Counterfeit deterrence using full width array scans

ABSTRACT

Systems and methods are described that facilitate counterfeit deterrence in a printer or the like. A final image is scanned from a photoreceptor belt before or after transfer of the image to a print medium or from the print medium itself prior to output, and the scanned image data is assessed using a set of stored criteria to detect counterfeit signatures in the scanned image. Upon a determination that the scanned image includes a restricted image, and therefore contains one or more counterfeit image, the printer is shut down, electronically locked until serviced, and/or caused to damage or mark the printed counterfeit image(s).

BACKGROUND

The subject application relates to counterfeit detection and deterrenceof production of counterfeit documents. While the systems and methodsdescribed herein relate to xerographic platforms, it will be appreciatedthat the described techniques may find application in other printingsystems, other counterfeit detection systems, and/or other imageanalysis systems.

Every country has legal restrictions on the reproduction of banknoteimages. The counterfeiting of currency is a crime, and whilerestrictions vary from country to country, in some countries, anyreproduction of banknote images—even for artistic or advertising uses—isstrictly forbidden. Even in countries that allow some limited use ofbanknote images, there are specific rules and requirements.

A counterfeit deterrence system (CDS) has been placed by the CentralBank Counterfeit Deterrence Group (CBCDG) to deter the use of personalcomputers, digital imaging equipment, and software in the counterfeitingof banknotes. The CDS has been voluntarily adopted by hardware andsoftware manufacturers, and prevents personal computers and digitalimaging tools from capturing or reproducing the image of a protectedbanknote or other currency.

Counterfeit deterrence has been implemented in color printing products,relying on image processing in the scan or print path to detectbanknotes and prevent them from being reproduced. These solutionstypically require complete full page (or a portion of full page) imagesto be available in the submission, rip, and print process for analysis.The architecture of some printing systems, in particular high-endproduction systems, does not readily lend itself to this type ofsolution, especially for complex job structures. Moreover, conventionaltechniques do not analyze printed images.

Accordingly, there is an unmet need for systems and/or methods thatfacilitate overcoming the aforementioned deficiencies.

BRIEF DESCRIPTION

In accordance with various aspects described herein, systems and methodsare described that facilitate deterring counterfeit production ofrestricted documents. For example, a method for deterring counterfeitreproduction of documents comprises scanning an image to be output froma printer, comparing the scanned image to a library of restricted imagescomprising counterfeit signatures, determining whether the scanned imageincludes a restricted image by detecting corresponding counterfeitsignatures in the scanned image, and ceasing printer operation if thescanned image matches at least one restricted image.

According to another feature described herein, a counterfeit deterrencesystem comprises a scanner that scans an image to be output from aprinter, a counterfeit detector that receives the scanned image andcompares it to one or more stored criteria to detect counterfeitsignatures and determine whether the scanned image includes a restrictedimage, and a process controller that selectively controls printerprocesses upon a determination that the scanned image includes arestricted image.

Yet another feature relates to an apparatus for counterfeit detection,comprising means for transferring an image to a print medium, means forscanning an image on at least one of the means for transferring theimage to the print medium or the print medium itself, and means forassessing the scanned image against one or more stored criteria anddetermining whether the scanned image includes a counterfeit image. Theapparatus further comprises means for impeding output of the final imageon the print medium upon a determination that the scanned image is acounterfeit image.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a counterfeit deterrence system that preventscounterfeit document reproduction by analyzing printer output andincludes a photoreceptor belt or drum (or intermediate transfer belt)that is positioned adjacent a paper path and imparts an image on paperat an image transfer point as the paper passes the belt, where the FWAscanner is positioned to read the image off the photoreceptor belt ordrum (or intermediate transfer belt) prior to the image beingtransferred to paper (or other medium).

FIG. 2 is an illustration of the system wherein the FWA scanner ispositioned to read the latent image remaining on the photoreceptor beltor drum (or intermediate transfer belt) following transfer of the imageto paper (or other medium).

FIG. 3 is an illustration of the system, wherein the FWA scanner ispositioned along the paper path downstream of the photoreceptor belt andcaptures image data from an image transferred to paper or other medium.

FIG. 4 illustrates a method related to detecting restricted imagesduring a printing process and deterring document counterfeiting, inaccordance with various features.

FIG. 5 is an illustration of a system, wherein the FWA scanner ispositioned along the paper path downstream of a direct marking printer(e.g., an inkjet or the like) and captures image data from an imagetransferred to paper or other medium.

DETAILED DESCRIPTION

In accordance with various features described herein, systems andmethods are described that facilitate detecting and preventingcounterfeit production of documents using digital image processingsoftware, hardware, and the like. With reference to FIG. 1, acounterfeit deterrence system 10 that prevents counterfeit documentreproduction by analyzing printer output includes a photoreceptor beltor drum (or intermediate transfer belt or drum) 12 that is positionedadjacent a paper path 14 and imparts an image on paper at an imagetransfer point 16 as the paper passes the belt 12. It will beappreciated that the “photoreceptor belt” 12 may be a photoreceptordrum, an intermediate transfer belt, and intermediate transfer drum,etc., according to various embodiments described herein.

A full width array (FWA) scanner 18 is positioned at a leading side ofthe paper path 14 (e.g., upstream from the belt) and scans the belt todetect the image to be transferred to the paper. Although the scanner 18is described herein as a FWA scanner, it will be appreciated that anysuitable scanner with sufficient resolution can be employed inconjunction with the various systems, features, and aspects describedherein. By positioning the FWA scanner 18 between the last developmentstation or last intermediate transfer station (not shown) and transferpoint 16, a full page image can be captured and analyzed via known imageprocessing algorithms to determine whether restricted images are beingprinted. That is, the complete or final image as transferred to a printmedium (e.g., paper) is scanned and analyzed, in contrast toconventional systems and techniques that analyze partial or incompletedigital image data constructed at different times and locations in aprinter.

In one embodiment, the FWA scanner 18 transmits image informationdetected from the belt 12 to an image processor 20 that includes acounterfeit detector 22 and a process controller 24. The counterfeitdetector compares detected image data from the FWA scanner to a databaseor memory 26 having stored therein counterfeit indicator information(e.g., watermarks, holograms, multi-colored inks, embedded strips, othercounterfeit prevention signatures, etc.) to determine whether acounterfeiting event is occurring. The process controller 24periodically or continuously determines whether the image (or a portionthereof) detected by the FWA scanner 18 includes a restricted image, at28. For instance, the process controller receive an indication from thecounterfeit detector 22 that the detected image includes a restrictedimage, based on a comparison of the image to counterfeit indicatorinformation stored in the memory 26. The memory 26 also storescounterfeit detection software for execution by the image processor 20and various other components of the system.

According to an example, the memory 26 stores reference data andcriteria for identifying counterfeit images, such that when the FWAscanner 18 detects an image on the belt 12 that meets the criteria forbeing a restricted image, a counterfeiting event is determined to bepresent and the process controller 24 shuts down the printer or devicethat is being used to counterfeit the document(s), at 30. If nocounterfeit event is detected, then printing continues as normal, at 32.Similarity between a restricted image and the detected image can bedetermined using indicator information associated with the referencedata and criteria, using known mechanisms, such as watermarks,holograms, serial numbers, portraits, font size and/or position ofspecific letters, numbers, and/or characters, etc.

In one embodiment, similarity above a predetermined threshold willtrigger the process controller 24 to stop printing. For instance,different counterfeit indicators can be weighted and evaluated todetermine a level of similarity between the detected image and one ormore restricted images. In this manner, a detected image of a papercurrency can trigger a printer shutdown, while printing of a detectedimage of a photo of paper currency used in an advertisement with otherimagery and/or text can be permitted to continue.

If processing time requirements and/or FWA scanner placement do notallow the printer to be shut down before transfer of the image iscomplete, various actions can be taken, up to and including “lockingout” the system from further printing, and requiring the customer tocontact the manufacturer to unlock the system.

In FIG. 1, the FWA scanner 18 captures images off the xerographic orintermediate transfer belt before transfer, at a point where the fullimage has been placed on the belt. Each page image is captured by theFWA scanner, and image data is sent to one or more image processors 20.The counterfeit detector determines whether the page being printedcontains any restricted images. If no restricted images are found,printing proceeds as usual. If any restricted images are detected, theprinter is shutdown. Even if the sheet is through transfer by the timecounterfeit images are detected, shutdown may occur before the image is(fully) fused, or before the second side of a duplex image can betransferred.

In a related embodiment, the FWA scanner 18 can be placed after one ormore, but not necessarily all, separations of the image have been placedon the belt. In this embodiment, it is desirable that the detection of arestricted image be reliably performed without all color separations.

In another embodiment, one or more FWA scanners are employed at variouspoints in the printing process. In other embodiments, modification ofexisting counterfeit detection algorithms can be employed for analyzingreverse images, latent images, or images with limited separations.

The counterfeit deterrence system 10 facilitates evaluation of the fullpage image independent of the manner in which various document elements(e.g., variable data) are managed in the raster image processing (RIP)and image path. This is useful since, in many printing systemarchitectures, a fully resolved electronic image of the page to beprinted does not necessarily exist anywhere in the system at a singlepoint in time. The system also facilitates counterfeit deterrencewithout impacting document RIP time, and can be used for all documentand image formats supported by a printer in which the system 10 isemployed, without incremental development or validation costs whenadding new document formats or print paths. Moreover, the system andtechniques described herein need not employ a time-variable imageprocessing element in the real-time image path, thereby mitigatingpotential productivity impacts when printing images that are notrestricted. Still furthermore, the FWA scanner 18 may be used for imagequality and/or process controls applications.

A goal of conventional counterfeit deterrence systems is to disableprinting of any restricted images (e.g., to stop the printing processbefore any restricted images are transferred to paper). Using thesystems and techniques presented herein, some or all of a page may havebeen transferred to a sheet before it is determined that the pagecontained a restricted image. In this manner, the system 10 can:shutdown an associated printing machine before the second side of aduplexed sheet can be printed; shut down the printer in such as way asto physically damage any already-transferred sheets containingrestricted images, so that these sheets cannot be re-fed into the systemto print the second side; fault the machine so that recovery requiresreporting of the specific fault condition to the printer manufacturer;etc.

FIG. 2 is an illustration of a system 10′ wherein the FWA scanner 18 ispositioned downstream from the photoreceptor belt or drum 12 on thepaper path 14. The system comprises the photoreceptor belt or drum 12,which transfers one or more images to sheets of paper as the sheets passthrough a transfer point 16. The FWA scanner 18 scans the belt afterimage transfer to collect data associated with latent images on thebelt. For instance, the FWA scanner captures images off the xerographicor intermediate transfer belt after transfer to paper, and transmits thecaptured image data to the image processor 20. The counterfeit detectorcompares the captured latent image data and compares it to counterfeitindicia stored in the memory 26. A determination is made, at 28,regarding whether the captured image data is significantly similar oridentical to a restricted image. If so, then the process controller 24shuts down a printer in which the system 10′ is employed or takes otherremedial action to prevent completion of the counterfeit print job. Ifthe captured image does not match a restricted image, the printingcontinues unimpeded, at 32.

In other embodiments, the counterfeit detector 22 employs one or moremachine-executable algorithms, which may be stored in the memory 26, tocompare the captured image data to counterfeit indicia stored in thememory to evaluate whether a counterfeit condition is present. Forinstance, levels of similarity can be defined and compared to apredetermined threshold similarity level to determine whether thecaptured image data is similar enough to a restricted image to warrantpreventative action.

FIG. 3 is an illustration of a system 10″, wherein the FWA scanner 18 ispositioned along the paper path 14 downstream of the photoreceptor belt12 and captures image data from an image transferred to paper or othermedium. One advantage of scanning the output image on the printed sheetis that the counterfeit detection system can be externally mounted tothe output of a printer and wired into the printer (e.g., power supplyor the like) to shut it down upon detection of a counterfeit image.

The figure shows the photoreceptor belt or drum 12, which transfers oneor more images to sheets of paper as the sheets pass through a transferpoint 16. The FWA scanner 18 scans the sheets after transfer to collectimage data from transferred images. For instance, the FWA scannercaptures images from the paper after transfer, and transmits thecaptured image data to the image processor 20. The counterfeit detectorcompares the captured image data and compares it to counterfeit indiciastored in the memory 26. A determination is made, at 28, regardingwhether the captured image data is significantly similar or identical toa restricted image based on criteria stored in the memory 26. If so,then the process controller 24 shuts down the printer in which thesystem 10″ is employed or takes other remedial action to preventcompletion of the counterfeit print job. If the captured image does notmeet the criteria for being a restricted image, the printing continuesas normal, at 32.

In related embodiments, the counterfeit detector 22 employs one or moremachine-executable algorithms, which may be stored in the memory 26, tocompare the captured image data to counterfeit indicia stored in thememory to evaluate whether a counterfeit condition is present. Forinstance, levels of similarity can be established and compared to apredetermined threshold similarity level to determine whether thecaptured image data is substantially similar to a restricted image towarrant preventative action.

The use of the FWA scanner, as described herein, in a printing enginefor counterfeit detection differs from conventional systems or methods,which rely on analysis of document data prior to printing. Additionally,conventional systems and methodologies do not employ a FWA scanner tocapture an image off a xerographic or intermediate transfer belt or aprinted page for the purpose of counterfeit detection and deterrence.

FIG. 4 illustrates a method related to detecting restricted imagesduring a printing process and deterring document counterfeiting, inaccordance with various features. While the methods are described as aseries of acts, it will be understood that not all acts may be requiredto achieve the described goals and/or outcomes, and that some acts may,in accordance with certain aspects, be performed in an order differentthat the specific orders described.

At 52, images are scanned using a full width array (FWA) scanner or thelike. In one embodiment, the scanner is positioned to scan the whilethey are on a photoreceptor belt, as described with regard to FIGS. 1and 2. In another embodiment, the scanner scans the images after theyare printed on a page or sheet (e.g., after being run past the belt,which transfers the image(s) to the page).

At 54, a scanned image is assessed against a set of stored criteria todetermine whether all or a portion of the image contains counterfeitsignature(s). In one embodiment, a restricted image library includescounterfeit indicia, such as information related to anti-counterfeitmeasures (e.g., embedding strips, watermarks, holograms, microchips,serial numbers, anti-counterfeit graphics, etc.). The indicia can beweighted and/or summed to determine a level of similarity between thescanned image and the restricted image, and the aggregate similarityvalue can be compared to a predetermined threshold to determine whetherthe image is scanned similar enough to warrant printer shutdown or otherremedial action.

At 56, a determination is made regarding whether the scanned imagematches a restricted image based on the comparison at 54. If the scannedimage does not match a restricted image, then the method reverts to 52for continued monitoring. If the scanned image matches the restrictedimage, then at 58 anti-counterfeit measures are executed by the processcontroller 24. The anti-counterfeit measures may include, without beinglimited to, stopping a print job during which a restricted image isdetected, shutting down and/or electronically locking the printer,requiring manufacturer or supplier service to unlock the printer,physically marking or damaging documents in which counterfeit orrestricted images are detected, or a combination thereof.

FIG. 5 is an illustration of a system 10′″, wherein the FWA scanner 18is positioned along the paper path 14 downstream of a direct markingprinter 70 (e.g., an inkjet or the like) and captures image data from animage transferred to paper or other medium. An advantage of scanning theoutput image on the printed sheet is that the counterfeit detectionsystem can be externally mounted to the output of a printer and wiredinto the printer (e.g., power supply or the like) to shut it down upondetection of a counterfeit image.

The figure shows the direct marking printer 70, which transfers one ormore images to sheets of paper as the sheets pass through or adjacent toit. The FWA scanner 18 scans the sheets after image transfer to collectimage data from transferred images. For instance, the FWA scannercaptures images printed on the sheets, and transmits the captured imagedata to the image processor 20. The counterfeit detector compares thecaptured printed image data and compares it to counterfeit indiciastored in the memory 26. At 28, a determination is made regardingwhether the captured image data is significantly similar or identical toa restricted image based on criteria stored in the memory 26. If so,then the process controller 24 shuts down the printer in which thesystem 10′″ is employed or takes other remedial action to preventcompletion of the counterfeit print job. If the captured image does notmeet the criteria for being a restricted image, the printing continuesas normal, at 32.

In related embodiments, the counterfeit detector 22 employs one or moremachine-executable algorithms, which may be stored in the memory 26, tocompare the captured image data to counterfeit indicia stored in thememory to evaluate whether a counterfeit condition is present. Forinstance, levels of similarity can be established and compared to apredetermined threshold similarity level to determine whether thecaptured image data is substantially similar to a restricted image towarrant preventative action.

It will be appreciated that various of the above-disclosed and otherfeatures and functions, or alternatives thereof, may be desirablycombined into many other different systems or applications. Also thatvarious presently unforeseen or unanticipated alternatives,modifications, variations or improvements therein may be subsequentlymade by those skilled in the art which are also intended to beencompassed by the following claims.

The invention claimed is:
 1. A counterfeit deterrence system,comprising: a photoreceptor comprising at least one of a photoreceptorbelt, a photoreceptor drum, an intermediate transfer belt, or anintermediate transfer drum; a scanner arranged to view a complete,transferable image on the photoreceptor as to be output by a printer toa print medium so as to scan the complete, transferable image andcapture a scanned image corresponding to the complete, transferableimage; a counterfeit detector that receives the scanned image andcompares it to at least one stored criteria from an associated memory todetect counterfeit signatures resulting in at least one correspondingcriteria comparison, weights the at least one criteria comparisonresulting in at least one corresponding weighted criteria comparison,determines a level of similarity between the scanned image and at leastone restricted image stored in the associated memory using the at leastone weighted criteria comparison, and determines whether the scannedimage includes a restricted image based at least in part on a determinedlevel of similarity relative to a predetermined threshold stored in theassociated memory; and a process controller that selectively controlsprinter processes upon a determination that the scanned image includes arestricted image.
 2. The system of claim 1, wherein the scanner is afull width array (FWA) scanner.
 3. The system of claim 1, wherein theprocess controller electronically locks the printer and prevents furtheroperation upon a determination by the counterfeit detector that thescanned image includes a restricted image.
 4. The system of claim 3,wherein the process controller maintains the printer in a locked stateuntil unlocked by a supplier or manufacturer.
 5. The system of claim 1,wherein the process controller causes the printer to physically markprinted sheets output by the printer as counterfeit upon a determinationby the counterfeit detector that the scanned image includes a restrictedimage.
 6. The system of claim 1, wherein the process controller causesthe printer to physically damage printed sheets output by the printerupon a determination by the counterfeit detector that the scanned imageincludes a restricted image.
 7. The system of claim 1, wherein thescanner is positioned upstream of at least one of the photoreceptor beltor the intermediate transfer belt on a print medium path and scans thecomplete, transferable image from the at least one of the photoreceptorbelt or the intermediate transfer belt prior to transfer of thecomplete, transferable image to a print medium.
 8. The system of claim1, wherein the scanner is arranged to view the photoreceptor subsequentto a last development station or to a last intermediate transfer stationand prior to a transfer point of the complete, transferable image to theoutput medium.
 9. A counterfeit deterrence system, comprising: aphotoreceptor, wherein the photoreceptor is a photoreceptor belt, aphotoreceptor drum, an intermediate transfer belt, or an intermediatetransfer drum; a scanner positioned between a last development stationor a last intermediate transfer station and a transfer point of aprinter configured to view the photoreceptor and configured to capture afull page image from the photoreceptor, wherein the full page imagecomprises a complete, transferable image as to be output by the printerto a print medium prior to transfer of the complete, transferable imageto the print medium; a counterfeit detector that receives the capturedfull page image and compares it to at least one stored criteria from anassociated memory to detect counterfeit signatures resulting in at leastone corresponding criteria comparison, weights the at least one criteriacomparison resulting in at least one corresponding weighted criteriacomparison, determines a level of similarity between the captured fullpage image and at least one restricted image stored in the associatedmemory using the at least one weighted criteria comparison, anddetermines whether the captured full page image includes a restrictedimage based at least in part on a determined level of similarityrelative to a predetermined threshold stored in the associated memory;and a process controller that selectively controls printer processesupon a determination that the captured full page image includes arestricted image.
 10. The system of claim 9, wherein the scanner is afull width array (FWA) scanner.