[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

NL2006766C2 - Quantitative examination of counterfeits. - Google Patents

Quantitative examination of counterfeits. Download PDF

Info

Publication number
NL2006766C2
NL2006766C2 NL2006766A NL2006766A NL2006766C2 NL 2006766 C2 NL2006766 C2 NL 2006766C2 NL 2006766 A NL2006766 A NL 2006766A NL 2006766 A NL2006766 A NL 2006766A NL 2006766 C2 NL2006766 C2 NL 2006766C2
Authority
NL
Netherlands
Prior art keywords
carrier
counterfeit
image data
value
conformity
Prior art date
Application number
NL2006766A
Other languages
Dutch (nl)
Inventor
Pieter Markus
Original Assignee
Nl Bank Nv
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nl Bank Nv filed Critical Nl Bank Nv
Priority to NL2006766A priority Critical patent/NL2006766C2/en
Application granted granted Critical
Publication of NL2006766C2 publication Critical patent/NL2006766C2/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Inspection Of Paper Currency And Valuable Securities (AREA)

Description

No. NLP189180A
QUANTITATIVE EXAMINATION OF COUNTERFEITS BACKGROUND
The invention relates to a method for determining the discriminative ability of an apparatus for handling 5 carriers provided with one or more authenticity features for discriminating between a specific counterfeit and a corresponding genuine carrier, in particular the discriminative ability of an inspection algorithm as used in such an apparatus. The carrier is in particular a banknote 10 or another carrier such as a passport, a bank card or credit card.
In order to check whether a specific carrier, in particular a specific banknote, is genuine or a counterfeit, a large variety of sophisticated carrier handling 15 apparatuses are known, and even more sophisticated apparatuses are being developed. Usually the carrier handling apparatuses each use one or more inspection algorithms for inspecting a carrier, in particular for inspecting one or more authenticity features arranged on or 20 in said carrier. Based on the outcome of the inspection of a specific carrier, the carrier handling apparatus classifies the specific carrier as genuine or as a counterfeit.
2
Usually, the algorithms are a compromise for obtaining a reasonable throughput of carriers, on the one hand, and for obtaining a reasonable discriminative ability for discriminating between a specific counterfeit and a 5 corresponding genuine carrier, on the other hand.
For example, United States Patent 5,947,255 describes a method for reducing the quantity of data that needs to be processed for each paper note. thus the throughput of a paper notes handling apparatus can be 10 increased.
In order to increase the discriminative ability of carrier handling apparatuses, very sophisticated authenticating methods and apparatuses are developed, as described for example in the International Application WO 15 2005/055155.
Each carrier handling apparatus thus as a certain discriminative ability at a certain throughput which are based on inspection algorithms that are designed by the apparatus manufacturer and are used in a specific carrier 20 handling apparatus. There exists no method to measure the discriminative ability of a specific carrier handling apparatus quantitatively and/or objectively.
In addition there exists a wide variety of different types of authentication marks and authenticity 25 features, and a large variation in the quality of paper notes handling apparatus readable authenticity features, also denoted as machine readable authenticity features, used on corresponding and/or different paper notes. There exists no method to measure the quality of machine readable 30 authenticity features of counterfeits objectively.
It is an object of the present invention to more objectively and/or quantitatively determine, whether a specific counterfeit can be identified as a counterfeit by a specific paper note handling apparatus.
35
SUMMARY OF THE INVENTION
3
According to a first aspect, the invention provides a method for determining the discriminative ability of an inspection algorithm for use in a carrier handling 5 apparatus for discriminating between a specific counterfeit and a corresponding genuine carrier, said method comprising the steps of: a. providing image data of the specific counterfeit carrier and of the corresponding genuine 10 carrier, b. providing an inspection algorithm for inspecting a carrier, c. simulating in a computer an execution of the inspection algorithm using the image data of the specific 15 counterfeit carrier, d. simulating in a computer an execution of the inspection algorithm using the image data of the corresponding genuine carrier, e. comparing a result of the simulation on the 20 image data of the specific counterfeit carrier with a result of the simulation on the image data of the corresponding genuine carrier and determining a value of conformity between these results, and f. outputting a rating value for the 25 discriminative ability of the inspection algorithm for the specific counterfeit based on the value of conformity.
For example, if the result of the simulation on the image data of the specific counterfeit carrier comprises 30 a value X and the result of the simulation on the image data of the corresponding genuine carrier comprises a value Y, then the value of conformity may be calculated by
Value of conformity = (1-(Abs (Y-X)/Y)) * 100 % 35
If the value of conformity is 100 %, the inspection algorithm as used by the specific carrier 4 handling apparatus cannot distinguish between the counterfeit and the genuine carrier. The lower the value of conformity, the larger is the discriminative ability of the inspection algorithm as used by the specific carrier 5 handling apparatus for the specific counterfeit.
Using this method, the value of conformity or the discriminative ability of an inspection algorithm is quantified, and it is now possible to predict and compare the discriminative ability of inspection algorithms for 10 particular counterfeits. This method can be used for ranking the risk that specific counterfeits, of a collection of different counterfeits, are not identified as such by a particular inspection algorithm, and thus pose a threat for the particular carrier handling apparatus using such an 15 algorithm.
According to a second aspect the invention relates to a method for determining the discriminative ability of a carrier handling apparatus for discriminating between a specific counterfeit and a corresponding genuine carrier, 20 said method comprising the steps of: a. providing image data of the specific counterfeit carrier and of the corresponding genuine carrier, b. providing an inspection algorithm as used by 25 the carrier handling apparatus for inspecting a carrier, c. simulating in a computer an execution of the inspection algorithm using the image data of the specific counterfeit carrier, d. simulating in a computer an execution of the 30 inspection algorithm using the image data of the corresponding genuine carrier, e. comparing a result of the simulation on the image data of the specific counterfeit carrier with a result of the simulation on the image data of the corresponding 35 genuine carrier and determining a value of conformity between these results, and f. outputting a rating value for the 5 discriminative ability of the carrier handling apparatus for the specific counterfeit based on the value of conformity.
Again, if the result of the simulation on the image data of the specific counterfeit carrier comprises a 5 value X and the result of the simulation on the image data of the corresponding genuine carrier comprises a value Y, then the value of conformity may be calculated by
Value of conformity = (1-(Abs (Y-X)/Y)) * 100 % 10
Using this method, the value of conformity or the discriminative ability of a carrier handling apparatus is quantified, and it is now possible to predict and compare the discriminative ability of carrier handling apparatuses 15 for particular counterfeits. This method can be used for ranking the discriminative ability of various different carrier handling apparatuses for a particular counterfeit. In addition, when a new counterfeit is identified, the method can determine whether this new counterfeit poses a 20 risk for the existing carrier handling apparatuses. If the new counterfeit poses a risk for a particular carrier handling apparatus, the supplier/manufacturer of said particular apparatus can be warned.
Both methods described above can also be used to 25 more objectively determine the quality of machine readable authenticity features, and thus can be used in research and development of such machine readable authenticity features.
In an embodiment the carrier comprises a surface, and the image data comprises data of the image of, at least 30 substantially, a whole surface of the carrier. In particular, high resolution images of the counterfeit and genuine carrier are created, preferably under controlled conditions, and are stored in a data base, for example in a Bitmap format. Since, at least substantially, the whole 35 surface of the carrier is available, a wide variety of different inspection algorithms can be simulated. On the one hand, inspection algorithms using only the data of one or 6 more minute areas of the image can be simulated. On the other hand, inspection algorithms using data of the whole image area can also be simulated.
In an embodiment the image data comprises data of 5 one or more images obtained from the carrier using light in the Ultra-Violet (UV) Electro-Magnetic spectrum range, the Infra-Red (IR) Electro-Magnetic spectrum range and/or the Visible (VIS) Electro-Magnetic spectrum range and/or using magnetic measurements. Preferably, high resolution images of 10 the counterfeit and genuine carrier are created, in the UV Electro-Magnetic spectrum range, the IR Electro-Magnetic spectrum range, the VIS Electro-Magnetic spectrum range and by measuring the magnetic characteristics of the carrier, and are stored in a data base, for example in a Bitmap 15 format. Having high resolution images in various spectrum ranges available in the data base, a wide variety of different inspection algorithms, using one or more different spectrum ranges, can be simulated.
In order to obtain image data in the Electro- 20 Magnetic spectrum, an image sensor, for example a camera, can be used.
In order to obtain an image in the magnetic spectrum, a magnetic sensor is scanned over the surface of the carrier, and the magnetic field as detected as a 25 function of the position on the carrier is stored in the data base, for example in a Bitmap format.
In an embodiment the image data comprises data of one or more images obtained from the carrier using light with a wavelength or wavelength range at or around 254 nm, 30 365 nm, 645 nm, 850 nm and/or 1000 nm. Such an image of a particular wavelength or wavelength range can be created by using a light source that emits only light at or around said particular wavelength or wavelength range for illuminating the carrier, and/or by using a detector which detects only 35 light at or around said particular wavelength or wavelength range.
Preferably the image data comprises data of images 7 measured in reflection and images measured in transmission. During the simulation a selection is made to use the reflection and/or the transmission images on the basis of the inspection algorithm of the carrier handling apparatus, 5 in particular of the detection method used in the carrier handling apparatus.
In an embodiment, wherein the carrier handling apparatus is arranged for using several different inspection algorithms, the method comprises the steps of 10 repeating steps a. to e. for each of said several different inspection algorithms on the image data of the specific counterfeit carrier and on said corresponding genuine carrier, and outputting a rating value for the discriminative 15 ability of the inspection algorithm for the specific counterfeit based on the values of conformity of each of said several different inspection algorithms, in particular based on manner said carrier handling apparatus combines and/or processes the results of each of said several 20 different inspection algorithms.
This embodiment allows for the determination of the discriminative ability of carrier handling apparatuses having a more sophisticated algorithm or an assembly of inspection algorithms.
25 In an embodiment the rating value for the discriminative ability of the carrier handling apparatus for the specific counterfeit may be based on a (weighted) average of the values of conformity of each of said several different inspection algorithms.
30 Alternatively the rating value for the discriminative ability of the carrier handling apparatus for the specific counterfeit may also be based on the lowest value of conformity of each of said several different inspection algorithms.
35 In an embodiment, the method comprises the steps of: providing image data of several different 8 counterfeit carriers and of the corresponding genuine carrier, repeating steps a. to e. for each of said several different counterfeit carriers and on said corresponding 5 genuine carrier, and outputting a rating value for the discriminative ability of the inspection algorithm for the several specific counterfeit carriers based on the values of conformity of each of said several different counterfeit carriers.
10 This embodiment allows for providing an indication for a general discriminative ability of the carrier handling apparatus for the collection of several different counterfeit carriers.
In an embodiment, the rating value is equal to the 15 value of conformity or the (weighted) average of the values of conformity.
In an embodiment, the carrier is a banknote.
According to a third aspect, the invention relates to a computer-readable storage medium having embodied 20 thereon a computer program for implementing the methods and/or any embodiment described above.
According to a fourth aspect, the invention relates to an apparatus, comprising a memory comprising computer-executable instructions for implementing the 25 methods and/or any embodiment described above.
In an embodiment, said apparatus comprises a scanning device for obtained image data from the carrier using light in the Ultra Violet Electro-Magnetic spectrum range, the Infra Red Electro-Magnetic spectrum range and/or 30 the Visible Electro-Magnetic spectrum range and/or using Magnetic measurements .
The various aspects and features described and shown in the specification can be applied, individually, wherever possible. These individual aspects, in particular 35 the aspects and features described in the attached dependent claims, can be made subject of divisional patent applications .
9
BRIEF DESCRIPTION OF THE DRAWINGS
5 The invention will be elucidated on the basis of an exemplary embodiment shown in the attached drawings, in which:
Figure 1 shows a ranking of various counterfeits by their value of conformity according three different 10 algorithms used in carrier handling apparatus A;
Figure 2 shows a ranking of various counterfeits by their value of conformity according two different algorithms used in carrier handling apparatus B; and
Figure 3 shows a ranking of various counterfeits 15 for the two carrier handling apparatuses A and B.
DETAILED DESCRIPTION OF THE INVENTION
20 As already indicated above, the invention relates to a method for determining to what extend a particular counterfeit poses a threat or is critical for not being identified by a carrier handling apparatus. A counterfeit poses a threat or is critical when an analysis of the 25 counterfeit by the carrier handling apparatus provides substantially the same result as an analysis of a corresponding genuine carrier by the carrier handling apparatus. The larger the threat, the larger the risk that the counterfeit is classified as genuine by the carrier 30 handling apparatus. According to the invention, the difference or conformity between a counterfeit and a corresponding genuine carrier is quantified.
A first exemplary embodiment provides a method for 35 determination and quantification of machine readable authenticity features in counterfeits in respect to genuine banknotes and per banknote handling apparatus. In 10 particular, the method used machine readable authenticity features which are detectable in the electro-magnetic spectrum and/or in the magnetic spectrum.
First, high resolution images of the counterfeits 5 are created.
Using a multi-spectral analyzing apparatus (Foster and Freeman, model VCS6000) the electromagnetic characteristics of the counterfeits are analyzed. The multi-spectral analyzing apparatus is provided with several light 10 sources which can emit light in various wavelength ranges, from the Ultraviolet to the Infrared. In addition, the multi-spectra analyzing apparatus comprises a camera suitable for producing images of the counterfeit paper note at various wavelengths and at various magnifications. The 15 obtained images are subsequently stored in a memory in a Bitmap format.
In order to obtain images of various counterfeits that can be compared and further used for the simulation, the multi-spectral analyzing apparatus has been modified 20 that for transmission measurements, the paper notes is illuminated by a direct light infrared LED rectangle array. Preferably a Fresnell lens is arranged between the LED rectangle array and the carrier. This modification allows for a more uniform illumination of the carriers.
25 In addition, the multi-spectral analyzing apparatus is calibrated with a dedicated calibration sample. An example of such a dedicated calibration sample is a collection of standard paper sheets which have been characterized with respect to their optical and/or magnetic 30 properties. For example, said collection comprises one paper sheet which exhibits a well defined amount of UV reflection, a second paper sheet which exhibits a well defined IR reflection and a well defined IR transmission, and a third paper sheet having a well defined grid for calibrating the 35 magnification factor of the scanning sensor, in particular the camera.
Using a magn-reader (Regula 7701 of Advanced 11
Security Solutions) the magnetic characteristics of the counterfeits are analyzed. The magn-reader measures the magnetic field as a function of the position on the banknotes, and converts the measurements in a visual 5 presentation or image. The obtained image is also stored in a memory in a Bitmap format.
The images may be normalized in order to be more easy to compare. Such a normalization may comprise a correction for a rectangular illumination, edge detection 10 and/or contour determination, skew detection, and/or blob reduction.
Secondly, the high resolution images are transferred to a software application which comprises a data base with information 15 - about the inspection algorithm used by a particular paper notes handling apparatus, which comprises: - the authenticity feature or features that are inspected by the particular paper notes handling apparatus and the wavelength range 20 used for this inspection, - how the authenticity feature or features are inspected, and about the results of such an inspection on genuine banknotes .
25 The method uses the images of the counterfeit to simulate the inspection of said counterfeit by the particular paper notes handling apparatus and compares the result with the result of a corresponding genuine banknote. A value of conformity is determined which provides a 30 quantative measure or rating value for the resemblance of said counterfeit with respect to a corresponding genuine banknote according to the inspection algorithm used by a particular paper notes handling apparatus.
The rating value for various different 35 counterfeits and/or for various different paper notes handling apparatuses can be ranked. The ranking may comprise a ranking of the severity of counterfeits threat for 12 particular banknote handling machines according to their algorithms, and/or the sensitivity of banknotes handling machines for particular counterfeits according to their algorithms .
5 A second exemplary embodiment provides a method for determination and quantification of machine readable authenticity features in counterfeits in respect to genuine banknotes according to basic inspection algorithms. Basic 10 inspection algorithms for inspecting banknotes, may comprise the inspection of: - In the infrared (IR) spectral range: - Items printed on the banknote with IR absorbing ink, IR partly absorbing ink or IR non absorbing 15 inks, such as architectural buildings on the banknote, serial numbers or denomination indications - A watermark - Paper characteristics 20 - In the ultraviolet (UV) spectral range: - Items printed on the banknote with UV absorbing ink, partly UV absorbing ink or non UV Absorbing inks, such as architectural buildings, flags or stars on the banknote.
25 - Paper characteristics - In the Visible light spectral range: - Paper color - Ink color - In the Magnetic spectral range: 30 - Presence of a metalized thread, with or without a specific magnetic signal - Items printed with Magnetic ink
High resolution images of counterfeits are 35 transferred to a software application which comprises a data base with information - about the basic inspection algorithms, which comprises: 13 - the authenticity feature or features that are inspected (see the example mentioned above) and the wavelength range used for this inspection, - how the authenticity feature or features are 5 inspected, and about the results of such an inspection on genuine banknotes .
The method uses the images of the counterfeit to simulate the inspection of said counterfeit using the 10 particular basic inspection algorithms and compares the result with the result of a corresponding genuine banknote. A value of conformity is determined which provides a quantative measure or rating value for the resemblance of said counterfeit with respect to a corresponding genuine 15 banknote according to the basic inspection algorithm.
The rating value for various different counterfeits and/or for various different basic inspection algorithms can be ranked. The ranking may comprise a ranking of the severity of counterfeits with respect to a 20 corresponding genuine banknote for the various basic inspection algorithms. Using this method basic inspection algorithms can be compared with each other and can be further optimized.
25 As already mentioned above, the value of conformity is a measure, in particularly a percentage, for the resemblance between the result of the simulation of a specific inspection algorithm on the image data of the specific counterfeit carrier, and the result of the 30 simulation of said specific inspection algorithm on the image data of the corresponding genuine carrier. If the result of the simulation on the image data of the specific counterfeit carrier is a value X and the result of the simulation on the image data of the corresponding genuine 35 carrier is a value Y, then the value of conformity may be calculated by 14
Value of conformity = (1-(Abs(Y-X)/Y)) * 100 %
The value of conformity determines the quantitative rating of the specific counterfeit according to the specific 5 inspection algorithm.
If a carriers handling apparatus is arranged for using several different inspection algorithms, the value of conformity can be obtained for each of said several different inspection algorithms on the image data of the 10 specific counterfeit carrier and on said corresponding genuine carrier. The rating value for the discriminative ability of the carriers handling apparatus for the specific counterfeit is based on the manner used by said carriers handling apparatus for combining and/or processing the 15 results of each of said several different inspection algorithms .
Example 1: 20 Carrier handling apparatus A uses three inspection algorithms for inspecting each carrier. According to one algorithm, the carriers is inspected using IR light. According to a second algorithm, the carrier is inspected using UV light. And according to a third algorithm, the 25 carriers is inspected by use of the magnetic features on or in the carrier.
Applying the method of the invention on counterfeit number 1 according to various inspection algorithms of apparatus A, yields: 30 - Value of conformity in the Infrared spectrum: 100% - Value of conformity in the Ultraviolet spectrum: 80% - Value of conformity for the magnetic features: 0%
Applying the method of the invention on 35 counterfeit number 2 according to the inspection algorithm of apparatus A, yields: - Value of conformity in the Infrared spectrum: 90% 15 - Value of conformity in the Ultraviolet spectrum: 90% - Value of conformity for the magnetic features: 0%
Applying the method of the invention on counterfeit number 3 according to the inspection algorithm 5 of apparatus A, yields: - Value of conformity in the Infrared spectrum: 80% - Value of conformity in the Ultraviolet spectrum: 80% - Value of conformity for the magnetic features: 80%
The result is shown in figure 1. Counterfeit 1 has 10 the highest ranking for the IR algorithm, then counterfeit 2 and counterfeit 3 has the lowest ranking. Counterfeit 2 has the highest ranking for the UV algorithm, and counterfeit 1 and 3 have the lowest ranking. Counterfeit 3 has the highest ranking for the magnetic algorithm, and counterfeit 1 and 2 15 have the lowest ranking.
The values or conformity are provided as a percentage, and in addition a color scheme indicates to what extend a particular counterfeit poses a threat or is critical for not being identified is a counterfeit by a 20 carrier handling apparatus: - Red: the counterfeit carrier is similar to the genuine carrier, according to the algorithm used, and this counterfeit poses a threat; - Yellow: the result of the simulation on the 25 image data of the counterfeit carrier is near to or approaches the result of the simulation on the image data of the genuine carrier.
- Green: the result of the simulation on the image data of the counterfeit carrier is far 30 remote from the result of the simulation on the image data of the genuine carrier. This counterfeit poses no threat.
In the example of figure 1, a value of conformity of 75 % and lower are indicated by a green color, a value of 35 conformity above 75 % and below 90 % are indicated by a yellow color, and a value of conformity of 90 % or above are indicated by a red color. If desired the limit values for 16 the various colors can be adapted.
Example 2: 5 Carrier handling apparatus B uses two inspection algorithms for inspecting each carrier. According to one algorithm, the carriers is inspected using IR light. According to a second algorithm, the carrier is inspected using UV light. Magnetic measurements are not available 10 (n.a.).
Applying the method of the invention on counterfeit number 1 according to various inspection algorithms of apparatus B, yields: - Value of conformity in the Infrared spectrum: 100% 15 - Value of conformity in the Ultraviolet spectrum: 75% - Value of conformity for the magnetic features: n.a.
Applying the method of the invention on counterfeit number 2 according to the inspection algorithm of apparatus B, yields: 20 - Value of conformity in the Infrared spectrum: 90% - Value of conformity in the Ultraviolet spectrum: 90% - Value of conformity for the magnetic features: n.a.
Applying the method of the invention on counterfeit number 3 according to the inspection algorithm 25 of apparatus B, yields: - Value of conformity in the Infrared spectrum: 85% - Value of conformity in the Ultraviolet spectrum: 75% - Value of conformity for the magnetic features: n.a.
The result is shown in figure 2. Counterfeit 1 has 30 the highest ranking for the IR algorithm, then counterfeit 2 and counterfeit 3 has the lowest ranking. Counterfeit 2 has the highest ranking for the UV algorithm, and counterfeit 1 and 3 have the lowest ranking.
Example 3: 35
In addition a ranking of the possible threat a particular counterfeit poses for a carrier handling 17 apparatus can also be provided. Such a ranking is shown in figure 3. The values provided in figure 3 is the average value of the individual results of the various inspection algorithms .
5
In summary, the invention relates to a method for determining the discriminative ability of an inspection algorithm for use in a carrier handling apparatus for discriminating between a specific counterfeit and a 10 corresponding genuine carrier, said method comprising the steps of: providing image data of the specific counterfeit carrier and of the corresponding genuine carrier, providing an inspection algorithm as used by the 15 carriers handling apparatus for inspecting a carrier, simulating in a computer an execution of the inspection algorithm using the image data of the specific counterfeit carrier, simulating in a computer an execution of the 20 inspection algorithm using the image data of the corresponding genuine carrier, comparing a result of these simulations and determining a value of conformity between these results, and outputting a rating value for the discriminative 25 ability of the inspection algorithm for the specific counterfeit based on the value of conformity.
It is to be understood that the above description is included to illustrate the operation of the preferred 30 embodiments and is not meant to limit the scope of the invention. From the above discussion, many variations will be apparent to one skilled in the art that would yet be encompassed by the spirit and scope of the present invention.
35

Claims (15)

1. Werkwijze voor het bepalen van het onderscheidend vermogen van een inspectie algoritme voor gebruik in een inrichting voor het verwerken van dragers voor het onderscheiden tussen een specifieke vervalste en 5 een overeenkomstige echte drager, waarbij de werkwijze de stappen omvat van: a. het verschaffen van beelddata van de specifieke vervalste drager en van een overeenkomstige echte drager, 10 b. het verschaffen van het inspectie algoritme voor het inspecteren van een drager, c. het op een computer simuleren van het uitvoeren van het inspectie algoritme gebruikmakende van de beelddata van de specifieke vervalste drager, 15 d. het op een computer simuleren van het uitvoeren van het inspectie algoritme gebruikmakende van de beelddata van de overeenkomstige echte drager, e. Het vergelijken van een resultaat van de simulatie op de beelddata van de specifieke vervalste drager 2. met een resultaat van de simulatie op de beelddata van de overeenkomstige echte drager en het bepalen van een waarde voor de conformiteit tussen deze resultaten, en f. het uitvoeren van een waarderingsgetal voor het onderscheidend vermogen van het inspectie algoritme voor 25 de specifieke vervalsing op basis van de waarde voor de conformiteit.Method for determining the distinctive character of an inspection algorithm for use in a device for processing carriers for distinguishing between a specific counterfeit and a corresponding real carrier, the method comprising the steps of: a. of image data of the specific counterfeit carrier and of a corresponding real carrier, b. providing the inspection algorithm for inspecting a carrier, c. simulating on a computer the execution of the inspection algorithm using the image data of the specific counterfeit carrier, d. simulating on a computer the execution of the inspection algorithm using the image data of the corresponding real carrier, e. Comparing a result of the simulation on the image data of the specific counterfeit carrier 2. with a result of the simulation on the image data of the corresponding real carrier and determining a value for the conformity between these results, and f. performing a value rating for the distinctive character of the inspection algorithm for the specific falsification based on the value for conformity. 2. Werkwijze voor het bepalen van het onderscheidend vermogen van een apparaat voor het verwerken van een drager voor het onderscheiden tussen een specifieke 30 vervalste en een overeenkomstige echte drager, waarbij de werkwijze de stappen omvat van: a. het verschaffen van beelddata van de specifieke vervalste drager en van de overeenkomstige echte drager, b. het verschaffen van een inspectie algoritme zoals gebruikt door het apparaat voor het verwerken van een 5 drager, voor het inspecteren van een drager, c. het simuleren in een computer van het uitvoeren van het inspectie algoritme gebruikmakende van de beelddata van de specifieke vervalste drager, d. het simuleren in een computer van het 10 uitvoeren van het inspectie algoritme gebruikmakende van de beelddata van de overeenkomstige echte drager, e. het vergelijken van een resultaat van de simulatie op de beelddata van de specifieke vervalste drager met een resultaat van de simulatie op de beelddata van de 15 overeenkomstige echte drager en het bepalen van een waarde voor de conformiteit tussen deze resultaten, en f. het uitvoeren van een waarderingsgetal voor het onderscheidend vermogen van het apparaat voor het verwerken van een drager voor de specifieke vervalsing op 20 basis van de waarde voor de conformiteit.2. Method for determining the distinctive character of a device for processing a carrier for distinguishing between a specific counterfeit and a corresponding real carrier, the method comprising the steps of: a. Providing image data of the specific carrier counterfeit carrier and of the corresponding real carrier, e.g. providing an inspection algorithm as used by the device for processing a carrier, for inspecting a carrier, c. simulating in a computer the execution of the inspection algorithm using the image data of the specific counterfeit carrier, d. simulating in a computer the execution of the inspection algorithm using the image data of the corresponding real carrier, e. comparing a result of the simulation on the image data of the specific counterfeit carrier with a result of the simulation on the image data of the corresponding real carrier and determining a value for the conformity between these results, and f. performing a value rating for the distinctive power of the device for processing a carrier for the specific counterfeit based on the value for conformity. 3. Werkwijze volgens conclusie 1 of 2, waarbij de drager een oppervlak omvat, en waarin de beelddata gegevens omvat van een beeld van, ten minste in hoofdzaak, een geheel oppervlak van de drager.The method of claim 1 or 2, wherein the carrier comprises a surface, and wherein the image data comprises data from an image of, at least substantially, an entire surface of the carrier. 4. Werkwijze volgens conclusie 1, 2 of 3, waarin de beelddata gegevens omvat van één of meer beelden verkregen van de drager onder gebruikmaking van licht in het ultraviolet electromagnetisch spectrum bereik, het infrarood electromagnetische spectrum bereik en/of het visuele 30 electromagnetische spectrum bereik en/of onder gebruikmaking van magnetische metingen.4. Method as claimed in claim 1, 2 or 3, wherein the image data comprises data from one or more images obtained from the carrier using light in the ultraviolet electromagnetic spectrum range, the infrared electromagnetic spectrum range and / or the visual electromagnetic spectrum range and / or using magnetic measurements. 5. Werkwijze volgens conclusie 4, waarbij de beelddata gegevens omvat van één of meer beelden verkregen van de drager onder gebruikmaking van licht met een 35 golflengte of een golflengte gebied van of rond 254 nm, 365 nm, 645 nm, 850 nm en/of 1000 nm.5. Method according to claim 4, wherein the image data comprises data from one or more images obtained from the carrier using light with a wavelength or a wavelength region of or around 254 nm, 365 nm, 645 nm, 850 nm and / or 1000 nm. 6. Werkwijze volgens één der voorgaande conclusies, waarbij de beelddata gegevens omvat van beelden gemeten in reflectie en beelden gemeten in transmissie.The method of any preceding claim, wherein the image data comprises data from images measured in reflection and images measured in transmission. 7. Werkwijze volgens één der voorgaande conclusies, waarbij het apparaat voor het verwerken van een 5 drager is ingericht voor het gebruik van meerdere verschillende inspectie algoritmes, en waarbij de werkwijze de stappen omvat van het herhalen van de stappen a. tot en met e. voor elk van de meerdere verschillende inspectie algoritmes op de 10 beelddata van de specifieke vervalste drager en op de overeenkomstige echte drager, en het uitvoeren van een waarderingsgetal voor het onderscheidend vermogen van het inspectie algoritme voor de specifieke vervalsing op basis van de waarden voor de 15 conformiteit van elk van de meerdere verschillende inspectie algoritmes.7. Method as claimed in any of the foregoing claims, wherein the device for processing a carrier is adapted to use a plurality of different inspection algorithms, and wherein the method comprises the steps of repeating the steps a. To e. for each of the plurality of different inspection algorithms on the image data of the specific counterfeit carrier and on the corresponding real carrier, and performing a value rating for the distinctive character of the inspection algorithm for the specific counterfeit based on the values for the fake conformity of each of the multiple different inspection algorithms. 8. Werkwijze volgens één der voorgaande conclusies, verder omvattende de stappen van: het verschaffen van beelddata van meerdere 20 verschillende vervalste dragers en van de overeenkomstige echte drager, het herhalen van de stappen a. tot en met e. voor elk van de meerdere verschillende vervalste dragers en op de overeenkomstige echte drager, en 25 het uitvoeren van een waarderingsgetal voor het onderscheidend vermogen van het inspectie algoritme voor de meerdere verschillende vervalste dragers op basis van de waarden voor de conformiteit voor elk van de meerdere verschillende vervalste dragers.8. Method as claimed in any of the foregoing claims, further comprising the steps of: providing image data from a plurality of different counterfeit carriers and the corresponding real carrier, repeating the steps a. To e. for each of the plurality of different counterfeit carriers and on the corresponding real carrier, and performing a distinctive value rating of the inspection algorithm for the plurality of different counterfeit carriers based on the values of conformity for each of the plurality of different counterfeit carriers counterfeit carriers. 9. Werkwijze volgens één der voorgaande conclusies, waarbij het resultaat van de simulatie op de beelddata van de specifieke vervalste drager een waarde X omvat en waarbij het resultaat van de simulatie op de beelddata van de echte drager een waarde Y omvat, en waarbij 35 de waarde voor de conformiteit wordt berekend door Waarde voor de conformiteit = (1 - (Abs(Y-X)/Y)) * 100%9. Method as claimed in any of the foregoing claims, wherein the result of the simulation on the image data of the specific falsified carrier comprises a value X and wherein the result of the simulation on the image data of the real carrier comprises a value Y, and wherein the conformity value is calculated by Value for conformity = (1 - (Abs (YX) / Y)) * 100% 10. Werkwijze volgens conclusie 9, waarbij het waarderingsgetal gelijk is aan de waarde voor de conformiteit.The method of claim 9, wherein the rating number is equal to the value for conformity. 11. Werkwijze volgens conclusies 7 en 9, of conclusies 8 en 9, waarbij het waarderingsgetal gelijk is aan een gemiddelde van de waarden voor de conformiteit of een gewogen gemiddelde van de waarden voor de conformiteit.A method according to claims 7 and 9, or claims 8 and 9, wherein the rating number is equal to an average of the values for conformity or a weighted average of the values for conformity. 12. Werkwijze volgens één der voorgaande 10 conclusies, waarbij de drager een bankbiljet is.12. Method as claimed in any of the foregoing claims, wherein the carrier is a banknote. 13. Een door een computer leesbaar opslagmedium waarin een computerprogramma is aangebracht voor het implementeren van de werkwijze volgens één der voorgaande conclusies.A computer-readable storage medium in which a computer program is provided for implementing the method of any one of the preceding claims. 14. Een apparaat omvattende een geheugen omvattende door een computer uitvoerbare instructies voor het uitvoeren van de werkwijze volgens één van de conclusies 1 tot en met 12.An apparatus comprising a memory comprising computer-executable instructions for performing the method according to any of claims 1 to 12. 15. Apparaat volgens conclusie 14, omvattende een 20 scanning apparaat voor het opnemen van beelddata van de drager onder gebruikmaking van licht in het ultraviolet electromagnetisch spectrum gebied, het infrarood electromagnetisch spectrum gebied en/of het zichtbare electromagnetisch spectrum gebied en/of onder gebruikmaking 25 van magnetische metingen. -o-o-o-o-o-o-o-o-15. Device as claimed in claim 14, comprising a scanning device for recording image data of the carrier using light in the ultraviolet electromagnetic spectrum area, the infrared electromagnetic spectrum area and / or the visible electromagnetic spectrum area and / or using of magnetic measurements. -o-o-o-o-o-o-o-
NL2006766A 2011-05-11 2011-05-11 Quantitative examination of counterfeits. NL2006766C2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
NL2006766A NL2006766C2 (en) 2011-05-11 2011-05-11 Quantitative examination of counterfeits.

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NL2006766A NL2006766C2 (en) 2011-05-11 2011-05-11 Quantitative examination of counterfeits.
NL2006766 2011-05-11

Publications (1)

Publication Number Publication Date
NL2006766C2 true NL2006766C2 (en) 2012-11-13

Family

ID=44640734

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2006766A NL2006766C2 (en) 2011-05-11 2011-05-11 Quantitative examination of counterfeits.

Country Status (1)

Country Link
NL (1) NL2006766C2 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0537513A1 (en) * 1991-10-15 1993-04-21 URMET S.p.A. Costruzioni Elettro-Telefoniche Device for validating banknotes
US5757001A (en) * 1996-05-01 1998-05-26 The Regents Of The University Of Calif. Detection of counterfeit currency
DE10029051A1 (en) * 2000-06-13 2001-12-20 Giesecke & Devrient Gmbh Method for testing the validity of documents, such as banknotes, by testing the documents for two or more authenticity criteria and classifying the documents according to the criteria they fulfill

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0537513A1 (en) * 1991-10-15 1993-04-21 URMET S.p.A. Costruzioni Elettro-Telefoniche Device for validating banknotes
US5757001A (en) * 1996-05-01 1998-05-26 The Regents Of The University Of Calif. Detection of counterfeit currency
DE10029051A1 (en) * 2000-06-13 2001-12-20 Giesecke & Devrient Gmbh Method for testing the validity of documents, such as banknotes, by testing the documents for two or more authenticity criteria and classifying the documents according to the criteria they fulfill

Similar Documents

Publication Publication Date Title
EP1490828B1 (en) Currency verification
CN101583979B (en) Method for identifying soiling and/or colour fading in the region of colour transitions on documents of value, and means for carrying out the method
KR101297702B1 (en) Improved fake currency detector using integrated transmission and reflective spectral response
US20050100204A1 (en) Method and apparatus for detecting fluorescent particles contained in a substrate
Jung et al. A new methodology for detection of counterfeit Viagra® and Cialis® tablets by image processing and statistical analysis
AU2011257540B2 (en) Device for testing the authenticity of valuable documents
BRPI0620308A2 (en) image processing of media items before validation
RU2438182C1 (en) Method of processing banknotes (versions)
GB2355522A (en) Improvements in verifying printed security substrates
RU2562758C2 (en) Method and apparatus for determining reference data set of class for classification of valuable documents
KR100881230B1 (en) High-precision forgery discrimination system using stereo image
WO2011036748A1 (en) Paper sheet identification device and paper sheet identification method
AU2003204290B2 (en) Currency validator
del Hoyo-Meléndez et al. A multi-technique approach for detecting and evaluating material inconsistencies in historical banknotes
KR101076322B1 (en) Method for discriminating the authenticity of paper money by using a contact image sensor
Lamsal et al. Counterfeit paper banknote identification based on color and texture
NL2006766C2 (en) Quantitative examination of counterfeits.
CN102214305A (en) Method for taking evidence for source of printing paper sheet by using grain characteristic
CN105556576B (en) It verifies the method for the valuable document with polymeric substrates and transparent window and implements the equipment of the method
KR101117359B1 (en) Apparatus and method for medium recognition
Halder et al. Analysis of fluorescent paper pulps for detecting counterfeit Indian paper money
US20090074229A1 (en) Device and method for the visual representation of measured values
KR101020583B1 (en) Hologram optical inspection system
US11941901B2 (en) Smartphone or tablet comprising a device for generating a digital identifier of a copy, including at least one print image of a printed product produced in a production system, and method for using this device
US8474592B2 (en) Currency discrimination

Legal Events

Date Code Title Description
MM Lapsed because of non-payment of the annual fee

Effective date: 20200601