Method for determining authenticity using images that exhibit parallax

ABSTRACT

A method for determining the validity of a parallax image, comprising: receiving a captured two-dimensional image of a parallax image having at least three target identifiers, where at least two target identifiers are located at different depth planes in the parallax image; identifying the at least three target identifiers in the captured two-dimensional image of the parallax image and determining the spatial relationship between the at least three target identifiers in the two-dimensional image of the parallax image; comparing the spatial relationship of the at least three target identifiers in the captured two-dimensional image of the parallax image against a predetermined spatial relationship of the at least three target identifiers that indicates authenticity; and adjudicating the authenticity of the parallax image based on the degree of difference between the spatial relationship of the at least three target identifiers in the captured two-dimensional image of the parallax image and the predetermined spatial relationship of the at least three target identifiers.

CROSS-REFERENCE TO RELATED APPLICATIONS

This is a Continuation of application Ser. No. 15/998,926 filed Aug. 17,2018, which in turn is a National Phase Application of PCT ApplicationNo. PCT/IB2017/050872 filed Feb. 16, 2017, which claims the benefit ofProvisional Application No. 62/296,316 filed Feb. 17, 2016. Thedisclosure of the prior applications is hereby incorporated by referenceherein in its entirety.

TECHNICAL FIELD

This disclosure relates to authentication, brand protection,anti-counterfeiting, and to methods for authentication designed to beused with images that exhibit parallax such as certain types ofholograms. More specifically, the disclosure relates to methods forvalidation based on holograms exhibiting parallax, and to the use ofholographic elements for conveying information or data. Authenticationmethods using particular devices such as smart phone cameras andflashes, communication interfaces, computer processors, and downloadableapplications for smart phones, tablets, and computers are alsodisclosed.

BACKGROUND OF THE DISCLOSURE

Authentication, brand protection and anti-counterfeiting have a widerange of applications. These relate generally to verifying theauthenticity of commercial goods, consumable products including food andbeverages, medicines, clothing and accessories, electronic devices,currency, passports and other government or non-governmental ID cards(e.g., academic IDs, corporate IDs), tickets, key cards, documents, andother uses where authentication, brand protection, oranti-counterfeiting is necessary or desirable. The term “authentication”may be used to refer to all related applications such as brandprotection and anti-counterfeiting collectively. Authentication works byverifying the provenance of an item or document and therefore verifyingthat the item or document is not a counterfeit, knockoff or fake.

Images used in authentication possess increasing value in relation tothe difficulty of copying or mimicking them and the relative simplicityof equipment and methods needed for verifying their authenticity. Forexample, holograms that require complex or expensive equipment forauthentication will have reduced ranges of applications for economic andother considerations, especially if the equipment is not easilyportable. Holograms may contain overt and/or covert elements. Simpleholograms, such as two-dimensional embossed or color-shift holograms,have overt elements such as appearance or disappearance of an image orcolor shift as the hologram is pivoted at different angles to incidentlight. Simple holograms commonly applied on credit cards are examples oftwo-dimensional embossed holograms. Such holographic elements are overtand rely on subjective or intuitive verification by a human observer.These holograms are relatively easy and inexpensive to copy or mimic,providing little real security for end users, merchants, or others whomay need to rely upon them.

Holograms exhibiting parallax are generally more difficult to copy orimitate convincingly than embossed holograms. To produce a hologram thatexhibits parallax, an object to be imaged is illuminated with collimatedlight (e.g., from a laser) and a light sensitive recording medium (e.g.,a photographic plate) is positioned so as to receive light reflectedfrom the object. Each point on the object reflects light to the entirerecording medium, and each point on the medium receives light from theentire object. This beam of reflected light is known as the object beam.At the same time, a portion of the collimated light is beamed by amirror directly to the medium, by-passing the object. This beam is knownas the reference beam. What is recorded on the recording medium is theinterference pattern that results from the interaction of the referencebeam and the object beam impinging on the medium. When the processedrecording medium is subsequently illuminated and observed appropriately,the light from the illuminating source is diffracted by the hologram toreproduce the wave-front that originally reached the medium from theobject, so that the hologram resembles a window through which a virtualimage of the object is observed in full three-dimensional form, completewith parallax.

There are continuing and growing needs for images that are increasinglydifficult to counterfeit, copy or imitate convincingly, and there isalso a need for systems and methods that can validate images withcommonly available portable equipment. There are also continuing andgrowing needs for secure digital verification image systems forobjective, rapid, and reliable authentication using simple portableequipment.

SUMMARY OF THE DISCLOSURE

According to a first aspect of the invention there is provided a methodfor determining the validity of a parallax image, comprising: receivinga captured two-dimensional image of a parallax image having at leastthree target identifiers, wherein at least two target identifiers arelocated at different depth planes in the parallax image; identifying theat least three target identifiers in the captured two-dimensional imageof the parallax image and determining the spatial relationship betweenthe at least three target identifiers in the two-dimensional image ofthe parallax image; comparing the spatial relationship of the at leastthree target identifiers in the captured two-dimensional image of theparallax image against a predetermined spatial relationship of the atleast three target identifiers that indicates authenticity; andadjudicating the authenticity of the parallax image based on the degreeof difference between the spatial relationship of the at least threetarget identifiers in the captured two-dimensional image of the parallaximage and the predetermined spatial relationship of the at least threetarget identifiers.

Typically, the spatial relationship of the at least three targetidentifiers comprises a ratio of the lengths of vectors linking thetarget identifiers. The spatial relationship of the at least threetarget identifiers in the captured two-dimensional image of the parallaximage may typically be compared against a digital model of the spatialrelationship between the at least three target identifiers of a masterparallax image against which the authenticity of the parallax image isbeing determined. Such a digital model may typically comprise thepredetermined spatial relationship.

The method may further comprise the steps of capturing multipletwo-dimensional images of a master parallax image taken from multipleperspectives; identifying at least three target identifiers in eachcaptured two-dimensional image of the master parallax image; creating aplurality of vectors linking the target identifiers in each of thecaptured two-dimensional images of the master parallax image;determining the ratio of the lengths of the vectors linking the targetidentifiers in each of the captured two-dimensional images of the masterparallax image; and generating a digital model for the master parallaximage that captures the ratio of the lengths of the vectors linking thetarget identifiers in each of the captured two-dimensional images of themaster parallax image, wherein the digital model comprises thepredetermined spatial relationship. These steps are typically carriedout before the receiving of the captured two-dimensional image of aparallax image.

The method may comprise the steps of creating a plurality of vectorslinking the target identifiers in the captured two-dimensional image ofthe parallax image; and determining the ratio of the lengths of thevectors linking the target identifiers in the captured two-dimensionalimage of the parallax image, and wherein the step of comparingcomprises: accessing the digital model for the master parallax image;comparing the vector length ratio determined from the capturedtwo-dimensional image of the parallax image against vector length ratiovalues captured in the digital model for the master parallax image; andcalculating the difference between the vector length ratio for thecaptured two-dimensional image of the parallax image and the vectorlength ratios from the digital model for the master parallax image; andwherein the adjudicating is based on whether the difference between thevector length ratio from the captured two-dimensional image of theparallax image and the vector length ratio from the digital model forthe master parallax image are within an acceptable predetermined margin.

The method may further comprise determining the perspective relative tothe master parallax image of each of the multiple two-dimensional imagesof the master parallax image; and inputting the coordinates of theperspective of each two-dimensional image of the master parallax imageinto the digital model for the master parallax image and associatingsuch perspective coordinates with the ratio of the lengths of thevectors linking the target identifiers in each of the respectivetwo-dimensional images of the master parallax image captured in thedigital model for the master parallax image; determining the perspectiverelative to the parallax image of the received captured two-dimensionalimage of the parallax image; comparing the vector length ratiodetermined from the captured two-dimensional image of the parallax imageagainst the vector length ratio captured from the digital model for themaster parallax image for substantially the same perspectivecoordinates; calculating the difference between the vector length ratiofor the captured two-dimensional image of the parallax image and thecorresponding vector length ratio of the digital model for substantiallythe same perspective coordinates; and adjudicating the authenticity ofthe captured two-dimensional image of the parallax image based onwhether the differences between the vector length ratio from thecaptured two-dimensional image of the parallax image and the vectorlength ratio values from the digital model for substantially the sameperspective coordinates are within an acceptable predetermined margin.

The method may further comprise receiving a plurality of capturedtwo-dimensional images of a parallax image; identifying at least threetarget identifiers in each of the plurality of captured two-dimensionalimages of the parallax image; creating a plurality of vectors linkingthe target identifiers in each of the plurality of capturedtwo-dimensional images of the parallax image; and determining the ratioof the lengths of the vectors linking the target identifiers in each ofthe plurality of captured two-dimensional images of the parallax image;accessing the digital model for the master parallax image; comparing thevector length ratio determined from each of the plurality of capturedtwo-dimensional images of the parallax image against vector length ratiovalues captured in the digital model for the master parallax image;calculating the difference between the vector length ratio for each ofthe plurality of captured two-dimensional images of the parallax imageand the vector length ratios from the digital model for the masterparallax image; and adjudicating the authenticity of the capturedtwo-dimensional image of the parallax image based on whether thedifference between the vector length ratio from each of the plurality ofcaptured two-dimensional image of the parallax image and the vectorlength ratio from the digital model for the master parallax image arewithin an acceptable predetermined margin.

Where the method comprises receiving a plurality of capturedtwo-dimensional images of a parallax image, the method may comprisecomparing the vector length ratio determined from each of the pluralityof captured two-dimensional images of the parallax image against thecorresponding vector length ratio in the digital model for substantiallythe same perspective coordinates as each of the plurality of capturedtwo-dimensional images of the parallax image.

Typically the parallax image is an image exhibiting parallax generatedfrom a hologram. Preferably the parallax image exhibits full parallax.Similarly, the master parallax image is typically an image exhibitingparallax generated from a hologram. Preferably the master parallax imageexhibits full parallax. At least one of the parallax image and themaster parallax image may comprise a lenticular image or a micro-lensimage.

In an embodiment, the parallax image may be provided on a document ofvalue such as a passport, identity card, driving licence, bank card,bank note or security label. This advantageously allows for checking theauthenticity of such a document of value and, in accordance with asecond aspect of the invention there is provided method of determiningthe validity of a document of value comprising a parallax image,comprising the method of any of the first aspect of the invention.

In accordance with a third aspect of the invention there is provided acomputer program product comprising one or more computer-readable mediahaving thereon computer-executable instructions that, when executed byone or more processors of a computer, causes the one or more processorsof the computer to perform the method of the first or second aspects.

In accordance with a fourth aspect of the invention there is provided adigitally executable authentication system for determining the validlyof a parallax image that executes the steps comprising: receivingmultiple two-dimensional images of a master parallax image taken frommultiple perspectives; identifying at least two pairs of targetidentifiers in each two-dimensional image of the master parallax image;creating a plurality of vectors linking the target identifiers in eachof the two-dimensional images of the master parallax image; determiningthe ratio of the lengths of the vectors linking the target identifiersin each of the two-dimensional images of the master parallax image; andgenerating a digital model that captures the ratio of the lengths of thevectors linking the target identifiers in each of the two-dimensionalimages of the master parallax image; receiving a capturedtwo-dimensional image of a possible duplicate of the master parallaximage; identifying at least two pairs of target identifiers in thecaptured two-dimensional image of the possible duplicate of the masterparallax image; creating a plurality of vectors linking the targetidentifiers in the captured two-dimensional image of the possibleduplicate of the master parallax image; and determining the comparativeratio of the lengths of the vectors linking the target identifiers inthe captured two-dimensional image of the possible duplicate of themaster parallax image; accessing the digital model; comparing the vectorlength ratio determined from the captured two-dimensional image of thepossible duplicate of the master parallax image against vector ratiovalues captured in the digital model; calculating the difference betweenthe vector length ratios for the captured two-dimensional image of thepossible duplicate of the master parallax image and the vector lengthratios of the digital model; and adjudicating the authenticity of thecaptured two-dimensional image of the possible duplicate of the masterparallax image based on whether the differences between the vectorlength ratio values from the captured two-dimensional image of thepossible duplicate of the master parallax image and the vector lengthratio values from the digital model are within an acceptablepredetermined margin.

Typically the parallax image is an image exhibiting parallax generatedfrom a hologram. Preferably the parallax image exhibits full parallax.Similarly, the master parallax image is typically an image exhibitingparallax generated from a hologram. Preferably the master parallax imageexhibits full parallax. At least one of the parallax image and themaster parallax image may comprise a lenticular image or a micro-lensimage.

The digitally executable authentication system may execute the steps ofcapturing the perspective relative to the master parallax image of eachof the multiple two-dimensional images of the master parallax image; andinputting the respective coordinates of the perspective of eachtwo-dimensional image of the master parallax image into the digitalmodel and associating such perspective coordinates with the ratio of thelengths of the vectors linking the target identifiers in each of therespective two-dimensional images of the master parallax image;determining the perspective relative to the possible duplicate of themaster parallax image of the received captured two-dimensional image ofa possible duplicate of the master parallax image; comparing the vectorlength ratio determined from the captured two-dimensional image of thepossible duplicate of the master parallax image against vector lengthratio values captured in the digital model for substantially the sameperspective coordinates; calculating the difference between the vectorlength ratio for the captured two-dimensional image of the possibleduplicate of the master parallax image and the corresponding vectorlength ratio of the digital model for substantially the same perspectivecoordinates; and adjudicating the authenticity of the capturedtwo-dimensional image of the possible duplicate of the master parallaximage based on whether the difference between the vector length ratiovalues from the captured two-dimensional image of the possible duplicateof the master parallax image and the vector length ratio value from thedigital model for substantially the same perspective coordinates arewithin an acceptable predetermined margin.

The digitally executable authentication system may execute the steps ofreceiving a plurality of captured two-dimensional images of a possibleduplicate of the master parallax image; identifying at least two pairsof target identifiers in each of the plurality of capturedtwo-dimensional images of the possible duplicate of the master parallaximage; creating a plurality of vectors linking the target identifiers ineach of the plurality of captured two-dimensional images of the possibleduplicate of the master parallax image; and determining the comparativeratio of the lengths of the vectors linking the target identifiers ineach of the plurality of captured two-dimensional images of the possibleduplicate of the master parallax image; determining the perspectiverelative to the possible duplicate of the master parallax image of eachof the plurality of received captured two-dimensional images of apossible duplicate of the master parallax image; comparing the vectorlength ratio determined from each of the plurality of capturedtwo-dimensional images of the possible duplicate of the master parallaximage against corresponding vector length ratio in the digital model forsubstantially the same perspective coordinates as each of the pluralityof captured two-dimensional images of the possible duplicate of themaster parallax image; calculating the difference between the vectorlength ratio for each of the plurality of captured two-dimensionalimages of the possible duplicate of the master parallax image and thecorresponding vector length ratio of the digital model for substantiallythe same perspective coordinates; and adjudicating the authenticity ofthe captured two-dimensional image of the possible duplicate of themaster parallax image based on whether the difference between the vectorlength ratio values from each of the plurality of capturedtwo-dimensional images of the possible duplicate of the master parallaximage and the corresponding vector length ratio values from the digitalmodel for substantially the same perspective coordinates are within anacceptable predetermined margin.

In accordance with a fifth of the invention there is provided adigitally executable authentication system for determining the validityof a document of value comprising a parallax image, comprising thesystem of the fourth aspect.

In accordance with a sixth aspect of the invention there is provided amethod for validating a hologram having parallax comprising: creating afirst hologram exhibiting parallax and containing at least three targetidentifiers, at least two of which are located on differing depthplanes; capturing still images of the first hologram from multipleviewing perspectives; recording the coordinates of the viewingperspective from which each image is captured relative to the firsthologram; identifying at least two pairs of target identifiers in eachof the captured images of the first hologram; generating vectors linkingthe at least two pairs of target identifiers in each captured image ofthe first hologram; determining the relative vector length ratios of thegenerated vectors linking the target identifiers in each image of thefirst hologram; recording the vector length ratios for each image alongwith the coordinates of the viewing perspective for each image; usingthe recorded vector length ratios for each image along with the imagecoordinates to generate a first hologram digital model that determinesthe vector length ratio for a complete set of possible perspectives fromwhich the first hologram is viewed; determining whether a secondhologram exhibiting parallax is an authentic duplicate of the firsthologram by illuminating the second hologram with a point light sourceand capturing an image of the illuminated second hologram; calculatingthe coordinates of the viewing perspective of the captured imagerelative to the second hologram; identifying the at least two pairs oftarget identifiers that were identified in the first hologram in thecaptured image of the second hologram; creating vectors linking thetarget identifiers in the captured image of the second hologram, anddetermining the ratio of the lengths of the vectors linking the targetidentifiers in the second hologram; calculating the difference betweenthe vector length ratio from the second hologram against thecorresponding vector length ratio determined from the first hologramdigital model for the perspective coordinates from which the image ofthe second hologram was captured; adjudicating the authenticity of thesecond hologram based on whether the difference between the vectorlength ratio from the captured image of the second hologram and thecorresponding vector length ratio values from the first hologram digitalmodel are within an acceptable predetermined margin; and communicatingthe authentication determination to an evaluator of the second hologram.

The capturing an image of the illuminated second hologram may beperformed with a scanning device selected from cameras, scanners, anddigital recorders. The scanning device may be a smart phone equippedwith a camera and a point light source.

The foregoing method steps in other embodiments may optionally includeat least one step for acquiring coded or non-coded data, information, orimages of any kind.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1a is a plan view image of a full parallax hologram;

FIG. 1b shows an image of the hologram of FIG. 1a viewed from anotherperspective;

FIG. 1c show the hologram as shown in FIG. 1b with designated targetidentifiers and directional vectors connecting the target identifiers;

FIG. 2a is a captured image of a full parallax hologram;

FIG. 2b shows identification and digital measurement of indiscreteidentifiers of the image in FIG. 2a with designated target identifiersand directional vectors connecting the target identifiers;

FIG. 3 is a block diagram of a hologram validation system according to adisclosed embodiment.

DETAILED DESCRIPTION

Unless otherwise stated or defined, all technical and scientific termsused herein have commonly understood meanings by one of ordinary skillin the art to which this disclosure pertains.

When the term “about” is used in describing a value or an end-point of arange, the disclosure should be understood to include the specific valueor end-point referred to.

As used herein, the term “substantially” means being of considerabledegree, almost all. If tolerance for comparing stored and observedvalues are “substantially” the same or equal, then those observed valuesfall within the stored range with any tolerance values included.

References in the singular may also include the plural (for example, “a”and “an” may refer to one, or one or more) unless the contextspecifically states otherwise.

Unless otherwise indicated, the terms set forth below have the intendedmeanings assigned to them.

“Digital” in addition to its ordinary meanings, is intended to encompassany digital media capable of simulating real parallax upon viewing,including computer modeling and digital stereography.

“Hologram” is intended to substantially mean a two-dimensional object,such as a label with an image in which the image has a reproducedviewing range that provides perception of depth and in detail of theimage beyond what is typically viewed in a two-dimensional image.Holograms are typically fixed in a three-dimensional holographic film.Holograms include light interference patterns.

“Holographic” is intended to encompass any medium capable of generatingan image that appears to be three-dimensional including media havingreal parallax upon viewing, such as optical volume holograms, and mediathat can simulate parallax on viewing, such as embossed holograms. Byway of illustration and not limitation, photoimageable film isholographic.

“Optical” in addition to its commonly understood meanings, may alsoencompass any medium using optical elements, lenses, mirrors, anddiffraction elements, capable of generating an image that appears to bethree-dimensional or multi-channel upon viewing, such as lenticularimages and micro-lens images.

“Parallax” is an apparent change in the position of an object resultingfrom a change in position of an observer viewing the object. An imagehas parallax if the image changes realistically with a change in therelative position of the observer. In a holographic image, if severalobjects were present when the hologram was recorded, the image hasparallax if the holographic reconstructed objects move relative to oneanother with a change in the relative position of the observer in thesame manner that the original objects would have moved relative to eachother with the change in the viewing perspective.

“Parallax image” is a three-dimensional image that changes realisticallywith a change in the relative position of the observer such as aholographic image, a lenticular image or a micro-lens image thatexhibits parallax.

“Point cloud” is intended to encompass any set of data points in athree-dimensional coordinate system, typically defined by x, y, and zaxes, whether the data points corresponding to an element's coordinatesare fixed or flexible. The point cloud data and the rigid body data willmatch in an authentic hologram or holographic element either exactly orwithin pre-determined tolerance limits.

“Print” in addition to its ordinary meanings encompasses any printedmedia capable of generating an image that appears to bethree-dimensional or multi-channel upon viewing, and may include colorshift inks.

“Rigid body” encompasses any idealization of a solid body, typicallyrepresented as a collection of point elements. This definition is meantto include both perfectly rigid bodies in which deformation can beneglected, as well as semi-flexible bodies in which deformations arereasonably known or expected and are predictable. An example of a rigidbody as that term is used in this disclosure is a holographic elementcontaining three identifiers in a triangular shape. The triangle definedby these three points is a rigid body.

“Two pairs” is understood to mean both two mutually exclusive pairscomprising four identifiers in total, as well as two pairs in which asingle point is redundant in both pairs, comprising three identifiers intotal.

In one embodiment, there is provided a holographic element comprising areconstructable vector-based perspective element comprising at least twoidentifiers optically fixed in space within an imageable holographicfilm at varying depths so that they are not in the same plane, the filmincluding a parallax image. The at least two identifiers out of planewith each other and the parallax image comprise a rigid body and a pointcloud in a master scene in the hologram.

In an embodiment, the holographic element comprises at least two pairsof identifiers all of which are out of plane with each other. In anotherembodiment, the holographic element comprises an identifier in areference plane and a multiplicity of identifiers which are out of planewith each other and the identifier in the reference plane. In aparticular embodiment, the holographic element comprises an identifierin a reference plane and three identifiers fixed at varied depths so asto be out of plane with each other and out of plane with the identifierin the reference plane.

In an embodiment, the image exhibiting parallax is a lenticular image ora micro-lens image with at least two pairs of identifiers all of whichare out of plane with each other.

In an embodiment, a holographic element also comprises data embedded inthe holographic film which is readable by an optical instrument such asa scanner. The data may be letters, figures, diagrams, schematics orimages, or may be coded as in a bar code, QR code or the like, and anycombination of these. Data, such as site of manufacture, point of sale,warranty registration, identification of end user, inventory controldata, internet links, and other useful or desirable information or datamay be embedded in a hologram and made accessible during theauthentication process or at any time.

The disclosed embodiments further include a validation device that maybe any device for adjudicating an image exhibiting parallax. Thevalidation device may communicate with, be coupled to, or include ascanning component such as a scanner, including a smart phone camera, apersonal computer, a portable computer, a personal digital assistant, aprinter, a copier, a portable scanner, a facsimile (fax) device, amulti-function device (MFD), a vending machine, a change machine, acurrency reader/exchanger, an airport/train kiosk, a ticket readingdevice, a checkpoint reader, or other devices that may read documents oritems with images exhibiting parallax. The validation device may outputits validation determination to a user interface such as a display,printer, speaker, visual indicator for receipt by those attempting toauthenticate an image exhibiting parallax. The validation device mayreject the document or item containing the image if the image isadjudicated invalid. The validation device may be programed to notifythe checker and/or other proper authorities either locally or remotelythat a counterfeit has been detected.

In an embodiment, a hologram with parallax is illuminated with fixedpoint light source to generate a reconstructed image that is scanned andrecorded. The viewing angle and direction (perspective) for the scan aredetermined. The determined perspective (angle and direction) is matchedwith a captured (stored) digital reference for the determinedperspective. The relative vectors, whether visually apparent orsimulated, extending between at least two pairs of target identifiers inthe reconstructed image are determined and their relative lengthratio(s) is compared against the ratio(s) of the same vectors in astored digital reference taken from the same perspective. If theratio(s) in the scanned image match the ratio(s) of the stored referenceexactly or within programmed tolerance values in an algorithm, thehologram (and the item or document with which it is associated) isdeemed to be authentic. If the image matching fails, the hologram andthe item or document with which it is associated is deemed suspect. Thetolerance applied is dependent on the level of security desired for theauthentication.

In another embodiment, a hologram with parallax is illuminated withfixed point light source to generate a reconstructed image that isscanned and recorded. At least three relative vectors, whether visuallyapparent or simulated, extending between at least two pairs of targetidentifiers in the reconstructed image are determined and their relativelength ratios are determined and then compared against all of therelative length ratios of the same three vectors of a stored digitalreference for all possible perspective images for the valid hologram. Ifthe ratios in the scanned image match one of those of the storedreference exactly or within programmed tolerance values in an algorithm,the hologram (and the item or document with which it is associated) isdeemed to be authentic. If a greater degree of certainty is needed, itmay be required that the process be repeated for multiple images.

In an embodiment, a method for validating a secondary hologram havingparallax includes:

-   -   Creating a master image exhibiting parallax and containing at        least two pairs of identifiers, at least two of which        identifiers are located on differing depth planes;    -   Capturing still images of the master image from numerous viewing        angles and directions (perspectives);    -   Recording the coordinates of the location from which each image        is captured relative to the master image;    -   Identifying the at least two pairs of target identifiers in each        of the captured images;    -   Generating vectors linking the target identifiers of each of the        at least two pairs of target identifiers in each captured image;    -   Determining the vector lengths of the generated vectors and the        ratio of the lengths of the vectors linking the target        identifiers of each of the pairs of target identifiers;    -   Recording the vector length ratio for each image along with the        corresponding image coordinates for each image;    -   Interpolating a vector length ratio, and optionally target        identifier locations and linking vector lengths, for other        possible perspectives for which images were not precisely        captured;    -   Generating a digital model such as a computer database or a        mathematical model capable of determining the one or more        relative vector length ratios of the vectors linking the target        identifiers of each of the at least two pairs of target        identifiers, and optionally, target identifier locations and        linking vector lengths, for a complete set of possible master        image viewing perspectives;    -   Making a second image exhibiting parallax by duplicating the        master image exhibiting parallax;    -   Illuminating the second image with a point light source and        capturing a still image, from an arbitrary perspective, of the        illuminated secondary image;    -   Identifying the at least two pairs of target identifiers in the        captured image of the second image exhibiting parallax;    -   Creating vectors linking the target identifiers of each of the        at least two pairs of target identifiers in the captured image        of the second image exhibiting parallax, and determining the        vector lengths and the ratio of the lengths of the vectors        linking the target identifiers of each pair of target        identifiers;    -   Comparing the vector length ratio against the corresponding        vector length ratio from the master hologram digital model;    -   Determining whether the second image exhibiting parallax is        valid and authentic based on whether the difference between the        vector length ratio from the captured image of the second image        exhibiting parallax and the vector length ratio from the digital        model generated from the master hologram are within an        acceptable predetermined margin;    -   Communicating the authentication determination to an evaluator        of the secondary hologram.

The various steps of this method for validating a secondary hologram canbe combined with other steps in practice, and the order of the steps canchange without departing from the disclosed embodiments.

In one embodiment, the coordinates of the view point location of thecaptured still image of the secondary hologram and/or the perspective ofthe image relative to the secondary hologram is determined. The vectorlength ratio determined from the image of the secondary hologram is thencompared only against the vector length ratio for the same viewingperspective (i.e., angle and direction) from a master hologram computerdigital model. If the specific view location of the captured still imageis determined, the vector length ratio and vector lengths can becompared against the corresponding data from the digital model for thesame set of coordinates (i.e., viewing point).

The image exhibiting parallax and containing at least two pairs oftarget identifiers, at least two of which are located on differing depthplanes, is preferably a hologram exhibiting full three-dimensionalparallax in all directions. By “full three-dimensional parallax”, it ismeant that the holographic image changes realistically with a change inthe relative position of the observer. The target identifiers in theholographic reconstructed object image move relative to one another inthe same manner that the original objects would have done. By “alldirections”, it is meant that the realistic parallax is observable asthe perspective shifts along both the x-axis and the y-axis. This istypically described in the art as having both horizontal (x-axis) andvertical (y-axis) parallax. The master hologram may be a volume hologramin which target identifiers within the parallax image are opticallyfixed in space and are located at multiple plane depths. Production offull parallax holograms may utilize various recording media (silverhalide, dichromated gelatin, photopolymer, etc.) and such methods arewell known and documented in the existing art. Alternatively, thehologram used in the disclosed embodiment can be a hologram thatexhibits parallax in a single direction such as a rainbow hologram or afoil hologram. However, using a hologram that exhibits parallax in asingle direction in the disclosed authentication method or with thedisclosed digitally executable authentication program is less exactingthan applying the disclosed authentication method or the discloseddigitally executable authentication program to a hologram that exhibitsfull parallax.

Of the target identifiers of the at least two pairs of targetidentifiers in the image exhibiting parallax, at least two of them arelocated on differing depth planes. The differing depth planes areindicative of target identifiers located at differing distances alongthe Z-axis. The target identifiers may be any uniquely identifiabledesign element including but not limited to linear junctions,identifiable shapes, or differences in contrast or color. For example,in the images of the full parallax hologram shown in FIG. 1a , thetarget identifiers are bow tie patterns 22, 24, 26 and 28 in thehologram 20. In the full parallax hologram shown in FIG. 2a , the targetidentifiers may be the points or nodes where lines in the pattern changedirection.

In a hologram exhibiting full parallax, the relative location of thetarget identifiers appear to change in a predictive manner as theperspective of the viewer shifts. In the hologram of FIG. 1a , the bowtie 24 appears to be on the same plane as the logo 30, where the bow tie22 appears to be forward of the plane of the logo 30, and the bow ties26 and 28 appear to be at different depths behind the plane of the logo30. When the hologram is viewed from a different perspective, therelative lengths of the vectors between any three of the targetidentifiers change. For example, when the hologram of FIG. 1a is viewedfrom a different viewing angle and direction as shown in FIG. 1b , theapparent position of the target identifiers in a two-dimensional imageof the hologram changes because of the parallax of the hologram. Thehologram shown in FIG. 1c is viewed from the same perspective as shownin FIG. 1b and vectors between the bow tie target identifiers 22, 24 and26 are shown. The lengths of these vectors and the ratio(s) of theirlengths change in a predictable manner due to the full parallax of thehologram.

Once the master hologram has been created, still images of the masterhologram are captured from numerous viewing angles and directions (i.e.,viewing perspectives). Optionally still images of the master hologramcan be generated at various distances from the hologram for each viewingperspective (i.e., viewing points). The viewing perspectives imagedcover a full range of viewing angles and directions from which thesecondary hologram is likely to be observed during an authenticationprocedure. To capture the images of the master hologram from a fullrange of perspectives, the master hologram is mounted into a viewingstation equipped with a scanning device such as a camera or other videorecorder. A viewing station is used to properly quantify and mark inspace the coordinates of the original view perspective, and optionalview point, of each image relative to the hologram. Perspectives can bedescribed in angular coordinates or polar coordinates relative to thesurface normal angle. “Surface normal” refers to a viewing angle that isdirectly perpendicular to the holographic surface at the center point ofthe hologram. At the surface normal the viewing perspective is said tobe 0,0 and has no angular tilt in either direction. Subsequent shiftsalong the x-axis or y-axis would then be described by the resultingpositive or negative angular rotation relative to the surface normal.Still images of the master hologram are captured from many known viewingperspectives. The view perspective relative to the surface normal of thehologram typically ranges from about −35 degrees to about +35 degrees inboth axes, but can change depending on the intended angle of viewcharacteristic of the specific master hologram. During the recordingprocess, it does not matter whether the camera remains fixed and thehologram tilts to affect an angular perspective shift, or whether thehologram remains fixed and the camera pivots around the hologram so longas the camera remains pointed in the direction of the hologram with anappropriate illumination source. While a viewing distance between 6 and36 inches (15.2 and 91.4 cm) is typical, the distance of the camera fromthe hologram is mostly irrelevant as the vector length ratios for targetidentifiers remains constant at varying distance. Increased viewingdistance is limited mainly by camera resolution.

The captured images are digitally stored in a computer database alongwith the x, y (and optionally z) coordinates or the polar coordinatesfor each image. The number of images captured depends on the desiredprecision, but for a typical authentication process, at least about 1000to 5000 images are recorded from a complete range of perspectives foruse in the disclosed authentication process. Fewer captured images mayrequire greater interpolation of intermediate identifier locations fromsurrounding images. Either a single master hologram typically known inthe art as an H1, or an exact copy of the master hologram, typicallyknown as an H2, may be used in the generation of the images, althoughholographic quality loss is expected with each subsequent copygeneration.

At least two pairs of target identifiers are identified in each of thecaptured images. The identified target identifiers are in at least twodepth planes in the hologram. The same target identifiers are identifiedand plotted in each image. This can be done manually, but it ispreferably done by a scanning computer program that identifies thetarget identifiers in each of the digitally stored images. The scanningprogram may use feature recognition technology such as markerrecognition or markerless recognition as used in the augmented reality(AR) and computer generated imagery (CGI) fields.

For example, for the hologram shown in FIG. 2a , the scanning computerprogram first crops the images to capture only the hologram in eachimage, and it then converts the image to greyscale. With the hologramshown in FIG. 2a , the scanning program identifies the nodes where thelines of the hologram change direction as the target identifiers, andvectors linking the target identifiers A, B, C, D, A1, B1, C1, and D1are generated as shown in FIG. 2b , where the vectors are identified bythe lines extending between the target identifier nodes. The scanningprogram records the x-y coordinates of each of the targetidentifiers/nodes and calculates the length of each of these linkingvectors. The scanning program calculates the vector lengths and thecomparative lengths of at least three of the vectors linking the targetidentifiers in each image taken from each view perspective. The vectorlength ratios are useful because they remain constant for a given viewperspective (viewing angle and direction) regardless of the distancefrom the hologram at which the image was captured.

The vectors between three target identifiers form what is known as arigid body. The apparent length of the vectors of the rigid body changewith the perspective from which the rigid body in the image exhibitingparallax is viewed. Vectors linking at least two pairs of targetidentifier nodes create a polygon. A single master image might havemultiple polygons depending on the number of target identifiers and thedesired precision. In the case of a three-sided polygon, the vectorlength ratios are called a “triple” as there are three resulting vectorlength values. These triples are described by a ratio rather thanabsolute length in any given unit. A triangle with vector lengthsmeasured in pixels might be 25 px; 50 px; 30 px which has the same ratioas a triangle measured as 50 px; 100 px, 60 px.

Because the hologram is one exhibiting full parallax, the ratios ofvector lengths change in a predictable manner with the view perspective(viewing angle and direction). This predictable change with viewingangle and direction makes it possible for the processor running thescanning computer program to next interpolate the vector length ratiosfor viewing angles and viewing directions from which images were notactually captured. Even though there isn't a captured imagecorresponding to each minute change in viewing angle and direction,these vector length ratio values can be accurately interpolated fromdata recorded from the scanned images. For example, if a horizontal(x-axis) polar perspective shift of +3 degrees from the surface normalresulted in a given vector increasing from 5 units to 7 units, thatvector length might be interpolated at 6 units for an assumed +1.5degrees shift from normal along the same axis at equivalent distance.From the recorded images, a digital model such as a computer database ormathematical model is generated from which the relative vector lengthratios can be measured and/or interpolated for a complete set ofpossible hologram viewing angles and directions regardless of distancefrom the hologram.

The authentication process also requires that the secondary hologramduplicates be generated from the master hologram or from a very highquality duplicate of the master hologram. By definition, the secondaryholograms exhibit the same parallax as the master hologram. Theprocesses for producing hologram duplicates are well established andknown to those skilled in the art.

The secondary hologram duplicates are affixed to or incorporated intoproducts, documents or items that may require authentication. Forexample, the secondary hologram duplicates can be associated withmedicines, clothing and accessories, electronic devices, currency,passports and other government or non-governmental ID cards (academic,corporate), tickets, key cards, documents, and other items whereauthentication, brand protection, or anti-counterfeiting is necessary ordesirable.

When it is desired to check the authenticity of a secondary hologram,and consequently the item with which the secondary hologram is affixedor into which the secondary hologram is incorporated, the checker and/orchecking device locates the secondary hologram. The checking deviceilluminates the secondary hologram with a point light source and areconstruction of the hologram is generated and is captured by a camera,scanner, or other digital recorder of the checking device from anarbitrary viewing perspective. Where greater authentication accuracy isdesired, multiple images may be captured. In one embodiment, thescanning device is a smart phone or tablet computer equipped with astill or video camera and a flash emitter or other light source. Inanother embodiment, the scanner is a portable digital scanning devicethat includes a digital scanner or camera and a point light source. Inanother embodiment, the scanner is a digital camera mounted in aportable or table top device in conjunction with a point light sourcefixed at a known position relative to the scanner and connected to acomputer to provide a rapid authentication response. The checking devicemay include a computer program or application that controls the cameraand light source when the image of the secondary hologram is capturedand that stores the captured image. The program or application may beone that is downloaded onto the checking device as a computer program or“app” from a website such as an App Store.

The master hologram and/or the secondary hologram copies of the masterhologram may contain other useful data detectable by a scanning device.Additional data may be fixed in the hologram as information, graphics,symbols, or schematics embedded in the holographic film. Codes (bar, QR,for example) can be used for automatic registrations for warranty,subscription, rebate, discount and other such purposes. Embedded codesor data can also be used for remote purchase verification such as forinternet sales. The code may, for example, identify the hologram beingauthenticated or the internet address of a remote authenticationprocessor so that when the scanned information is sent to theauthentication processor, the scanned image will be compared against thedata or digital model of the correct hologram. Of particular interest inrelation to the field of authentication are track-and-trace informationthat can be provided by a scanning device such as: point of sale,location of the product at any given time, demographic information aboutthe buyer, the buyer's identity, contact information for the buyer, orwhether the packaging or container for the product is being repurposedor recycled. Alerts for product upgrades and add-ons can be launched onthe scanning device for the customer's information. These can help thesupplier of the product in profiling target markets of potentialinterest. Assembly and use instructions, as well as demonstration orinstructional videos, may auto-launch on the scanning device from codesor internet links embedded in the hologram.

In one embodiment, the scanning program records and saves the image andthen electronically transmits the image to a remote processor computerthat performs the functions of cropping the image, identifying the atleast two pairs of target identifiers in the captured image, generatingvectors between the identified target identifiers, measuring the lengthsof the vectors and calculating the vector length ratios for the rigidbody formed by the target identifiers, comparing the calculated vectorlength ratios with the ratios stored in the computer database generatedfrom the master hologram or calculated from the digital model based onthe master hologram, determining whether the difference between theratios measured from the secondary hologram and the ratios from themaster hologram computer database or digital model are below thatrequired for the secondary hologram to be adjudicated authentic, andcommunicating the authentication adjudication back to a device proximatethe authenticator or checking device, such as the authenticator's smartphone or a device associated with the checking device.

In one embodiment the method of authentication compares vector lengthratios of captured images of the reconstructed secondary hologramagainst the database of captured images of the master hologram from aknown perspective. The scanning program calculates the perspectiveand/or view point from which the image was captured relative to thesecondary hologram. The scanning program then compares the vector lengthratios in the scanned image against the vector length ratios for thecorresponding perspective determined from the database or digital modelgenerated from the master hologram. The viewing perspective of the imageof the secondary hologram may be determined through visual odometrytechniques utilizing information proximate to or embedded in thehologram. For example, the hologram might be placed within a printedsquare bounding box of known proportion. The apparent shape andproportions of this bounding box may be utilized to indicate the angleand direction (perspective) of the scanner as these qualities change ina predictable manner as the scanner angle and direction varies from thesurface normal. The locations of target identifiers in the secondaryhologram may be compared against a digital simulation model (forexample, point cloud model) of the corresponding rigid bodies derivedfrom the master hologram.

In another embodiment, the perspective of the scanner and scanned imageis not known or determined. Instead, the scanner captures multipleimages of the secondary hologram, locates target identifiers in eachimage, constructs three-sided polygons (triples), determines the vectorlength ratio of the triples, and verifies that the vector length ratioof each triple exists within an exhaustive master database, comprised oftriples from images taken from a full range of perspectives. Eachadditional verifiable triple obtained from an image of a secondaryhologram adds an increased level of certainty of the authentication.

The process for identifying the at least two pairs of target identifiersin the captured image of the secondary hologram, creating vectorslinking the target identifiers in the captured image of the secondaryhologram, and determining the vector lengths and the comparativeratio(s) of the lengths of the vectors linking the target identifiers ofthe secondary hologram is the same process as described above fordetermining the vector length ratio(s) from the master hologram.

In one embodiment, the scanning program is located proximate where thesecondary hologram is scanned and the scanning program performs thesteps of cropping the image, identifying the target identifiers in thecaptured image, generating vectors between the identified targetidentifiers, measuring the lengths of the vectors and calculating thevector length ratio(s) for the rigid body formed by the targetidentifiers. Optionally, the scanning program located proximate thescanner also calculates the perspective and/or view point from which theimage was captured relative to the secondary hologram. The scanningdevice or a computer connected to the scanning device then transmits thevector length ratio(s), and optionally the data identifying the viewperspective or view point for the image, to a remote computer thatperforms the steps of comparing the vector length ratio(s) with theratio(s) stored in a computer database generated from the masterhologram or calculated from the digital model derived from the masterhologram, determining whether the difference between the vector lengthratio(s) measured from the secondary hologram and the vector lengthratio(s) from the master hologram computer database or digital model arebelow that required for the secondary hologram to be judged authentic,and communicating the authentication adjudication back to a deviceproximate the scanning device and/or the authenticator.

In another embodiment, the scanning program located proximate where thesecondary hologram is scanned performs the steps of cropping the image,identifying the target identifiers in the in the captured image,generating vectors between the identified target identifiers, measuringthe lengths of the vectors and calculating the vector length ratio(s)for the rigid body formed by the target identifiers, comparing thevector length ratio(s) with the ratio(s) stored in a computer databasegenerated from the master hologram or calculated from the digital modelmade from the master hologram that is stored on and executable from thescanning device or a computer proximate the scanning device, determiningwhether the difference between the ratio(s) measured from the secondaryhologram and the ratio(s) from the master hologram computer database ordigital model are below that required for the secondary hologram to beadjudicated authentic, and communicating the authentication adjudicationto the checker. Optionally, the scanning program may calculate theperspective and/or view point from which the image was captured relativeto the secondary hologram and then compare the vector length ratio foronly that perspective against the vector length ratio for thecorresponding perspective in the computer database or digital modellocated proximate where the secondary hologram is scanned. In anotherembodiment, the scanning program compares the vector length ratioagainst the vector length ratios for all perspectives in the database ordigital model looking for any positive match.

In another embodiment, the scanning program located proximate where thesecondary hologram is scanned performs the steps of capturing the imagesof the secondary hologram. The scanning device or a computer connectedto the scanning device then transmits the images to a remote computerthat performs all the tasks of identifying the target identifiers in thecaptured image, generating vectors between the identified targetidentifiers, measuring the lengths of the vectors and calculating thevector length ratio(s) for the rigid body formed by the targetidentifiers, comparing the vector length ratio(s) with the ratio(s)stored in a computer database generated from the master hologram orcalculated from the digital model made from the master hologram,determining whether the difference between the vector length ratio(s)measured from the secondary hologram and the vector length ratio(s) fromthe master hologram computer database or digital model are below thatrequired for the secondary hologram to be judged authentic, andcommunicating the authentication adjudication back to a location of thescanning device and/or the authenticator or another computer processor.Optionally, the remote computer may calculate the perspective and/orview point from which the image was captured relative to the secondaryhologram and then compare the vector length ratio for only thatperspective against the vector length ratio for the correspondingperspective in the computer database or digital model located with theremote computer. In another embodiment, the remote computer compares thevector length ratio against the vector length ratios for allperspectives in the database or digital model looking for any positivematch.

The authentication can be based on a single image of the secondaryhologram, but the authentication system described can be made morerobust by requiring a positive match on multiple scanned images of thesecondary hologram before the secondary hologram is found to beauthentic.

In one possible embodiment, determination of authentication is provideddirectly to the evaluator via the in-app user interface on, for example,a mobile smartphone. This communication might be transmitted by anon-screen graphic, vibration, sound, or any combination. In otherembodiments, the authentication determination can be communicated to anevaluator through various methods including, but not limited to, email,text message, SMS, phone call, facsimile, visual indicators on thescanning device, positive responses from a connected device such as avending machine or electronic door latch, or other means of electroniccommunication.

FIG. 3 illustrates a block diagram of a parallax image validation systemin accordance with one possible embodiment of the disclosure. Theparallax image validation system 300 may include, for example,communication interface 310, a scanner 312, input and/or output devices314 and 316, a point light source 318, a communications link 320, acomputer database module and/or a digital computer model 322, a memory324, a read only memory (ROM) 326, one or more processors 328, and anadjudication module 330.

The communication interface 310 permits communication among thecomponents of the parallax image validation system 300. Depending uponthe location of the various components, the communication interface 310may be a bus, a hard-wired connection, a wireless link, an opticalconnection, an audio connection, or any combination thereof. Thecommunication interface 310 interconnects the other components of thesystem and allows the components to digitally communicate with eachother. The communication interface may, for example, include a computernetwork, an ethernet connection, a cellular network connection, awireless internet connection, an internet connection, or a combinationthereof. Communication interface 310 may include any mechanism thatfacilitates communication via a network. The communication link 320 mayinclude other mechanisms for assisting in communications with otherdevices and/or systems.

In an embodiment, the scanner 312 is an optical scanner such as adigital camera or recorder. Other possible scanning devices include asmart phone camera, printer, a copier, a document scanner, amulti-function printing and scanning device, a facsimile (fax) device, apersonal computer, a portable computer, a notebook computer, a personaldigital assistant, a tablet computer, a handheld scanner, a vendingmachine reader, a change machine reader, a currency reader/exchanger, anairport/train kiosk device, a ticket reading device, a gate orcheckpoint reader, or other devices that may read documents or itemswith holograms. A smart phone camera is a preferred scanning devicebecause much of the population already owns smart phones with camerasand light sources.

Input device 314 may include one or more conventional mechanisms thatpermit a user to input information to the processing device, such as akeyboard, a touch screen or touch pad, a mouse, a digital pen, a voicerecognition device, or a keypad. One or more than one input device maybe incorporated into the validation system 300. Output device 316 mayinclude one or more conventional mechanisms that output information to auser, including a display, a printer, a copier, a scanner, amulti-function device, one or more speakers, a display light or diode,or a medium, such as a memory, or a magnetic or optical disk and acorresponding disk drive.

The point light source 318 may be a light bulb, a camera flash, a lightor flash on a smart phone such as an LED light, sunlight, or anothersource of light. Preferably, the light source is a light or flash on thescanning device that is controlled by the scanning device.

Processor 328 may include at least one conventional processor ormicroprocessor that interprets and executes instructions. Memory 324 maybe a random-access memory (RAM) or another type of dynamic storagedevice that stores information and instructions for execution byprocessor or processors 328. Read-only memory (ROM) 326 may also beincluded in the validation system 300 which may include a conventionalROM device or another type of static storage device that stores staticinformation and instructions for processor 328. A storage device mayaugment the ROM and may include any type of storage media, such as, forexample, a thumb drive, a hard drive, cloud drive, magnetic or opticalrecording media and its corresponding drive. The parallax imagevalidation system 300 may perform such functions in response toprocessor 328 by executing sequences of instructions contained in acomputer-readable medium, such as, for example, memory 324 and ROM 326.Such instructions may be read into memory 324 from anothercomputer-readable medium, such as a storage device or from a separatedevice via the communication link 320, which for example could be ahard-wired connection, a wireless connection or an optical connection.

The parallax image validation system of FIG. 3 and the relateddiscussion are intended to provide a brief, general description of asuitable communication and processing environment in which theauthentication/validation system may be implemented. Although notrequired, the disclosed embodiments are described, at least in part, inthe general context of computer-executable instructions, such as thesystem components shown in FIG. 3.

Generally, program modules include routine programs, objects,components, data structures, etc. that perform particular tasks orimplement particular abstract data types. Moreover, those skilled in theart will appreciate that other embodiments may be practiced incommunication network environments with many types of communicationequipment and computer system configurations, including smart phones,tablet computers, personal computers, hand-held devices, multi-processorsystems, microprocessor-based computers, programmable consumerelectronics, and the like. Computer-executable instructions include, forexample, instructions and data which cause a general-purpose computer,special purpose computer, or special purpose processing device toperform a certain function or group of functions. Computer-executableinstructions also include program modules that are executed by computersin stand-alone or network environments. Generally, program modulesinclude routines, programs, objects, components, and data structures,and the like that perform particular tasks or implement particularabstract data types. Computer-executable instructions, associated datastructures, and program modules represent examples of the program codemeans for executing steps of the methods disclosed herein. Theparticular sequence of such executable instructions or associated datastructures represent examples of corresponding acts for implementing thefunctions described therein.

It will be appreciated that variations of the above-disclosedembodiments and other features and functions, or alternatives thereof,may be desirably combined into many other different systems orapplications. It is also understood that various presently unforeseen orunanticipated alternatives, modifications, variations or improvementstherein may be subsequently made by those skilled in the art which arealso intended to be encompassed by the following claims.

The concepts described herein will be further illustrated in thefollowing example, which does not limit the scope of the inventiondescribed in the claims.

Example

A master hologram (Hologram A) was produced by volume reflectionholography using a glass plate coated with dichromated gelatin (DCG).Hologram A comprises three individual bow-tie targets resembling thosedepicted in FIG. 1. Hologram A exhibits full three-dimensional parallax.The first target was located at a depth plane coincident with thesurface of the DCG emulsion; a condition commonly known in the art asbeing located on the film plane. A second bow-tie target was located ona parallel depth plane approximately 3 mm behind the film plane and thethird target was located on a parallel depth plane approximately 2 mm infront of the film plane. This master hologram is designated as the“authentic master” version to be used in master database creation.

Hologram A was placed in a viewing station and illuminated with a pointlight source in the form of a single white LED emitter located proximatea digital camera. The viewing station provided a mechanism whereby thecamera could be positioned at various quantifiable perspectives withinthe intended angle of view of the hologram while remaining focused onthe hologram and keeping the hologram centered in its field of view. Amultiplicity of still images of Hologram A were captured and stored in adatabase. Each still image represented an individual polar coordinaterelative to the surface normal designated as perspective (0,0). Stillimages were captured in successive one degree increments to the extentof reaching ±35 degrees in both the horizontal and vertical axes, andeach image file was labelled with the appropriate perspective coordinate(e.g. −12,+6 corresponding to a perspective location that is minus 12°from normal in the horizontal axis, and +6° from normal in the verticalaxis).

The master file was retrieved from the database corresponding to theperspective coordinates of another hologram that is to be compared tothe master Hologram A. Master database images were cropped to includeonly the target identifiers and the cropped images were zoomed to aid inprecision. In analyzing the master image of Hologram A from theperspective angle located at +15° in the y-axis and +5° in the x-axis, anode was placed at the center of the bow-tie targets located at thejunction point of the intersecting lines of each target. This nodeplacement was performed manually with the aid of 2D CAD software.Alternatively the node placement could be performed digitally usingcommon feature recognition techniques. Vectors were drawn between eachpair of nodes creating a 3-sided polygon. Vector lengths were initiallymeasured and measurements were converted to a ratio of relative lengths.A 3-sided polygon with vector lengths of 2.35 inch, 3.78 inch, and 1.93inch resulted from the measurement process. The resulting ratio wastherefore 1.00:1.61:0.82. This ratio remains constant regardless of thezoom extent of the cropped image.

A duplicate Hologram B was created by directly replicating Hologram Ausing a contact copy method used in reflection holography replication.The replication process resulted in Hologram B being an exact replica ofHologram A with identical depth planes. Hologram B was placed in theviewing station and corresponding perspective angle of +15° y-axis and+5° x-axis was chosen. A still image was captured using a digital camerawith a point light source. The image was cropped to include only thebow-tie targets and the cropped image was zoomed to aid in precision. Inanalyzing the image of Hologram B, a node was placed at the center ofeach of the bow-tie targets located at the junction point of theintersecting lines of each target. This node placement was performedmanually with the help of 2D CAD software. Alternatively the nodeplacement could be performed digitally using common feature recognitiontechniques. Vectors were drawn between each pair of nodes creating a3-sided polygon. Vector lengths were initially measured and measurementswere converted to a ratio of relative lengths. A three-sided polygonwith side lengths 2.58 inch, 4.16 inch, and 2.13 inch was the result ofthe measurement process, producing a triangle with side length ratio of1.00:1.61:0.83 which is within the expected measurement error of thedevices. The resulting ratio is deemed to be identical. Hologram B isdeemed authentic.

A third hologram (Hologram C) was produced by volume reflectionholography, using a glass plate coated with dichromated gelatin (DCG)comprised of three individual bow-tie targets resembling those depictedin FIG. 1. In this instance the first target was located at a depthplane coincident with the surface of the DCG emulsion. A second bow-tietarget was located on a parallel depth plane approximately 2.5 mm behindthe film plane and the third target was located on a parallel depthplane approximately 1.5 mm in front of the film plane. Hologram C was anattempted counterfeit of the master Hologram A and the two hologramsappeared identical to the common unaided viewer.

Hologram C was placed in the viewing station and a still image wascaptured from the perspective angle corresponding to +15° y-axis and +5°x-axis using a point light source. The image was cropped to include onlythe targets and the cropped image was zoomed to aid in precision. Inanalyzing the image of Hologram C, a node was placed at the center ofthe bow-tie targets located at the junction point of the intersectinglines of each target. This node placement was performed manually withthe assistance of 2D CAD software.

Alternatively the node placement could be performed digitally usingcommon feature recognition techniques. Vectors were drawn between eachpair of nodes creating a 3-sided polygon. The resulting vector lengthswere 2.60 inch, 3.78 inch, and 2.01 inch. The resulting side lengthratio was therefore 1.00:1.45:0.77. Because the vector ratio fromHologram B did not precisely match the ratio for the correspondingmaster database image of Hologram A and was outside the errorexplainable by simple measurement error, Hologram C was deemed to be notauthentic.

Further exemplary embodiments of the present disclosure are set out inthe following numbered clauses:

Numbered clause 1: A method for determining the validity of a parallaximage, comprising:

-   -   receiving a captured two-dimensional image of a parallax image        having at least three target identifiers located at different        depths in the full parallax image;    -   identifying the at least three target identifiers in the        captured two-dimensional image of the parallax image and        determining the spatial relationship between the at least three        target identifiers in the two-dimensional image of the parallax        image;    -   comparing the spatial relationship of the three target        identifiers in the captured two-dimensional image of the        parallax image against a digital model of the spatial        relationship between the at least three target identifiers of        the parallax image; and    -   adjudicating the authenticity of the parallax image based on the        degree of difference between the spatial relationship of the at        least three target identifiers in the captured two-dimensional        image of the parallax image and the digital model of the spatial        relationship between the at three target identifiers of the        parallax image.

Numbered clause 2: The method of clause 1 wherein the parallax image isan image generated from a hologram which parallax image exhibits fullparallax.

Numbered clause 3: A method for determining the validity of a parallaximage, comprising:

-   -   capturing multiple two-dimensional images of the parallax image        taken from multiple perspectives; identifying at least two pairs        of target identifiers in each captured two-dimensional image of        the parallax image; creating a plurality of vectors linking the        target identifiers in each of the captured two-dimensional        images of the parallax image; determining the ratio of the        lengths of the vectors linking the target identifiers in each of        the captured two-dimensional images of the parallax image; and        generating a digital model for the parallax image that captures        the ratio of the lengths of the vectors linking the target        identifiers in each of the captured two-dimensional images of        the parallax image;    -   receiving a captured two-dimensional image of a possible        duplicate of the parallax image; identifying at least two pairs        of target identifiers in the captured two-dimensional image of        the possible duplicate of the parallax image; creating a        plurality of vectors linking the target identifiers in the        captured two-dimensional image of the possible duplicate of the        parallax image; and determining the ratio of the lengths of the        vectors linking the target identifiers in the captured        two-dimensional image of the possible duplicate of the parallax        image;    -   accessing the digital model for the parallax image; comparing        the vector length ratio determined from the captured        two-dimensional image of the possible duplicate of the parallax        image against vector length ratio values captured in the digital        model for the parallax image; calculating the difference between        the vector length ratio for the captured two-dimensional image        of the possible duplicate of the parallax image and the vector        length ratios from the digital model for the parallax image; and        adjudicating the authenticity of the captured two-dimensional        image of the possible duplicate of the parallax image based on        whether the difference between the vector length ratio from the        captured two-dimensional image of the possible duplicate of the        parallax image and the vector length ratio from the digital        model for the parallax image are within an acceptable        predetermined margin.

Numbered clause 4: The method of clause 3 wherein the parallax image isan image exhibiting parallax generated from a hologram.

Numbered clause 5: The method of clause 3 or clause 4 wherein theparallax image exhibits full parallax.

Numbered clause 6: The method of any of clauses 3 to 5 including thesteps of:

-   -   determining the perspective relative of the parallax image of        each of the multiple two-dimensional images of the parallax        image; and inputting the coordinates of the perspective of each        two-dimensional image of the parallax image into the digital        model for the parallax image and associating such perspective        coordinates with the ratio of the lengths of the vectors linking        the target identifiers in each of the respective two-dimensional        images of the parallax image captured in the digital model for        the parallax image;    -   determining the perspective relative to the possible duplicate        of the parallax image of the received captured two-dimensional        image of the possible duplicate of the parallax image;    -   comparing the vector length ratio determined from the captured        two-dimensional image of the possible duplicate of the parallax        image against vector ratio captured from the digital model for        the parallax image for substantially the same perspective        coordinates; calculating the difference between the vector        length ratio for the captured two-dimensional image of the        possible duplicate of the parallax image and the corresponding        vector length ratio of the digital model for substantially the        same perspective coordinates; and adjudicating the authenticity        of the captured two-dimensional image of the possible duplicate        of the parallax image based on whether the differences between        the vector length ratio from the captured two-dimensional image        of the possible duplicate of the parallax image and the vector        length ratio values from the digital model for substantially the        same perspective coordinates are within an acceptable        predetermined margin.

Numbered clause 7: The method of any of clauses 3 to 6 comprising:

-   -   receiving a plurality of captured two-dimensional images of a        possible duplicate of the parallax image; identifying at least        two pairs of target identifiers in each of the plurality of        captured two-dimensional images of the possible duplicate of the        parallax image; creating a plurality of vectors linking the        target identifiers in each of the plurality of captured        two-dimensional images of the possible duplicate of the parallax        image; and determining the ratio of the lengths of the vectors        linking the target identifiers in each of the plurality of        captured two-dimensional images of the possible duplicate of the        parallax image;    -   accessing the digital model for the parallax image; comparing        the vector length ratio determined from each of the plurality of        captured two-dimensional images of the possible duplicate of the        parallax image against vector length ratio values captured in        the digital model for the parallax image; calculating the        difference between the vector length ratio for each of the        plurality of captured two-dimensional images of the possible        duplicate of the parallax image and the vector length ratios        from the digital model for the parallax image; and adjudicating        the authenticity of the captured two-dimensional image of the        possible duplicate of the parallax image based on whether the        difference between the vector length ratio from each of the        plurality of captured two-dimensional image of the possible        duplicate of the parallax image and the vector length ratio from        the digital model for the parallax image are within an        acceptable predetermined margin.

Numbered clause 8: A digitally executable authentication system fordetermining the validly

-   -   of a parallax image that executes the steps comprising:

receiving multiple two-dimensional images of a master parallax imagetaken from multiple perspectives; identifying the same at least twopairs of target identifiers in each two-dimensional image of the masterparallax image; creating a plurality of vectors linking the targetidentifiers in each of the two-dimensional images of the master parallaximage; determining the ratio of the lengths of the vectors linking thetarget identifiers in each of the two-dimensional images of the masterparallax image; and generating a digital model that captures the ratioof the lengths of the vectors linking the target identifiers in each ofthe two-dimensional images of the master parallax image;

-   -   receiving a captured two-dimensional image of a possible        duplicate of the master parallax image; identifying at least two        pairs of target identifiers in the captured two-dimensional        image of the possible duplicate of the master parallax image;        creating a plurality of vectors linking the target identifiers        in the captured two-dimensional image of the possible duplicate        of the master parallax image; and determining the comparative        ratio of the lengths of the vectors linking the target        identifiers in the captured two-dimensional image of the        possible duplicate of the master parallax image;    -   accessing the digital model; comparing the vector length ratio        determined from the captured two-dimensional image of the        possible duplicate of the master parallax image against vector        ratio values captured in the digital model; calculating the        difference between the vector length ratios for the captured        two-dimensional image of the possible duplicate of the master        parallax image and the vector length ratios of the digital        model; and adjudicating the authenticity of the captured        two-dimensional image of the possible duplicate of the master        parallax image based on whether the differences between the        vector length ratio values from the captured two-dimensional        image of the possible duplicate of the master parallax image and        the vector length ratio values from the digital model are within        an acceptable predetermined margin.

Numbered clause 9: The digitally executable authentication system fordetermining the validly of a parallax image of clause 8 wherein theparallax image is an image exhibiting parallax generated from ahologram.

Numbered clause 10: The digitally executable authentication system fordetermining the validly of a parallax image of clause 8 or 9 wherein theparallax image is an image exhibiting full parallax generated from ahologram.

Numbered clause 11: The digitally executable authentication system fordetermining the validly of a parallax image of any of clauses 8 to 10that executes the steps of capturing the perspective relative of themaster parallax image of each of the multiple two-dimensional images ofthe master parallax image; and inputting the respective coordinates ofthe perspective of each two-dimensional image of the master parallaximage into the digital model and associating such perspectivecoordinates with the ratio of the lengths of the vectors linking thetarget identifiers in each of the respective two-dimensional images ofthe master parallax image;

-   -   determining the perspective relative to the possible duplicate        of the master parallax image of the received captured        two-dimensional image of a possible duplicate of the master        parallax image;    -   comparing the vector length ratio determined from the captured        two-dimensional image of the possible duplicate of the master        parallax image against vector length ratio values captured in        the digital model for substantially the same perspective        coordinates; calculating the difference between the vector        length ratio for the captured two-dimensional image of the        possible duplicate of the master parallax image and the        corresponding vector length ratio of the digital model for        substantially the same perspective coordinates; and adjudicating        the authenticity of the captured two-dimensional image of the        possible duplicate of the master parallax image based on whether        the difference between the vector length ratio values from the        captured two-dimensional image of the possible duplicate of the        master parallax image and the vector length ratio value from the        digital model for substantially the same perspective coordinates        are within an acceptable predetermined margin.

Numbered clause 12: The digitally executable authentication system fordetermining the validly of a parallax image of clause 11 that executesthe steps of:

-   -   receiving a plurality of captured two-dimensional images of a        possible duplicate of the master parallax image; identifying at        least two pairs of target identifiers in each of the plurality        of captured two-dimensional images of the possible duplicate of        the master parallax image; creating a plurality of vectors        linking the target identifiers in each of the plurality of        captured two-dimensional images of the possible duplicate of the        master parallax image; and determining the comparative ratio of        the lengths of the vectors linking the target identifiers in        each of the plurality of captured two-dimensional images of the        possible duplicate of the master parallax image; determining the        perspective relative to the possible duplicate of the master        parallax image of each of the plurality of received captured        two-dimensional images of a possible duplicate of the master        parallax image;    -   comparing the vector length ratio determined from each of the        plurality of captured two-dimensional images of the possible        duplicate of the master parallax image against corresponding        vector length ratio in the digital model for substantially the        same perspective coordinates as each of the plurality of        captured two-dimensional images of the possible duplicate of the        master parallax image; calculating the difference between the        vector length ratio for each of the plurality of captured        two-dimensional images of the possible duplicate of the master        parallax image and the corresponding vector length ratio of the        digital model for substantially the same perspective        coordinates; and adjudicating the authenticity of the captured        two-dimensional image of the possible duplicate of the master        parallax image based on whether the difference between the        vector length ratio values from each of the plurality of        captured two-dimensional images of the possible duplicate of the        master parallax image and the corresponding vector length ratio        values from the digital model for substantially the same        perspective coordinates are within an acceptable predetermined        margin.

Numbered clause 13: A method for validating a hologram having parallaxcomprising:

-   -   creating a first hologram exhibiting parallax and containing at        least three target identifiers, at least two of which are        located on differing depth planes;    -   capturing still images of the first hologram from multiple        viewing perspectives;    -   recording the coordinates of the viewing perspective from which        each image is captured relative to the first hologram;    -   identifying at least two pairs of target identifiers in each of        the captured images of the first hologram;    -   generating vectors linking the at least two pairs of target        identifiers in each captured image of the first hologram;    -   determining the relative vector length ratios of the generated        vectors linking the target identifiers in each image of the        first hologram;    -   recording the vector length ratios for each image along with the        coordinates of the viewing perspective for each image;    -   using the recorded vector length ratios for each image along        with the image coordinates to generate a first hologram digital        model that determines the vector length ratio for a complete set        of possible perspectives from which the first hologram is        viewed;    -   determining whether a second hologram exhibiting parallax is an        authentic duplicate of the first hologram by    -   illuminating the second hologram with a point light source and        capturing an image of the illuminated second hologram;    -   calculating the coordinates of the viewing perspectives of the        captured image relative to the second hologram;    -   identifying the at least two pairs of target identifiers that        were identified in the first hologram in the captured image of        the second hologram;    -   creating vectors linking the target identifiers in the captured        image of the second hologram, and determining the ratio of the        lengths of the vectors linking the target identifiers in the        second hologram;    -   calculating the difference between the vector length ratio from        the second hologram against the corresponding vector length        ratio determined from the first hologram digital model for the        perspective coordinates from which the image of the second        hologram was captured;    -   adjudicating the authenticity of the second hologram based on        whether the difference between the vector length ratio from the        captured image of the second hologram and the corresponding        vector length ratio values from the first hologram digital model        are within an acceptable predetermined margin;    -   communicating the authentication determination to an evaluator        of the second hologram.

Numbered clause 14: The method for validating a hologram having parallaxof clause 13 wherein the capturing an image of the illuminated secondhologram is done with a scanning device selected from cameras, scanners,and digital recorders.

Numbered clause 15: The method for validating a hologram having parallaxof clause 14 wherein the scanning device is a smart phone equipped witha camera and a point light source.

What is claimed is:
 1. A method for determining the validity of aparallax image, comprising: receiving a captured two-dimensional imageof a parallax image having at least three target identifiers, wherein atleast two target identifiers are located at different depth planes inthe parallax image; identifying the at least three target identifiers inthe captured two-dimensional image of the parallax image and determiningthe spatial relationship between the at least three target identifiersin the two-dimensional image of the parallax image; comparing thespatial relationship of the at least three target identifiers in thecaptured two-dimensional image of the parallax image against apredetermined spatial relationship of the at least three targetidentifiers that indicates authenticity; and adjudicating theauthenticity of the parallax image based on the degree of differencebetween the spatial relationship of the at least three targetidentifiers in the captured two-dimensional image of the parallax imageand the predetermined spatial relationship of the at least three targetidentifiers.