image-based counterfeit detection | |
US20230147685A1 (en) | Generalized anomaly detection | |
CN111213156A (en) | Character recognition sharpness determination | |
EP4109336A1 (en) | Methods and a system for verifying the authenticity of a mark | |
US10551524B2 (en) | Batch authentication of materials for automated anti counterfeiting | |
US20210158035A1 (en) | System, method and computer program product for automatic remote verification of identity documents | |
Panetta et al. | LQM: Localized quality measure for fingerprint image enhancement | |
EP4356316A2 (en) | Classification using artificial intelligence strategies that reconstruct data using compression and decompression transformations | |
CN112991317A (en) | Camera module detection method, model training method and device | |
Fitriani et al. | Implementation of a Banknote Watermark Detection Application Leveraging Superior Segmentation Methods | |
Chen et al. | Forensicability Assessment of Questioned Images in Recapturing Detection | |
CN113052237A (en) | Target object detection method and device and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: AU10TIX LIMITED, CYPRUS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:MARKIN, SERGEY;ATZMON, RON;MOSCOVITZ, YAEL;AND OTHERS;REEL/FRAME:043612/0741 Effective date: 20170510 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: AU10TIX LTD., ISRAEL Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AU10TIX LIMITED;REEL/FRAME:054380/0980 Effective date: 20201111 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment: 4 |