Authentication of secure items by shape level lines

Image analysis – Applications

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S155000, C713S176000, C380S258000

Reexamination Certificate

active

11149017

ABSTRACT:
The disclosed method and system may be used for creating advanced protection means for secure items (e.g. bank notes, identity documents, certificates, checks, diploma, travel documents, tickets) and valuable products (e.g CD-ROMs, DVD's, prescription drugs, products with affixed labels, watches). Secure items are authenticated by shape level lines. The shape level lines become apparent when superposing a base layer comprising sets of lines and a revealing layer comprising a line grating. One of the two layers is a modified layer which embeds a shape elevation profile generated from an initial, preferably bilevel, motif shape image. By modifying the relative superposition phase of the revealing layer on top of the base layer or vice-versa (e.g. by translation or rotation), shape level lines grow and shrink dynamically. In the case that these shape level lines are present, the secure item is accepted as authentic. Otherwise the item is rejected as suspect.

REFERENCES:
patent: 4761253 (1988-08-01), Antes
patent: 4984824 (1991-01-01), Antes et al.
patent: 5018767 (1991-05-01), Wicker
patent: 5032003 (1991-07-01), Antes
patent: 5396559 (1995-03-01), McGrew
patent: 5694229 (1997-12-01), Drinkwater
patent: 5708717 (1998-01-01), Alasia
patent: 5712731 (1998-01-01), Drinkwater et al.
patent: 5790703 (1998-08-01), Wang
patent: 5995638 (1999-11-01), Amidror et al.
patent: 5999280 (1999-12-01), Huang
patent: 6249588 (2001-06-01), Amidror
patent: 6273473 (2001-08-01), Taylor et al.
patent: 6494491 (2002-12-01), Zeiter et al.
patent: 6819775 (2004-11-01), Amidror
U.S. Appl. No. 09/477,544 (Ostromoukhov, Hersch), Method and apparatus for generating digital halftone images by multi color dithering, filed Jan. 4, 2000.
U.S. Appl. No. 10/270,546, (Hersch, Chosson), “Authentication of documents and articles by moireé patterns”, filed Oct. 16, 2002.
U.S. Appl. No. 10/879,218, (Hersch, Chosson), “Model-based synthesis of band moire images for authenticating security documents and valuable articles”, filed Jun. 30, 2004.
U.S. Appl. No. 10/440,355, (Hersch, Emmel, Collaud), Reproduction of security documents and color images with metallic inks, filed May 19, 2003.
U.S. Appl. No. 10/284,551, (Z. Fan, S Wang), Anti-counterfeiting see-through security feature using line patterns, filed Oct. 30, 2002.
I. Amidror, The Theory of the Moiré Phenomenon, Kluwer Academic Publishers, 2000, Chapter 10, Moiré between repetitive non-periodic layer, pp. 249-352 and Chapter 11, Other possible approaches for moiré analysis, pp. 353-374.
J. Huck, Mastering Moirés. Investigating Some of the Fascinating Properties of Interference Patterns, 2003, paper available by contacting the author, see http://pages.sbcglobal.net/joehuck/Pages/kit.html.
A.K. Jain, Fundamentals of Digital Image Processing, Prentice Hall, 1989, sections “Skeleton algorithms” and “thinning algorithms”, pp. 382-383 and section “Morphological Processing”, pp. 384-389.
J.S. Marsh, Contour Plots using a Moiré Technique, American Journal of Physics, vol. 48, Jan. 1980, 39-40.
J.F. Moser, Document Protection by Optically Variable Graphics in Optical Document Security, Ed. R.L. Van Renesse, Artech House, London, 1998, pp. 247-266.
V. Ostromoukhov and R. D. Hersch, Multi-color and artistic dithering, SIGGRAPH Annual Conference, 1999, pp. 425-432.
K. Patorski, The moiré Fringe Technique, Elsevier 1993, pp. 14-16.
A. Rosenfeld and J. Pfaltz, “Sequential operations in digital picture processing,” Journal of the Association for Computing Machinery, vol. 13, No. 4, 1966, pp. 471-494.
B. Saleh, M.C. Teich, Fundamentals of Photonics, John Wiley, 1991, p. 116.
R.L. van Renesse, in Optical Document Security, 2nd ed., 1998, Artech House, Sections 9.3.1 Parallax Images and 9.3.2 Embossed Lens Patterns, pp. 207-210 (part of Chapter 9: Noniridescent Optically Variable Devices).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Authentication of secure items by shape level lines does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Authentication of secure items by shape level lines, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Authentication of secure items by shape level lines will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3876451

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.