WO2016077934A1 - System and method for detecting the authenticity of products - Google Patents

System and method for detecting the authenticity of products Download PDF

Info

Publication number
WO2016077934A1
WO2016077934A1 PCT/CA2015/051216 CA2015051216W WO2016077934A1 WO 2016077934 A1 WO2016077934 A1 WO 2016077934A1 CA 2015051216 W CA2015051216 W CA 2015051216W WO 2016077934 A1 WO2016077934 A1 WO 2016077934A1
Authority
WO
WIPO (PCT)
Prior art keywords
product
image
chaotic
products
computing device
Prior art date
Application number
PCT/CA2015/051216
Other languages
French (fr)
Inventor
Guy LE HENAFF
Original Assignee
Le Henaff Guy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Le Henaff Guy filed Critical Le Henaff Guy
Priority to US15/527,907 priority Critical patent/US10956732B2/en
Priority to CN201580074242.8A priority patent/CN108291876B/en
Priority to EP15860424.9A priority patent/EP3221690B1/en
Publication of WO2016077934A1 publication Critical patent/WO2016077934A1/en
Priority to HK19100663.5A priority patent/HK1258299A1/en
Priority to US16/674,749 priority patent/US11256914B2/en
Priority to US17/647,237 priority patent/US12026860B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/80Geometric correction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/50Information retrieval; Database structures therefor; File system structures therefor of still image data
    • G06F16/58Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/583Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T5/00Image enhancement or restoration
    • G06T5/40Image enhancement or restoration using histogram techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/40Analysis of texture
    • G06T7/41Analysis of texture based on statistical description of texture
    • G06T7/42Analysis of texture based on statistical description of texture using transform domain methods
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/40Analysis of texture
    • G06T7/41Analysis of texture based on statistical description of texture
    • G06T7/44Analysis of texture based on statistical description of texture using image operators, e.g. filters, edge density metrics or local histograms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/70Determining position or orientation of objects or cameras
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/20Image preprocessing
    • G06V10/22Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition
    • G06V10/225Image preprocessing by selection of a specific region containing or referencing a pattern; Locating or processing of specific regions to guide the detection or recognition based on a marking or identifier characterising the area
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20061Hough transform
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20048Transform domain processing
    • G06T2207/20064Wavelet transform [DWT]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20076Probabilistic image processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/95Pattern authentication; Markers therefor; Forgery detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V2201/00Indexing scheme relating to image or video recognition or understanding
    • G06V2201/09Recognition of logos

Definitions

  • the subject matter disclosed generally relates to systems and methods for detecting the authenticity of products.
  • the subject matter relates to a system and method for uniquely identifying items so as to be able to distinguish genuine items from counterfeit items.
  • the identification process acts as a method for detecting a unique and chaotic virtual serial number, as well as a way for confirming existence or non-existence of the virtual serial number.
  • a user-guided method which allows for a powerful algorithm to be use, which algorithm, allows for a guided progressive elimination/decimation of suspicion to enable a vision-based authentication system that serves the purpose.
  • a fingerprint authentication system is exemplified which is generalized to cover natural chaos in products and goods. The system does not always allow for a simultaneous identification but may require first to know where to search for the fingerprint.
  • a method for determining the authenticity of products comprising: using an image capturing device, capturing images of authentic products; processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; performing a search for a pre- detected chaotic signature associated with one of the authentic products, within the received image of the given product; and determining the authenticity of the given product based on a result of the search.
  • a method for determining the authenticity of products comprising receiving captured images of authentic products; processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; performing a search for a pre-detected chaotic signature associated with one of the authentic products searching within the received image of the given product; and determining the authenticity of the given product based on a result of the search.
  • a memory device having recorded thereon non-transitory computer readable instructions for determining the authenticity of products; the instructions when executed by a processor cause the processor to process images of authentic products including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receive, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; search for a pre-detected chaotic signature associated with one of the authentic products within the received image; and determine the authenticity of the given product based on a result of the search.
  • a computing device having access to a memory having recorded thereon computer readable code for determining the authenticity of products, the code when executed by the processor of the computing device causes the computing device to process images of authentic products including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receive, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; search for a pre-detected chaotic signature associated with one of the authentic products within the received image; and determine the authenticity of the given product based on a result of the search.
  • a memory device having recorded thereon non-transitory computer readable instructions for installing on a portable computing device comprising an image capturing device, the instructions when executed by a processor causes the computing device to: capture an image of a given product; send the image of the given product to a remote server for verification; receive from the remote server a request to take a close-up image of the given product, and location information identifying a region of interest (ROI) for the close-up image; identify the location of the ROI on the given product; display a visual indicator of the ROI on a display device associated with the computing device to allow a user to zoom over the ROI and take the close-up picture.
  • ROI region of interest
  • a memory device having recorded thereon non-transitory computer readable instructions for installing on a computing device, the computer readable instructions comprising: images of authentic products, each image comprising a chaotic signature which is specific to an authentic product, and/or data representing the chaotic signatures associated with the authentic products; and executable instructions which when executed by the computing device cause the computing device to: capture or receive a first image of a first product; process the first image to determine an authenticity of the first product, wherein processing of the first image comprises detecting a presence or lack of presence of a pre-recorded chaotic signature in the first image.
  • Figure 1 describes an example of the production registration phase in accordance with an embodiment
  • Figure 2 illustrates an example of the verification request phase, in accordance with an embodiment
  • Figure 3a illustrates an example of an image taken at the authentication phase on a Smartphone
  • Figure 3b is close up view of an ROI region in Figure 3a;
  • Figure 3c is an image transform of the image of Figure 3b using a gradient over a low pass filtered image, in accordance with a non-limiting example of implementation
  • Figure 3d show a high pass filtering of the image of Figure 3b once luminance had been neutralized
  • Figures 4a to 4c illustrate images of a different product
  • Figures 5a to 5c illustrate images of yet a further product and show how the chaotic aspect may be produced as a result of the manufacturing process
  • Figure 6 illustrates an example of a database including a plurality of folders 1 -n, each folder containing images of genuine products of the same product series;
  • Figure 7 illustrates an exemplary configuration of a folder associated with a given product series;
  • Figures 8a-8e illustrate a non-limiting example of implementation of the guiding process
  • Figure 9a illustrates an example of a QR data matrix surrounding a chaotic signature on a cork of a bottle
  • Figure 9b illustrates an example of a package including a QR data matrix in accordance with an embodiment
  • Figure 10 is a general flowchart of the workflow between the app and the server, in accordance with an embodiment
  • Figure 1 1 a illustrates a chaotic aspect of paper of a label within vicinity and under a bar code provided on a bottle
  • Figure 1 1 b is a gradient image of Figure 1 1 a over a small amount of pixels in which luminance is neutralized to enhance high frequencies;
  • Figures 12 to 29 illustrate different methods for determining the ROI on different products
  • Figures 30-1 to 30-4 illustrate an example of a method for determining the authenticity of a product by progressively detecting a lattice defining a web comprising a plurality of paths in an image;
  • Figure 31 is flowchart of a method for determining the authenticity of products, in accordance with an embodiment
  • Figure 32 is flowchart of a method for determining the authenticity of products, in accordance with another embodiment.
  • Embodiments of the invention describe a system and method for detecting the authenticity of products by detecting a unique chaotic signature that should be intimately part of the product itself.
  • a unique chaotic signature that should be intimately part of the product itself.
  • leather pore, fiber in Xray of metal goods, wood, fiber in paper Photos of the products are taken at the plant and stored in a database/server which is accessible via a telecommunications network.
  • the server processes the images to detect for each authentic product a unique authentic signature which is the result of a manufacturing process or a process of nature or any other process that may leave a unique signature that can be used as a unique identification of the product.
  • the user may take a picture of the product and send it to the server (e.g. using an app installed on a portable device or the like).
  • the server may process the receive image in search for a pre-detected and/or pre-stored chaotic signature associated with an authentic product.
  • the server may return a response to the user indicating the result of the search.
  • a feedback mechanism may be included to guide the user to take a picture at a specific location of the product where the chaotic signature may exist.
  • the authentication method may include three main phases: 1 ) a product registration phase which usually occurs at the plant where the genuine products are manufactured, whereby, images of the genuine products are taken and stored. 2)
  • the second phase is the verification request phase which occurs at the store where the product is being sold, whereby, a user who wants to check the authenticity of a given product may take a picture of the product and send the picture to the server for verification.
  • This phase can involve an Augmented Reality experience in order to guide the user toward an area of the product that are best suited for authentication (and which include one or more ROIs as described below).
  • the third phase is the comparison phase whereby the server compares the received image with pre-stored images of genuine products and outputs the comparison results for viewing on the user's computing device.
  • Phase 2 may involve three sub-phases: Phase 2.1 ) performs an identification of the product, phase 2.2) is a dialogue between the system and the user based on phase 2.1 to guide user toward a Zone Of Authentication (aka Region of Interest ROI) as (122), (128), (154) (156), (1041 ), (2012) for close range capture for capturing an image with sufficient resolution for the identification process.
  • Phase 2.1 performs an identification of the product
  • phase 2.2 is a dialogue between the system and the user based on phase 2.1 to guide user toward a Zone Of Authentication (aka Region of Interest ROI) as (122), (128), (154) (156), (1041 ), (2012) for close range capture for capturing an image with sufficient resolution for the identification process.
  • Zone Of Authentication aka Region of Interest ROI
  • Sub Phase 2.3 may be performed automatically by the app when the portable device detects that a sufficient resolution of the ROI has been reached (sufficient increase in size and/or number of pixels).
  • the third phase includes reporting to the user the result of the search.
  • This phase performs the authentication, working on high precision analysis.
  • the result can be done by aggregation of probability of analysis either of various methods applied to same image or of various attempts to authenticate from different views of same object as it can be seen in Figure 13. For example three probabilities of 50% for three different ROI can result in a pretty high combined probability that a positive match has occurred confirming the authenticity of the product.
  • a Neyman-Pearson lemma algorithm allows to calculate the final probability using all probabilities and their associated qualities.
  • the main embodiment may report the final probability as a bar graph.
  • the 2 phase may be done with a repetition of image pickup and analysis if a doubtful condition is determined by the machine or if the product does not have sufficient chaotic aspect on a single place (single ROI). This is exemplified on the case of a bag shown in Figs 8B and 8D which show two different requests for a close range pickup allowing top aggregate probability out of the authentication process.
  • Figure 1 describes an example of the production registration phase in accordance with an embodiment.
  • the product registration phase is exemplified as being a plant for manufacturing luxury bags.
  • an image capturing device 102 is operably installed to take photos of the bags 104 as the bags 104 pass down the production chain. Pictures of the bags are stored on a database/server 106 which is accessible via a communications network 108.
  • the image capturing device 102 can, without limitation, be a smartphone equipped with a good quality camera and a direct telecommunication system a WiFi, Bluetooth or internet enabled camera or any camera with wired or wireless remote transmission capabilities.
  • Figure 2 illustrates an example of the verification request phase, in accordance with an embodiment.
  • the user when the user wants to verify the authenticity of a given product 1 10, the user may take a picture of the product 1 10 using a portable computing device 1 12 and send the picture of the telecommunications network 108 to the server 106 for comparison.
  • an application may be provided for installing on the portable computing device 1 12 for taking a picture of the product 1 10 and sending the picture to the server 106.
  • the application may include the IP address of the server and may be configured to transmit the picture to the server once the picture is taken.
  • the application may also be configured to perform local image processing and compressing before sending the image to the server 106.
  • the application may include an interactive aspect to interact with the user and ask for additional pictures in specific areas of the product to improve the analysis. This will be described in further detail herein below.
  • the server 106 may be configured to locally process the image of a genuine product taken in the product registration phase to determine one or a plurality of region of interests (ROI) within the image these ROI includes a potential chaotic signature.
  • ROI region of interests
  • the embodiments describe a non- limiting example of an image processing method for the sake of illustration and understanding. However, the embodiments are not limited to this method and may be implemented with other image processing methods or a combination of the method described herein and other methods.
  • the region of interest may be chosen based on an increased frequency in a given area as compared to the rest of the image. In an embodiment, three histograms of frequencies may be used: a global 2D, a vertical 1 D, and a 1 D horizontal histogram of frequencies.
  • a search is done on peak and valley of frequencies to find all relative peaks in the frequency range 1/500 of image dimension to 1/2000 of image dimension.
  • Search uses a Kalman filtering of the histogram then extracts differences in the range of an adjusted percentage of the difference between peaks and valleys, for example 30% is an acceptable range. Accordingly a signal that drops less than 30% between two relative maximums will disqualify the two relative maximums as being peaks. This determines the coordinates of area of interest where a certain regularity exists (high pass filter) but where the higher frequencies exhibits irregularities without being in the range of the noise of the image or the surface of the good/product at registration time (typically in a 2 pixels range).
  • the apparatus may use a succession of operation to find commonality between images. This is done by looking for a medium frequency.
  • the server may use a Hough transform to adjust orientation of the object and adjust scale. For example, without limitation it is possible to focus on the label of the product, the stitches, and other areas where a unique signature may be present. Without being mandatory, this helps the asserting recognition of chaos in ROI which give a safer determination of the identity of chaos in respective Area of interests (ROI) as well as giving a first set of clue as the image processing parameters to use for the signing part analysis as it allows the analysis of chaos to work closer to a confirmation mode than an estimation mode. In particular the relative positioning to anchor point.
  • ROI Area of interests
  • the single or multiple ROIs are characterized by a higher frequency than the Anchor points, a noise estimation is done first to determine the noise dispersion and the signal/noise ratio. This allows to determine a cut off frequency for frequencies of interest.
  • the interesting areas for ROI are characterized by a high contrast of frequency on relatively wide area (4 to 8 time the pixel distance of the low frequency). All areas that exhibit such pattern of frequencies are grouped by connectivity and create a Mask of the ROI. The values used in the mask reveal the contrast for the surrounding neighbor. This allow for weighting the quality of the authentication that can be done on the ROI at a later stage.
  • the Mask is computed on every object individually then an intersection of every Mask or ROI is done. The intersection of the Mask takes the form of an addition of contrast.
  • the first Mask for a first object can profitably be enriched from experience learned from computation of other new objects as they arrive without requiring to re-compute it for all others.
  • This Mask has the higher value where the contrast is not only rather high but also very common. This creates a mix of commonality of the ROI with also the characteristics of it.
  • This Mask is a key component to know where to consider ROIs in scan that will occur during the image analysis in real time. The apparatus focuses its search on areas where the Mask or ROI is high, gradually suggesting areas where the mask have lower and lower values. Each degree or recognition found for each ROI are considered in a final result, each can be weighted with different factor to aggregate their similarity in a consistent manner.
  • the Mask areas of no interest are nullified to avoid a scan of ROI on areas that definitively have no reason to show similarity. So that when the object is not genuine and all previous ROI scan failed individually or by cumulated weighted aggregation to deliver an acceptable combined probability of similarity, the system can determine that the product is not genuine.
  • the location of the ROI may be substantially the same for all products in a given product line. For example, if the highest chaotic signature is around the location of button on the bag due the fact that the button is installed manually, then the location of the ROI may be substantially the same for all the products in this series, and these cases are faster to search since the server does not have to search in other locations when the image is received from the user. However, in most cases the location of the ROI of choice or set or ROIs are different for each product of the same series depending on where the server finds the chaotic signature.
  • the Mask contains local information about frequency contrast in an area or interest it is of interest to consider an histogram of the Mask itself as well as an histogram of Mask frequencies allowing to characterize a factor based on ratio of medium frequencies versus all others, that allow evaluation of the capabilities the apparatus have to determine signature using only one area or need to aggregate over a couple of others.
  • Figure 3a illustrates an example of an image taken at the registration phase.
  • the exemplary image 120 represents a hand bag.
  • the server 106 may process the image 120 as discussed above to determine a ROI 122 which includes the chaotic signature.
  • Figure 3b is close up view of the ROI region 122 in Figure 3a.
  • the region 122 includes a plurality of irregularities that can be used as anchor points 124 as compared to the rest of the areas. The other irregularities shown are identified as 125 and these constitute the features set.
  • anchor points and features set are the anchor points exist in all the products in a given line of products while the features set 125 constitute the chaotic signature and may be the result of a natural process, a manufacturing process, or a natural evolution once a manufacturing process is done, like a fermentation process of mildew that will have its own chaotic structure and can worn out a copy of this structure as a worn out on a material too smooth to be analyzed, or any combination of the above.
  • Figure 3c Is an image transform of the image 122 using a low pass filtered image using a pixels level adjustment using a local luminance around each pixels weighting an image gradient over this pixels.
  • a Hough transform is applied that allow to search for major line in Hough space that intersect. Such crossing is considered as anchor point and the quality of such crossing of Hough line is increased when regularly found over other sampled of production goods when they exhibit same crossing in nearly same vicinities.
  • Figure 3d show a high pass filtering of the image 122 once luminance had been neutralized, another Hough transform allow to search for commonality of lines but in this case it is the complementary that are taken in account as the feature set of chaotic points that will be metered between them, or more generally to an anchor point. This only exemplify a method for analyzing irregularities over goods that qualify a signature, But other method can be used either statistical analysis and classification or non-parametric classification of pattern, that allow at later time a simpler search.
  • Figure 4a illustrates an image of another product.
  • Direction 440 is typically used during the sale process and exemplified in Figures 4b and 4c.
  • Direction 441 is aimed toward another area of the product where sufficient chaotic aspect exists in a place that is expected to be worn out less easily during the life of a product. This can even be used for analyzing passage of person either with a camera looking upward (provided that focus plane and image pre-processing respects people's privacy). It can even be used sideway using the grain of the leather as a signature.
  • the image 126 shown in Figure 4b includes an area 128 which is rich with irregularities.
  • FIG. 4b is a close up view of the ROI 128 of Figure 4a.
  • the ROI 128 includes Anchor points 131 . These Anchor points are determined as features which exist across production (de facto if not existing it should warn a trigger that product is defective), the other set involving more chaotic pattern is made of at least a few of the leather pores 132 that are amongst several chaotic aspects including the cut 130 made in the fabric.
  • chaotic signature which is unique to the product associated with that picture.
  • Such chaotic signature constitutes a unique identification aspect which is impossible to forge reproduce, let alone to detect where the chaotic signature exists on the product.
  • the signature may be strengthened further by creating relationships between the different chaotic aspects such as but not limited to: number of chaotic aspects, distance between a certain chaotic aspect and another one etc.
  • Figures 5a and 5b shows how the chaotic aspect may be produced as a result of the manufacturing process.
  • Figure 5a is a top view of a product.
  • Figure 5b is close up view of the ROI of the product shown in Figure 5a and
  • Figure 5c is close up view of the ROI in an image associated with a different product from the same series of the product of Figure 5a.
  • Figure 5a illustrates a picture 136 of a shirt by the brand Perry Ellis ® .
  • the picture 136 includes a ROI 138.
  • Figure 5b is close up view of the ROI 138a of the shirt of Figure 5a
  • Figure 5b is a close up view of the ROI 138b of another shirt but in the same location.
  • the area beside the sticker "SLIM FIT" in Figure 5b includes three squares that are spaced apart from the sticker.
  • Figure 5c shows two squares that are partially provided under the sticker and another square that is just in touch with the sticker. This is an example of another type of chaotic signatures that the server may detect in the pictures and look for in the images received from the user.
  • the server may, based on the shape, color and other aspects of the product, classify the products belonging to the same series (aka line of products) in a given folder for facilitating the search when receiving images from the user.
  • the database may include a plurality of folders 1 -n each folder containing images of genuine products of the same product series e.g. PERRY ELLIS® slim fit shirts, or the Monogram Delightful ® series by Louis Vuitton ® etc.
  • Analysis of such a characteristic image can be done using either an imbedded solution using a GIST kind of method or a ORBS or SURF method to extract descriptors feeding a LSH (Locally Sensitive Hashing) tree, but can also be done using online solution like the QUALCOMM Vuforia SURF implementation or MoodStock search engine implementation which offer solutions that are essentially able to give a rough identification of the product for Phase 2.1 .
  • the server may associate with each image of a genuine product a sub-image representing one of the ROI of that image as exemplified in Figure 7.
  • Figure 7 illustrates an exemplary configuration of a folder associated with a given product series.
  • the sub-images may be used for expediting the comparison process whereby the server may compare the pixels in the received image with each sub-image representing each stored chaotic signature of a genuine product until a match occurs or until the entire folder is searched without any match.
  • the identification process begins.
  • the server may first determine the product line, and when the product line is determined the server may start searching in the folder associated with that product line in order to find whether or not a previously photographed genuine product exists which has the same chaotic signature as in the received picture. Therefore, if the received image does not have a sufficient quality that allows for searching for the chaotic signature, the server may send a notification back to the portable device asking for another picture.
  • the notification may be accompanied with a certain message to display to the user on the portable device such as for example: not sufficient lighting, or too much lighting, or change position etc.
  • the identification process only delivers one to many ( ⁇ 100) plausible candidates to a final processing stage for final comparison with the received image.
  • the identification process may chose a smaller subset of images e.g. 1/1000 to 1/10000 of the entire set of images for comparing them with the received image. The selection of this subset is based on the features set.
  • the server may chose the images having features set that are the closest to the received image to then compare each one of those images to the received image using an authentication process that is more thorough and subsequently more CPU intensive.
  • the server may only chose 100 images maximum for this final comparison step. Therefore, the final decision by the server may be rendered in about 10 sec not counting communication delays between the user and the server.
  • the purpose of this stage is to certify beyond a reasonable doubt that one or none of the identified sets offers sufficient similarity to the received image so that the outcome probability that the object is genuine can be asserted.
  • the reason of such 2 strokes action is due to the long processing time that can require an Authentication process for all the recoded products in the database which depending on the type of product may reach millions.
  • the analysis of chaotic area can be either completely pattern dependent, looking for a pattern at any place using an algorithm like a GIST, SURF or a BOF(Bag Of Features) to generate descriptors working on a pre-processed image.
  • the preprocessing may be done in the portable device but the GIST analysis is preferably done at the server.
  • the server side analyzer enters the authentication process working on the very limited subset but using a fine pattern analysis mode.
  • the identification process uses an algorithm that deliver a plausible CTM (coordinates transformation matrix) allowing to transform the perspective distorted image that also very frequently exhibits rotation or even slant.
  • the authentication process can use algorithm methodologies derived from fingerprint authentication processing taking the smears and curves out of the oriented gradient processing.
  • the fingerprint algorithm delivers reasonable success and mainly very low level of mistakes.
  • the penalty is that it frequently delivers a higher level of undetermined situations (neither a yes nor a no). This may be reported to user who in turn should be guided to take another snapshot.
  • an enhanced embodiment exists whereby the identification process is advantageously helped by making a certain number of position within the image available as anchor points that can be used to determine the position where to search for chaotic salient point.
  • This is exemplified in Figure 3b at 124, and Figure 4b at 131 where the anchor point (or beacon) are determined from points that exist and are common in nearly all manufactured goods for each product line as part of the design and that have no or very few chaotic comportment.
  • Anchor points are considered as points of interest, for example constellation of peaks out of the gradient image, which have a common geographical location.
  • An example of a criteria that can be used for the tolerance of commonality of geographical location evaluated during the Anchor point determination can be the Chi-square of position dispersion. This dispersion of position is kept as a parameter that will characterize the anchor point.
  • Anchor points sets are used to characterize more easily the object and optionally identify a batch or a manufacturing method. When anchor points are available (determined by processing the batch of images for a class of same product line) then the analysis of chaotic area or interest can occur more easily. The relative position of chaotic salient point of chaotic area (ROI) is then metered to a reasonable number of all surrounding anchor points.
  • ROI relative position of chaotic salient point of chaotic area
  • the value kept is the distance, the angle versus a relative horizon and the quality of dispersion of the anchor point. This information is stored in the central database.
  • the number of Anchor points within a radius of a chaotic point determines a statistical minimum and maximum allowing to decode the constellation during reading and asserts a quality of recognition based on the number of points found versus all the point that had been stored during the registration.
  • Anchor points themselves exhibit sufficient chaotic dispersion so that it should be very unlikely that the positions of anchors point between themselves are sufficient for a unique discrimination of the goods. While being true on some goods. It did appear that this direct method is setting constraints on the algorithms that can be used to search for these signatures made of the differences of distances. While using anchor points and additionally using a pattern that should be at a certain bearing of the anchor points increase the flexibility offered for these fuzzy searches. Too many parameters are uncontrolled while being involved in the whole chain of analysis. For example, the moisture in the atmosphere where the goods are stored and also the way the goods are stored or stacked may distorted it slightly within acceptable tolerance for the end user, while it definitively changes the geometries of the galaxy of the features set.
  • this 2 levels approach allows the pattern detection of chaotic features to be done using a smaller area for the ROI, which is better for dealing with a distorted final product, and simultaneously the presence of anchor points allows this smaller pattern area in the ROI to still be easy enough to position and then correlate with the content of the central image database.
  • fig 12 shows an object (Art) as fig 14 at long range recognized by the AR system.
  • the white spot like 1021 represents anchor points as found by the recognition system. They allow to estimate a decently precise CTM (current transformation matrix) and extract from the AR database the Asset that must be associated with this candidate to be displayed atop the Art, this suggests to the user to close up on areas of interest for Authentication (ROI), like the area 1031 shown in Fig 17.
  • ROI areas of interest for Authentication
  • Fig 15 shows the same object but with the closer range pickup. It had also been recognized by the AR identifier and anchor points determined as shown by bright white spots. It quickly appears that the signature of the artist is a structure that are of a medium entropy, means are regular enough to allow a good chance that feature points (descriptors) like ORBS can be found and efficiently used (the bright white spots alike 1021), as well as giving enough of these feature points with a rather high precision so that a pattern matching can start with a decent load on CPU because the number of tries needed is nowadays limited by the high precision of positioning which decrease the need to try various shift and scale and even rotation.
  • This capability to guide user is of high interest as it is shown on fig 14 to 15.
  • the AR system performs a first recognition which allows to know that at least this artwork is known by the system, then it suggests a predefined area of interest in the form a certain number of areas where the apparatus would like the user to focus on. It then displays a bullseye and an arrow to guide the user to take a closer picture of the area that is indicated on the screen display.
  • this in itself is first good sign of existence of similar products in the database (the initial probability of the feature set is based for example on the number of goods which have similar descriptors the sets for goods that are different).
  • the purpose of the next action is to qualify a certain pattern and/or intersection of patterns such as for example the line of the signature with the texture of the paper, this natural alliance of chaos cannot be reproduced at least using known technics as of today.
  • Fig 16 shows a first level of image transform done through a gradient localized in a direction, this make the structure of the paper appear.
  • the AR system will allow to help user focusing on this area with their own tracking mechanism and the assets here are the arrow and the bullseye (see fig.13).
  • a picture of higher resolution will be taken on a more critical area ROI, in this particular example the ROI is shown as being area 1041.
  • FIG. 18 shows the view from the smartphone side before being identified, then fig 19 shows the response once the package has been identified.
  • the user is driven to take another view of the package as in fig 26.
  • the AR embarks again and suggests to have a close view of a ROI in fig 21. This allows a high resolution image to be taken, as shown in fig 22.
  • Fig 23 depicts the image once processed and shows the anchor points (rectangles) and the area of pattern search (ellipse).
  • the anchor points had been determined as a constant pattern from image to image during take-up and as maximizing the usage of Vertical and horizontal shape that are less likely to be chaotic, therefore, they can be expected to be present in almost every image of the same product line. This is also exemplified on fig 1 1 b where the printed barcode itself naturally offers anchor points. As well as on fig 4c with label and stitches.
  • lot numbers are usually in the ranges of 1000 to 100,000 while the product manufactured can include millions of units. In other words, 1000-100,000 units can have the same lot number on them. Therefore, it is possible to narrow down the search from millions to 100,000 sets of patterns which can be reasonably explored even with a crude enumerating process (pattern size is typically 16 x 16 and a CPU can compare 1 Millions/second so that 10 second over 100 000 set allow to have 10 patterns/set check at 10 position, which appears to be more than sufficient as generally there is always at least 6 patterns that differs between products made with a substrate like leather, paper, wood, clothe, embossed plastics, and in general all high chaotic substrate.
  • pattern size is typically 16 x 16 and a CPU can compare 1 Millions/second so that 10 second over 100 000 set allow to have 10 patterns/set check at 10 position, which appears to be more than sufficient as generally there is always at least 6 patterns that differs between products made with a substrate like leather, paper, wood, clothe, embossed plastics, and in general all high chaotic
  • FIG. 24 Another exemplification is depicted in Figs 24 to 29 which deal with the blister of the drug.
  • Figs 24 and 26 represent two different blisters and the Identification successfully embarks on both pictures asking for a close up of a ROI (3010) and (3020).
  • the full size gradient shown on fig 19 and 27 are for the sake of general understanding but the apparatus may focus on ROIs only.
  • the information on the side of the blister (301 1 ) and (3021 ) are of interest to be decoded with a glyph recognition (Support Vector Machine (SVM) which is a typical first stage of an OCR) to determine if some alpha-numerical information would allow a reduction in the number of pattern to cross analyze.
  • SVM Serial Vector Machine
  • the ROI of fig 28 and fig 29 show anchor points (rectangles) and pattern area (ellipse). It must be noted that 3050 and 3060 are emphasizing the difference that exists between the two blisters. An extreme difference exists here but it is an exemplification of the natural manufacturing chaos occurring during the processing that, which chaos is rare in nature and creates the authentication area that uniquely identifies the product or gives a strong indication that the product is authentic.
  • anchor point allows to reduce the computational problem to avoid analysis using a topography method such as the triangulation method, close to astronomical position analysis, in which the apparatus first uses a detector to identify a first object and its weighted center, then establishes the evolution of the first object based on the metrics determined by the position acquired by triangulation of two other objects known to exist and which form a triangle qualified by angles with the first object.
  • a topography method such as the triangulation method
  • a product may have 100 different patterns at some specific ROI, and another product may have another set of patterns at a different ROI.
  • the first result of pattern matching may deliver patterns coming from the first set and may very well determine patterns coming from the second set. Therefore, the misplacement of pattern should be resolved using the statistical analysis to authenticate the most relevant set of pattern as being the one having the highest number of patterns in the given ROI and the best match between pattern and candidate image in each ROI found to be at the proper distance between anchor points and pattern.
  • the principle may accumulate the distance to anchor points, subtracted from expected distance, thus establishing a score based on the sum of delta of distances. When a distance is beyond reasonable values, it is completely discarded.
  • the Sum Of Square differences(SSD) or alike norma of matching of difference between pattern and target, are compounded in this analysis. As an example for values used in a main embodiment. If the SSD is 30% of maximum match for the analysis session then the tolerance on distance before being discarded is 20% if the pattern matching SSD is higher than 66% then the tolerance on distance is lower in the range of 5%.
  • SSD Sum Of Square differences
  • the embodiments use the SSD method, it must be noted that the embodiments are not limited to this method and that other pattern matching methods are available for example in CV library like OpenCV and can be used with such approach.
  • the maximum for the analysis session being determined with the analysis of the dispersion of SSD, the regularity of high score being a strong indicator of the quality of the match set analysis. While a dispersion that may even include some very strong matching is a negative indication of a matching authentication. This information may be compounded using a Neural Network with a training set done using various substrates.
  • Pattern searching and identification of pattern from a database is difficult to put in a generalized tree like method that would allow a scan through very many pattern sets. This is due to the amount of combination of patterns that create a set and the similarity between the patterns of different sets.
  • recognition of the object allow to focus on only one reference image like in example on fig 14 for an artwork which is unique, or as exemplified here of a lithography in limited quantity, and numbered (as exemplified by area 101 1 which explicit the sample printed) these cases are near perfect cases as the set of pattern to check against is de-facto limited in size.
  • the number of reference images can be huge (size of a batch lot), so that even if the apparatus narrows down the number of references to scan through various mechanism, like the batch number (2010) or (3010) on the blister, there is still a need to scan many reference images.
  • the LSH tree allows for some organization of pattern for fuzzy search, another approach using a reverse principle where for each pattern the associated data are the list of products that may contain it, is more efficient in the main embodiment.
  • the sortation approach described above for finding the best pattern (10 pattern/set tried for match at 10 positions) can be of a cardinality sized to have a geometrical progression with samples and requires minutes of CPU for processing time.
  • the pattern search can benefit to create and "a posterior" principle because using square of 16x16 this deliver enough case where nearly each combination of 16x16 square may be used, either within the same reference image at various locations, or across all the reference images.
  • 16 * 16 square can be coded as 16+16 bits which would lead to 32 bits to index every combination of patterns. This allows to create for each of those 2 32 ⁇ 4Billion patterns a list of reference image index and their ROI locations which allows to speed up the search by quickly decimating patterns that are not existing and then filter the commonality of position and index of the reference.
  • the position to an anchor point is a key component of the final determination.
  • the embodiments can properly operate using 1 K square patterns to analyses (64 x 16) patterns, each pattern being 16 * 16 pixels over an image of 2K * 1 K pixels once areas of no interest are eliminated. .
  • the distance of pattern to anchor point is in itself a sufficient factor for classification because the aggregation of found distances subtracted from the expected distance deliver a final score that involves 1000 distances which if coded over 4 bits deliver a 4K bits precision for the index.
  • the implementation of the main embodiment does not allow a high precision because it had been evaluated from the rules in industry that 128 bits are sufficient to qualify the uniqueness of an object. Accordingly, the embodiments only consider patterns that appear in the ROI at a distance of maximum 4 pixels from the anchor point.
  • the principle of this accelerator relies on a subpart of the H264 compression encoding, by deriving the pattern matching from the motion estimator used in the H264 compression algorithm (http://web.stanford.edu/class/ee398a/handouts/lectures/EE398a MotionEstimati on 2012.pdf ).
  • This allows to use hardware assisted systems and feeding a deeply modified version of the encoder, keeping only the analyzer, and where the supplied image from the Device is the "moving" image and where the reference image act as a "previous" frame. This allows to aggregate the vector and direction of vector to determine the accuracy of the matching.
  • This method dramatically speeds up the search and is also improved by reducing the amount of tile to check focusing on a subset determined at registration time.
  • This set is based on a histogram of frequencies and the tile which exhibit the best homogenous histogram (modeled after a search for a "flat line”) is the most interesting.
  • the pattern matching method fails to deliver a sufficiently high score at proper positions of anchors point, or in general if a confirmation is requested using another approach the later decision can become a need due to lighting conditions, then another confirmation method embarks using as much as possible of the information from the previous one in particular about positioning of the sample image.
  • This method uses the fact that most chaotic aspect out of the image transformation using frequency gives way to a lattice like pattern. Otherwise described as a labyrinths.
  • the search will take some lattice node and dive in the lattice of the reference image at some specific entry point. This in turn allow to aggregate a score made of the total of length of path that do match between the 2 lattices.
  • the insertion point can be such as putting grid of squares 16 x16 then within each squares sort places if the lattice where path intersects the more path lead to a place the more interesting this intersection is and should be consider as an entry point for the search.
  • the radius of search is typically equal to 1 square i.e. covers 32 x 32 pixels.
  • the computation is organized by first doing the image processing needed to extract edges of gradient, then converted to a skeleton of single pixels applying a kernel convolution to erode the paths.
  • a process maybe started to join "interrupted" lattice paths, based on a tangential approach, (at last 3 pixels aligned allow to bridge another lattice sub path if same 3 pixels tangent exist on the other side and the bridge doesn't need to cover more than a couple of pixels. This compensates for disappearance of continuity in the sample image mainly due to poor lighting condition. Incidentally this allows a certain analysis of the quality of the image as the number of bridges needed gives an indication of the difference of quality with the image pickup done on the reference image.
  • the image processing part can also be done in the GPU. This approach allows for a strong confirmation of authenticity while preserving a flexibility on the aspect of the image which is compatible with the poor pickup image.
  • the performance is improved by an organization of node between reference images which allow to create a tree of similar locality of node across reference images using a very similar approach as the one described above for similarity of square 16 x16 when many reference exists.
  • Figures 30-1 to 30-4 illustrate an example of a method for determining the authenticity of a product by progressively detecting a lattice defining a web comprising a plurality of paths in an image.
  • the lattice may be taken out of a reference image and
  • Figure 30-2 represents a lattice taken out of a candidate image.
  • a discontinuity exists in the line joining the nodes 1 and 3, when compared to Figure 30-1 .
  • Figures 30-1 and 30-2 three nodes exists which are numbered 1 -3 between the three different lines that define the lattice.
  • the embodiments may chose the nodes as an entry point in order to circulate the lattice to determine the authenticity of Figure 30-2 with respect to Figure 30-1 . Assuming that the system chooses node 3 as entry point and mistakenly considers node 3 as being node 2 due to some similarity of the pixels around the two nodes. In the present case, the system may proceed with the processing of the lattice by choosing a path that starts with node 3 expecting to end up at node 1 as exemplified in Figure 30-3. However, after an expected distance has been travelled on the line, the system may detect that it does not find node 1 .
  • the system may try a different direction as exemplified in Figure 30-4 until it finds node 2 and re-apply the same strategy to find node 1 , which when accomplished can make the system re-asset its initial travel path with a great benefit of being able to use all the computations that are already pre- done by requalifying the end points and re-using the expensive computations of the path.
  • the server may have to search different areas within the received image to detect the presence of a previously recorded/photographed chaotic signature.
  • the server may apply a progressive targeting to find the area of interest in the received image. This also allows pinpointing known specific location of interest where the frequency dispersion is optimal (e.g. using the same criteria used to detect the chaotic signature in the images of the authentic products). Using such guidance allows going from coarse analysis that delivers probability amounts to target a final very precise area that exhibit a unique identity. This process can be done either within the transmitted images by looking at subsets of the image establishing a pattern matching of a rather generic area until a subset exhibits sufficient similarity in the sense of a Norma like sum of square of difference, applied either on the image or a transformation thereof, or can be done by requiring the device 152 to adjust the pickup to a specific area.
  • the suggested area used to assist the pattern analyzer use the value of the Mask of ROI computed as explained above.
  • the aspect of such Mask exhibits an irregular shape with peaks and valleys with a noise background. Peaks are directly used as suggestion for the ROI to consider.
  • This human guided method is applied very similarly within the server to consider a succession of ROI. However, because it is executed in the server by an automat going from an ROI to another ROI this occurs in a period of milliseconds for aggregating results of ROI analysis, while using manual operation asking the user to manually take a better snapshot of the ROI, but this time it will occur at the rate in which the user will supply the image.
  • the server may also generate statistics related to the ROIs in a given folder of pictures of genuine products. Such statistics may relate to the dimensions and locations of the ROIs for a given product series.
  • the server may send information to the app installed on the phone to guide the user to take a closer picture of a potential location where the ROI may exist.
  • Examples of the type of information that the server may send to the app include: size/dimensions of the ROI relative to the image of the product, the location of the ROI within the image, shape of the ROI, boundaries of the ROI etc.
  • the app may be adapted to determine whether or not the image meets the basic requirements of clarity and resolution e.g. avoid obvious cases where picture is blurry or dark etc.
  • the app may be equipped with the intelligence that allows it to use the information received from the server to identify/detect the identified location (potential ROI location) on the product being photographed.
  • the information sent by the server to identify the potential location of the ROI may include one or more of: dimensions of the ROI, surface ratio between the ROI and the surface of the product on which the ROI is located, and location information identifying the location of the ROI within the product.
  • the app may be configured to perform basic image processing to isolate the product from its background to locate the identified ROI using the received information to then guide the user to take closer pictures thereof.
  • the app in addition to the visual indicator 154 the app may be adapted to produce one or more audible sounds, including voice, that help guiding the user in the right orientation and/or direction until a decent picture of the ROI is available at the screen.
  • the app may be configured to display one or more visual indicators on the screen to guide the user take a closer picture of the identification location that may include a potential ROI.
  • a non-limiting example of implementation of the guiding process is provided in Figures 8a-8e.
  • the user takes a picture 150 of a product 151 using a smartphone 152.
  • the picture 150 may then be sent to the server for processing. If the server does not find any match to a pre-recorded chaotic signature, the server may select based on the statistics associated with that line of products another location for the ROI and send the info to the app.
  • the app may use the information to detect the location of the ROI on the photographed product.
  • the app may highlight an area 154 on that need to be photographed closer. The user may then bring the device 152 closer to take a closer picture of the identified area as exemplified in Figure 8c.
  • the app may then allow the user to take a second picture (e.g. by activating the picture taking button) and send it to the server.
  • the surface area of the visual indicator may enlarge as the device 152 approaches the ROI.
  • the device 152 may send the close up picture 155 to the server. If no match exists, the server may request another picture in a different location 156 as exemplified in Figures 8d and 8e. The process may continue until a final determination is made.
  • the final determination may be one of several cases including:
  • the received image does not meet the minimal criteria for image content, typically the expected frequency distribution. In other words, the received image cannot be used to make proper determination;
  • the good can be either replicated for same serial number including enough of the chaotic aspect, or the good is known from other sources as being a non- registered one. It can come from external sources and can be (without limitation) detected at 2 different places simultaneously, or being sold for a first time at a place that is not an authorized dealer, or being explicitly registered as faked if destruction of good is not the appropriate method, or registered but not yet offered.
  • the server may then send the final determination back to the portable device for display in the app.
  • a local version limited to a certain number of digest of the signed image may be embedded for some specialized check within the app used for the authentication as discussed below.
  • the portable device may be configured to perform the entire analysis locally without sending the image to the remote server for processing.
  • the app may have access to the features set of a subset of the registered products.
  • the subset may be specific to a certain manufacturer or line of products.
  • the subset may also be dependent on geographical constraints in the sense that users in a given country will not need access to registered products that are shipped or scheduled to be sold or distributed in a different country or different continent etc.
  • the latter embodiment is of particular interest when the objects to authenticate are in limited range.
  • This include auctions where offered goods have pretention as for the origin, inventories of luxury goods in warehouse or at borders, the transiting product between two places, e.g. servicing of plane engine parts etc.
  • the amount of products that are genuine candidates are limited (100 to 10000) then the handheld device may be downloaded in advance with all the features set and authentication pattern necessary for authentication so that a totally offline experience can be conducted using handheld CPU for the whole processing.
  • Methods applied for authenticating many allow to use gigantic amount of memory nor powerful GPU but on the other side the amount of pattern to check against is very limited (1 Million squares 16x16 average) so that a good result can be achieved within a reasonable amount of time. Eventually removing reference that are check to speed up later usage as the check session occurs.
  • the features set may be provided in a library that the app can access for verification purposes.
  • the features set in the library may be updated periodically as new products are registered and/or have reason to be made part of the library. For example, if the product was manufactured and registered but not yet released.
  • the app may be specific to a certain manufacturer or line of products, or even a certain badge of products. In other cases, the app may be used for determining authenticity of different and unrelated products e.g. luxury bags, and vaccination syringes.
  • a QR data matrix in addition to the chaotic seal.
  • a QR data matrix may be provided which defines an empty space/ aperture to place over the chaotic seal such that the chaotic seal would be surrounded by the QR data matrix.
  • the chaotic seal may be provided in the form of a piece of wood or another object having a unique shape/signature.
  • the QR data matrix may be provided on a label to be placed over the chaotic signature. An example is provided in Figure 9.
  • Figure 9a illustrates an example of a QR data matrix surrounding a chaotic signature on a cork of a bottle.
  • a QR data matrix 160 defining an aperture 162 is provided on a bottle 164.
  • the aperture 162 allows a visual access to a chaotic signature defined by the shape and lines of cork provided in the bottle.
  • Such embodiment not only allows for identifying the authenticity of the bottle 164 but also to detect whether the bottle was previously opened or not because any dislocation of the features defining the chaotic signature would result in a negative match.
  • the same principle apply to other goods like those delivered in prefilled syringe.
  • the QR data embodiment facilitates the search process at the server because the size in pixels and the location of the ROI would be known. Furthermore, the QR data allows for associating meta-information with the product. For example, the label if can very conveniently include or display a serial number. This number will go through an OCR and considerably eases the recognition process by asking for an image based authentication, rather than image based identification.
  • the QR code can also contains additional focus information aimed at easing the camera pickup, in particular the focal plane of the object 164 can be at a very different depth than the QR code.
  • the camera will first auto focus on the easiest part of the picture, generally the high contrast. Then the QR code can be read and determined the necessary de-focus that would allow the camera to enforce the maximum quality of a small part of the field of view, the aperture 162. So that the quality of the signing chaotic camera pickup is maximized.
  • the QR data matrix 160 may be provided on the package and a visual access may be provided through the aperture 162 to an area of the product defining the chaotic signature as exemplified in Figure 9b.
  • Figure 9b illustrates an example of a package including a QR data matrix in accordance with an embodiment. As shown in Figure 9b, the QR data matrix 162 provides visual access to the product included in the package 166, thus, providing access to the chaotic signature of the product without having to open the package before purchasing it.
  • the structure of the signing pattern can be found in an area of choice like a barcode.
  • the structure of the paper contains sufficient differences from label to label so that it can be used as a signing factor.
  • the richness of such structure can be understood from Figure 1 1 b which is an image process that neutralizes luminance and enhances high frequencies trough a gradient process over a small amount of pixels.
  • the Anchor point can be taken out of the edge of the Barcode, through a Hough transform looking at crossing of lines, while the chaotic features are taken out of high frequencies that also show a dispersion of characteristics (in other word taking a frequency range just below the highest ray found in the frequency histogram).
  • the bar code is an additional source of information as it can identify the product uniquely reducing dramatically the search for identification in the database, simultaneously the orientation and aspect of bar code allow to correct the image hence readjust the distribution of frequencies on an image that are distorted like the barrel effect shown on a bottle. This is helpful to readjust image pickup perspective and field taken image pickup.
  • Figure 1 1 b that in 1 126 the chaos that are part of the glass molding irregularities are of high interest as they can be part of the chaotic feature set hence certify that not only the label is genuine but belonging to the proper content.
  • the picture in Figure 1 1 b is taken with a smartphone Samsung Galaxy SIV Mini ® with a standard camera and no add-on of any kind.
  • the re-registration can then be organized locally under surveillance from manufacturer, otherwise the goods may be returned to the plant for verification and/or registration.
  • Figure 10 is a general flowchart of the workflow between the app and the server, in accordance with an embodiment.
  • Steps 170-174 take place at the app (portable computing device).
  • Step 170 comprises taking a picture of the product that need to be verified.
  • the app assesses the minimal requirements of the picture taken at 170. If they are ok the picture is transmitted to the server at step 174 otherwise a new picture is taken (with or without guidance).
  • the server determines the category (product line) of the product shown in the received picture.
  • the received may then be processed to extract a set of features.
  • the set of features may be extracted using the same rules and algorithms used at the product registration step when the images of the authentic products are processed to extract/find the chaotic signature.
  • the extracted feature set is searched in the database to find a match.
  • the results of searching the different features are identified through their features set (image descriptors like GIST this is Phase 2.1. Then user pickup, or server focus itself on a ROI for authentication at step 184.
  • step 186 If, at step 186, the combined probability is beyond a certain threshold the results are delivered at step 190. Otherwise, the server may request a new picture at step 188 and suggest a different location for the potential ROI and send the same back to the app for taking the new picture at the specified location. The experience is repeated if necessary at step 188, result of step 184 being kept for aggregation until all location of the set of known place of ROI for this identified product are scanned, or earlier if the aggregated probability reached the required threshold of accuracy.
  • FIG. 31 is flowchart of a method for determining the authenticity of products, in accordance with an embodiment.
  • the method begins at step 250 by capturing images of authentic products using an image capturing device.
  • Step 252 comprises processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product.
  • Step 254 comprises receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product.
  • Step 256 comprises performing a search for a pre-detected chaotic signature associated with one of the authentic products, within the received image of the given product.
  • Step 258 comprises determining the authenticity of the given product based on the result of the search.
  • FIG 32 is flowchart of a method for determining the authenticity of products, in accordance with another embodiment.
  • the method comprises receiving captured images of authentic products at step 260.
  • Step 262 comprises processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product.
  • Step 264 comprises receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product.
  • Step 266 comprises performing a search for a pre- detected chaotic signature associated with one of the authentic products searching within the received image of the given product.
  • Step 268 comprises determining the authenticity of the given product based on the result of the search.
  • the process described above is not limited to chaotic signatures and can be applied to characterize human applied signatures that can be of a non-chaotic nature but rather extremely difficult to reproduce, example of such can be inclusion of metallic structures buried within another metallic object, where X ray may show the pattern.
  • the manufacturing process may be complexified to a level where it becomes deterrent to produce a fake product.
  • the chaotic nature is difficult to assert then it can be created on purpose and even contain a method that allow an identification of the product, an example of a technology that can be combined is offered by "Stealth Mark" which delivers a product where the dispersion of grain is chaotic, whereas the detection of the product does not involve an authentication but rather an identification.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Probability & Statistics with Applications (AREA)
  • Library & Information Science (AREA)
  • Data Mining & Analysis (AREA)
  • Multimedia (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Image Analysis (AREA)
  • Geometry (AREA)

Abstract

System and method for detecting the authenticity of products by detecting a unique chaotic signature. Photos of the products are taken at the plant and stored in a database/server. The server processes the images to detect for each authentic product a unique authentic signature which is the result of a manufacturing process, a process of nature etc. To detect whether the product is genuine or not at the store, the user/buyer may take a picture of the product and send it to the server (e.g. using an app installed on a portable device or the like). Upon receipt of the photo, the server may process the receive image in search for a pre-detected and/or pre-stored chaotic signature associated with an authentic product. The server may return a response to the user indicating the result of the search. A feedback mechanism may be included to guide the user to take a picture at a specific location of the product where the chaotic signature may exist.

Description

SYSTEM AND METHOD FOR DETECTING THE AUTHENTICITY
OF PRODUCTS
RELATED APPLICATIONS
[0001] This application claims priority from US Provisional Application No. 62/082939 filed on November 21 , 2014, the specification of which is incorporated herein by reference in its entirety.
BACKGROUND
(a) Field
[0002] The subject matter disclosed generally relates to systems and methods for detecting the authenticity of products. In particular, the subject matter relates to a system and method for uniquely identifying items so as to be able to distinguish genuine items from counterfeit items.
(b) Related Prior Art
[0003] Counterfeiting is a hugely lucrative business in which criminals rely on the continued high demand for cheap goods coupled with low production and distribution costs.
[0004] Counterfeiting of items such as luxury goods, food, alcoholic beverages, materials, art work (paintings, sculpture), drugs and documents defrauds consumers and tarnishes the brand names of legitimate manufacturers and providers of the genuine items. Additionally, the counterfeit items can often endanger the public health (for example, when adulterated foods and drugs are passed off as genuine).
[0005] The Organization for Economic Cooperation and Development (OECD) estimated the value of counterfeiting to be in the region of $800 billion per year worldwide, including 250 billion in drugs and medical. This imposes a real burden on world trade estimated to 2% of world trade for 2007. [0006] Anti-counterfeiting measures have included serial numbers, machine readable identifiers (e.g., barcodes and two-dimensional codes), "tamper-proof" security labels (e.g., holograms and labels that change state or partly or completely self-destruct on removal), and remotely detectable tags (e.g., radio-frequency identification tags) applied to items directly or to tags, labels, and/or packaging for such items. The principle behind the most common approach is to try to increase the difficulties to reproduce a specific item/tag/object affixed on the goods being purchased.
[0007] However, such measures have themselves been counterfeited.
[0008] Some methods exist which affix an additional label that contains some sort of signature of a non-reproducible material, in the form of a hologram or in the form of grains of certain colors (like Stealth Mark). Some other methods exist which heat up a polymer to create a bubble to purposely introduce a chaotic pattern.
[0009] Therefore, there remains a need in the market for a more secure system and method for detecting the authenticity of the products being purchased.
SUMMARY
[0010] The present embodiments describe such system and method.
[0011] As discussed above, existing approaches aim at affixing a controlled material of a certain aspect onto some hard surface of the product to allow for a simple signature detection when looked at through a magnifying lens (which in fact requires adding this lens to the capturing device and also requires the user to know where to check for the signature part of the product). However, natural chaos of matter already exists in most of the product categories that need authentication, which is the fundamental concept behind human fingerprint. Accordingly, the embodiments aim at capturing the existing natural chaos and dealing with the difficulties that exist to generalize the process when the end user is either not expecting to see any addition of material (Art, luxury) or increase in cost (Drug manufacturing).
[0012] Accordingly, a method is described which allows for detecting the natural chaos and aggregating analysis from various areas of the product (hard or soft (flexible)) using only photos captured by portable computing devices. In more simplified words, the identification process acts as a method for detecting a unique and chaotic virtual serial number, as well as a way for confirming existence or non-existence of the virtual serial number.
[0013] In a non- limiting example of implementation, a user-guided method is described which allows for a powerful algorithm to be use, which algorithm, allows for a guided progressive elimination/decimation of suspicion to enable a vision-based authentication system that serves the purpose. In other words, a fingerprint authentication system is exemplified which is generalized to cover natural chaos in products and goods. The system does not always allow for a simultaneous identification but may require first to know where to search for the fingerprint.
[0014] In an aspect, there is provided a method for determining the authenticity of products, the method comprising: using an image capturing device, capturing images of authentic products; processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; performing a search for a pre- detected chaotic signature associated with one of the authentic products, within the received image of the given product; and determining the authenticity of the given product based on a result of the search. [0015] In another aspect, there is provided a method for determining the authenticity of products, the method comprising receiving captured images of authentic products; processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; performing a search for a pre-detected chaotic signature associated with one of the authentic products searching within the received image of the given product; and determining the authenticity of the given product based on a result of the search.
[0016] In a further aspect, there is provided a memory device having recorded thereon non-transitory computer readable instructions for determining the authenticity of products; the instructions when executed by a processor cause the processor to process images of authentic products including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receive, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; search for a pre-detected chaotic signature associated with one of the authentic products within the received image; and determine the authenticity of the given product based on a result of the search.
[0017] In yet a further aspect, there is provided a computing device having access to a memory having recorded thereon computer readable code for determining the authenticity of products, the code when executed by the processor of the computing device causes the computing device to process images of authentic products including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product; receive, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product; search for a pre-detected chaotic signature associated with one of the authentic products within the received image; and determine the authenticity of the given product based on a result of the search.
[0018] In yet another aspect, there is provided a memory device having recorded thereon non-transitory computer readable instructions for installing on a portable computing device comprising an image capturing device, the instructions when executed by a processor causes the computing device to: capture an image of a given product; send the image of the given product to a remote server for verification; receive from the remote server a request to take a close-up image of the given product, and location information identifying a region of interest (ROI) for the close-up image; identify the location of the ROI on the given product; display a visual indicator of the ROI on a display device associated with the computing device to allow a user to zoom over the ROI and take the close-up picture.
[0019] In yet another aspect, there is provided a memory device having recorded thereon non-transitory computer readable instructions for installing on a computing device, the computer readable instructions comprising: images of authentic products, each image comprising a chaotic signature which is specific to an authentic product, and/or data representing the chaotic signatures associated with the authentic products; and executable instructions which when executed by the computing device cause the computing device to: capture or receive a first image of a first product; process the first image to determine an authenticity of the first product, wherein processing of the first image comprises detecting a presence or lack of presence of a pre-recorded chaotic signature in the first image.
[0020] Features and advantages of the subject matter hereof will become more apparent in light of the following detailed description of selected embodiments, as illustrated in the accompanying figures. As will be realized, the subject matter disclosed and claimed is capable of modifications in various respects, all without departing from the scope of the claims. Accordingly, the drawings and the description are to be regarded as illustrative in nature, and not as restrictive and the full scope of the subject matter is set forth in the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
[0021] Further features and advantages of the present disclosure will become apparent from the following detailed description, taken in combination with the appended drawings, in which:
[0022] Figure 1 describes an example of the production registration phase in accordance with an embodiment;
[0023] Figure 2 illustrates an example of the verification request phase, in accordance with an embodiment;
[0024] Figure 3a illustrates an example of an image taken at the authentication phase on a Smartphone;
[0025] Figure 3b is close up view of an ROI region in Figure 3a;
[0026] Figure 3c is an image transform of the image of Figure 3b using a gradient over a low pass filtered image, in accordance with a non-limiting example of implementation;
[0027] Figure 3d show a high pass filtering of the image of Figure 3b once luminance had been neutralized;
[0028] Figures 4a to 4c illustrate images of a different product;
[0029] Figures 5a to 5c illustrate images of yet a further product and show how the chaotic aspect may be produced as a result of the manufacturing process;
[0030] Figure 6 illustrates an example of a database including a plurality of folders 1 -n, each folder containing images of genuine products of the same product series; [0031] Figure 7 illustrates an exemplary configuration of a folder associated with a given product series;
[0032] Figures 8a-8e illustrate a non-limiting example of implementation of the guiding process;
[0033] Figure 9a illustrates an example of a QR data matrix surrounding a chaotic signature on a cork of a bottle;
[0034] Figure 9b illustrates an example of a package including a QR data matrix in accordance with an embodiment;
[0035] Figure 10 is a general flowchart of the workflow between the app and the server, in accordance with an embodiment;
[0036] Figure 1 1 a illustrates a chaotic aspect of paper of a label within vicinity and under a bar code provided on a bottle;
[0037] Figure 1 1 b is a gradient image of Figure 1 1 a over a small amount of pixels in which luminance is neutralized to enhance high frequencies;
[0038] Figures 12 to 29 illustrate different methods for determining the ROI on different products;
[0039] Figures 30-1 to 30-4 illustrate an example of a method for determining the authenticity of a product by progressively detecting a lattice defining a web comprising a plurality of paths in an image;
[0040] Figure 31 is flowchart of a method for determining the authenticity of products, in accordance with an embodiment;
[0041] Figure 32 is flowchart of a method for determining the authenticity of products, in accordance with another embodiment.
[0042] It will be noted that throughout the appended drawings, like features are identified by like reference numerals.
DETAILED DESCRIPTION [0043] Embodiments of the invention describe a system and method for detecting the authenticity of products by detecting a unique chaotic signature that should be intimately part of the product itself. As a non-limiting example, leather pore, fiber in Xray of metal goods, wood, fiber in paper. Photos of the products are taken at the plant and stored in a database/server which is accessible via a telecommunications network. The server processes the images to detect for each authentic product a unique authentic signature which is the result of a manufacturing process or a process of nature or any other process that may leave a unique signature that can be used as a unique identification of the product. To detect whether the product is genuine or not at the store, the user may take a picture of the product and send it to the server (e.g. using an app installed on a portable device or the like). Upon receipt of the photo, the server may process the receive image in search for a pre-detected and/or pre-stored chaotic signature associated with an authentic product. The server may return a response to the user indicating the result of the search. A feedback mechanism may be included to guide the user to take a picture at a specific location of the product where the chaotic signature may exist.
[0044] The authentication method may include three main phases: 1 ) a product registration phase which usually occurs at the plant where the genuine products are manufactured, whereby, images of the genuine products are taken and stored. 2) The second phase is the verification request phase which occurs at the store where the product is being sold, whereby, a user who wants to check the authenticity of a given product may take a picture of the product and send the picture to the server for verification. This phase can involve an Augmented Reality experience in order to guide the user toward an area of the product that are best suited for authentication (and which include one or more ROIs as described below). 3) The third phase is the comparison phase whereby the server compares the received image with pre-stored images of genuine products and outputs the comparison results for viewing on the user's computing device. [0045] Phase 2) may involve three sub-phases: Phase 2.1 ) performs an identification of the product, phase 2.2) is a dialogue between the system and the user based on phase 2.1 to guide user toward a Zone Of Authentication (aka Region of Interest ROI) as (122), (128), (154) (156), (1041 ), (2012) for close range capture for capturing an image with sufficient resolution for the identification process. Phase 2.3) comprises capturing of the close range image if determined to be wide enough within acceptable tolerance for slant and rotation (a purified Current Transformation Matrix (x' = a x x + c x y + e y' = b x x + d x y + f, where a, b, c, and d express a traditional rotation matrix with a zoom coefficient and e, f translation ) with "a" and "d" coefficient equal and "c" and "b" coefficient close to zero) "e" and f" coefficient being as expected for targeting the ROI. Sub Phase 2.3 may be performed automatically by the app when the portable device detects that a sufficient resolution of the ROI has been reached (sufficient increase in size and/or number of pixels).
[0046] The third phase includes reporting to the user the result of the search. This phase performs the authentication, working on high precision analysis. The result can be done by aggregation of probability of analysis either of various methods applied to same image or of various attempts to authenticate from different views of same object as it can be seen in Figure 13. For example three probabilities of 50% for three different ROI can result in a pretty high combined probability that a positive match has occurred confirming the authenticity of the product. A Neyman-Pearson lemma algorithm allows to calculate the final probability using all probabilities and their associated qualities. The main embodiment may report the final probability as a bar graph. If the report delivers a probability that is beyond doubt then the display is an OK message, otherwise the result takes the form of a bar from red to green allowing the user to evaluate if they need another method of authentication or to restart the analysis in better environmental condition (generally due to lighting) [0047] It must be noted that the 2 phase may be done with a repetition of image pickup and analysis if a doubtful condition is determined by the machine or if the product does not have sufficient chaotic aspect on a single place (single ROI). This is exemplified on the case of a bag shown in Figs 8B and 8D which show two different requests for a close range pickup allowing top aggregate probability out of the authentication process.
[0048] Referring now to the drawings, Figure 1 describes an example of the production registration phase in accordance with an embodiment. In the present example, the product registration phase is exemplified as being a plant for manufacturing luxury bags. As shown in Figure 1 , an image capturing device 102 is operably installed to take photos of the bags 104 as the bags 104 pass down the production chain. Pictures of the bags are stored on a database/server 106 which is accessible via a communications network 108.
[0049] The image capturing device 102 can, without limitation, be a smartphone equipped with a good quality camera and a direct telecommunication system a WiFi, Bluetooth or internet enabled camera or any camera with wired or wireless remote transmission capabilities.
[0050] Figure 2 illustrates an example of the verification request phase, in accordance with an embodiment. As shown in Figure 2, when the user wants to verify the authenticity of a given product 1 10, the user may take a picture of the product 1 10 using a portable computing device 1 12 and send the picture of the telecommunications network 108 to the server 106 for comparison.
[0051] In an embodiment, an application may be provided for installing on the portable computing device 1 12 for taking a picture of the product 1 10 and sending the picture to the server 106. The application may include the IP address of the server and may be configured to transmit the picture to the server once the picture is taken. The application may also be configured to perform local image processing and compressing before sending the image to the server 106. In another embodiment, the application may include an interactive aspect to interact with the user and ask for additional pictures in specific areas of the product to improve the analysis. This will be described in further detail herein below.
Image Processing and Search at the Server
[0052] Once the image is locally processed and/or compressed it is sent to the server for further processing and comparison with pictures of genuine products.
[0053] In an embodiment, the server 106 may be configured to locally process the image of a genuine product taken in the product registration phase to determine one or a plurality of region of interests (ROI) within the image these ROI includes a potential chaotic signature. The embodiments describe a non- limiting example of an image processing method for the sake of illustration and understanding. However, the embodiments are not limited to this method and may be implemented with other image processing methods or a combination of the method described herein and other methods. The region of interest may be chosen based on an increased frequency in a given area as compared to the rest of the image. In an embodiment, three histograms of frequencies may be used: a global 2D, a vertical 1 D, and a 1 D horizontal histogram of frequencies. A search is done on peak and valley of frequencies to find all relative peaks in the frequency range 1/500 of image dimension to 1/2000 of image dimension. Search uses a Kalman filtering of the histogram then extracts differences in the range of an adjusted percentage of the difference between peaks and valleys, for example 30% is an acceptable range. Accordingly a signal that drops less than 30% between two relative maximums will disqualify the two relative maximums as being peaks. This determines the coordinates of area of interest where a certain regularity exists (high pass filter) but where the higher frequencies exhibits irregularities without being in the range of the noise of the image or the surface of the good/product at registration time (typically in a 2 pixels range). [0054] When more than one product is available, the apparatus may use a succession of operation to find commonality between images. This is done by looking for a medium frequency. The server may use a Hough transform to adjust orientation of the object and adjust scale. For example, without limitation it is possible to focus on the label of the product, the stitches, and other areas where a unique signature may be present. Without being mandatory, this helps the asserting recognition of chaos in ROI which give a safer determination of the identity of chaos in respective Area of interests (ROI) as well as giving a first set of clue as the image processing parameters to use for the signing part analysis as it allows the analysis of chaos to work closer to a confirmation mode than an estimation mode. In particular the relative positioning to anchor point. This allows for a simpler identification of relation between sub areas of the image that exhibit at least some signing capabilities. The other interest of such rough common analysis is to determine a minimal feature set that should appear. This is crucial to allow a better determination of cases where the system will assert that it cannot be said that the object is a genuine one, but without reporting it by negation as being not genuine. It is then said as Undetectable.
[0055] The single or multiple ROIs are characterized by a higher frequency than the Anchor points, a noise estimation is done first to determine the noise dispersion and the signal/noise ratio. This allows to determine a cut off frequency for frequencies of interest. The interesting areas for ROI are characterized by a high contrast of frequency on relatively wide area (4 to 8 time the pixel distance of the low frequency). All areas that exhibit such pattern of frequencies are grouped by connectivity and create a Mask of the ROI. The values used in the mask reveal the contrast for the surrounding neighbor. This allow for weighting the quality of the authentication that can be done on the ROI at a later stage. In an embodiment, the Mask is computed on every object individually then an intersection of every Mask or ROI is done. The intersection of the Mask takes the form of an addition of contrast. Additionally the first Mask for a first object can profitably be enriched from experience learned from computation of other new objects as they arrive without requiring to re-compute it for all others. This Mask has the higher value where the contrast is not only rather high but also very common. This creates a mix of commonality of the ROI with also the characteristics of it. This Mask is a key component to know where to consider ROIs in scan that will occur during the image analysis in real time. The apparatus focuses its search on areas where the Mask or ROI is high, gradually suggesting areas where the mask have lower and lower values. Each degree or recognition found for each ROI are considered in a final result, each can be weighted with different factor to aggregate their similarity in a consistent manner. Under a certain threshold value (typically Number of Object * 3% of contrast swing) the Mask areas of no interest are nullified to avoid a scan of ROI on areas that definitively have no reason to show similarity. So that when the object is not genuine and all previous ROI scan failed individually or by cumulated weighted aggregation to deliver an acceptable combined probability of similarity, the system can determine that the product is not genuine.
[0056] In some cases, the location of the ROI may be substantially the same for all products in a given product line. For example, if the highest chaotic signature is around the location of button on the bag due the fact that the button is installed manually, then the location of the ROI may be substantially the same for all the products in this series, and these cases are faster to search since the server does not have to search in other locations when the image is received from the user. However, in most cases the location of the ROI of choice or set or ROIs are different for each product of the same series depending on where the server finds the chaotic signature. As the Mask contains local information about frequency contrast in an area or interest it is of interest to consider an histogram of the Mask itself as well as an histogram of Mask frequencies allowing to characterize a factor based on ratio of medium frequencies versus all others, that allow evaluation of the capabilities the apparatus have to determine signature using only one area or need to aggregate over a couple of others. The more narrow is the frequency histogram, the more a specific area is good place to find signing chaotic pattern.
[0057] Figure 3a illustrates an example of an image taken at the registration phase. The exemplary image 120 represents a hand bag. The server 106 may process the image 120 as discussed above to determine a ROI 122 which includes the chaotic signature. Figure 3b is close up view of the ROI region 122 in Figure 3a. As shown in Figure 3b, the region 122 includes a plurality of irregularities that can be used as anchor points 124 as compared to the rest of the areas. The other irregularities shown are identified as 125 and these constitute the features set. The difference between anchor points and features set is that the anchor points exist in all the products in a given line of products while the features set 125 constitute the chaotic signature and may be the result of a natural process, a manufacturing process, or a natural evolution once a manufacturing process is done, like a fermentation process of mildew that will have its own chaotic structure and can worn out a copy of this structure as a worn out on a material too smooth to be analyzed, or any combination of the above.
[0058] Figure 3c Is an image transform of the image 122 using a low pass filtered image using a pixels level adjustment using a local luminance around each pixels weighting an image gradient over this pixels. On such image a Hough transform is applied that allow to search for major line in Hough space that intersect. Such crossing is considered as anchor point and the quality of such crossing of Hough line is increased when regularly found over other sampled of production goods when they exhibit same crossing in nearly same vicinities. Figure 3d show a high pass filtering of the image 122 once luminance had been neutralized, another Hough transform allow to search for commonality of lines but in this case it is the complementary that are taken in account as the feature set of chaotic points that will be metered between them, or more generally to an anchor point. This only exemplify a method for analyzing irregularities over goods that qualify a signature, But other method can be used either statistical analysis and classification or non-parametric classification of pattern, that allow at later time a simpler search.
[0059] Other examples are provided below.
[0060] For example, Figure 4a illustrates an image of another product. There is at least 3 directions of view that allow to take a picture allowing authentication. Direction 440 is typically used during the sale process and exemplified in Figures 4b and 4c. Direction 441 is aimed toward another area of the product where sufficient chaotic aspect exists in a place that is expected to be worn out less easily during the life of a product. This can even be used for analyzing passage of person either with a camera looking upward (provided that focus plane and image pre-processing respects people's privacy). It can even be used sideway using the grain of the leather as a signature. The image 126 shown in Figure 4b includes an area 128 which is rich with irregularities. When processing the image 126, the server would identify the area 128 as a ROI which includes the chaotic signature. Figure 4b is a close up view of the ROI 128 of Figure 4a. As shown in Figure 4b, the ROI 128 includes Anchor points 131 . These Anchor points are determined as features which exist across production (de facto if not existing it should warn a trigger that product is defective), the other set involving more chaotic pattern is made of at least a few of the leather pores 132 that are amongst several chaotic aspects including the cut 130 made in the fabric.
[0061] Combined, these irregularities define a chaotic signature which is unique to the product associated with that picture. Such chaotic signature constitutes a unique identification aspect which is impossible to forge reproduce, let alone to detect where the chaotic signature exists on the product. The signature may be strengthened further by creating relationships between the different chaotic aspects such as but not limited to: number of chaotic aspects, distance between a certain chaotic aspect and another one etc.
[0062] A further example is shown in Figures 5a and 5b which shows how the chaotic aspect may be produced as a result of the manufacturing process. Figure 5a is a top view of a product. Figure 5b is close up view of the ROI of the product shown in Figure 5a and Figure 5c is close up view of the ROI in an image associated with a different product from the same series of the product of Figure 5a.
[0063] In particular, Figure 5a illustrates a picture 136 of a shirt by the brand Perry Ellis®. The picture 136 includes a ROI 138. Figure 5b is close up view of the ROI 138a of the shirt of Figure 5a, and Figure 5b is a close up view of the ROI 138b of another shirt but in the same location. As shown at 140a the area beside the sticker "SLIM FIT" in Figure 5b includes three squares that are spaced apart from the sticker. By contrast, Figure 5c shows two squares that are partially provided under the sticker and another square that is just in touch with the sticker. This is an example of another type of chaotic signatures that the server may detect in the pictures and look for in the images received from the user.
[0064] In an embodiment, the server may, based on the shape, color and other aspects of the product, classify the products belonging to the same series (aka line of products) in a given folder for facilitating the search when receiving images from the user. For example, as shown in Figure 6, the database may include a plurality of folders 1 -n each folder containing images of genuine products of the same product series e.g. PERRY ELLIS® slim fit shirts, or the Monogram Delightful® series by Louis Vuitton® etc. Analysis of such a characteristic image can be done using either an imbedded solution using a GIST kind of method or a ORBS or SURF method to extract descriptors feeding a LSH (Locally Sensitive Hashing) tree, but can also be done using online solution like the QUALCOMM Vuforia SURF implementation or MoodStock search engine implementation which offer solutions that are essentially able to give a rough identification of the product for Phase 2.1 .
[0065] In a further embodiment, the server may associate with each image of a genuine product a sub-image representing one of the ROI of that image as exemplified in Figure 7. Figure 7 illustrates an exemplary configuration of a folder associated with a given product series. The sub-images may be used for expediting the comparison process whereby the server may compare the pixels in the received image with each sub-image representing each stored chaotic signature of a genuine product until a match occurs or until the entire folder is searched without any match.
[0066] Accordingly, when receiving the image from the user/app, the identification process begins. The server may first determine the product line, and when the product line is determined the server may start searching in the folder associated with that product line in order to find whether or not a previously photographed genuine product exists which has the same chaotic signature as in the received picture. Therefore, if the received image does not have a sufficient quality that allows for searching for the chaotic signature, the server may send a notification back to the portable device asking for another picture. The notification may be accompanied with a certain message to display to the user on the portable device such as for example: not sufficient lighting, or too much lighting, or change position etc.
[0067] In an embodiment, and in order to expedite the identification process and make it acceptable to reduce the waiting time for the client (user) who is waiting for a response, the identification process only delivers one to many ( <100) plausible candidates to a final processing stage for final comparison with the received image. In other words, if there are 100,000 registered products in the database, hence at least 100,000 images (each image representing one authentic product), the identification process may chose a smaller subset of images e.g. 1/1000 to 1/10000 of the entire set of images for comparing them with the received image. The selection of this subset is based on the features set. In particular, the server may chose the images having features set that are the closest to the received image to then compare each one of those images to the received image using an authentication process that is more thorough and subsequently more CPU intensive. In an example, the server may only chose 100 images maximum for this final comparison step. Therefore, the final decision by the server may be rendered in about 10 sec not counting communication delays between the user and the server.
[0068] The purpose of this stage is to certify beyond a reasonable doubt that one or none of the identified sets offers sufficient similarity to the received image so that the outcome probability that the object is genuine can be asserted. The reason of such 2 strokes action is due to the long processing time that can require an Authentication process for all the recoded products in the database which depending on the type of product may reach millions. The analysis of chaotic area can be either completely pattern dependent, looking for a pattern at any place using an algorithm like a GIST, SURF or a BOF(Bag Of Features) to generate descriptors working on a pre-processed image. The preprocessing may be done in the portable device but the GIST analysis is preferably done at the server.
[0069] Then the server side analyzer enters the authentication process working on the very limited subset but using a fine pattern analysis mode. The identification process uses an algorithm that deliver a plausible CTM (coordinates transformation matrix) allowing to transform the perspective distorted image that also very frequently exhibits rotation or even slant. In one embodiment the authentication process can use algorithm methodologies derived from fingerprint authentication processing taking the smears and curves out of the oriented gradient processing. The fingerprint algorithm delivers reasonable success and mainly very low level of mistakes. The penalty is that it frequently delivers a higher level of undetermined situations (neither a yes nor a no). This may be reported to user who in turn should be guided to take another snapshot. In another embodiment, it is possible to use a specific algorithm made of speculative pattern matching in a wavelet converted image. This gives a certain flexibility to compensate for orientation beyond the CTM delivered by the identification phase.
[0070] However, an enhanced embodiment exists whereby the identification process is advantageously helped by making a certain number of position within the image available as anchor points that can be used to determine the position where to search for chaotic salient point. This is exemplified in Figure 3b at 124, and Figure 4b at 131 where the anchor point (or beacon) are determined from points that exist and are common in nearly all manufactured goods for each product line as part of the design and that have no or very few chaotic comportment.
[0071] Anchor points are considered as points of interest, for example constellation of peaks out of the gradient image, which have a common geographical location. An example of a criteria that can be used for the tolerance of commonality of geographical location evaluated during the Anchor point determination can be the Chi-square of position dispersion. This dispersion of position is kept as a parameter that will characterize the anchor point. Anchor points sets are used to characterize more easily the object and optionally identify a batch or a manufacturing method. When anchor points are available (determined by processing the batch of images for a class of same product line) then the analysis of chaotic area or interest can occur more easily. The relative position of chaotic salient point of chaotic area (ROI) is then metered to a reasonable number of all surrounding anchor points. The value kept is the distance, the angle versus a relative horizon and the quality of dispersion of the anchor point. This information is stored in the central database. The number of Anchor points within a radius of a chaotic point determines a statistical minimum and maximum allowing to decode the constellation during reading and asserts a quality of recognition based on the number of points found versus all the point that had been stored during the registration.
[0072] It is also possible sometimes that Anchor points themselves exhibit sufficient chaotic dispersion so that it should be very unlikely that the positions of anchors point between themselves are sufficient for a unique discrimination of the goods. While being true on some goods. It did appear that this direct method is setting constraints on the algorithms that can be used to search for these signatures made of the differences of distances. While using anchor points and additionally using a pattern that should be at a certain bearing of the anchor points increase the flexibility offered for these fuzzy searches. Too many parameters are uncontrolled while being involved in the whole chain of analysis. For example, the moisture in the atmosphere where the goods are stored and also the way the goods are stored or stacked may distorted it slightly within acceptable tolerance for the end user, while it definitively changes the geometries of the galaxy of the features set. Therefore this 2 levels approach allows the pattern detection of chaotic features to be done using a smaller area for the ROI, which is better for dealing with a distorted final product, and simultaneously the presence of anchor points allows this smaller pattern area in the ROI to still be easy enough to position and then correlate with the content of the central image database.
[0073] The difficulties of the art lies in the tradeoff necessary between the low precision position delivered by the capture system with rotation, scaling and even natural perspective distortions, compared to the high precision position needed by a safe authentication system. These distortions are a consequence of the coarse nature of the image pickup device, generally hand held device which is held without great concern by consumer at time of pickup. A minimum guidance is needed and offered, as it can be seen on fig 12 and fig 13 where the bracket like 1022 does guide the user to have a picture as compatible with a 90 degrees modulus as possible while decreasing shear, slant and maximizing image size. However without additional guidance either by the computer using computer vision CV to establish correction factor, or more efficiently using capabilities offered by the Augmented Reality Paradigm and tools, this precision of pickup is largely insufficient to narrow down the samples to scan to a decent minimum. The interest of combining the AR with Authentication method is to allow this high precision position to be determined with the help of the AR system and generally asking the user to focus on some very specific area at very close range, This allows to find safer anchor points that allow for a simpler scanning of the image to find if a decent amount of the expected patterns from the original image exist in the submitted sample.
[0074] The benefit of the AR recognition phase is that it can be repeated at various scales over the same object to gradually qualify the object at closer and closer range still keeping previous probability of being genuine for a progressive aggregation until it reach a sufficient level or all ROI are scanned and it failed to deliver a conform probability or being genuine. To exemplify this, fig 12 shows an object (Art) as fig 14 at long range recognized by the AR system. The white spot like 1021 represents anchor points as found by the recognition system. They allow to estimate a decently precise CTM (current transformation matrix) and extract from the AR database the Asset that must be associated with this candidate to be displayed atop the Art, this suggests to the user to close up on areas of interest for Authentication (ROI), like the area 1031 shown in Fig 17. Fig 15 shows the same object but with the closer range pickup. It had also been recognized by the AR identifier and anchor points determined as shown by bright white spots. It quickly appears that the signature of the artist is a structure that are of a medium entropy, means are regular enough to allow a good chance that feature points (descriptors) like ORBS can be found and efficiently used (the bright white spots alike 1021), as well as giving enough of these feature points with a rather high precision so that a pattern matching can start with a decent load on CPU because the number of tries needed is thankfully limited by the high precision of positioning which decrease the need to try various shift and scale and even rotation.
[0075] This capability to guide user is of high interest as it is shown on fig 14 to 15. The device is started, the AR system performs a first recognition which allows to know that at least this artwork is known by the system, then it suggests a predefined area of interest in the form a certain number of areas where the apparatus would like the user to focus on. It then displays a bullseye and an arrow to guide the user to take a closer picture of the area that is indicated on the screen display. When a recognition is established, this in itself is first good sign of existence of similar products in the database (the initial probability of the feature set is based for example on the number of goods which have similar descriptors the sets for goods that are different). Subsequently, the purpose of the next action is to qualify a certain pattern and/or intersection of patterns such as for example the line of the signature with the texture of the paper, this natural alliance of chaos cannot be reproduced at least using known technics as of today.
[0076] Once the user takes a closer picture of area 1021 then the process starts the image transform and pattern analysis. Fig 16 shows a first level of image transform done through a gradient localized in a direction, this make the structure of the paper appear. The AR system will allow to help user focusing on this area with their own tracking mechanism and the assets here are the arrow and the bullseye (see fig.13). Then either in real time over the video feed or trough action of the camera, a picture of higher resolution will be taken on a more critical area ROI, in this particular example the ROI is shown as being area 1041.
[0077] Another example is depicted by figures 18 to 23 where the full process is explained. Fig 18 shows the view from the smartphone side before being identified, then fig 19 shows the response once the package has been identified. As it is known to have better ROI on a side (this will be fig 22), the user is driven to take another view of the package as in fig 26. Once identified the AR embarks again and suggests to have a close view of a ROI in fig 21. This allows a high resolution image to be taken, as shown in fig 22. Fig 23 depicts the image once processed and shows the anchor points (rectangles) and the area of pattern search (ellipse). The anchor points had been determined as a constant pattern from image to image during take-up and as maximizing the usage of Vertical and horizontal shape that are less likely to be chaotic, therefore, they can be expected to be present in almost every image of the same product line. This is also exemplified on fig 1 1 b where the printed barcode itself naturally offers anchor points. As well as on fig 4c with label and stitches.
[0078] Hence the interest there is to focus on barcode, not for the code itself but also for the alignment it provides which can be used as a reference for metering the pattern. In fig 22 it can also be seen that the manufacturer had to affix production information that allows a drastic reduction in the number of pattern to check against. It can be seen that patterns are expected at some specific place so that it is not of interest to scan every place for every pattern but rather use a pattern matching and displacement analysis.
[0079] For example, in the pharmaceutical industry, lot numbers are usually in the ranges of 1000 to 100,000 while the product manufactured can include millions of units. In other words, 1000-100,000 units can have the same lot number on them. Therefore, it is possible to narrow down the search from millions to 100,000 sets of patterns which can be reasonably explored even with a crude enumerating process (pattern size is typically 16 x 16 and a CPU can compare 1 Millions/second so that 10 second over 100 000 set allow to have 10 patterns/set check at 10 position, which appears to be more than sufficient as generally there is always at least 6 patterns that differs between products made with a substrate like leather, paper, wood, clothe, embossed plastics, and in general all high chaotic substrate. It can be noted that a tree organization of patterns allow to drastically speed up even such enumeration process. [0080] Another scenario is to look for the serial number (if any) and search for the chaotic signature in the ROI for this product. However, not all products have serial numbers, which necessitates the methods discussed above for narrowing down the search. Other cases of unique products include art work such as original paintings which are by default unique.
[0081] Another exemplification is depicted in Figs 24 to 29 which deal with the blister of the drug. Figs 24 and 26 represent two different blisters and the Identification successfully embarks on both pictures asking for a close up of a ROI (3010) and (3020). The full size gradient shown on fig 19 and 27 are for the sake of general understanding but the apparatus may focus on ROIs only. The information on the side of the blister (301 1 ) and (3021 ) are of interest to be decoded with a glyph recognition (Support Vector Machine (SVM) which is a typical first stage of an OCR) to determine if some alpha-numerical information would allow a reduction in the number of pattern to cross analyze. The ROI of fig 28 and fig 29 show anchor points (rectangles) and pattern area (ellipse). It must be noted that 3050 and 3060 are emphasizing the difference that exists between the two blisters. An extreme difference exists here but it is an exemplification of the natural manufacturing chaos occurring during the processing that, which chaos is rare in nature and creates the authentication area that uniquely identifies the product or gives a strong indication that the product is authentic.
[0082] Such numerical analysis to matching can be expected in a simple and 1/1 relationship on some products that have a serial number. Analyzing the chaotic pattern naturally or purposely added onto the bank note allows for an absolute identification of genuine banknote in a 1/1 mode.
[0083] The concept of anchor point allows to reduce the computational problem to avoid analysis using a topography method such as the triangulation method, close to astronomical position analysis, in which the apparatus first uses a detector to identify a first object and its weighted center, then establishes the evolution of the first object based on the metrics determined by the position acquired by triangulation of two other objects known to exist and which form a triangle qualified by angles with the first object. However, many differences between the embodiments and the angular based triangulation method. For example, if the other two objects are not detected the triangulation method determines that the first object also does not exist or does not qualify.
[0084] However, in the present embodiments very many relevant objects may exist and very many fake irrelevant/fake objects may also exist at the relevant place (ROI). Therefore, there exists a necessity to assemble a multitude of signature sets and compare them to a reference database. Accordingly, a statistical analysis is used to measure the distance between the anchor points and the ROIs which may then create a plurality of probabilities associated with the different sets of ROIs, each set being associated with a different product. The plurality of probabilities may then be combine into a final probability.
[0085] For example, a product may have 100 different patterns at some specific ROI, and another product may have another set of patterns at a different ROI. During authentication phase, the first result of pattern matching may deliver patterns coming from the first set and may very well determine patterns coming from the second set. Therefore, the misplacement of pattern should be resolved using the statistical analysis to authenticate the most relevant set of pattern as being the one having the highest number of patterns in the given ROI and the best match between pattern and candidate image in each ROI found to be at the proper distance between anchor points and pattern.
[0086] Other attempts have been made to perform authentication using pattern matching. One of these methods uses analysis of a cross section of pattern (as if the pattern is like a fuzzy barcode) using a classification based on weak coincidence of code which is strengthened with the number of decently close match of code. Other methods use classification methods based on the number of patterns that have a decent image match while being simultaneously in immediate vicinity of a relative other pattern matching in same condition. However, the present embodiments do not consider the amount of relationship between patterns in immediate vicinity, but rather use classification through analysis of distance to at least one reference point i.e. the anchor points.
[0087] Other methods exists which are color/intensity based approaches which look at a substrate to identify colors and their intensities in different areas on a document. These method do not use the pattern identification approach per se, but rather a merged pattern intensity in which the loci of analysis must be precise to avoid influence of nearby printing. The side effect here is to decrease the requirement of precision of location. Typically these methods are mainly used with very regular products like banknotes, but do not properly work on productions that have wide varieties of aspects like paint or variations during production, like drugs blisters. Some additional approaches exist which are labelled as being pattern based but which in fact look at patterns as shapes that must exist, and not as pixels sets. These shapes are looked for during authentication without performing a reconstruction which requires a high quality image pickup. The main problem with these approaches is that they decrease the probability to successfully authenticate if the image intake is of bad quality or not- normed. Yet an additional approach exists which is based on pattern analysis and which requires high magnification which inherently allow seizing more of chaotic nature of substrate which greatly simplify the issue because the variety of pattern is high enough to look for a one/one relation (a pattern have very small to none chance to belong to another product). The identification of the pattern area become crucial and apply mainly in cases where the product itself can be checked using a method that allows a physical analysis of the position. This approach optimizes the case of false positive because the severity of the process is too high. In other words, the number of cases where a product is identified as being genuine when in fact it is not are extremely diminished, but the penalty is the increase in the number of cases where genuine products are not identified as such, which in fact is very bad from the standpoint of the manufacturer who is generally paying for the service.
[0088] In a non-limiting example of implementation, the principle may accumulate the distance to anchor points, subtracted from expected distance, thus establishing a score based on the sum of delta of distances. When a distance is beyond reasonable values, it is completely discarded. The Sum Of Square differences(SSD) or alike norma of matching of difference between pattern and target, are compounded in this analysis. As an example for values used in a main embodiment. If the SSD is 30% of maximum match for the analysis session then the tolerance on distance before being discarded is 20% if the pattern matching SSD is higher than 66% then the tolerance on distance is lower in the range of 5%. The counter-intuitive principle being that a strong matching with a crude method like SSD is rather an oddity and should not be bonified. While the embodiments use the SSD method, it must be noted that the embodiments are not limited to this method and that other pattern matching methods are available for example in CV library like OpenCV and can be used with such approach. The maximum for the analysis session being determined with the analysis of the dispersion of SSD, the regularity of high score being a strong indicator of the quality of the match set analysis. While a dispersion that may even include some very strong matching is a negative indication of a matching authentication. This information may be compounded using a Neural Network with a training set done using various substrates. It must be noted that preliminary to or during the capturing of images of the reference images, there generally exists the possibility to inform the system about the nature of the substrate in the object, which allows a user to match it to a predefined category (Wood, Leather, Cardboard, paper, plastics, skin, woven fabrics, agglomerated grains, etc ... ) so that the Trained Set used at classification for final aggregation of all scores, can be chosen based on this specificity allowing greater discrimination which allows to increase tolerance to change of shape of the object versus the reference image. This is typically a more critical problem when analyzing object made of leather or cloth, while being a less critical problem because this kind of objects substrates naturally exhibits more randomness of the natural chaos. Accordingly, a decrease of constraints for qualification keeps the operational quality of the authentication above the needed requirement.
[0089] Pattern searching and identification of pattern from a database is difficult to put in a generalized tree like method that would allow a scan through very many pattern sets. This is due to the amount of combination of patterns that create a set and the similarity between the patterns of different sets. In some case the recognition of the object allow to focus on only one reference image like in example on fig 14 for an artwork which is unique, or as exemplified here of a lithography in limited quantity, and numbered (as exemplified by area 101 1 which explicit the sample printed) these cases are near perfect cases as the set of pattern to check against is de-facto limited in size. But in some other case like the drugs box on fig 18 or on the blister on fig 24, the number of reference images can be huge (size of a batch lot), so that even if the apparatus narrows down the number of references to scan through various mechanism, like the batch number (2010) or (3010) on the blister, there is still a need to scan many reference images.
[0090] While the LSH tree allows for some organization of pattern for fuzzy search, another approach using a reverse principle where for each pattern the associated data are the list of products that may contain it, is more efficient in the main embodiment. When the amount of reference image is very high the sortation approach described above for finding the best pattern (10 pattern/set tried for match at 10 positions) can be of a cardinality sized to have a geometrical progression with samples and requires minutes of CPU for processing time. Then the pattern search can benefit to create and "a posterior" principle because using square of 16x16 this deliver enough case where nearly each combination of 16x16 square may be used, either within the same reference image at various locations, or across all the reference images. It is then of interest to use a memory based indexing mechanism as this 16*16 square can be coded as 16+16 bits which would lead to 32 bits to index every combination of patterns. This allows to create for each of those 232 ~ 4Billion patterns a list of reference image index and their ROI locations which allows to speed up the search by quickly decimating patterns that are not existing and then filter the commonality of position and index of the reference. The position to an anchor point is a key component of the final determination. The embodiments can properly operate using 1 K square patterns to analyses (64 x 16) patterns, each pattern being 16*16 pixels over an image of 2K *1 K pixels once areas of no interest are eliminated. . The distance of pattern to anchor point is in itself a sufficient factor for classification because the aggregation of found distances subtracted from the expected distance deliver a final score that involves 1000 distances which if coded over 4 bits deliver a 4K bits precision for the index. The implementation of the main embodiment does not allow a high precision because it had been evaluated from the rules in industry that 128 bits are sufficient to qualify the uniqueness of an object. Accordingly, the embodiments only consider patterns that appear in the ROI at a distance of maximum 4 pixels from the anchor point.
[0091] However, for the case where we have millions of products to search against, even optimized pattern matching such as the methods discussed above, can be expensive in term of CPU bandwidth/usage to allow for a decent response time. And knowing a-priori precisely (pixel precision) where to search for a match of pattern of a set will dramatically speed up the pattern matching. The main embodiment uses a specific method accelerator in this case to reduce the response time.
[0092] The principle of this accelerator relies on a subpart of the H264 compression encoding, by deriving the pattern matching from the motion estimator used in the H264 compression algorithm (http://web.stanford.edu/class/ee398a/handouts/lectures/EE398a MotionEstimati on 2012.pdf ). This allows to use hardware assisted systems and feeding a deeply modified version of the encoder, keeping only the analyzer, and where the supplied image from the Device is the "moving" image and where the reference image act as a "previous" frame. This allows to aggregate the vector and direction of vector to determine the accuracy of the matching.
[0093] This method dramatically speeds up the search and is also improved by reducing the amount of tile to check focusing on a subset determined at registration time. This set is based on a histogram of frequencies and the tile which exhibit the best homogenous histogram (modeled after a search for a "flat line") is the most interesting.
[0094] A 4K x 4K encoder working on a subset made of 1 K square of 16 x 16, allow to compute (4000/1000) * (4000/16) * 30 Comparison / seconds which is in the range of 30000 vector of displacement of pattern/sec, the organization of search can also be improved with tree organized search prequalifying certain aspects of pattern using a method as explained above, this gives a factor 100 to the efficiency toward a brute force scan, so that a machine can compare an average of 10 Million references images in a bit over 3 seconds. As it is more interesting to try slight changes in position of the sample image (4 different shift and 2 scale) this decreases the throughput to an average of change 1.1 Millions/sec which is a good high mark limits of the number of reference to scan once the AR experience allows to decrease the field of product to explore (a drug batch size of a common drugs are in the 100,000 sample range for blisters.)
[0095] If the pattern matching method fails to deliver a sufficiently high score at proper positions of anchors point, or in general if a confirmation is requested using another approach the later decision can become a need due to lighting conditions, then another confirmation method embarks using as much as possible of the information from the previous one in particular about positioning of the sample image.
[0096] This method uses the fact that most chaotic aspect out of the image transformation using frequency gives way to a lattice like pattern. Otherwise described as a labyrinths. The search will take some lattice node and dive in the lattice of the reference image at some specific entry point. This in turn allow to aggregate a score made of the total of length of path that do match between the 2 lattices.
[0097] The interest of this method is to simplify the search of the best insertion point, If the insertion point for the search is badly chosen then rapidly the amount of length covered by the similarity of path become small however at each intersecting within a limited distance, the search may restart using already computed path but considering them as part of the same reference node but inserted at different place in the sample image. This allow to rapidly allow a readjustment of the analysis.
[0098] At each major crossing points the computation can be done starting another thread that will re-evaluate the pertinence of this point as a better entry point.
[0099] The insertion point can be such as putting grid of squares 16 x16 then within each squares sort places if the lattice where path intersects the more path lead to a place the more interesting this intersection is and should be consider as an entry point for the search.
[00100] The radius of search is typically equal to 1 square i.e. covers 32 x 32 pixels.
[00101] The computation is organized by first doing the image processing needed to extract edges of gradient, then converted to a skeleton of single pixels applying a kernel convolution to erode the paths. When the skeleton convolution is done, a process maybe started to join "interrupted" lattice paths, based on a tangential approach, (at last 3 pixels aligned allow to bridge another lattice sub path if same 3 pixels tangent exist on the other side and the bridge doesn't need to cover more than a couple of pixels. This compensates for disappearance of continuity in the sample image mainly due to poor lighting condition. Incidentally this allows a certain analysis of the quality of the image as the number of bridges needed gives an indication of the difference of quality with the image pickup done on the reference image.
[00102] Then path too close (1 pixels apart) are joined and eroded again.
[00103] This complex processing is justified by the interest there is to feed a massively multithreaded architecture like the one available for CPU assistance by GPU like the NVidia GPU architecture in CUDA. So that these massive amounts of processors can all work in parallel doing the path analysis as well as reconsider node numbering as described above.
[00104] The image processing part can also be done in the GPU. This approach allows for a strong confirmation of authenticity while preserving a flexibility on the aspect of the image which is compatible with the poor pickup image.
[00105] The performance is improved by an organization of node between reference images which allow to create a tree of similar locality of node across reference images using a very similar approach as the one described above for similarity of square 16 x16 when many reference exists.
[00106] An example is described in Figures 30-1 to 30-4. Figures 30-1 to 30-4 illustrate an example of a method for determining the authenticity of a product by progressively detecting a lattice defining a web comprising a plurality of paths in an image. The lattice may be taken out of a reference image and Figure 30-2 represents a lattice taken out of a candidate image. As clearly shown in Figure 4-2 a discontinuity exists in the line joining the nodes 1 and 3, when compared to Figure 30-1 . Also as shown in Figures 30-1 and 30-2, three nodes exists which are numbered 1 -3 between the three different lines that define the lattice. The embodiments may chose the nodes as an entry point in order to circulate the lattice to determine the authenticity of Figure 30-2 with respect to Figure 30-1 . Assuming that the system chooses node 3 as entry point and mistakenly considers node 3 as being node 2 due to some similarity of the pixels around the two nodes. In the present case, the system may proceed with the processing of the lattice by choosing a path that starts with node 3 expecting to end up at node 1 as exemplified in Figure 30-3. However, after an expected distance has been travelled on the line, the system may detect that it does not find node 1 . In which case, the system may try a different direction as exemplified in Figure 30-4 until it finds node 2 and re-apply the same strategy to find node 1 , which when accomplished can make the system re-asset its initial travel path with a great benefit of being able to use all the computations that are already pre- done by requalifying the end points and re-using the expensive computations of the path.
Processing At The App
[00107] As discussed above, since the location of the chaotic signature is not always the same for all the genuine products, the server may have to search different areas within the received image to detect the presence of a previously recorded/photographed chaotic signature.
[00108] In one embodiment, the server may apply a progressive targeting to find the area of interest in the received image. This also allows pinpointing known specific location of interest where the frequency dispersion is optimal (e.g. using the same criteria used to detect the chaotic signature in the images of the authentic products). Using such guidance allows going from coarse analysis that delivers probability amounts to target a final very precise area that exhibit a unique identity. This process can be done either within the transmitted images by looking at subsets of the image establishing a pattern matching of a rather generic area until a subset exhibits sufficient similarity in the sense of a Norma like sum of square of difference, applied either on the image or a transformation thereof, or can be done by requiring the device 152 to adjust the pickup to a specific area.
[00109] Typically the suggested area used to assist the pattern analyzer use the value of the Mask of ROI computed as explained above. The aspect of such Mask exhibits an irregular shape with peaks and valleys with a noise background. Peaks are directly used as suggestion for the ROI to consider. This human guided method is applied very similarly within the server to consider a succession of ROI. However, because it is executed in the server by an automat going from an ROI to another ROI this occurs in a period of milliseconds for aggregating results of ROI analysis, while using manual operation asking the user to manually take a better snapshot of the ROI, but this time it will occur at the rate in which the user will supply the image. However the speed in this case is not the issue as the user understands naturally that the process requires more areas for certification and at- the contrary the server is not expected to consider multiple ROIs within its own analysis. Selection of a User guided focus on ROI or on a server automatic guided approach on ROI is based on the quality of picture taken for analysis. Below a certain level of quality the system must compensate by asking user for a closer look but on various areas of the object. This also could be needed to compensate for poor quality picture due to poor lighting conditions
[00110] In another embodiment, the server may also generate statistics related to the ROIs in a given folder of pictures of genuine products. Such statistics may relate to the dimensions and locations of the ROIs for a given product series.
[00111] Therefore, and as explained above, if the server could not detect a potential ROI in the image received from the user, the server may send information to the app installed on the phone to guide the user to take a closer picture of a potential location where the ROI may exist. Examples of the type of information that the server may send to the app include: size/dimensions of the ROI relative to the image of the product, the location of the ROI within the image, shape of the ROI, boundaries of the ROI etc.
[00112] In addition to the functions discussed above such as taking the picture and sending it to the server etc., the app may be adapted to determine whether or not the image meets the basic requirements of clarity and resolution e.g. avoid obvious cases where picture is blurry or dark etc.
[00113] In addition, the app may be equipped with the intelligence that allows it to use the information received from the server to identify/detect the identified location (potential ROI location) on the product being photographed. In a non-limiting example of implementation, the information sent by the server to identify the potential location of the ROI may include one or more of: dimensions of the ROI, surface ratio between the ROI and the surface of the product on which the ROI is located, and location information identifying the location of the ROI within the product. The app may be configured to perform basic image processing to isolate the product from its background to locate the identified ROI using the received information to then guide the user to take closer pictures thereof.
[00114] In an embodiment, in addition to the visual indicator 154 the app may be adapted to produce one or more audible sounds, including voice, that help guiding the user in the right orientation and/or direction until a decent picture of the ROI is available at the screen.
[00115] In an embodiment, the app may be configured to display one or more visual indicators on the screen to guide the user take a closer picture of the identification location that may include a potential ROI. A non-limiting example of implementation of the guiding process is provided in Figures 8a-8e. As shown in Figure 8a, the user takes a picture 150 of a product 151 using a smartphone 152. The picture 150 may then be sent to the server for processing. If the server does not find any match to a pre-recorded chaotic signature, the server may select based on the statistics associated with that line of products another location for the ROI and send the info to the app. The app may use the information to detect the location of the ROI on the photographed product.
[00116] For example, as shown in Figure 8b, the app may highlight an area 154 on that need to be photographed closer. The user may then bring the device 152 closer to take a closer picture of the identified area as exemplified in Figure 8c. When the app detects a resolution level which is equal to or above a given threshold the app may then allow the user to take a second picture (e.g. by activating the picture taking button) and send it to the server. As shown in Figure 8c the surface area of the visual indicator may enlarge as the device 152 approaches the ROI. The device 152 may send the close up picture 155 to the server. If no match exists, the server may request another picture in a different location 156 as exemplified in Figures 8d and 8e. The process may continue until a final determination is made.
[00117] The final determination may be one of several cases including:
Genuine: this is the case where an image was found in the database that matches the received image.
Unknown: Not genuine but not certain as being faked. Meaning no images in the database match the received image;
Undetectable: the received image does not meet the minimal criteria for image content, typically the expected frequency distribution. In other words, the received image cannot be used to make proper determination;
Not Genuine: there is a certain number of cases where the good can be either replicated for same serial number including enough of the chaotic aspect, or the good is known from other sources as being a non- registered one. It can come from external sources and can be (without limitation) detected at 2 different places simultaneously, or being sold for a first time at a place that is not an authorized dealer, or being explicitly registered as faked if destruction of good is not the appropriate method, or registered but not yet offered.
[00118] If the image is qualified as "Unknown" another embodiment can submit the picture as it was taken over the web to a processing center where human specialist may act as referee and do a human interpretation of the uncertainties either in an absolute manner or using help for comparison with the set of images suspected to be the goods analyzed but that cannot be confirmed.
[00119] The server may then send the final determination back to the portable device for display in the app.
[00120] In another embodiment, a local version limited to a certain number of digest of the signed image, like a GIST data set and pattern set, may be embedded for some specialized check within the app used for the authentication as discussed below. In the latter case, the portable device may be configured to perform the entire analysis locally without sending the image to the remote server for processing. In a non-limiting example of implementation, the app may have access to the features set of a subset of the registered products. The subset may be specific to a certain manufacturer or line of products. The subset may also be dependent on geographical constraints in the sense that users in a given country will not need access to registered products that are shipped or scheduled to be sold or distributed in a different country or different continent etc.
[00121] The latter embodiment is of particular interest when the objects to authenticate are in limited range. This include auctions where offered goods have pretention as for the origin, inventories of luxury goods in warehouse or at borders, the transiting product between two places, e.g. servicing of plane engine parts etc. In these cases the amount of products that are genuine candidates are limited (100 to 10000) then the handheld device may be downloaded in advance with all the features set and authentication pattern necessary for authentication so that a totally offline experience can be conducted using handheld CPU for the whole processing. Methods applied for authenticating many not allow to use gigantic amount of memory nor powerful GPU but on the other side the amount of pattern to check against is very limited (1 Million squares 16x16 average) so that a good result can be achieved within a reasonable amount of time. Eventually removing reference that are check to speed up later usage as the check session occurs.
[00122] In an embodiment, the features set may be provided in a library that the app can access for verification purposes. The features set in the library may be updated periodically as new products are registered and/or have reason to be made part of the library. For example, if the product was manufactured and registered but not yet released.
[00123] In an embodiment, the app may be specific to a certain manufacturer or line of products, or even a certain badge of products. In other cases, the app may be used for determining authenticity of different and unrelated products e.g. luxury bags, and vaccination syringes.
QR code and Chaotic Seal
[00124] In an embodiment, it is possible to use a QR data matrix in addition to the chaotic seal. For example, a QR data matrix may be provided which defines an empty space/ aperture to place over the chaotic seal such that the chaotic seal would be surrounded by the QR data matrix. The chaotic seal may be provided in the form of a piece of wood or another object having a unique shape/signature. The QR data matrix may be provided on a label to be placed over the chaotic signature. An example is provided in Figure 9.
[00125] Figure 9a illustrates an example of a QR data matrix surrounding a chaotic signature on a cork of a bottle. As shown in Figure 9a, A QR data matrix 160 defining an aperture 162 is provided on a bottle 164. The aperture 162 allows a visual access to a chaotic signature defined by the shape and lines of cork provided in the bottle. Such embodiment not only allows for identifying the authenticity of the bottle 164 but also to detect whether the bottle was previously opened or not because any dislocation of the features defining the chaotic signature would result in a negative match. The same principle apply to other goods like those delivered in prefilled syringe.
[00126] The QR data embodiment facilitates the search process at the server because the size in pixels and the location of the ROI would be known. Furthermore, the QR data allows for associating meta-information with the product. For example, the label if can very conveniently include or display a serial number. This number will go through an OCR and considerably eases the recognition process by asking for an image based authentication, rather than image based identification.
[00127] The QR code can also contains additional focus information aimed at easing the camera pickup, in particular the focal plane of the object 164 can be at a very different depth than the QR code. Typically the camera will first auto focus on the easiest part of the picture, generally the high contrast. Then the QR code can be read and determined the necessary de-focus that would allow the camera to enforce the maximum quality of a small part of the field of view, the aperture 162. So that the quality of the signing chaotic camera pickup is maximized.
[00128] The presence of a QR data also eases considerably the analysis of horizontal ity of the picture at the verification phase, so that pattern authentication can use algorithm of a more speculative nature.
[00129] Often, the product is provided in a package, and thus, it would be difficult to open the package to test the authenticity of the product before purchasing it. In an embodiment, the QR data matrix 160 may be provided on the package and a visual access may be provided through the aperture 162 to an area of the product defining the chaotic signature as exemplified in Figure 9b. Figure 9b illustrates an example of a package including a QR data matrix in accordance with an embodiment. As shown in Figure 9b, the QR data matrix 162 provides visual access to the product included in the package 166, thus, providing access to the chaotic signature of the product without having to open the package before purchasing it.
[00130] As exemplified in Figure 1 1 a the structure of the signing pattern can be found in an area of choice like a barcode. In this case the structure of the paper contains sufficient differences from label to label so that it can be used as a signing factor. The richness of such structure can be understood from Figure 1 1 b which is an image process that neutralizes luminance and enhances high frequencies trough a gradient process over a small amount of pixels. The Anchor point can be taken out of the edge of the Barcode, through a Hough transform looking at crossing of lines, while the chaotic features are taken out of high frequencies that also show a dispersion of characteristics (in other word taking a frequency range just below the highest ray found in the frequency histogram).
[00131] The usage of barcode as a help to guide correction of horizon is exemplified on Fig 21 where the user is first guided with AR to find one place of interest for authentication, here the bar code area. It is also shown on the example that if the system fails to authenticate the drug pack with the barcode, before reporting to user a low probability of genuine origin, the apparatus may guide the user toward another are of interest like 2021 where the batch code appears. This can greatly help reducing the amount of reference image to compare to.
[00132] In the case of bar code area, the bar code is an additional source of information as it can identify the product uniquely reducing dramatically the search for identification in the database, simultaneously the orientation and aspect of bar code allow to correct the image hence readjust the distribution of frequencies on an image that are distorted like the barrel effect shown on a bottle. This is helpful to readjust image pickup perspective and field taken image pickup. It can be noted on Figure 1 1 b that in 1 126 the chaos that are part of the glass molding irregularities are of high interest as they can be part of the chaotic feature set hence certify that not only the label is genuine but belonging to the proper content. The picture in Figure 1 1 b is taken with a smartphone Samsung Galaxy SIV Mini® with a standard camera and no add-on of any kind.
Authorized dealer adjustments
[00133] In an embodiment, it is possible to grant licensed and trusted dealer the authority to test the products before displaying them for sale and the authority to add pictures of the product should the server return a negative response or a positive response which is inconsistent.
[00134] The re-registration can then be organized locally under surveillance from manufacturer, otherwise the goods may be returned to the plant for verification and/or registration.
[00135] Figure 10 is a general flowchart of the workflow between the app and the server, in accordance with an embodiment.
[00136] Steps 170-174 take place at the app (portable computing device). Step 170 comprises taking a picture of the product that need to be verified. At step 172 the app assesses the minimal requirements of the picture taken at 170. If they are ok the picture is transmitted to the server at step 174 otherwise a new picture is taken (with or without guidance).
[00137] Step 176 and up take place at the server side. At step 176 the server determines the category (product line) of the product shown in the received picture. The received may then be processed to extract a set of features. In an embodiment, the set of features may be extracted using the same rules and algorithms used at the product registration step when the images of the authentic products are processed to extract/find the chaotic signature. At step 180 the extracted feature set is searched in the database to find a match. At step 182 the results of searching the different features are identified through their features set (image descriptors like GIST this is Phase 2.1. Then user pickup, or server focus itself on a ROI for authentication at step 184.
[00138] If, at step 186, the combined probability is beyond a certain threshold the results are delivered at step 190. Otherwise, the server may request a new picture at step 188 and suggest a different location for the potential ROI and send the same back to the app for taking the new picture at the specified location. The experience is repeated if necessary at step 188, result of step 184 being kept for aggregation until all location of the set of known place of ROI for this identified product are scanned, or earlier if the aggregated probability reached the required threshold of accuracy.
[00139] Figure 31 is flowchart of a method for determining the authenticity of products, in accordance with an embodiment. The method begins at step 250 by capturing images of authentic products using an image capturing device. Step 252 comprises processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product. Step 254 comprises receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product. Step 256 comprises performing a search for a pre-detected chaotic signature associated with one of the authentic products, within the received image of the given product. Step 258 comprises determining the authenticity of the given product based on the result of the search.
[00140] Figure 32 is flowchart of a method for determining the authenticity of products, in accordance with another embodiment. The method comprises receiving captured images of authentic products at step 260. Step 262 comprises processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product. Step 264 comprises receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product. Step 266 comprises performing a search for a pre- detected chaotic signature associated with one of the authentic products searching within the received image of the given product. Step 268 comprises determining the authenticity of the given product based on the result of the search.
[00141] While preferred embodiments have been described above and illustrated in the accompanying drawings, it will be evident to those skilled in the art that modifications may be made without departing from this disclosure. Such modifications are considered as possible variants comprised in the scope of the disclosure.
[00142] For example, the process described above is not limited to chaotic signatures and can be applied to characterize human applied signatures that can be of a non-chaotic nature but rather extremely difficult to reproduce, example of such can be inclusion of metallic structures buried within another metallic object, where X ray may show the pattern. In which case, the manufacturing process may be complexified to a level where it becomes deterrent to produce a fake product. When the chaotic nature is difficult to assert then it can be created on purpose and even contain a method that allow an identification of the product, an example of a technology that can be combined is offered by "Stealth Mark" which delivers a product where the dispersion of grain is chaotic, whereas the detection of the product does not involve an authentication but rather an identification.

Claims

CLAIMS:
1 . A method for determining the authenticity of products, the method comprising:
- using an image capturing device, capturing images of authentic products;
- processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product;
- receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising a digital digest of an image of the given product;
- performing a search for a pre-detected chaotic signature associated with one of the authentic products, within the received image of the given product; determining the authenticity of the given product based on a result of the search.
2. The method of claim 1 , further comprising expediting the search for the pre-detected chaotic signature, the expediting comprising:
a. identifying presence of a graphic element that exists in all the products;
b. identifying an aspect of the graphic element, such aspect existing only in a given sub-group including one or more products;
c. performing the search for the pre-detected chaotic signature only in the given sub-group of products.
3. The method of claim 2, wherein the graphic element is one of: lot number, batch number, serial number, version number, logo, trademark, tracing number, expiry date, manufacturing date, place of manufacturing.
4. The method of claim 2, wherein the aspect of the graphic element represents a binary value.
5. The method of claim 1 , further comprising expediting the search for the pre-detected chaotic signature using a hardware accelerator built with a pattern analyzer embedded with a hardware video encoder.
6. The method of claim 5, further comprising aggregating motion estimation vectors to create a final score to determine the authenticity of the given product based on a sum of norma of the vectors of the motion estimator.
7. The method of claim 2, wherein when a stalling case of pattern matching occurs, a lattice matching process is started to find in the reference image designated nodes of a first lattice known to exist in the reference image.
8. The method of claim 7, further comprising:
- finding an entry point in a second lattice found in the received image,
- travelling a given path of the second lattice for a given distance;
- if a node is not found within the given distance, a direction of travel is changed to explore other parts of the lattice until a number of nodes is found in the received image which match with the designated nodes of the reference image in position and length of path between nodes.
9. The method of claim 1 , further comprising requesting another image of the given product from the remote computing device.
10. The method of claim 1 , further comprising:
- identifying at least one region of interest (ROI) within the received image;
- requesting a close up image of the ROI from the remote computing device; and - searching within the close-up image for a pre-detected chaotic signature associated with one of the authentic products.
1 1 . The method of claim 10, wherein identifying the ROI comprises:
- processing the received image using a set of rules used to find the chaotic signature in the images of the authentic products; and
- estimating a potential location of the chaotic signature, the potential location representing the ROI.
12. The method of claim 10, wherein identifying the ROI is done based on statistical information relating to locations of the chaotic signatures in a given line of products.
13. The method of claim 10, further comprising repeating the steps of requesting and searching until one of the following occurs:
- a probability associated with the result is higher than a pre-defined threshold; and
- a pre-determined number of iterations is done.
14. The method of claim 1 , further comprising:
- classifying images of authentic products in one or more product-lines;
- detecting a product-line associated with the given product shown in the received image; and
- searching, within the received image, for pre-detected chaotic signatures associated with authentic products pertaining only to the detected product line.
15. The method of claim 1 , further comprising:
- providing a QPR matrix defining an aperture on the product; and - providing visual access to the chaotic signature through the aperture of the QPR matrix such that the QPR matrix surrounds the chaotic signature.
16. The method of claim 1 , further comprising:
- providing a QPR matrix defining an aperture on package containing the product, wherein the package contains a visual access to an area of the product containing the chaotic signature; and
- providing visual access to the chaotic signature through the aperture of the QPR matrix such that the QPR matrix surrounds the chaotic signature.
17. The method of claim 1 , wherein detecting a unique chaotic signature comprises detecting a certain chaotic signature that is the result of a manufacturing process, a process of nature, or both thereof.
18. The method of claim 1 , wherein the step of capturing occurs at a plant where the authentic products are manufactured, or at a licensed dealer.
19. A method for determining the authenticity of products, the method comprising:
- receiving captured images of authentic products;
- processing the captured images including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product;
- receiving, from a remote computing device, an authenticity request for a given product, the authenticity request comprising a digest of an image of the given product;
- performing a search for a pre-detected chaotic signature associated with one of the authentic products searching within the received image of the given product; determining the authenticity of the given product based on a result of the search.
20. A memory device having recorded thereon non-transitory computer readable instructions for determining the authenticity of products; the instructions when executed by a processor cause the processor to:
- process images of authentic products including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product;
- receive, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product;
- search for a pre-detected chaotic signature associated with one of the authentic products within the received image; and
- determine the authenticity of the given product based on a result of the search.
21 . A computing device having access to a memory having recorded thereon computer readable code for determining the authenticity of products, the code when executed by the processor of the computing device causes the computing device to:
- process images of authentic products including detecting, for each authentic product, a unique chaotic signature in one or more images associated with that authentic product;
- receive, from a remote computing device, an authenticity request for a given product, the authenticity request comprising an image of the given product;
- search for a pre-detected chaotic signature associated with one of the authentic products within the received image; and
determine the authenticity of the given product based on a result of the search.
22. The computing device of claim 21 , wherein the computing device is adapted to request another image of the given product from the remote computing device.
23. The computing device of claim 21 , wherein the computing device is adapted to:
- identify a region of interest (ROI) within the received image;
- request a close up image of the ROI from the remote computing device;
- search within the close-up image for a pre-detected chaotic signature associated with one of the authentic products.
24. The computing device of claim 23, wherein the computing device is adapted to process the received image using a set of rules used to find the chaotic signature in the images of the authentic products; and estimate a potential location of the chaotic signature, the potential location representing the ROI.
25. The computing device of claim 23, wherein the ROI is identified based on statistical information relating to locations of the chaotic signatures in a given line of products.
26. The computing device of claim 21 , wherein the computing device is adapted to:
- classify images of authentic products in one or more product-lines;
- detect a product-line associated with the given product shown in the received image; and - search, within the received image, for pre-detected chaotic signatures associated with authentic products pertaining only to the detected product line.
27. The computing device of claim 21 , wherein the computing device is adapted to search for the chaotic signature in a QPR matrix defining an aperture providing visual access to the chaotic signature of the product.
28. A memory device having recorded thereon non-transitory computer readable instructions for installing on a portable computing device comprising an image capturing device, the instructions when executed by a processor causes the computing device to:
- capture an image of a given product;
- send the image of the given product to a remote server for verification;
- receive from the remote server a request to take a close-up image of the given product, and location information identifying a region of interest (ROI) for the close-up image;
- identify the location of the ROI on the given product;
- display a visual indicator of the ROI on a display device associated with the computing device to allow a user to zoom over the ROI and take the close-up picture.
29. A memory device having recorded thereon non-transitory computer readable instructions for installing on a computing device, the computer readable instructions comprising:
- images of authentic products, each image comprising a chaotic signature which is specific to an authentic product, and/or data representing the chaotic signatures associated with the authentic products; and - executable instructions which when executed by the computing device cause the computing device to:
o capture or receive a first image of a first product;
o process the first image to determine an authenticity of the first product, wherein processing of the first image comprises detecting a presence or lack of presence of a pre-recorded chaotic signature in the first image.
PCT/CA2015/051216 2014-11-21 2015-11-23 System and method for detecting the authenticity of products WO2016077934A1 (en)

Priority Applications (6)

Application Number Priority Date Filing Date Title
US15/527,907 US10956732B2 (en) 2014-11-21 2015-11-23 System and method for detecting the authenticity of products
CN201580074242.8A CN108291876B (en) 2014-11-21 2015-11-23 System and method for detecting authenticity of product
EP15860424.9A EP3221690B1 (en) 2014-11-21 2015-11-23 System and method for detecting the authenticity of products
HK19100663.5A HK1258299A1 (en) 2014-11-21 2019-01-15 System and method for detecting the authenticity of products
US16/674,749 US11256914B2 (en) 2014-11-21 2019-11-05 System and method for detecting the authenticity of products
US17/647,237 US12026860B2 (en) 2014-11-21 2022-01-06 System and method for detecting the authenticity of products

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201462082939P 2014-11-21 2014-11-21
US62/082,939 2014-11-21

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US15/527,907 A-371-Of-International US10956732B2 (en) 2014-11-21 2015-11-23 System and method for detecting the authenticity of products
US16/674,749 Continuation US11256914B2 (en) 2014-11-21 2019-11-05 System and method for detecting the authenticity of products

Publications (1)

Publication Number Publication Date
WO2016077934A1 true WO2016077934A1 (en) 2016-05-26

Family

ID=56013001

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2015/051216 WO2016077934A1 (en) 2014-11-21 2015-11-23 System and method for detecting the authenticity of products

Country Status (5)

Country Link
US (3) US10956732B2 (en)
EP (1) EP3221690B1 (en)
CN (1) CN108291876B (en)
HK (1) HK1258299A1 (en)
WO (1) WO2016077934A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106815731A (en) * 2016-12-27 2017-06-09 华中科技大学 A kind of label anti-counterfeit system and method based on SURF Image Feature Matchings
WO2018078600A1 (en) * 2016-10-28 2018-05-03 Inegi - Instituto De Engenharia Mecânica E Gestão Industrial Device and method for identifying a cork stopper, and respective kit
US10061958B2 (en) * 2016-03-14 2018-08-28 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
CH713631A1 (en) * 2017-03-28 2018-09-28 Hapa Ag Swiss Printing Tech Method for authenticating a counterfeit-proof object.
CN109658392A (en) * 2018-12-05 2019-04-19 江西书源科技有限公司 The legal of water purifier peripheral equipment determines method
WO2019102072A1 (en) * 2017-11-24 2019-05-31 Heyday Oy Method and system for identifying authenticity of an object
EP3617950A1 (en) 2018-08-31 2020-03-04 Philippe Guesdon Concept System for communicating information relating to an object
CN112334919A (en) * 2018-04-26 2021-02-05 Ppg工业俄亥俄公司 Systems, methods, and interfaces for rapid generation of coatings
EP3627392A4 (en) * 2018-04-16 2021-03-10 Turing AI Institute (Nanjing) Co., Ltd. Object identification method, system and device, and storage medium
US10990950B2 (en) * 2019-02-25 2021-04-27 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
WO2021119104A1 (en) * 2019-12-09 2021-06-17 Nike Innovate C.V. Digital fingerprinting
EP3862921A1 (en) * 2020-02-05 2021-08-11 Datalogic IP Tech S.r.l. Unsupervised anchor handling for machine vision system
EP3928972A1 (en) * 2020-06-24 2021-12-29 Boegli-Gravures S.A. Engraved modulated piece
CN113935346A (en) * 2021-10-12 2022-01-14 南通大学 Commodity anti-counterfeiting code generation method based on trademark picture scrambling encryption
RU2775808C2 (en) * 2018-08-22 2022-07-11 Флорент Текнолоджиз, ЭлЭлСи Neural network systems and computer-implemented methods of identifying and/or evaluating one or more food products in visual input information
US11874220B2 (en) 2018-04-26 2024-01-16 Ppg Industries Ohio, Inc. Formulation systems and methods employing target coating data results
EP4049189A4 (en) * 2019-10-21 2024-02-28 Entrupy Inc. Shoe authentication device and authentication process
WO2024149837A1 (en) * 2023-01-13 2024-07-18 Novatec Generator for generating unique identifiers and authentication images from a single visual content item

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
WO2014022813A1 (en) 2012-08-02 2014-02-06 The 41St Parameter, Inc. Systems and methods for accessing records via derivative locators
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
US11244349B2 (en) * 2015-12-29 2022-02-08 Ebay Inc. Methods and apparatus for detection of spam publication
CN108492121B (en) * 2018-04-18 2021-09-07 景德镇止语堂陶瓷有限公司 System and method for verifying authenticity of hand-drawn tea set based on VR technology
US11715059B2 (en) 2018-10-12 2023-08-01 Walmart Apollo, Llc Systems and methods for condition compliance
EP3915072A4 (en) * 2019-01-23 2022-10-05 Cellr Pty Ltd Beverage producer authenticity verification method and system
JP7312560B2 (en) * 2019-01-31 2023-07-21 株式会社Screenホールディングス Information processing device, information processing method, information processing program, learning method, and trained model
US10922811B2 (en) * 2019-05-06 2021-02-16 Ford Global Technologies, Llc Object differentiation and identification
WO2020223929A1 (en) * 2019-05-08 2020-11-12 河北百林软木制品有限公司 Wooden plug encoding method and apparatus, wooden plug tracing method and apparatus, and electronic device
CN110188217A (en) * 2019-05-29 2019-08-30 京东方科技集团股份有限公司 Image duplicate checking method, apparatus, equipment and computer-readable storage media
CN112071037B (en) * 2019-06-11 2022-07-01 虹球环艺科技集团有限公司 Method for driving field indicator lamp
KR20190107614A (en) * 2019-09-02 2019-09-20 엘지전자 주식회사 User profiling method using event occurrence time
CN110535876B (en) * 2019-09-20 2024-03-12 成都建为精电科技有限责任公司 Anti-counterfeiting component with state encryption variable code and encryption data generation method thereof
US10755061B1 (en) 2019-09-30 2020-08-25 Snap Inc. Product verification in a messaging system
US12026862B2 (en) * 2019-10-11 2024-07-02 3M Innovative Properties Company Apparatus and methods for preprocessing images having elements of interest
FI20196125A1 (en) * 2019-12-23 2021-06-24 Truemed Oy Method for identifying authenticity of an object
GB202011767D0 (en) * 2020-07-29 2020-09-09 Ams Int Ag Determining the authenticity of an object
TWI766408B (en) * 2020-10-28 2022-06-01 英屬維京群島商恒聖智能系統整合股份有限公司 A method for verifying product authenticity and establishing authorized product data by fabric characteristics
DE102020215403A1 (en) 2020-12-07 2022-06-09 Robert Bosch Gesellschaft mit beschränkter Haftung Procedures for verifying the origin and/or identity of a product
US20220232813A1 (en) * 2021-01-23 2022-07-28 PestNotify Patent Holdco, LLC Insect Trap and Classification System
DE102021203081A1 (en) * 2021-03-26 2022-09-29 Robert Bosch Gesellschaft mit beschränkter Haftung Method and device for verifying an authenticity of an object and device for object assessment
CN113011528B (en) * 2021-04-28 2022-11-01 中国电子科技集团公司第五十四研究所 Remote sensing image small target detection method based on context and cascade structure
CN113379720B (en) * 2021-06-29 2022-08-09 云南昆船设计研究院有限公司 Tea cake anti-counterfeiting method based on tea cake image feature code
JP2023046978A (en) * 2021-09-24 2023-04-05 富士フイルムビジネスイノベーション株式会社 Collation device and program
US11941860B2 (en) * 2021-09-24 2024-03-26 Zebra Tehcnologies Corporation Computational load mitigation for image-based item recognition
US20230245133A1 (en) * 2022-01-31 2023-08-03 Walmart Apollo, Llc Systems and methods for assessing quality of retail products
US11948386B1 (en) 2023-07-06 2024-04-02 SpaceFarm LLC Artwork authenticity systems and methods

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5673338A (en) * 1993-06-10 1997-09-30 Verification Technologies, Inc. System for verification of unique items
US20060100964A1 (en) * 2003-06-25 2006-05-11 Tuv Rheinland Holding Ag Product protection gateway and method for checking the authenticity of products
US20090302101A1 (en) * 2006-06-14 2009-12-10 Guillaume Poizat Process for product traceability without addition or modification of the material using a digital signature obtained from one or more intrinsic product characteristics
US8090952B2 (en) * 2007-07-06 2012-01-03 Harris Scott C Counterfeit prevention system based on random positioning on a pattern
US20130173383A1 (en) * 2012-01-03 2013-07-04 Zortag Inc. Method Of, And System For, Authenticating And Custom Marketing Products In Response To Their Authentication
WO2013173408A1 (en) * 2012-05-18 2013-11-21 Sri International System and method for authenticating a manufactured product with a mobile device
US20140201094A1 (en) 2013-01-16 2014-07-17 Amazon Technologies, Inc. Unauthorized product detection techniques

Family Cites Families (69)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5267332A (en) 1991-06-19 1993-11-30 Technibuild Inc. Image recognition system
JPH07318787A (en) * 1994-05-26 1995-12-08 Canon Inc Automatic zoom device
US7654580B2 (en) * 1995-11-29 2010-02-02 Graphic Security Systems Corporation Self-authenticating documents with printed or embossed hidden images
US6031930A (en) * 1996-08-23 2000-02-29 Bacus Research Laboratories, Inc. Method and apparatus for testing a progression of neoplasia including cancer chemoprevention testing
US6396507B1 (en) * 1996-09-13 2002-05-28 Nippon Steel Corporation Data storage/access network system for zooming image and method of the storage/access
US6775417B2 (en) * 1997-10-02 2004-08-10 S3 Graphics Co., Ltd. Fixed-rate block-based image compression with inferred pixel values
US7162052B2 (en) * 1998-04-16 2007-01-09 Digimarc Corporation Steganographically encoding specular surfaces
US8027509B2 (en) * 2000-04-19 2011-09-27 Digimarc Corporation Digital watermarking in data representing color channels
KR100405060B1 (en) * 2000-08-24 2003-11-07 휴먼드림 주식회사 Enlarged Digital Image Providing Method and Apparatus Using Data Communication Networks
US7103205B2 (en) * 2000-11-24 2006-09-05 U-Systems, Inc. Breast cancer screening with ultrasound image overlays
GB0129369D0 (en) * 2001-12-07 2002-01-30 Filtrona United Kingdom Ltd Method and apparatus for marking articles
US7058202B2 (en) * 2002-06-28 2006-06-06 Ecole polytechnique fédérale de Lausanne (EPFL) Authentication with built-in encryption by using moire intensity profiles between random layers
US8171567B1 (en) * 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US20040148260A1 (en) * 2002-12-17 2004-07-29 Canon Kabushiki Kaisha Information processing apparatus, information processing system, information processing method, and program product
JP4823890B2 (en) * 2003-03-06 2011-11-24 ディジマーク コーポレイション Document authentication method
US7492937B2 (en) * 2004-05-26 2009-02-17 Ramsay Thomas E System and method for identifying objects of interest in image data
US20060013486A1 (en) * 2004-07-13 2006-01-19 Burns Peter D Identification of acquisition devices from digital images
US7489396B1 (en) * 2005-05-18 2009-02-10 Vie Group, Llc Spectrophotometric camera
EP3399462A1 (en) * 2005-09-05 2018-11-07 Alpvision SA Means for using microstructure of materials surface as a unique identifier
US9208394B2 (en) * 2005-09-05 2015-12-08 Alpvision S.A. Authentication of an article of manufacture using an image of the microstructure of it surface
US8812978B2 (en) * 2005-12-22 2014-08-19 Xerox Corporation System and method for dynamic zoom to view documents on small displays
FR2895541B3 (en) * 2005-12-23 2008-04-18 Signoptic Technologies Sarl METHOD FOR EXTRACTING A RANDOM SIGNATURE FROM A MATERIAL ELEMENT
US9033371B2 (en) * 2005-12-23 2015-05-19 Xerox Corporation Counterfeit prevention using miniature security marks
JP4770493B2 (en) * 2006-02-02 2011-09-14 富士ゼロックス株式会社 Remote indication system and remote indication method
US20070292034A1 (en) * 2006-03-03 2007-12-20 Tabankin Ira J Device and method for digitally watermarking an image with GPS data
US7945083B2 (en) * 2006-05-25 2011-05-17 Carestream Health, Inc. Method for supporting diagnostic workflow from a medical imaging apparatus
US8407220B2 (en) * 2006-09-28 2013-03-26 Augme Technologies, Inc. Apparatuses, methods and systems for ambiguous code-triggered information querying and serving on mobile devices
US20080095465A1 (en) * 2006-10-18 2008-04-24 General Electric Company Image registration system and method
CN101755290B (en) * 2007-06-01 2012-11-28 卡巴-诺塔赛斯有限公司 Authentication of security documents, in particular of banknotes
EP2003599A1 (en) * 2007-06-14 2008-12-17 Sick Ag Optoelectronic sensor and method for recording codes
US7973834B2 (en) * 2007-09-24 2011-07-05 Jianwen Yang Electro-optical foveated imaging and tracking system
US9729326B2 (en) * 2008-04-25 2017-08-08 Feng Lin Document certification and authentication system
FR2932588B1 (en) * 2008-06-12 2010-12-03 Advanced Track & Trace METHOD AND DEVICE FOR READING A PHYSICAL CHARACTERISTIC ON AN OBJECT
US8731301B1 (en) * 2008-09-25 2014-05-20 Sprint Communications Company L.P. Display adaptation based on captured image feedback
GB2464723A (en) 2008-10-24 2010-04-28 Ian Smith Product Identification and Authentication
US8780206B2 (en) * 2008-11-25 2014-07-15 De La Rue North America Inc. Sequenced illumination
PT10410T (en) * 2009-03-24 2009-09-24 Antonio Andrade SYSTEM OF REGISTRATION, COMPENSATION, MANAGEMENT AND ANALYSIS OF PURCHASE OR PERSONALIZED OFFER
DE102009022233A1 (en) 2009-05-20 2010-11-25 Feustel, Dietmar Use of a character string in systems of cryptography, statistics, simulation, randomization, slot machines and the like.
US20100296583A1 (en) * 2009-05-22 2010-11-25 Aten International Co., Ltd. Image processing and transmission in a kvm switch system with special handling for regions of interest
SG177518A1 (en) * 2009-07-09 2012-02-28 Bilcare Technologies Singapore Pte Ltd A reading device able to identify a tag or an object adapted to be identified, related methods and systems
US9292893B2 (en) * 2009-12-10 2016-03-22 Empire Technology Development Llc Chaotic watermarking for a digital image
US8971567B2 (en) * 2010-03-05 2015-03-03 Digimarc Corporation Reducing watermark perceptibility and extending detection distortion tolerances
CN103249574A (en) * 2010-08-17 2013-08-14 株式会社伪物识别技术研究所 Method for authenticity assessment easily performed by ordinary people using printed minute identification mark
CN103620650A (en) * 2011-06-21 2014-03-05 先进追踪和寻踪公司 Method and device for authenticating a tag
JP2013041387A (en) * 2011-08-15 2013-02-28 Sony Corp Image processing device, image processing method, imaging device, electronic device, and program
EP2786362A2 (en) * 2011-12-01 2014-10-08 Integrita Computing Systems India Private Limited A method of generation and transmission of secure tokens based on tokens generated by trng and split into shares and the system thereof
ITMI20120706A1 (en) * 2012-04-27 2013-10-28 St Microelectronics Srl AN INTEGRATED CIRCUIT CARD FOR AUTHENTICATION AND A METHOD FOR THE AUTHENTICATION OF THE INTEGRATED CIRCUIT CARD
KR20180094138A (en) * 2012-06-22 2018-08-22 닛본 덴끼 가부시끼가이샤 Verification method, verification system, verification device, and program therefor
US8712893B1 (en) * 2012-08-16 2014-04-29 Allstate Insurance Company Enhanced claims damage estimation using aggregate display
US9401153B2 (en) * 2012-10-15 2016-07-26 Digimarc Corporation Multi-mode audio recognition and auxiliary data encoding and decoding
CN105264568B (en) * 2013-04-04 2019-06-14 日本电气株式会社 Identifying system, recognition methods, matching unit and program
US9818150B2 (en) * 2013-04-05 2017-11-14 Digimarc Corporation Imagery and annotations
WO2014169238A1 (en) * 2013-04-11 2014-10-16 Digimarc Corporation Methods for object recognition and related arrangements
CN103310256B (en) * 2013-06-03 2016-05-11 何南炎 The preparation of the continuous antifalsification label in kind based on image comparison and discrimination method
US9356936B2 (en) * 2013-10-02 2016-05-31 Intralinks, Inc. Method and apparatus for managing access to electronic content
RU2667926C2 (en) * 2013-10-04 2018-09-25 Сикпа Холдинг Са Method and system for marking object having surface of conductive material
CN103702217A (en) 2013-12-09 2014-04-02 乐视网信息技术(北京)股份有限公司 Image showing method and device
CN106030615B (en) * 2013-12-17 2019-06-28 因富通国际有限公司 Composite information bearing device
US9800360B2 (en) * 2014-02-06 2017-10-24 Honda Motor Co., Ltd. Management of stations using preferences from social networking profiles
US20150310601A1 (en) * 2014-03-07 2015-10-29 Digimarc Corporation Methods and arrangements for identifying objects
US9720934B1 (en) * 2014-03-13 2017-08-01 A9.Com, Inc. Object recognition of feature-sparse or texture-limited subject matter
CN104123537B (en) 2014-07-04 2017-06-20 西安理工大学 A kind of quick auth method based on hand and personal recognition
US10277806B2 (en) * 2014-07-18 2019-04-30 Artincam Ltd. Automatic image composition
EP2991029A1 (en) * 2014-08-29 2016-03-02 Thomson Licensing Method for inserting features into a three-dimensional object and method for obtaining features from a three-dimensional object
US20160071101A1 (en) * 2014-09-09 2016-03-10 Tyson York Winarski Selfie financial security transaction system
JP6465625B2 (en) * 2014-10-10 2019-02-06 キヤノン株式会社 Control device, control method therefor, and program
WO2016202827A1 (en) * 2015-06-18 2016-12-22 Hicof Inc. Authentication feature in a barcode
US9947015B1 (en) * 2017-05-05 2018-04-17 Hector A Vildosola Analyzing digital images for authenticating memorabilia items
US20200027106A1 (en) * 2018-07-23 2020-01-23 Rok Mobile International Ltd. Sweepstakes campaign system and uses thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5673338A (en) * 1993-06-10 1997-09-30 Verification Technologies, Inc. System for verification of unique items
US20060100964A1 (en) * 2003-06-25 2006-05-11 Tuv Rheinland Holding Ag Product protection gateway and method for checking the authenticity of products
US20090302101A1 (en) * 2006-06-14 2009-12-10 Guillaume Poizat Process for product traceability without addition or modification of the material using a digital signature obtained from one or more intrinsic product characteristics
US8090952B2 (en) * 2007-07-06 2012-01-03 Harris Scott C Counterfeit prevention system based on random positioning on a pattern
US20130173383A1 (en) * 2012-01-03 2013-07-04 Zortag Inc. Method Of, And System For, Authenticating And Custom Marketing Products In Response To Their Authentication
WO2013173408A1 (en) * 2012-05-18 2013-11-21 Sri International System and method for authenticating a manufactured product with a mobile device
US20140201094A1 (en) 2013-01-16 2014-07-17 Amazon Technologies, Inc. Unauthorized product detection techniques

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3221690A4

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10061958B2 (en) * 2016-03-14 2018-08-28 Sys-Tech Solutions, Inc. Methods and a computing device for determining whether a mark is genuine
WO2018078600A1 (en) * 2016-10-28 2018-05-03 Inegi - Instituto De Engenharia Mecânica E Gestão Industrial Device and method for identifying a cork stopper, and respective kit
US10936865B2 (en) 2016-10-28 2021-03-02 Inegi-Instituto De Engenharia Mecanica E Gestao Industrial Device and method for identifying a cork stopper, and respective kit
CN106815731A (en) * 2016-12-27 2017-06-09 华中科技大学 A kind of label anti-counterfeit system and method based on SURF Image Feature Matchings
CH713631A1 (en) * 2017-03-28 2018-09-28 Hapa Ag Swiss Printing Tech Method for authenticating a counterfeit-proof object.
EP3714397A4 (en) * 2017-11-24 2021-01-13 Truemed Oy Method and system for identifying authenticity of an object
WO2019102072A1 (en) * 2017-11-24 2019-05-31 Heyday Oy Method and system for identifying authenticity of an object
EP3627392A4 (en) * 2018-04-16 2021-03-10 Turing AI Institute (Nanjing) Co., Ltd. Object identification method, system and device, and storage medium
CN112334919B (en) * 2018-04-26 2023-10-31 Ppg工业俄亥俄公司 System, method, and interface for rapid generation of paint
US11874220B2 (en) 2018-04-26 2024-01-16 Ppg Industries Ohio, Inc. Formulation systems and methods employing target coating data results
CN112334919A (en) * 2018-04-26 2021-02-05 Ppg工业俄亥俄公司 Systems, methods, and interfaces for rapid generation of coatings
RU2775808C2 (en) * 2018-08-22 2022-07-11 Флорент Текнолоджиз, ЭлЭлСи Neural network systems and computer-implemented methods of identifying and/or evaluating one or more food products in visual input information
RU2775808C9 (en) * 2018-08-22 2022-09-27 Флорент Текнолоджиз, ЭлЭлСи Neural network-based systems and computer-implemented methods for identifying and/or evaluating one or more food items present in a visual input
FR3085515A1 (en) * 2018-08-31 2020-03-06 Philippe Guesdon Concept SYSTEM FOR DISSEMINATING INFORMATION RELATING TO AN OBJECT
EP3617950A1 (en) 2018-08-31 2020-03-04 Philippe Guesdon Concept System for communicating information relating to an object
CN109658392A (en) * 2018-12-05 2019-04-19 江西书源科技有限公司 The legal of water purifier peripheral equipment determines method
US20230177461A1 (en) * 2019-02-25 2023-06-08 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
US12118509B2 (en) 2019-02-25 2024-10-15 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
US11907901B2 (en) 2019-02-25 2024-02-20 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
US10990950B2 (en) * 2019-02-25 2021-04-27 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
US20210248581A1 (en) * 2019-02-25 2021-08-12 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
US11687874B2 (en) 2019-02-25 2023-06-27 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
US11593783B2 (en) 2019-02-25 2023-02-28 Walmart Apollo, Llc Systems and methods of product recognition through multi-model image processing
EP4049189A4 (en) * 2019-10-21 2024-02-28 Entrupy Inc. Shoe authentication device and authentication process
US11790377B2 (en) 2019-12-09 2023-10-17 Nike, Inc. Digital fingerprinting
WO2021119106A1 (en) * 2019-12-09 2021-06-17 Nike Innovate C.V. Digital fingerprinting
WO2021119104A1 (en) * 2019-12-09 2021-06-17 Nike Innovate C.V. Digital fingerprinting
US20240029083A1 (en) * 2019-12-09 2024-01-25 Nike, Inc. Digital fingerprinting
US11948156B2 (en) 2019-12-09 2024-04-02 Nike, Inc. Digital fingerprinting
EP3862921A1 (en) * 2020-02-05 2021-08-11 Datalogic IP Tech S.r.l. Unsupervised anchor handling for machine vision system
US11308634B2 (en) 2020-02-05 2022-04-19 Datalogic Ip Tech S.R.L. Unsupervised anchor handling for machine vision system
WO2021260574A1 (en) * 2020-06-24 2021-12-30 Boegli-Gravures Sa Engraved modulated piece
EP3928972A1 (en) * 2020-06-24 2021-12-29 Boegli-Gravures S.A. Engraved modulated piece
CN113935346A (en) * 2021-10-12 2022-01-14 南通大学 Commodity anti-counterfeiting code generation method based on trademark picture scrambling encryption
WO2024149837A1 (en) * 2023-01-13 2024-07-18 Novatec Generator for generating unique identifiers and authentication images from a single visual content item
FR3145053A1 (en) * 2023-01-13 2024-07-19 Novatec Generate unique identifiers and authentication images from unique visual content

Also Published As

Publication number Publication date
US20180349695A1 (en) 2018-12-06
US20220130159A1 (en) 2022-04-28
EP3221690B1 (en) 2023-07-19
CN108291876B (en) 2022-03-15
US11256914B2 (en) 2022-02-22
EP3221690A1 (en) 2017-09-27
CN108291876A (en) 2018-07-17
US12026860B2 (en) 2024-07-02
HK1258299A1 (en) 2019-11-08
US10956732B2 (en) 2021-03-23
EP3221690A4 (en) 2018-04-18
US20200065577A1 (en) 2020-02-27

Similar Documents

Publication Publication Date Title
US12026860B2 (en) System and method for detecting the authenticity of products
US11379856B2 (en) Centralized databases storing digital fingerprints of objects for collaborative authentication
US11423641B2 (en) Database for detecting counterfeit items using digital fingerprint records
US20200226366A1 (en) Controlled authentication of physical objects
US11302016B2 (en) Determination method, determination system, determination device, and program
US11321964B2 (en) Loop chain digital fingerprint method and system
US20210142436A1 (en) Event-driven authentication of physical objects
US9171347B2 (en) System and method for analysis and authentication of covert security information using a smart device
US8903181B2 (en) Low cost unique identification generation using combination of patterns and unique code images
EP2869240A2 (en) Digital fingerprinting object authentication and anti-counterfeiting system
US7840028B2 (en) Authentication system and method
Yan et al. An IoT-based anti-counterfeiting system using visual features on QR code
CN106056183B (en) The printed medium of printing press readable image and the system and method for scanning the image
CN112465517A (en) Anti-counterfeiting verification method and device and computer readable storage medium
CN111932282B (en) Anti-counterfeiting detection method and device
EP3929806A2 (en) Local encoding of intrinsic authentication data
WO2014177220A1 (en) Detection of presence of a bar code in image data
CN114792394A (en) Information processing apparatus, recording medium, and information processing method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15860424

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

REEP Request for entry into the european phase

Ref document number: 2015860424

Country of ref document: EP