This application discloses an invention that is related, generally and in various embodiments, to systems and methods for validating a security feature of an object.
Throughout the world, more and more security features are being added to objects such as currency, documents, product identification labels, etc. to guard against abuses such as counterfeiting, fraud, etc. To be most effective in preventing such abuses, it is important for each security feature to consistently meet a given quality standard. Therefore, for quality control purposes, it is important to be able to measure such security features at the point of production to ensure that the security features are correctly produced and meet or exceed the given quality standard.
In the printing industry, metallic or pearlescent inks are commonly utilized for providing a security feature of an object. Metallic or pearlescent inks have properties where their color and appearance change with the illumination angle. In general, most print measurement systems are unable to accurately and consistently determine the presence of the metallic or pearlescent inks because the systems only illuminate at a single illumination angle. Although instruments known as goniospectrophotometers are utilized to measure the average value of metallic or pearlescent pigments across a spot of an automotive finish, such spot measuring instruments are unable to effectively measure the complex patterns present in most security features.
In the printing industry, it is also common to utilize fluorescent materials or markings to provide a security feature of an object. When the fluorescent materials or markings are illuminated with UV light, the materials or markings emit light at a wavelength that is longer than the wavelength of the incident UV light. In general, most print measurement systems are unable to accurately and consistently determine the presence of the fluorescent materials or markings because the systems only illuminate with light in the visible spectrum.
In one general respect, this application discloses a method for validating a security feature of an object. According to various embodiments, the method comprises measuring spectral data of the object under a first illumination condition and a second illumination condition. The second illumination condition is different than the first illumination condition. The method also comprises determining a presence of the security feature based on the spectral data measured under each illumination condition, and comparing the security feature to a standard.
In another general respect, this application discloses a system for validating a security feature of an object. According to various embodiments, the system comprises at least two illumination sources, a line scanning spectrophotometer, a determination module for determining a presence of a security feature of the object, and a comparator module for comparing the security feature to a standard. Each illumination source is oriented at a different angle.
Aspects of the disclosed invention may be implemented by a computer system and/or by a computer program stored on a computer readable medium. The computer readable medium may comprise a disk, a device, and/or a propagated signal.
Other features and advantages will be apparent from the following description, including the drawings, and from the claims.
The figures and descriptions of the disclosed invention have been simplified to illustrate elements that are relevant for a clear understanding of the disclosed invention. It should be understood that the methods, products, and systems described below may include various other processes, components, and elements in actual implementation.
The method starts at block 12, where spectral data of the object is measured under at least two different illumination conditions. The measurements may be taken with any suitable measuring instrument. For example, the measurements may be taken with a line scanning spectrophotometer. A first illumination condition may comprise illuminating the object with a first line of collimated light at a first angle relative to an angle of detection. Similarly, a second illumination condition may comprise illuminating the object with a second line of collimated light at a second angle relative to the angle of detection, wherein the second angle is different than the first angle. For example, when light reflected from the object is measured at a detection angle normal to a surface of the object, the first angle may be 15 degrees off the detection angle, and the second angle may be 45 degrees off the detection angle.
According to various embodiments, a third illumination condition may comprise illuminating the object with a third line of collimated light at a third angle relative to an angle of detection, wherein the third angle is different than the first and second angles. For example, when light reflected from the object is measured at a detection angle 45 degrees off a normal of a surface of the object, the first angle may be 25 degrees off an opposing projection of the detection angle, the second angle may be 45 degrees off the opposing projection of the detection angle, and the third angle may be 75 degrees off the opposing projection of the detection angle.
According to various embodiments, at least one of the illumination conditions may comprise illuminating the object with a line of UV rich light. Illuminating the object with UV rich light allows for the measurement of any fluorescent content or markings. From the foregoing, one skilled in the art will appreciate that the object may be measured under any number of different illuminations conditions, and that any number of geometries (incident angle combinations relative to the detection angle) may be utilized.
From block 12, the method advances to block 14, where a presence of the security feature of the object is determined. The determination is based on the spectral data measured under each illumination condition. As metallic and pearlescent inks scatter or reorient light in ways that are very different from many materials such as, for example, paper, pigments, standard inks, etc., the pixels showing a color change over angle may be readily identified. Also, as fluorescent material or markings also re-emit incident light in a way that is very different from many materials, the pixels showing fluorescence may be readily identified. Therefore, the presence of the security feature may be determined by utilizing the pixel information of the image of the object to identify the presence of a metallic ink, a pearlescent ink, a fluorescent marking, etc. on the object or a fluorescent material in the object. Once all pixels showing fluorescence and/or color changes over angle are identified, the location, shape, color, pattern, etc. of the security feature may be determined. The presence of the security feature may be determined by a simple determination algorithm that analyzes the spectral data obtained at block 12.
From block 14, the process advances to block 16, where the security feature is compared to a standard. For example, according to various embodiments, the position and color of the pixels identified as metallic ink pixels may be compared to the desired position and color as defined by a particular quality standard. The placement or patterning of the metallic ink pixels may also be compared to the desired placement or patterning as defined by the particular standard. If the position, color, and placement or patterning of the pixels identified as metallic ink pixels are each within prespecified tolerances as defined by the particular standard, the security feature will be validated. For other security features (e.g., pearlescent ink, fluorescent material, fluorescent marking, etc.), the process described at block 16 will be the same but the standards may vary. The validation of the security feature may be determined by a simple comparison algorithm that compares the location, color, shape, pattern, etc. of the imaged security feature to a given standard. The validation may be communicated in any suitable manner.
The system 40 comprises at least two different illumination sources 42, a measuring instrument 44, a processor 46, a memory 48, a determination module 50, and a comparator module 52. According to various embodiments, one or more of the illumination sources 42, the processor 46, the memory 48, the determination module 50, and the comparator module 52 may comprise a portion of the measuring instrument 44. According to other embodiments, one or more of the illumination sources 42, the processor 46, the memory 48, the determination module 50, and the comparator module 52 may be separate and apart from the measuring instrument 44. For example, as shown in
The illuminating sources 42 may each project a line of collimated light, and at least one of the illuminating sources may project a line of light that comprises UV rich light. According to various embodiments, each illuminating source 42 may comprise one or more light emitting diodes (LEDs), and a reflector, lens, or combination of both to collimate the light for each LED. Each illuminating source 42 may also comprise a light guide for conveying the collimated light to the object.
The measuring instrument 44 may be any measuring unit suitable for measuring spectral data of an object. For example, according to various embodiments, the measuring instrument is a line scanning spectrophotometer. The memory 48 may be any type of memory suitable for storing data.
The determination module 50 may be configured to determine the presence of a security feature of the object. As described above, the determination utilizes the spectral data measured under each illumination condition to determine the presence of the security feature.
The comparator module 52 may be configured to compare the security feature to a standard. As described above, the comparison utilizes the determined location, color, shape, pattern, etc. of the imaged security feature to compare the security feature to a given standard.
According to various embodiments, each of the modules 50, 52 may be implemented as software applications, computer programs, etc. utilizing any suitable computer language (e.g., C, C++, Delphi, Java, JavaScript, Perl, Visual Basic, VBScript, etc.) and may be embodied permanently or temporarily in any type of machine, component, physical or virtual equipment, storage medium, or propagated signal capable of delivering instructions to a device. The software code may be stored as a series of instructions or commands on a computer-readable medium such that when the processor 46 reads the medium, the functions described herein are performed.
As used herein, the term “computer-readable medium” may include, for example, magnetic and optical memory devices such as diskettes, compact discs of both read-only and writeable varieties, optical disk drives, and hard disk drives. A computer-readable medium may also include memory storage that can be physical, virtual, permanent, temporary, semi-permanent and/or semi-temporary. A computer-readable medium may further include one or more propagated signals, and such propagated signals may or may not be transmitted on one or more carrier waves.
Although the modules 50, 52 are shown in
While several embodiments of the invention have been described, it should be apparent, however, that various modifications, alterations and adaptations to those embodiments may occur to persons skilled in the art with the attainment of some or all of the advantages of the disclosed invention. Therefore, this application is intended to cover all such modifications, alterations and adaptations without departing from the scope and spirit of the disclosed invention as defined by the appended claims.
This application claims the priority benefit of U.S. Provisional Patent Application No. 60/670,407, filed on Apr. 12, 2005.
Number | Date | Country | |
---|---|---|---|
60670407 | Apr 2005 | US |