Counterfeiting poses a serious problem to the pharmaceutical, cosmetics, electronics, software, automotive and aircraft industries, to name a few. Counterfeit products can lead to lost revenues, increased liability, and brand erosion. Product recalls due to counterfeit warnings can be expensive and disruptive.
Overt measures to deter counterfeiting include marking products with distinct colors and patterns, holograms, recto/verso registration, and visible watermarks. Covert measures include marking products with invisible marks and machine readable code, fluorescent and magnetic inks, hidden patterns, encrypted codes, radio frequency identification, engravements, and micro-displacement of glyphs.
Most of these measures add complexity or cost (or both) to product manufacture. In addition, detection can be difficult and slow. Detection using some of these measures involves specialized equipment.
An inexpensive anti-counterfeiting measure is desirable.
In certain situations, quick detection is essential. An inspector might have to enter a store and determine whether the goods being sold are counterfeit. If the inspector draws attention, his life could be at risk.
According to one aspect of the present invention, an article bears an HVS-perceivable security pattern based on metamerism. The metamerism causes the security pattern to be perceived differently when viewed under two different light sources.
According to another aspect of the present invention, a metamerism-based security pattern is viewed under one light source and then under a different light source. If the security pattern appears the same under both light sources, counterfeiting is suspected.
Other aspects and advantages of the present invention will become apparent from the following detailed description, taken in conjunction with the accompanying drawings, illustrating by way of example the principles of the present invention.
a is an illustration of the spectra of an exemplary unconventional light source.
b is an illustration of CIE standard illuminants A and D65.
a-9d are illustrations of different structures for security patterns in accordance with embodiments of the present invention.
As shown in the drawings for purposes of illustration, the present invention is embodied in security patterns based on metamerism. Metamerism refers to a property in which spectrally different color stimuli have the same tristimulus values. Metamerism occurs when two different points map into the same point in a three-dimensional hyperplane. A CIE metamerism index for change in illuminant may be defined as follows. The degree of metamerism M of two specimens that match in color under a given illuminant for a given reference observer is measured in terms of the color difference ΔE observed between the two specimens but under a different illuminant. For two specimens whose corresponding tristimulus values (X1=X2, Y1=Y2, Z1=Z2) are identical with respect to a reference illuminant and reference observer, the metamerism Mt index is set equal to the index of the color difference ΔE between the two specimens computed for test illuminant t. A detailed discussion of metamerism can be found in Wyszecki and Stiles, Color Science: Concepts and Methods, Quantitative Data and Formula, 2nd ed. New York: Wiley, 1982, pp. 183-221.
Metamerism-based security according to the present invention may include the use of metamers or paramers. Metamers are specimens having different spectral curves that produce exactly the same color sensation under the same illuminating and viewing conditions. Paramers are specimens having different spectral curves that produce approximately the same color sensation under the same illuminating and viewing conditions.
Reference is made to
The method includes designing a security pattern based on metamerism (block 110). The security pattern is perceivable by the human visual system (HVS), but the metamerism causes the security pattern to be perceived differently by the human visual system when the pattern is viewed under two different light sources. The security pattern may stand alone, or it may be integrated into a larger image. For example, the security pattern may be a logo, colored text on a colored background, or an ornamental pattern having two or more colors. Since metamerism can be extended to more than two stimuli, the security pattern may use multiple metamers or paramers. For the purposes herein, achromatic colors white, gray and black are considered to be colors. Several examples of metamerism-based security patterns are provided below.
The method further includes placing the security pattern on an article (block 120). For purposes herein, an article refers to the object being protected against counterfeiting, or the print medium associated with the object to be protected. Examples of the print medium include, without limitation, a package, box, crate, shipping container, pallet, substrate, wrapper, label, test strip, or package insert for the object to be protected. More than one metamerism-based security pattern may be placed on an article.
As a first example, a security pattern may be printed on the surface of an object such as a pill. As a second example, a security pattern may be printed on a textile item (e.g., a scarf, a bag). As a third example, a security pattern may be printed on a box for the object to be protected.
A metamerism-based security pattern may be placed on an article by a printing device that supports the use of metameric inks. Standard inks (e.g., CMYK) or custom color inks (e.g., red, orange, green, blue, violet) may be used. The printing device could be an inkjet printer, a digital printing press, a laserjet printer, a digital plotter, or any other digital device having a print engine. A printing device such as a mechanical printing press may even be used.
Other conventional security measures may be used to further enhance security. Examples of conventional measures include, without limitation, lot numbers, color coding, encoded bar codes, registration or placement encoding, microtext, distinct patterns, character sets, perforations, watermark, guilloches, and seals (e.g., holograms).
Reference is made to
Such counterfeiting protection is effective against counterfeiters who simply rely on a visual analysis of the article being counterfeited. Those counterfeiters will probably not detect the use of the metameric colors in the security pattern, and instead will use only a single color in the security pattern.
Such counterfeit protection is inexpensive. The security pattern can be applied during manufacture of the article.
Moreover, such counterfeit detection would allow an inspector to enter a store and quickly determine whether the objects within are counterfeit. If the inspector uses a small (e.g., pen-sized) light source as the second light source, the inspection can be performed without drawing attention.
In a first group of embodiments, metamerism is used to hide a portion of a security pattern. The security pattern uses colors that have different spectral power distributions but match under a reference light source. However, the colors do not match when viewed under a different light source.
In some embodiments of the first group, the security pattern may have a first portion superimposed over a second portion, where the first and second portions use colors having the same appearance under a light source, but have different spectral power curves. In other embodiments of the first group, the first and second portions may be adjacent. In yet other embodiments of the first group, the first and second portions may be spaced apart.
In some embodiments of the first group, one portion may use a spot color, while the other portion uses a process color. A spot color is printed with a single ink of that color. A process color is printed with a dither pattern of two or more fixed inks (e.g., cyan, magenta, yellow, and black). In other embodiments, different portions may use different process colors having the same appearance but have different spectral power curves. In still other embodiments, a single portion may use two colors having the same appearance but different spectral power curves. The security pattern may have additional colored portions having the same appearance but different spectral power curves.
Reference is now made to
The spot color is not limited to an achromatic color. As a first example, text printed with a spot color could be a color such as vivid blue. The background could be printed with a process color balanced with percentages of cyan, magenta and yellow under reference light source (e.g., a D65 light source). When viewed under the reference light source, the text will not be readable. When viewed under a different light source, however, the text will be readable.
Consider a different example, where the security pattern includes a first portion adjacent to a second portion. The first portion is printed with a process color such as light yellow. The second portion is printed with a more vivid yellow that is muted by adding a few cyan microdots. These two process colors might appear the same under a tungsten lamp, which has little power in the cyan region of the spectrum. However, the portion with the cyan microdots will appear greener in daylight or a fluorescent lamp, due to the peak reflectance in the cyan area.
The light sources will affect the degree of metamerism. The colors need not be metameric with respect to CIE standard illuminants, but instead can be metameric when viewed under certain unconventional light sources.
Reference is made to
Certain commercially available devices could be used as unconventional light sources. Examples of such devices include, but are not limited to, LCD displays in mobile devices such as mobile phones, digital cameras, PDAs, and laptop computers. Special unconventional light sources can be constructed from LEDs with peaked spectra that collectively emit a white light. For example, a key fob can be constructed with a cap filled with specific narrow band phosphor mixtures.
The use of unconventional light sources can increase the stealthiness of counterfeit detection. An inspector doesn't have to take a product out of its environment (e.g., take it out of a store). The inspector simply uses a seemingly ordinary device to expose the product to unconventional light.
The use of unconventional light sources increases the difficulty of defeating the counterfeit protection. In order to identify the illuminants, the counterfeiter would somehow have to obtain an inspector's light source and analyze it spectrally.
In a second group of embodiments, metamerism is used to hide details of a structure in a security pattern. The structure is printed with vivid colors, which exhibit strong metamerism because their spectra are more peaked. The structure does not create metamerism, only the colors create the metamerism. The details of the structure are HVS-perceivable when viewed under a first light source but not under a second light source. For example, the structure details are HVS-perceivable when viewed under a standard (e.g., D50) light source, but not HVS-perceivable when viewed under an unconventional light source. Counterfeit detection can be performed by observing whether the structure details are perceived under both light sources.
The two different light sources are not limited to a conventional light source and an unconventional light source. The two different light sources could be two different conventional light sources, or they could be two different unconventional light sources.
One type of structure is a checkerboard structure made up of two distinct colors that are metameric. The checkerboard structure has its own spectral distribution when its area is averaged. The average is different from the sum of the spectra of the inks because it is a non-linear combination of additive and subtractive effects. When the security pattern is viewed under the standard light source, the two colors do not match, so details (i.e., squares) of the checkerboard structure are perceived. When the security pattern is viewed under an unconventional light source, however, the colors appear to match, so the checkerboard structure details disappear.
The checkerboard structure may be printed with vivid colors that display high metamerism. However, the checkerboard structure is not so limited. Metameric checkerboard structures can be created with inks that by themselves are not metameric.
When used as a frame or matte, a checkerboard structure can create an optical illusion under certain lighting conditions. Counterfeit detection can be performed by observing the optical illusion (or lack thereof) rather than discerning the details of the checkerboard structure. Observing the optical illusion (or lack thereof) can be much faster than examining the structure details.
Reference is now made to
Reference is now made to
Structures other than the checkerboard structure may be used. Other exemplary structures are illustrated in
Reference is now made to
The digital printing press offers advantages over conventional ink-based printers. The digital printing press can print different content on each copy, which allows customized security patterns to be printed on different articles.
In other embodiments, the machine 610 can be a spooler. A spooler takes a print job from a workstation in one piece and then forwards it piece by piece to a printer as the printer is ready to accept input. The spooler can also perform imaging operations such as simplifying page descriptions. While processing a page to simplify the page description, the spooler can insert a security pattern on the page.
In other embodiments, the machine 610 could be a personal computer or workstation. The computer is used to add security patterns to images that will be printed by an ink-based printer. The computer and conventional ink-based printer could be used for small print runs.
In still other embodiments, the machine 610 could be an ink-based printer that has a built-in module for adding security patterns to articles being printed. The module could be made tamper-proof.
Reference is now made to
A security pattern is accessed (block 720). A previously created security pattern could be read from data storage, a security pattern could be created, a security pattern template could be accessed, etc. Colors for the security pattern still have to be selected.
To select the colors for the security pattern, the designer will first specify the light source where the object will be ordinarily located, as well as the light source that will be used for counterfeit detection (block 730). The latter light source might depend in part on how easily the object can be moved to a different light source. For example if the object is located in a store or warehouse, and it can be taken outside, the first light source might be the indoor lighting (e.g., fluorescent) in the store, and the second light source might be outdoor (ambient) lighting. If the object cannot be taken outside, but can be illuminated by a light source that is different than the ambient, the second light source will be that different light source.
The designer might specify unconventional light sources, which do not depend on where the object is located. For example, an inspector might be able to bring two different light sources into a warehouse (e.g., concealed as a pen fob) and expose the security pattern to those two different light source. This approach offers the advantage that the designer doesn't have to know the light source where the object will be located.
The designer will also specify the device that will be used to print the security patterns.
Pairs of colors for the security pattern are selected by mining the database (block 740). A software tool may be used to mine the database. An exemplary software tool compares pairs of measurement records in the database. For each record, the spectral data of the color patch is combined with the spectral data of each of the two light sources to compute the patch's colorimetric appearance under each light source. When a pair of patches has the same color appearance under one light source but a different color appearance under the other light source, a pair of metamers has been found and is added to a list of colors available to the designer to colorize the security mark.
The colors need not match exactly under the first light source. The human visual system's has a certain tolerance for distinguishing colors. The color difference should be below the threshold so the human visual system perceives the same color, even though the colors don't match exactly. Hence the allowance for paramers
An exemplary software tool could have a framework that is partitioned into two packages: a package on informatics algorithms and another package on color science algorithms. The informatics package could include algorithms and data structures for optimizing the color science computations.
The color science package may be designed in a layered architecture. A first layer may contain basic colorimetric enumerations, such as CIE illuminants and observers, densitometry standards, and instrument filters; common exceptions (e.g., the specification of a CIE illuminant that has not yet been implemented); psychophysics data standardized by the CIE; and persistent network storage through a database.
A second layer of the color science package may include basic color science concepts such as color term, color lexicon, color atlas, etc. A third layer of the color science package may define color model operators. These operators may be implemented as a hierarchical tree rooted in the generic color operator. These operators can be colorimetric or spectral. Some of the colorimetric operators may include device counts, cone sensitivities, CIE tristimulus, linear and non-linear colorimetric RGB spaces, and CIE based uniform color spaces (UCS, CIELAB).
A fourth layer of the color science package may include metrology models building on the color model operators. The color model operators are essentially color spaces. The metrology models describe the structure of the actual data in these color spaces, on which the color model operators operate. It uses persistent storage to store measurements, metadata and usage structure.
A fifth layer of the color science package may include higher functionalities such as readability of colored text, graphics and images on colored background, and metamerism and database mining. The fifth layer may also offer facilities like finding metamers and finding quadruplets of illuminant and object metamers.
The metamerism computations include applying the color model operators to the measurement records in the database. Then, color matches are determined. The data for the standard illuminants are in the first layer, as are the color matching functions that are used as coefficients for the operations in the third layer, for example the computation of tristimulus values from a spectral distribution. The metrology models in the fourth layer are used to access the spectral data of the ink patches and the unconventional light sources. It may be appreciated that for a sizeable database these computations are quite expensive; therefore, the package with algorithms and data structures is used, providing minimal computation times.
The software tool may be a standalone program or it may be integrated with a larger program (e.g., a graphical editor). The software tool may include a graphical editor for modifying or creating a security pattern.
Number | Name | Date | Kind |
---|---|---|---|
1612791 | Ames | Jan 1927 | A |
3752073 | Lorber | Aug 1973 | A |
4820163 | McCarty | Apr 1989 | A |
5473439 | Pappas | Dec 1995 | A |
5670005 | Look | Sep 1997 | A |
5995638 | Amidror | Nov 1999 | A |
6198545 | Ostromoukhov | Mar 2001 | B1 |
6249588 | Amidror | Jun 2001 | B1 |
6467810 | Taylor et al. | Oct 2002 | B2 |
6819775 | Amidror | Nov 2004 | B2 |
7090913 | Bourdelais et al. | Aug 2006 | B2 |
7180524 | Axelrod | Feb 2007 | B1 |
7246754 | Siuta et al. | Jul 2007 | B2 |
20020030360 | Herrmann | Mar 2002 | A1 |
20030021437 | Hersch | Jan 2003 | A1 |
20030026500 | Hersch | Feb 2003 | A1 |
20030043424 | Bhaskar | Mar 2003 | A1 |
20030161017 | Hudson | Aug 2003 | A1 |
20040076310 | Hersch | Apr 2004 | A1 |
20040233463 | Hersch | Nov 2004 | A1 |
20050052705 | Hersch | Mar 2005 | A1 |
20050067497 | Jones et al. | Mar 2005 | A1 |
20070110271 | Beretta | May 2007 | A1 |
20090027415 | Dispoto | Jan 2009 | A1 |
Number | Date | Country |
---|---|---|
1073257 | Jan 2001 | EP |
2838201 | Oct 2003 | FR |