New methods and apparatus for authenticating security documents such as banknotes, passports, etc. which may be printed on any support, including transparent synthetic materials and traditional opaque materials such as paper. The invention is based on moire patterns occuring between superposed dot-screens. By using a specially designed basic screen and master screen, where at least the basic screen is comprised in the document, a moire intensity profile of a chosen shape becomes visible in their superposition, thereby allowing the authentication of the document. If a microlens array is used as a master screen, the document comprising the basic screen may be printed on an opaque reflective support, thereby enabling the visualization of the m...
International audienceThis chapter provides a brief overview of the different approaches to document...
ABSTRACT We present a novel solution for authenticating printed paper documents by utilizing the inh...
This is new authentication scheme based on the secret sharing method with a data repair capability f...
New methods and apparatus for authenticating security documents such as banknotes, passports, etc. w...
This invention discloses new methods, security devices and apparatuses for authenticating documents ...
The present invention relies on the moiré patterns generated when superposing a base layer made of b...
The development of plastic card printers has led to the widespread use of identity documents printed...
An authentication method for grayscale document images, based on the secret sharing technique with a...
In this paper, we examine the problem of authenticating paper media using the unique fibre structure...
The present invention discloses methods and systems for printing by superposing a metallic ink and t...
Today, document counterfeiting is a global menace because of the advanced technologies available at ...
The use of image based information exchange has grown rapidly over the years in terms of both e-to-e...
[[abstract]]As the developments of the information technology and duplication devices, it is easy to...
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and...
Abstract- With fast advance digital technology image processing is fastest and secure area of resear...
International audienceThis chapter provides a brief overview of the different approaches to document...
ABSTRACT We present a novel solution for authenticating printed paper documents by utilizing the inh...
This is new authentication scheme based on the secret sharing method with a data repair capability f...
New methods and apparatus for authenticating security documents such as banknotes, passports, etc. w...
This invention discloses new methods, security devices and apparatuses for authenticating documents ...
The present invention relies on the moiré patterns generated when superposing a base layer made of b...
The development of plastic card printers has led to the widespread use of identity documents printed...
An authentication method for grayscale document images, based on the secret sharing technique with a...
In this paper, we examine the problem of authenticating paper media using the unique fibre structure...
The present invention discloses methods and systems for printing by superposing a metallic ink and t...
Today, document counterfeiting is a global menace because of the advanced technologies available at ...
The use of image based information exchange has grown rapidly over the years in terms of both e-to-e...
[[abstract]]As the developments of the information technology and duplication devices, it is easy to...
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and...
Abstract- With fast advance digital technology image processing is fastest and secure area of resear...
International audienceThis chapter provides a brief overview of the different approaches to document...
ABSTRACT We present a novel solution for authenticating printed paper documents by utilizing the inh...
This is new authentication scheme based on the secret sharing method with a data repair capability f...