| CPC B42D 25/346 (2014.10) [G06T 1/20 (2013.01); G06T 7/13 (2017.01); G06T 7/62 (2017.01); G06V 20/95 (2022.01); G06V 30/22 (2022.01); G06T 2207/30176 (2013.01)] | 20 Claims |

|
1. A method comprising:
obtaining, using one or more processors, at least one image of a document, wherein valid instances of the document include at least one perforation-based three-dimensional security feature;
obtaining, using the one or more processors, a first image snippet from the document, the first image snippet corresponding to at least a first portion of the perforation-based three-dimensional security feature present in the valid instances of the document;
analyzing, using the one or more processors, a set of one or more characteristics of the perforation-based three-dimensional security feature; and
modifying, using one or more processors, a likelihood that the document is accepted as valid, or rejected as invalid, based on a presence, or an absence, of at least a first characteristic in the set of one or more characteristics.
|