NL2006766C2 - Quantitative examination of counterfeits. - Google Patents
Quantitative examination of counterfeits. Download PDFInfo
- Publication number
- NL2006766C2 NL2006766C2 NL2006766A NL2006766A NL2006766C2 NL 2006766 C2 NL2006766 C2 NL 2006766C2 NL 2006766 A NL2006766 A NL 2006766A NL 2006766 A NL2006766 A NL 2006766A NL 2006766 C2 NL2006766 C2 NL 2006766C2
- Authority
- NL
- Netherlands
- Prior art keywords
- carrier
- counterfeit
- image data
- value
- conformity
- Prior art date
Links
- 238000007689 inspection Methods 0.000 claims description 81
- 238000000034 method Methods 0.000 claims description 52
- 238000004088 simulation Methods 0.000 claims description 25
- 238000001228 spectrum Methods 0.000 claims description 22
- 239000000969 carrier Substances 0.000 claims description 21
- 238000005259 measurement Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000004590 computer program Methods 0.000 claims description 2
- 230000000007 visual effect Effects 0.000 claims description 2
- 239000000976 ink Substances 0.000 description 8
- 238000002329 infrared spectrum Methods 0.000 description 6
- 238000002211 ultraviolet spectrum Methods 0.000 description 6
- 230000003595 spectral effect Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000005286 illumination Methods 0.000 description 2
- 238000011002 quantification Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000003708 edge detection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/20—Testing patterns thereon
- G07D7/202—Testing patterns thereon using pattern matching
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07D—HANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
- G07D7/00—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
- G07D7/06—Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
- G07D7/12—Visible light, infrared or ultraviolet radiation
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Toxicology (AREA)
- Engineering & Computer Science (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Inspection Of Paper Currency And Valuable Securities (AREA)
Description
No. NLP189180A
QUANTITATIVE EXAMINATION OF COUNTERFEITS BACKGROUND
The invention relates to a method for determining the discriminative ability of an apparatus for handling 5 carriers provided with one or more authenticity features for discriminating between a specific counterfeit and a corresponding genuine carrier, in particular the discriminative ability of an inspection algorithm as used in such an apparatus. The carrier is in particular a banknote 10 or another carrier such as a passport, a bank card or credit card.
In order to check whether a specific carrier, in particular a specific banknote, is genuine or a counterfeit, a large variety of sophisticated carrier handling 15 apparatuses are known, and even more sophisticated apparatuses are being developed. Usually the carrier handling apparatuses each use one or more inspection algorithms for inspecting a carrier, in particular for inspecting one or more authenticity features arranged on or 20 in said carrier. Based on the outcome of the inspection of a specific carrier, the carrier handling apparatus classifies the specific carrier as genuine or as a counterfeit.
2
Usually, the algorithms are a compromise for obtaining a reasonable throughput of carriers, on the one hand, and for obtaining a reasonable discriminative ability for discriminating between a specific counterfeit and a 5 corresponding genuine carrier, on the other hand.
For example, United States Patent 5,947,255 describes a method for reducing the quantity of data that needs to be processed for each paper note. thus the throughput of a paper notes handling apparatus can be 10 increased.
In order to increase the discriminative ability of carrier handling apparatuses, very sophisticated authenticating methods and apparatuses are developed, as described for example in the International Application WO 15 2005/055155.
Each carrier handling apparatus thus as a certain discriminative ability at a certain throughput which are based on inspection algorithms that are designed by the apparatus manufacturer and are used in a specific carrier 20 handling apparatus. There exists no method to measure the discriminative ability of a specific carrier handling apparatus quantitatively and/or objectively.
In addition there exists a wide variety of different types of authentication marks and authenticity 25 features, and a large variation in the quality of paper notes handling apparatus readable authenticity features, also denoted as machine readable authenticity features, used on corresponding and/or different paper notes. There exists no method to measure the quality of machine readable 30 authenticity features of counterfeits objectively.
It is an object of the present invention to more objectively and/or quantitatively determine, whether a specific counterfeit can be identified as a counterfeit by a specific paper note handling apparatus.
35
SUMMARY OF THE INVENTION
3
According to a first aspect, the invention provides a method for determining the discriminative ability of an inspection algorithm for use in a carrier handling 5 apparatus for discriminating between a specific counterfeit and a corresponding genuine carrier, said method comprising the steps of: a. providing image data of the specific counterfeit carrier and of the corresponding genuine 10 carrier, b. providing an inspection algorithm for inspecting a carrier, c. simulating in a computer an execution of the inspection algorithm using the image data of the specific 15 counterfeit carrier, d. simulating in a computer an execution of the inspection algorithm using the image data of the corresponding genuine carrier, e. comparing a result of the simulation on the 20 image data of the specific counterfeit carrier with a result of the simulation on the image data of the corresponding genuine carrier and determining a value of conformity between these results, and f. outputting a rating value for the 25 discriminative ability of the inspection algorithm for the specific counterfeit based on the value of conformity.
For example, if the result of the simulation on the image data of the specific counterfeit carrier comprises 30 a value X and the result of the simulation on the image data of the corresponding genuine carrier comprises a value Y, then the value of conformity may be calculated by
Value of conformity = (1-(Abs (Y-X)/Y)) * 100 % 35
If the value of conformity is 100 %, the inspection algorithm as used by the specific carrier 4 handling apparatus cannot distinguish between the counterfeit and the genuine carrier. The lower the value of conformity, the larger is the discriminative ability of the inspection algorithm as used by the specific carrier 5 handling apparatus for the specific counterfeit.
Using this method, the value of conformity or the discriminative ability of an inspection algorithm is quantified, and it is now possible to predict and compare the discriminative ability of inspection algorithms for 10 particular counterfeits. This method can be used for ranking the risk that specific counterfeits, of a collection of different counterfeits, are not identified as such by a particular inspection algorithm, and thus pose a threat for the particular carrier handling apparatus using such an 15 algorithm.
According to a second aspect the invention relates to a method for determining the discriminative ability of a carrier handling apparatus for discriminating between a specific counterfeit and a corresponding genuine carrier, 20 said method comprising the steps of: a. providing image data of the specific counterfeit carrier and of the corresponding genuine carrier, b. providing an inspection algorithm as used by 25 the carrier handling apparatus for inspecting a carrier, c. simulating in a computer an execution of the inspection algorithm using the image data of the specific counterfeit carrier, d. simulating in a computer an execution of the 30 inspection algorithm using the image data of the corresponding genuine carrier, e. comparing a result of the simulation on the image data of the specific counterfeit carrier with a result of the simulation on the image data of the corresponding 35 genuine carrier and determining a value of conformity between these results, and f. outputting a rating value for the 5 discriminative ability of the carrier handling apparatus for the specific counterfeit based on the value of conformity.
Again, if the result of the simulation on the image data of the specific counterfeit carrier comprises a 5 value X and the result of the simulation on the image data of the corresponding genuine carrier comprises a value Y, then the value of conformity may be calculated by
Value of conformity = (1-(Abs (Y-X)/Y)) * 100 % 10
Using this method, the value of conformity or the discriminative ability of a carrier handling apparatus is quantified, and it is now possible to predict and compare the discriminative ability of carrier handling apparatuses 15 for particular counterfeits. This method can be used for ranking the discriminative ability of various different carrier handling apparatuses for a particular counterfeit. In addition, when a new counterfeit is identified, the method can determine whether this new counterfeit poses a 20 risk for the existing carrier handling apparatuses. If the new counterfeit poses a risk for a particular carrier handling apparatus, the supplier/manufacturer of said particular apparatus can be warned.
Both methods described above can also be used to 25 more objectively determine the quality of machine readable authenticity features, and thus can be used in research and development of such machine readable authenticity features.
In an embodiment the carrier comprises a surface, and the image data comprises data of the image of, at least 30 substantially, a whole surface of the carrier. In particular, high resolution images of the counterfeit and genuine carrier are created, preferably under controlled conditions, and are stored in a data base, for example in a Bitmap format. Since, at least substantially, the whole 35 surface of the carrier is available, a wide variety of different inspection algorithms can be simulated. On the one hand, inspection algorithms using only the data of one or 6 more minute areas of the image can be simulated. On the other hand, inspection algorithms using data of the whole image area can also be simulated.
In an embodiment the image data comprises data of 5 one or more images obtained from the carrier using light in the Ultra-Violet (UV) Electro-Magnetic spectrum range, the Infra-Red (IR) Electro-Magnetic spectrum range and/or the Visible (VIS) Electro-Magnetic spectrum range and/or using magnetic measurements. Preferably, high resolution images of 10 the counterfeit and genuine carrier are created, in the UV Electro-Magnetic spectrum range, the IR Electro-Magnetic spectrum range, the VIS Electro-Magnetic spectrum range and by measuring the magnetic characteristics of the carrier, and are stored in a data base, for example in a Bitmap 15 format. Having high resolution images in various spectrum ranges available in the data base, a wide variety of different inspection algorithms, using one or more different spectrum ranges, can be simulated.
In order to obtain image data in the Electro- 20 Magnetic spectrum, an image sensor, for example a camera, can be used.
In order to obtain an image in the magnetic spectrum, a magnetic sensor is scanned over the surface of the carrier, and the magnetic field as detected as a 25 function of the position on the carrier is stored in the data base, for example in a Bitmap format.
In an embodiment the image data comprises data of one or more images obtained from the carrier using light with a wavelength or wavelength range at or around 254 nm, 30 365 nm, 645 nm, 850 nm and/or 1000 nm. Such an image of a particular wavelength or wavelength range can be created by using a light source that emits only light at or around said particular wavelength or wavelength range for illuminating the carrier, and/or by using a detector which detects only 35 light at or around said particular wavelength or wavelength range.
Preferably the image data comprises data of images 7 measured in reflection and images measured in transmission. During the simulation a selection is made to use the reflection and/or the transmission images on the basis of the inspection algorithm of the carrier handling apparatus, 5 in particular of the detection method used in the carrier handling apparatus.
In an embodiment, wherein the carrier handling apparatus is arranged for using several different inspection algorithms, the method comprises the steps of 10 repeating steps a. to e. for each of said several different inspection algorithms on the image data of the specific counterfeit carrier and on said corresponding genuine carrier, and outputting a rating value for the discriminative 15 ability of the inspection algorithm for the specific counterfeit based on the values of conformity of each of said several different inspection algorithms, in particular based on manner said carrier handling apparatus combines and/or processes the results of each of said several 20 different inspection algorithms.
This embodiment allows for the determination of the discriminative ability of carrier handling apparatuses having a more sophisticated algorithm or an assembly of inspection algorithms.
25 In an embodiment the rating value for the discriminative ability of the carrier handling apparatus for the specific counterfeit may be based on a (weighted) average of the values of conformity of each of said several different inspection algorithms.
30 Alternatively the rating value for the discriminative ability of the carrier handling apparatus for the specific counterfeit may also be based on the lowest value of conformity of each of said several different inspection algorithms.
35 In an embodiment, the method comprises the steps of: providing image data of several different 8 counterfeit carriers and of the corresponding genuine carrier, repeating steps a. to e. for each of said several different counterfeit carriers and on said corresponding 5 genuine carrier, and outputting a rating value for the discriminative ability of the inspection algorithm for the several specific counterfeit carriers based on the values of conformity of each of said several different counterfeit carriers.
10 This embodiment allows for providing an indication for a general discriminative ability of the carrier handling apparatus for the collection of several different counterfeit carriers.
In an embodiment, the rating value is equal to the 15 value of conformity or the (weighted) average of the values of conformity.
In an embodiment, the carrier is a banknote.
According to a third aspect, the invention relates to a computer-readable storage medium having embodied 20 thereon a computer program for implementing the methods and/or any embodiment described above.
According to a fourth aspect, the invention relates to an apparatus, comprising a memory comprising computer-executable instructions for implementing the 25 methods and/or any embodiment described above.
In an embodiment, said apparatus comprises a scanning device for obtained image data from the carrier using light in the Ultra Violet Electro-Magnetic spectrum range, the Infra Red Electro-Magnetic spectrum range and/or 30 the Visible Electro-Magnetic spectrum range and/or using Magnetic measurements .
The various aspects and features described and shown in the specification can be applied, individually, wherever possible. These individual aspects, in particular 35 the aspects and features described in the attached dependent claims, can be made subject of divisional patent applications .
9
BRIEF DESCRIPTION OF THE DRAWINGS
5 The invention will be elucidated on the basis of an exemplary embodiment shown in the attached drawings, in which:
Figure 1 shows a ranking of various counterfeits by their value of conformity according three different 10 algorithms used in carrier handling apparatus A;
Figure 2 shows a ranking of various counterfeits by their value of conformity according two different algorithms used in carrier handling apparatus B; and
Figure 3 shows a ranking of various counterfeits 15 for the two carrier handling apparatuses A and B.
DETAILED DESCRIPTION OF THE INVENTION
20 As already indicated above, the invention relates to a method for determining to what extend a particular counterfeit poses a threat or is critical for not being identified by a carrier handling apparatus. A counterfeit poses a threat or is critical when an analysis of the 25 counterfeit by the carrier handling apparatus provides substantially the same result as an analysis of a corresponding genuine carrier by the carrier handling apparatus. The larger the threat, the larger the risk that the counterfeit is classified as genuine by the carrier 30 handling apparatus. According to the invention, the difference or conformity between a counterfeit and a corresponding genuine carrier is quantified.
A first exemplary embodiment provides a method for 35 determination and quantification of machine readable authenticity features in counterfeits in respect to genuine banknotes and per banknote handling apparatus. In 10 particular, the method used machine readable authenticity features which are detectable in the electro-magnetic spectrum and/or in the magnetic spectrum.
First, high resolution images of the counterfeits 5 are created.
Using a multi-spectral analyzing apparatus (Foster and Freeman, model VCS6000) the electromagnetic characteristics of the counterfeits are analyzed. The multi-spectral analyzing apparatus is provided with several light 10 sources which can emit light in various wavelength ranges, from the Ultraviolet to the Infrared. In addition, the multi-spectra analyzing apparatus comprises a camera suitable for producing images of the counterfeit paper note at various wavelengths and at various magnifications. The 15 obtained images are subsequently stored in a memory in a Bitmap format.
In order to obtain images of various counterfeits that can be compared and further used for the simulation, the multi-spectral analyzing apparatus has been modified 20 that for transmission measurements, the paper notes is illuminated by a direct light infrared LED rectangle array. Preferably a Fresnell lens is arranged between the LED rectangle array and the carrier. This modification allows for a more uniform illumination of the carriers.
25 In addition, the multi-spectral analyzing apparatus is calibrated with a dedicated calibration sample. An example of such a dedicated calibration sample is a collection of standard paper sheets which have been characterized with respect to their optical and/or magnetic 30 properties. For example, said collection comprises one paper sheet which exhibits a well defined amount of UV reflection, a second paper sheet which exhibits a well defined IR reflection and a well defined IR transmission, and a third paper sheet having a well defined grid for calibrating the 35 magnification factor of the scanning sensor, in particular the camera.
Using a magn-reader (Regula 7701 of Advanced 11
Security Solutions) the magnetic characteristics of the counterfeits are analyzed. The magn-reader measures the magnetic field as a function of the position on the banknotes, and converts the measurements in a visual 5 presentation or image. The obtained image is also stored in a memory in a Bitmap format.
The images may be normalized in order to be more easy to compare. Such a normalization may comprise a correction for a rectangular illumination, edge detection 10 and/or contour determination, skew detection, and/or blob reduction.
Secondly, the high resolution images are transferred to a software application which comprises a data base with information 15 - about the inspection algorithm used by a particular paper notes handling apparatus, which comprises: - the authenticity feature or features that are inspected by the particular paper notes handling apparatus and the wavelength range 20 used for this inspection, - how the authenticity feature or features are inspected, and about the results of such an inspection on genuine banknotes .
25 The method uses the images of the counterfeit to simulate the inspection of said counterfeit by the particular paper notes handling apparatus and compares the result with the result of a corresponding genuine banknote. A value of conformity is determined which provides a 30 quantative measure or rating value for the resemblance of said counterfeit with respect to a corresponding genuine banknote according to the inspection algorithm used by a particular paper notes handling apparatus.
The rating value for various different 35 counterfeits and/or for various different paper notes handling apparatuses can be ranked. The ranking may comprise a ranking of the severity of counterfeits threat for 12 particular banknote handling machines according to their algorithms, and/or the sensitivity of banknotes handling machines for particular counterfeits according to their algorithms .
5 A second exemplary embodiment provides a method for determination and quantification of machine readable authenticity features in counterfeits in respect to genuine banknotes according to basic inspection algorithms. Basic 10 inspection algorithms for inspecting banknotes, may comprise the inspection of: - In the infrared (IR) spectral range: - Items printed on the banknote with IR absorbing ink, IR partly absorbing ink or IR non absorbing 15 inks, such as architectural buildings on the banknote, serial numbers or denomination indications - A watermark - Paper characteristics 20 - In the ultraviolet (UV) spectral range: - Items printed on the banknote with UV absorbing ink, partly UV absorbing ink or non UV Absorbing inks, such as architectural buildings, flags or stars on the banknote.
25 - Paper characteristics - In the Visible light spectral range: - Paper color - Ink color - In the Magnetic spectral range: 30 - Presence of a metalized thread, with or without a specific magnetic signal - Items printed with Magnetic ink
High resolution images of counterfeits are 35 transferred to a software application which comprises a data base with information - about the basic inspection algorithms, which comprises: 13 - the authenticity feature or features that are inspected (see the example mentioned above) and the wavelength range used for this inspection, - how the authenticity feature or features are 5 inspected, and about the results of such an inspection on genuine banknotes .
The method uses the images of the counterfeit to simulate the inspection of said counterfeit using the 10 particular basic inspection algorithms and compares the result with the result of a corresponding genuine banknote. A value of conformity is determined which provides a quantative measure or rating value for the resemblance of said counterfeit with respect to a corresponding genuine 15 banknote according to the basic inspection algorithm.
The rating value for various different counterfeits and/or for various different basic inspection algorithms can be ranked. The ranking may comprise a ranking of the severity of counterfeits with respect to a 20 corresponding genuine banknote for the various basic inspection algorithms. Using this method basic inspection algorithms can be compared with each other and can be further optimized.
25 As already mentioned above, the value of conformity is a measure, in particularly a percentage, for the resemblance between the result of the simulation of a specific inspection algorithm on the image data of the specific counterfeit carrier, and the result of the 30 simulation of said specific inspection algorithm on the image data of the corresponding genuine carrier. If the result of the simulation on the image data of the specific counterfeit carrier is a value X and the result of the simulation on the image data of the corresponding genuine 35 carrier is a value Y, then the value of conformity may be calculated by 14
Value of conformity = (1-(Abs(Y-X)/Y)) * 100 %
The value of conformity determines the quantitative rating of the specific counterfeit according to the specific 5 inspection algorithm.
If a carriers handling apparatus is arranged for using several different inspection algorithms, the value of conformity can be obtained for each of said several different inspection algorithms on the image data of the 10 specific counterfeit carrier and on said corresponding genuine carrier. The rating value for the discriminative ability of the carriers handling apparatus for the specific counterfeit is based on the manner used by said carriers handling apparatus for combining and/or processing the 15 results of each of said several different inspection algorithms .
Example 1: 20 Carrier handling apparatus A uses three inspection algorithms for inspecting each carrier. According to one algorithm, the carriers is inspected using IR light. According to a second algorithm, the carrier is inspected using UV light. And according to a third algorithm, the 25 carriers is inspected by use of the magnetic features on or in the carrier.
Applying the method of the invention on counterfeit number 1 according to various inspection algorithms of apparatus A, yields: 30 - Value of conformity in the Infrared spectrum: 100% - Value of conformity in the Ultraviolet spectrum: 80% - Value of conformity for the magnetic features: 0%
Applying the method of the invention on 35 counterfeit number 2 according to the inspection algorithm of apparatus A, yields: - Value of conformity in the Infrared spectrum: 90% 15 - Value of conformity in the Ultraviolet spectrum: 90% - Value of conformity for the magnetic features: 0%
Applying the method of the invention on counterfeit number 3 according to the inspection algorithm 5 of apparatus A, yields: - Value of conformity in the Infrared spectrum: 80% - Value of conformity in the Ultraviolet spectrum: 80% - Value of conformity for the magnetic features: 80%
The result is shown in figure 1. Counterfeit 1 has 10 the highest ranking for the IR algorithm, then counterfeit 2 and counterfeit 3 has the lowest ranking. Counterfeit 2 has the highest ranking for the UV algorithm, and counterfeit 1 and 3 have the lowest ranking. Counterfeit 3 has the highest ranking for the magnetic algorithm, and counterfeit 1 and 2 15 have the lowest ranking.
The values or conformity are provided as a percentage, and in addition a color scheme indicates to what extend a particular counterfeit poses a threat or is critical for not being identified is a counterfeit by a 20 carrier handling apparatus: - Red: the counterfeit carrier is similar to the genuine carrier, according to the algorithm used, and this counterfeit poses a threat; - Yellow: the result of the simulation on the 25 image data of the counterfeit carrier is near to or approaches the result of the simulation on the image data of the genuine carrier.
- Green: the result of the simulation on the image data of the counterfeit carrier is far 30 remote from the result of the simulation on the image data of the genuine carrier. This counterfeit poses no threat.
In the example of figure 1, a value of conformity of 75 % and lower are indicated by a green color, a value of 35 conformity above 75 % and below 90 % are indicated by a yellow color, and a value of conformity of 90 % or above are indicated by a red color. If desired the limit values for 16 the various colors can be adapted.
Example 2: 5 Carrier handling apparatus B uses two inspection algorithms for inspecting each carrier. According to one algorithm, the carriers is inspected using IR light. According to a second algorithm, the carrier is inspected using UV light. Magnetic measurements are not available 10 (n.a.).
Applying the method of the invention on counterfeit number 1 according to various inspection algorithms of apparatus B, yields: - Value of conformity in the Infrared spectrum: 100% 15 - Value of conformity in the Ultraviolet spectrum: 75% - Value of conformity for the magnetic features: n.a.
Applying the method of the invention on counterfeit number 2 according to the inspection algorithm of apparatus B, yields: 20 - Value of conformity in the Infrared spectrum: 90% - Value of conformity in the Ultraviolet spectrum: 90% - Value of conformity for the magnetic features: n.a.
Applying the method of the invention on counterfeit number 3 according to the inspection algorithm 25 of apparatus B, yields: - Value of conformity in the Infrared spectrum: 85% - Value of conformity in the Ultraviolet spectrum: 75% - Value of conformity for the magnetic features: n.a.
The result is shown in figure 2. Counterfeit 1 has 30 the highest ranking for the IR algorithm, then counterfeit 2 and counterfeit 3 has the lowest ranking. Counterfeit 2 has the highest ranking for the UV algorithm, and counterfeit 1 and 3 have the lowest ranking.
Example 3: 35
In addition a ranking of the possible threat a particular counterfeit poses for a carrier handling 17 apparatus can also be provided. Such a ranking is shown in figure 3. The values provided in figure 3 is the average value of the individual results of the various inspection algorithms .
5
In summary, the invention relates to a method for determining the discriminative ability of an inspection algorithm for use in a carrier handling apparatus for discriminating between a specific counterfeit and a 10 corresponding genuine carrier, said method comprising the steps of: providing image data of the specific counterfeit carrier and of the corresponding genuine carrier, providing an inspection algorithm as used by the 15 carriers handling apparatus for inspecting a carrier, simulating in a computer an execution of the inspection algorithm using the image data of the specific counterfeit carrier, simulating in a computer an execution of the 20 inspection algorithm using the image data of the corresponding genuine carrier, comparing a result of these simulations and determining a value of conformity between these results, and outputting a rating value for the discriminative 25 ability of the inspection algorithm for the specific counterfeit based on the value of conformity.
It is to be understood that the above description is included to illustrate the operation of the preferred 30 embodiments and is not meant to limit the scope of the invention. From the above discussion, many variations will be apparent to one skilled in the art that would yet be encompassed by the spirit and scope of the present invention.
35
Claims (15)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2006766A NL2006766C2 (en) | 2011-05-11 | 2011-05-11 | Quantitative examination of counterfeits. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
NL2006766A NL2006766C2 (en) | 2011-05-11 | 2011-05-11 | Quantitative examination of counterfeits. |
NL2006766 | 2011-05-11 |
Publications (1)
Publication Number | Publication Date |
---|---|
NL2006766C2 true NL2006766C2 (en) | 2012-11-13 |
Family
ID=44640734
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2006766A NL2006766C2 (en) | 2011-05-11 | 2011-05-11 | Quantitative examination of counterfeits. |
Country Status (1)
Country | Link |
---|---|
NL (1) | NL2006766C2 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0537513A1 (en) * | 1991-10-15 | 1993-04-21 | URMET S.p.A. Costruzioni Elettro-Telefoniche | Device for validating banknotes |
US5757001A (en) * | 1996-05-01 | 1998-05-26 | The Regents Of The University Of Calif. | Detection of counterfeit currency |
DE10029051A1 (en) * | 2000-06-13 | 2001-12-20 | Giesecke & Devrient Gmbh | Method for testing the validity of documents, such as banknotes, by testing the documents for two or more authenticity criteria and classifying the documents according to the criteria they fulfill |
-
2011
- 2011-05-11 NL NL2006766A patent/NL2006766C2/en not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0537513A1 (en) * | 1991-10-15 | 1993-04-21 | URMET S.p.A. Costruzioni Elettro-Telefoniche | Device for validating banknotes |
US5757001A (en) * | 1996-05-01 | 1998-05-26 | The Regents Of The University Of Calif. | Detection of counterfeit currency |
DE10029051A1 (en) * | 2000-06-13 | 2001-12-20 | Giesecke & Devrient Gmbh | Method for testing the validity of documents, such as banknotes, by testing the documents for two or more authenticity criteria and classifying the documents according to the criteria they fulfill |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1490828B1 (en) | Currency verification | |
CN101583979B (en) | Method for identifying soiling and/or colour fading in the region of colour transitions on documents of value, and means for carrying out the method | |
KR101297702B1 (en) | Improved fake currency detector using integrated transmission and reflective spectral response | |
US20050100204A1 (en) | Method and apparatus for detecting fluorescent particles contained in a substrate | |
Jung et al. | A new methodology for detection of counterfeit Viagra® and Cialis® tablets by image processing and statistical analysis | |
AU2011257540B2 (en) | Device for testing the authenticity of valuable documents | |
BRPI0620308A2 (en) | image processing of media items before validation | |
RU2438182C1 (en) | Method of processing banknotes (versions) | |
GB2355522A (en) | Improvements in verifying printed security substrates | |
RU2562758C2 (en) | Method and apparatus for determining reference data set of class for classification of valuable documents | |
KR100881230B1 (en) | High-precision forgery discrimination system using stereo image | |
WO2011036748A1 (en) | Paper sheet identification device and paper sheet identification method | |
AU2003204290B2 (en) | Currency validator | |
del Hoyo-Meléndez et al. | A multi-technique approach for detecting and evaluating material inconsistencies in historical banknotes | |
KR101076322B1 (en) | Method for discriminating the authenticity of paper money by using a contact image sensor | |
Lamsal et al. | Counterfeit paper banknote identification based on color and texture | |
NL2006766C2 (en) | Quantitative examination of counterfeits. | |
CN102214305A (en) | Method for taking evidence for source of printing paper sheet by using grain characteristic | |
CN105556576B (en) | It verifies the method for the valuable document with polymeric substrates and transparent window and implements the equipment of the method | |
KR101117359B1 (en) | Apparatus and method for medium recognition | |
Halder et al. | Analysis of fluorescent paper pulps for detecting counterfeit Indian paper money | |
US20090074229A1 (en) | Device and method for the visual representation of measured values | |
KR101020583B1 (en) | Hologram optical inspection system | |
US11941901B2 (en) | Smartphone or tablet comprising a device for generating a digital identifier of a copy, including at least one print image of a printed product produced in a production system, and method for using this device | |
US8474592B2 (en) | Currency discrimination |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM | Lapsed because of non-payment of the annual fee |
Effective date: 20200601 |