| CPC B42D 25/333 (2014.10) [G06T 5/50 (2013.01); G06T 7/13 (2017.01); G06V 30/414 (2022.01); G06T 2207/20221 (2013.01)] | 20 Claims |

|
1. A method comprising:
obtaining, using one or more processors, at least one image of a document, wherein valid instances of the document include at least a first three-dimensional security feature;
obtaining, using the one or more processors, a first image snippet from the document, the first image snippet corresponding to at least a first portion of the first three-dimensional security feature present in the valid instances of the document;
deriving, using the one or more processors, first dimensional data associated with the first image snippet;
analyzing, using the one or more processors, the first dimensional data to determine one or more of:
whether the first dimensional data is consistent with a presence of the first three-dimensional security feature, and
whether the first dimensional data is consistent with second dimensional data, wherein the second dimensional data corresponds to one of: a second portion of the first three-dimensional security feature in the valid instances of the document and at least a portion of a second three-dimensional security feature in the valid instances of the document; and
modifying, using one or more processors, a likelihood that the document under test is accepted as valid, or rejected as invalid, based on the analysis of the first dimensional data.
|