Reference is made to commonly-assigned U.S. patent application Ser. No. 13/094,931 (now U.S. Publication No. 2012/0275639), filed Apr. 27, 2011, entitled IMAGE ALGORITHMS TO REJECT UNDESIRED IMAGE FEATURES, by Widzinski et al.; and U.S. patent application Ser. No. 13/094,920 (now U.S. Publication No. 2012/0274467), filed Apr. 27, 2011 , entitled DEACTIVATION OF A SECURITY FEATURE, by Pawlik et al.; the disclosures of which are incorporated herein.
This invention generally relates to security marker authentication and specifically to security markers applied at very low levels.
If goods are not genuine, then product counterfeiting has occurred. If goods have been diverted from their intended channel of commerce, then the goods have been subject to product diversion.
Product counterfeiting occurs on artworks, CDs, DVDs, software recorded on CDs, fragrances, designer clothes, handbags, briefcases, automobile and airplane parts, securities, identification cards (driver's licenses, passports, visas, green cards), credit cards, smart cards, and pharmaceuticals. According to the World Health Organization, more than 7% of the world's pharmaceuticals are counterfeit. This percentage is higher in some countries, such as Colombia, where up to 40% of all medications are believed to be counterfeit. Until recently, the percentage of unauthorized medications in the United States has been virtually negligible due to a tightly controlled regulatory system that has made it extraordinarily difficult for counterfeiters to sell or distribute counterfeit medications. However, the recent explosion of internet drug sales from other countries and increasingly sophisticated counterfeiting techniques have substantially increased the amount of fraudulent drugs entering the United States.
Product diversion has also occurred on many of the aforementioned goods. Such diversion could result in the distribution and sale of goods which do not comply with the product specifications required in the markets where they are sold. For example, motorcycles intended to be sold without catalytic converters in a region with lower air pollution standards might be diverted to a region which does require such catalytic converters. Other negative effects include price inequities in certain markets, loss of exclusivity by some manufacturers or distributors, and damage to the goodwill, patent rights, and trademark rights of the manufacturer. Such diverted goods are sometimes referred to as “gray market” goods. Since the goods are genuine, it is sometimes difficult to determine whether the goods have been improperly diverted. This is especially true for a variety of goods such as, for example clothing, pharmaceuticals, and cosmetics.
The application of security markers to an object or product for authenticating the origin and intended market of the object product are known in the prior art. These security markers can be incorporated into components which make up the object or can be incorporated into papers, inks or varnishes that are applied to the object or labels affixed to the object or packaging for the object. The presence of security markers verifies the authentic origin of the object and is verified by means suited to the particular nature of the marker.
Non-destructive detection of security markers via characteristic emission capture on an image sensor during or following marker excitation is also known in the prior art. While marker-detector systems work well for these purposes, alternate marker materials applied with different detection modes may emit low intensity radiation across a broad spectrum. When detecting intended markers at extremely low levels, cross talk from unintended markers with radically different emission profiles can be observed. Generally, these marker signatures are observed with localized areas of high density emission points. These features are used to discriminate intended from unintended marker signals. This radiation may appear as intended marker emission with regard to emission intensity. Generally, the interfering marker emission will differ from intended marker emission patterns with respect to spatial distribution.
Briefly, according to one aspect of the present invention a method for authenticating security markers includes capturing an image of a region of interest on a product with a camera; storing image data in a two-dimensional array on a microprocessor; counting a number of pixels at or above a predetermined brightness level in the image data with the microprocessor to determine a first score; establishing an area within the image; counting a number of pixels within the area to determine a second score; calculating a ratio of the second score to the first score; and if the ratio is above a predetermined threshold the security marker is authenticated.
A properly marked object will be able to provide emissions that are detected as small dots with relatively low spatial density and that are centered within an image window. A circle constructed of radius r with origin at the spatial center of the window will include a majority of marker emission pixels. If the illuminated pixels are summed within this described circle, and then compared to the sum of illuminated pixels in the entire frame, a score ratio will result. Finally, this ratio is compared to a previously determined value. Ratios above the previously determined value will indicate a pass.
A failing condition is typically encountered when a high spatial density extraneous marker signal is encountered in the periphery of the detection window, that is, outside the circle described by radius r, but within the image frame. In this case, the ratio of summed marker signal pixels inside the circle as compared to the entire frame will result in a value lower than the predetermined reference value. Any single criterion failure will result in global rejection of the object under scrutiny.
The invention and its objects and advantages will become more apparent in the detailed description of the preferred embodiment presented below.
The present invention will be directed in particular to elements forming part of, or in cooperation more directly with the apparatus in accordance with the present invention. It is to be understood that elements not specifically shown or described may take various forms well known to those skilled in the art.
Referring now to
Referring now to
Reference values for final comparison are preferably greater than 40%. Calculated values lower than 40% result in failure. This test of authenticity is one of several. Failure of any individual test will result in a global fail condition.
All image acquisitions, processing, comparisons and status indications are conducted and indicated within the handheld reading device illustrated in
The invention has been described in detail with particular reference to certain preferred embodiments thereof, but it will be understood that variations and modifications can be effected within the scope of the invention.
Number | Name | Date | Kind |
---|---|---|---|
20030116747 | Lem et al. | Jun 2003 | A1 |
20040000998 | Karp | Jan 2004 | A1 |
20070023521 | Wildey et al. | Feb 2007 | A1 |
20080181447 | Adams et al. | Jul 2008 | A1 |
20090218401 | Moran et al. | Sep 2009 | A1 |
20100025476 | Widzinski, Jr. et al. | Feb 2010 | A1 |
20100052308 | Balinsky et al. | Mar 2010 | A1 |
20100155679 | Olm et al. | Jun 2010 | A1 |
20120202022 | Schulze-Hagenest | Aug 2012 | A1 |
Number | Date | Country |
---|---|---|
WO 0250790 | Jun 2002 | WO |
WO 2010071673 | Jun 2010 | WO |
Entry |
---|
“Image Analysis and Mathematical Morphology” vol. 1 by Serra from Academic Press, Inc., 1982, pp. 43-49 and 85-89. |
Number | Date | Country | |
---|---|---|---|
20120275640 A1 | Nov 2012 | US |