Methods and a system for verifying the authenticity of a mark

作者: Michael L. Soborski

DOI:

关键词:

摘要: In one implantation, a processor: (1) receives an image of candidate mark from acquisition device, (2) uses the to measure or more characteristics at plurality locations on mark, resulting in first set metrics, (3) removes, metric having dominant amplitude, trimmed (4) retrieves, computer-readable memory, second metrics that represents measured original (5) corresponding removed (6) compares with and (7) determines whether is genuine based comparison.

参考文章(108)
Jerome H. Lemelson, Bar codes and methods ,(1995)
John T. Anderson, Method of forming security markings ,(2012)
Takanori Ninomiya, Aritoshi Sugimoto, Kazuo Takeda, Identification method for an article using crystal defects ,(1999)
Prashun Purkayastha, Anandamoy Roychowdhary, Gaming platform utilizing a fraud detection platform ,(2013)
Anthony James Hoogs, Jenny Marie Weisenberg, Zhaohui Sun, Roderic Greene Collins, Budhaditya Deb, Aaron Shaw Markham, Anthony Christopher Anderson, Michael Shane Wilkinson, Catherine Mary Graichen, Corey Nicholas Bufi, System and method for forensic analysis of media works ,(2008)