The present invention concerns the field of tacking and authenticating genuine products such as tablets or pills manufactured by compressing powder.
Most of the tablets used in the pharmaceutical industry are manufactured by compressing powder between a so-called punch and a die. The recognition of the medication is mainly based on the package, once the tablet is removed from the blister, it is very difficult to known exactly which medication is contained in the tablet. A first solution is to shape the punch or the die so that a recognizable visual element helps the user to recognize the name of the medication. Since the surface is small, the visual element is limited to generally one character.
Another solution is to apply a reference on the tablet by an edible ink. This solution is used on tablet having a coating.
It has been noticed that the counterfeited tablets or pills contain also such recognizable pattern. Those patterns are no deterrent for the counterfeiters and in fact serve only the medical people dealing of a lot of different tablets so that they do not mix two medications.
The purpose of this invention is to provide a method to recognize tablets or pills by authenticate elements, those elements being very difficult to reproduce for the counterfeiters.
Accordingly, the present invention proposes a method to authenticate genuine tablets manufactured by compressing powder between a punch/die set comprising the steps of:
at an initial stage:
And at a later stage:
This invention describes methods for obtaining tablets/pills having a surface featuring microstructures that can be automatically recognized by software processing of the digital image of the surface. A given microstructure is obtained on the tablet surface by modifying the punch tool. Therefore, the invention focuses on two particular sets of methods: methods for designing the punch tool and methods for automatically recognizing the fingerprint image. Although the rest of the invention focuses on the punch, exactly the same concepts described hereafter also apply to the die, or in a combination in which the modifications are applied to the punch and to the die. The reference image will be taken on the surface of the tablet for which the tool contains microstructure. In case that the punch and the die contains microstructure, two reference images will be stored in relation of the manufacturing process obtains by this tool.
The present invention will be better understood thanks to the attached figures in which:
The manufacturing process must be designed in such a way that each tablet (in this document we mainly use the word tablet/tables, however, it is a placeholder for any similar item, such as pills, etc) features a microstructure with the following properties:
For the remaining part of the description, the term “reference image” refers to the image of the tablet acquired at the manufacturing stage. The term “test image” refers to the image acquired in the field, when a tablet should be authenticated.
The various parameters characterizing the manufacturing and composition of the tablet have an influence over the reproduction of the random structure obtained by the punch surface.
For instance, the average grain size of the powder can be related to the highest frequency of the noise structure that can be obtained. In addition, the manufacturing process by itself may not reproduce exactly the original noise texture of the punch, depending on the sticking coefficient of the powder.
Moreover, several other stages of the manufacturing process may also degrade the detectability of the microstructure. This is for instance the case for the process of tablet coating, during which a layer is applied around the tablet. This layer may alter the image of the microstructure as it can flatten it and add some random noise on each tablet.
Therefore, depending on the thickness of the coating, the defects of the microstructure have to be larger, so that the microstructure can still be recognized through the coating. The coating process itself, during which tablets collide between them can also mechanically modify this microstructure, alter the image and add some random noise to each tablet. For this reason the reference image can be acquired before the coating process instead of after, in order to obtain a basis, which is common to all the coated tablets, damaged or not.
Finally, handling and image acquisition also introduce alterations (for instance, the tablet is not flat in most of the cases which impacts on the quality of the digital image of the tablet surface). One solution is to take into account the depth of field of the acquisition device, which has to be such that the microstructure can still be detected even if the surface of the tablet is not flat. Another solution is to use only part of the tablet as a reference and as a test image, this part being as flat as possible.
Since the core idea of the whole approach consists in leaving, as much as possible, the tablet manufacturing process unchanged, it is necessary to apply specific strategies in order to compensate the effect of those alterations on the fingerprint detectability and on the manufacturing of the punch die set. There are basically two different kinds of strategies: optimization of the punch/die design and optimization of the detection algorithm.
Tablets punch/die sets are typically made of metallic alloys which shape is obtained usually using machining or electro-erosion, but other techniques like molding, laser, plasma, arc, drilling, oxy-fuel, hydro abrasion, chemical etching can also be used. The goal of the design techniques described below is to obtain a punch with some specific microstructure properties.
It should be noted that other definition of the surface microstructure can also be described using other parameters like maximum valley depth, maximum peak height, skewness, kurtosis, etc. . . . and the current invention is not limited to one specific measurement technique.
In order to obtain such noisy surface on the punch/die, the following techniques can be used:
The various properties of the tablet powder and the whole tablet manufacturing process may substantially impact the detectability of the fingerprint. For instance, a powder made of large rounded grains will typically have less high-frequency details than a powder made of small grains. The same applies for the chemical properties of the powder, the shape of the tablet, the kind of metal coatings used for the punch, the pressure applied, etc. Since punch tools must be manufactured for each type of tablet to be protected, it is useful to define a methodology enabling to quickly and efficiently define the optimal parameters used to create the punch (types of machining process, size of the grains of the fingerprint created on the punch, etc). As an example
Typically, the microstructure of the punch should be designed such that the powder follows the microstructure. In order to obtain accurate images of the microstructure, the average size of the defects creating the microstructure is most of the time between 5 to 20 um.
The optimization of the punch design consists in defining the best parameters for creating the noisy/grainy texture of the punch such that final tablet can be easily detected after that all the finishing process is completed. This finishing process introduces many alterations to the surface microstructure which decreases the detectability (for instance—but not limited to—powder characteristics, coating parameters, etc). One solution consists in optimizing the punch design such that those alterations will have a minor impact on the detectability. Two different approaches can be considered in the optimization of the punch: alteration compensations based on analysis in the frequency domain and alteration prevention based on particular design strategies of the punch.
The above-mentioned optimization techniques rely on the following methodology:
This methodology is schematically described in
The imaging process consists in creating a digital image of the surface of the microstructure of the punch or of the tablet. These images are used for two different processes:
The described invention relies on the capability of an imaging device to digitally record the imperfections, defects, micro-accidents or irregularities of a tablet surface. It is therefore critical to understand how such measurement can be obtained with an imaging device. Basically, two effects are used to measure the shape of the surface, shadows and specular reflections. The
In all configurations, the measured light intensity is related to the angle of the reflector and therefore the obtained image characterizes the shape of the examined surface.
Finally, although it was shown that there is a relation between the obtained digital image and the micro-topography of the sample, it is important to understand that some factors can seriously disturb this relation. For instance, if two pictures of the same tablet (or the reference tablet and the test tablet) are taken with the incident light coming from two different directions, the obtained images will be significantly different. Ideally, there should not be any differences since the micro-topology of a tablet does obviously not depend on the illumination system. This is for instance the case of digital scanners where the angle of the incident light will depend on the rotation angle of the tablet on the scanner. One solution consists in trying to infer the shape of the surface knowing the incident light angle using so-called shape from shading techniques. Such techniques take as input one or several digital images of the sample and compute the elevation map of the sample.
One of the imaging devices combining both a large availability on the market and a good imaging performance is the document scanner. Indeed, off-the-shelf scanners typically feature 1200 dpi to 2400 dpi optical resolution which is enough to resolve details of 20 to 10 micrometers. Moreover, it is also possible to use low resolution scans in order to determine where the tablet is on the scanner before performing a high resolution scan of this area. Finally, it should be noted that scanners work by measuring the diffuse reflectivity.
The aforementioned scanners can be characterized by the fact their principle is based on the motion of a 1D CCD (charge coupled device) over the area to be imaged (see
Microscopes: Optical microscopes can be equipped with a 2D CCD in order to obtain a digital image of the observed area (
Digital cameras: Resolution of recent digital cameras in the consumer market combined with Macro mode enable to reach effective resolution well over 600 dpi. It is therefore possible to use such devices for fingerprint applications. Since the device is hand held, and since there is typically no physical contact between the camera and the sample, the positioning (distance between camera an object) and orientation (angle between sample surface and camera) is subject to a high degree of variability between successive test images. Moreover, the lighting is less controlled compared to the lighting obtained with microscopes and documents scanners. For all these reasons, digital camera is an acquisition device that is complex to use for fingerprinting applications. However, despite these difficulties, it remains a very interesting device since many mobile phones are equipped with such cameras. This enables in particular to provide in one unique device the 3 following functionalities:
Image capture: The image can be captured using the camera of the mobile phone. In order sufficiently high resolution, a macro mode and an autofocus are typically required. Moreover, many mobile phones also include flash illumination, which is often required in order to obtain sharp images.
Image upload: The captured image can be uploaded to a dedicated server (by MMS or email attachment for instance). This server will contain the reference images of all set of punch/die set used to produce the tablet. Non only the punch/die set currently used for the production are stored but also the punch/die set that was used before and replaced by a new punch/die set. Each time a new punch/die set is installed on the production device, a new reference image (or images is both faces are taken into consideration) is stored into the database of the server. In order to limit the comparison process between the test image and the reference images, the user can input a medication name (or identifier of the medication) of the tablet he supposes to have. The comparison will then executed with the reference images for that medication only which are related to the identifier.
Detection result display: The server can send back the result of the microstructure analysis and display it (SMS or email by instance) or even play specific audio signals or ring tones (using ring-tone associated with specific number, MMS or audio email attachment for instance).
It is possible to design specific acquisition devices in order to optimally image the surface of a pill. In particular a tailored made design enable to overcome many of the issues encountered with off-the-shelf acquisition devices:
Stability and Angular Orientation
Many imaging system listed above will not lead to reproducible results because the tablet is not flat. Indeed, put on a digital scanner a rounded table may tilt slightly between two different imaging sessions, or even slightly move during the imaging process itself. A custom device can stability the tablet, accounting for its particular shape. For instance a system with a hole smaller then the tablet diameter (possibly vibrating) will lead to a reproducible positioning (as shown in
Distance Between CCD and Microstructure Surface
Document scanners enable to reliably ensure that the distance between fingerprint surface and CCD will remain constant between several acquisitions. Unfortunately, documents scanner do not provide uniform imaging result across the scanning area (lighting is different between the center and the borders of the scanning window, also when objects are not flat they are some distortions which are different between the center and the borders of the scanning window). A dedicated system can be built such that the distance between CCD and microstructure area is constant between successive snapshots (as shown in
Location of Imaged Area
It is critical to always image the same area of the tablet. This is a task which is challenging with non-specific devices. One solution consists in having a centering mechanism that ensures that the snapshot will always be taken at the same location on the tablet. For instance, a vibrating system (electro-mechanical) can automatically center the sample. In
Illumination
In order to obtain a reproducible lighting of the sample, any unwanted source of light should be discarded. A closed device with a strong internal illumination system enables to efficiently prevent contamination by uncontrolled and external light sources. In
Depth of Field
If a sample is not totally flat and if the depth of field of the imaging system is small, then it might not possible to obtain the focus on the entire imaged area. One solution consists in using an optical system with a small aperture (larger F-stop number) and increasing consequently exposure time or lighting intensity.
This device could interface with a computer using for instance USB connection, in order to easily control imaging process, lighting and even other positioning functions (like centering for instance).
The authentication process consists in comparing an acquired image (test image) of the tablet with a reference image (of the punch or of the tablet). This comparison is performed by digitally computing a value expressing how similar or different are these two digital images (so-called hereafter a similarity measurement). The most straightforward approach consists in computing the mathematical distance between those images, for instance the Mean Square Error. However, in practice in many cases such an approach would fail because it requires a perfect spatial registration of the compared images. Another approach which is more tolerant to errors in the relative positions of both images consists in computing the cross-correlation between the images and measuring, for instance, the signal to noise ratio of the cross-correlation peak (but any other scalar metric of the cross-correlation image can also work, like 1st to 2nd peak ratios, maximum to standard deviation ratios, etc). Three different metrics are explained below and can be used independently or in association for the similarity assessment.
The first metric consists in computing the mean value, the max value and the standard deviation of the cross-correlation image. Then the following formula is used dividing the difference between the max and mean value by the standard deviation
The second metric consists in computing the list of the peaks in the image and then dividing the difference between the first peak and the median peak by the difference between the second peak (which is basically noise) and the median peak as in the following formula. A peak in the cross-correlation image is a position which value is higher than all its neighbors.
The third metric consists in taking the ratio of the max value by the mean value in a normalized picture as in the following formula:
This approach will however not work if one of the images is rotated, stretched or more generally suffered from any geometrical transform which is different from a pure translation. More generally those approaches can still work assuming that a way is respectively found for finding the translation and the geometrical alterations between the images, and compensate for those differences before measuring the differences between the images. Finding translation can be accomplished by detecting the contours of the tablets or cross-correlating with a reference image (for instance the logo of the brand engraved in the punch). Finding generalized geometrical transform between images is challenging problem. Typically, an approach consists in identifying several features points and using this information to compute the compensated image. Such feature points can be purposely included on the punch design but it is also possible to use logo or text or any macroscopic identifier on the punch for the same purpose. In particular, if the set of possible transformations is only limited to rotation, the analysis of the Fourier transform of the image is sufficient to compute the rotation angle.
Finally, another approach consists in using a similarity measurement that is not sensitive to geometrical differences (this is the same type of strategy as shown above with the cross-correlation which is not sensitive to translation differences). In the particular case where only rotation differences are considered, one approach consists in unwarping the acquired image as shown in
This image is invariant to rotation, translation and scale.
Yet another solution for compensating for rotation consists in using a 1D signal a( ) constructed according to the following formula:
α(θ)=∫θRl(r,θ),dr
Where l( ) is the grayscale intensity of the tablet image (or a flattened version of it) at the location defined in polar coordinates by the distance to the center of the tablet r and an angle ( ) and R is the tablet diameter. Doing this for the reference image creates a reference 1D signal. It then possible for any tablet to compute its 1D signal a′( ) and cross-correlate a( ) and a′( ) to quickly find the rotation angle. Indeed if the tablet comes from the same punch as the reference signal, then the maximum of the cross-correlation signal (as a function of θ) corresponds to the rotation angle difference between the reference and the tested tablet. The tested tablet image can then be rotated by this angle prior to the measure of similarity computation. An absence of cross-correlation peak as a function of θ indicates that the tested tablet does come from a different punch than the reference tablet(s). It should be noted that the same approach can be used by replacing l( ) by the modulus of the Fourier transform of the tablet image.
The various similarity measurements approaches, depending of the types of registration differences, are synthetically summarized in the table below:
Finally, an effective approach consists in a more brute force approach where different geometrical compensations are iteratively tested in order to minimize the differences between images. Although, such approach can potentially lead to compute extremely large sets of transformations, it is possible to greatly reduce the number of combinations to be tested in some cases. First, using cross-correlation will enable to avoid compensating for the translation. Second, for some imaging devices like digital scanners, it can be assumed that there is no scale or stretching differences between the images. In such case, it is only needed to find the rotation angle, and therefore iteratively test for instance 360 degrees and find the best match. The steps of rotation can be computed knowing the robustness to rotation, as described in
It has to be noted that if the tablet contains a macroscopic identifier, this identifier can be used to retrieve the rotation angle of the test image and therefore rotate the test image so that the rotation angle is compensated.
If the macroscopic identifier is used as an authentication feature, different methods can be used to authenticate the tablet. Different macroscopic identifiers can be taken into account: printing on the tablet, shape of the tablet, engraved shape in the tablet. The shades that will be induced by the lighting system of the acquisition device have to be taken into account when performing the authentication. There is also the possibility to use these shades to create a 3D profile of the tablet. A possibility is to create the 3D profile of the reference using 1 or more tablet to using the shades induced by the lighting system of the acquisition device. In case a macroscopic identifier is used as an authentication feature, the number of reference images is greatly reduced. In fact, the reference image corresponds to the image of a tablet featuring the macroscopic identifier. Only 1 image has to be taken for all the genuine punch die sets featuring the same macroscopic identifier. The comparison between the reference and the test image is performed using Mean Square Error. However any other similarity measurement can be used. The morphology of the differences has to be taken into account. In fact, many small differences can be due to the punch die set and the various processes that are applied to the image, whereas one big difference is likely due to a counterfeiter.
All the above described approach assumes that one single similarity measurement is sufficient for the authentication process. It should be noted that the robustness of this similarity measurement can be greatly enhanced by using several similarity measurements with different level of zooms, with the two sides of the tablets, with pictures acquired from different view angle or with different lighting angles.
As the number of reference images can rapidly increase (between 40 and 60 punch/die set in a single compression machine), especially if the brute force method is used, it is interesting to use a multi-resolution approach to rapidly select a set of references for a possible match. Various methods are described below:
A possibility to speed up the detection process is to perform the comparison for images of smaller size to make a first step and then compare only smaller sets of bigger images. For instance if the image size is 1024×1024 and if there are 10,000,000 items in the database of the server, performing all cross-correlations with all references may take a significant amount of time (up to 1 hour in some cases). A detection strategy consists in performing the detection in several stages.
There are different possibilities to obtain a set of smaller images. It is possible to use cropped versions of the references, quantized versions of the references or downsampled versions of the references. Downsampling is preferred instead of cropping. First, downsampling is more resistant in case of dust or other small variations on the image; second, as the positioning is very precise, cropping can lead to the test image and reference image to be completely misaligned. This will not be the case with downsampling. A first stage is performed with downsampled versions of the test and reference images and then the next stage uses larger versions of the tests and references. In a preferred embodiment, the downsampling of the reference image(s) is executed once while the reference image is acquired. The downsampled version of the reference image is stored in the server's database. This approach is illustrated by diagram of
A practical example is given in order to illustrate this process. In an experiment n=3 and x=10 were used for cross-correlations of X0=10,000,000 references with a test image. The following number of candidates was then obtained: X12=112539, X22=1234, X32=2, X42=1, X52=1.
Depending on noise characteristics, downsampling down to 8×8 images size can easily be reached.
If the correlation is done in the Fourier domain, the coefficients can be stored in a database in an efficient way. It is generally admitted that downsampling an image in the spatial domain will result in a crop in the Fourier domain. Therefore only the coefficients of set Sx are stored in the database. Then for the matching of sets S0 to Sx−1, only some of the coefficients are retrieved from the database. To be accessed efficiently they are split between the different columns. The coefficients for the 2n×2n images can be stored in one column. Then, instead of storing all the coefficients of the 2n+1×2n+1 images, only the remaining ones up to this size can be stored in the next column. The coefficients that are stored in each column 491 of the database table 493 are represented by the black area on
A speed up can also be obtained by using a theory based on Bayes probabilities. The notations are the same as those of
P(G|SNRi>ti+1)=a
i=0, . . . , x−1 Equation 1
It can be stated that if the SNR is some fraction lambda between ti+1 and ti+2, then the probability for the image to be already recorded is b and b>a. This is modeled by Equation 2.
P(G|SNRi>ti+1+λ(ti+2−ti+1))=b
b>a,
i=0, . . . x−1
λε[0,1] Equation 2
All the following assumptions are formulated:
P(G|SNRi>ti+1)=aP(G|SNRi+j>ti+j)=bP(G)=c
i=0, . . . , x−1
j>0|i+j≦x
0≦a≦b≦c≦1 Equation 3
P(G|SNRi<ti+1)=0
i=0, . . . , x−1 Equation 4
P(G|SNRx>tx+1)=1 Equation 5
The speed up can be obtained the following way. First all the items of set S0 are correlated together. For each item, if the probability to be genuine is below a, the item is discarded. If it is between a and b, it is put in a set of possible match to be correlated in S1 as for the decision tree algorithm. If the probability to be genuine is more than b, then the picture is directly correlated at higher sizes up to size 2n+x+2n+x. If it is the good match, the algorithm stops. Else it continues to correlate references of set S0, until all have been correlated. Then if the match is still not found the same algorithm is applied for the following sets S1 up to Sx.
This method is a hybrid one between Decision tree and Bayes networks. The notations are those of
So sets can be created by taking into account the references with highest ranks.
x is the number of sets, as shown in
p is the current set used for cross-correlation.
i is the current iteration
C′ixp is the number of references to take at iteration i from set p, for the next set p+1.
The C′ixp best references are taken at each step. In fact as some of the best references have already been correlated during the preceding iteration, there is no need to correlate them again. Cixp is bigger for smaller size images than for the bigger ones. If after one iteration, the good match is not found, all the Cixp are increased until the good match is found or until a decision is taken that the image is not in the database. As the size of the image has a geometrical growth, the set of remaining references at each set should also follow a geometric law. The idea is to have an increasing common ratio for the geometric progression. Two things are important with this method: the stop criterion as well as the increasing law of the common ratio of the geometrical progression. A geometrical law can be chosen to increase the common ratio of the geometrical progression. The stop criterion is chosen so that the application stops before correlating all the references with a size of 2n+1×2n+1. In fact it is assumed that, if all the references of size 2n+1×2n+1 are correlated, there was no need to use the references of size 2n×2n. More precisely the Cixp are computed as in Equation 6 until i<j. The first line computes the number of references to take at each step. It corresponds to the number of references as computed in the second line minus the references that have already been taken in the preceding iterations. The second line computes the geometrical progression with a common ratio of a. The power corresponds to the iteration number (i) as well as the number of set (x) and the current size (p). The third line simply formulates that at the first iteration no references have already been correlated, therefore the number computed by the second line should be taken into account. The fourth line represents the stop criterion. It tells that the algorithm should stop if S1≧S0.
C′
ixp
=C
ixp
−C
(i−1)xp
C
ixp
=a
i(x−p)
C′0xp=C0xp
i=0, . . . j,j|Cjx1≦Card(S0) Equation 6
For example if a=2 and x=5, the following number of references Cixp should be taken at each step. Each row is representing an iteration i. The columns represent index of the set of images. It should be remarked that the last column always contains only one reference, as only one match can be found. In the first row, at i=0, only the best reference is correlated. In the next row, at i=1, 32 references from S0 are taken to correlate in set S1. It can be remarked that the number of reference taken from S0 is growing rapidly. The coverage of the database can be seen in
This theory is based on the transitivity of the correlation. It is true that if an image A correlates completely with an image B and if the image B correlates completely with an image C, then A correlates completely with C. But, if an image A doesn't correlate with an image B and if the image B doesn't correlate with an image C, then nothing can be told about the correlation of A and C. The question is then if A correlates to some degree with B and B correlates to some degree with C, what can be told about the correlation of A and C? It can be assumed that the highest the degree of correlation of A and B and of B and C, the highest the probability that A and C also correlate. Therefore, the goal is to compute subset of references that are well correlating together. Then, for the images of group S0 from
Another method to reduce the number of references is to select only the reference images corresponding to the same type of tablet than the one to authenticate, for example by using the brand of the tablet.
Before applying the comparison algorithm, it is possible to make the pictures easier to compare by applying a so called flattening process. The goal of this process is to highlight the structure of the tablets to accurately compare them. There are many possibilities to perform this flattening process:
Number | Date | Country | Kind |
---|---|---|---|
08172867.7 | Dec 2008 | EP | regional |
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/EP2009/067724 | 12/22/2009 | WO | 00 | 6/23/2011 |