System and method to optically authenticate physical objects
20200143032 ยท 2020-05-07
Inventors
- Roarke Horstmeyer (Palo Alto, CA, US)
- Robert Horstmeyer (Palo Alto, CA, US)
- Mark Harfouche (Pasadena, CA, US)
- Ron Appel (Palo Alto, CA, US)
Cpc classification
H01S5/183
ELECTRICITY
G02B21/367
PHYSICS
International classification
G02B21/36
PHYSICS
Abstract
A system and method to verify the authenticity of a physical object, based on the efficient acquisition and digital post-processing of a large amount of optical data. An optical system, comprised of an array of microscope-type micro-cameras and a patterned illumination source, acquires spatial, spectral and angular information about the physical object in the form of micro-camera images. The set of all acquired images comprise one object dataset, which a post-processing system then digitally transforms into a multi-gigabyte set of semi-random keys. Authentication takes place at a later date following a challenge-and-response protocol. The high resolution (<15 m) of the acquired data presents a significant challenge to attempted duplication of the physical object, and the large size (>1 Gigabyte) of the key set similarly prevents both physical and digital forgery attempts.
Claims
1. An optical measurement and processing system, comprising: More than one micro-camera imaging devices mechanically coupled to each other, each micro-camera imaging device configured to acquire optical measurements of a distinct region of an object; and a patterned illumination source containing one or more optical sources, each optical source configured to send patterned optical illumination to the object; and processing circuitry configured to convert the acquired optical measurements into an object dataset, and subsequently to convert each object dataset into one or more random cryptographic keys.
2. The optical measurement and processing system of claim 1, where the micro-camera imaging devices and the patterned illumination source are mechanically coupled to each other to form a micro-camera array microscope and illumination (MCAMI) system.
3. The optical measurement and processing system of claim 1, where more than one optical measurement is acquired by the micro-camera imaging devices as the patterned optical illumination is varied between each acquisition.
4. The optical measurement and processing system of claim 3, where one or more patterned illumination sources are configured to illuminate the object with different wavelengths of light.
5. The optical measurement and processing system of claim 3, where more than one optical measurement is acquired by the micro-camera imaging devices as the object is physically scanned to more than one location.
6. The optical measurement and processing system of claim 1, further comprising a digital memory unit configured to securely store the random cryptographic keys.
7. The optical measurement and processing system of claim 6, where the securely stored random cryptographic keys are compared to newly generated cryptographic keys from optical measurements acquired at a later date to provide a measure of object uniqueness.
8. The optical measurement and processing system of claim 6, where the securely stored random cryptographic keys are compared to different securely stored random cryptographic keys at a later date to provide a measure of object uniqueness.
9. The optical measurement and processing system of claim 8, where the securely stored random cryptographic keys are compared to different securely stored random cryptographic keys at a later date using an authentication protocol.
10. The optical measurement and processing system of claim 8, where the securely stored random cryptographic keys are compared to different securely stored random cryptographic keys at a later date using a challenge-and-response scheme.
11. The optical measurement and processing system of claim 6, where each random cryptographic key is stored with information regarding the patterned optical illumination used to generate the optical measurements from which the key is derived.
12. The optical measurement and processing system of claim 1, further comprising a digital communication link to send and receive information regarding the securely stored random keys or the patterned optical illumination to another party.
13. The optical measurement and processing system of claim 12, where the other party receives information regarding the securely stored random keys or patterned optical illumination and acquires optical measurements of an object under patterned optical illumination.
14. The optical measurement and processing system of claim 13, where the other party converts acquired optical measurements into an object dataset, and subsequently converts each object dataset into one or more random cryptographic keys.
15. The optical measurement and processing system of claim 12, where information regarding optical measurements, securely stored random keys or patterned optical illumination is received from another party and used to provide a measure of object uniqueness.
16. The optical measurement and processing system of claim 12, where the communication link is used to send requests to another party to provide repeated measurements of an object under different types of patterned optical illumination.
17. The optical measurement and processing system of claim 6, where the combination of the optical system and object form a physical unclonable function (PUF).
18. The optical measurement and processing system of claim 6, where the digital memory unit contains the random cryptographic keys derived from optical measurements of more than one object.
19. The optical measurement and processing system of claim 1, where the patterned illumination sources are light emitting diodes (LEDs).
20. The optical measurement and processing system of claim 1, where the processing circuitry is contained on a field-programmable gate array (FPGA).
21. The optical measurement and processing system of claim 6, where the securely stored random cryptographic keys are compared to newly generated cryptographic keys from optical measurements acquired at a later date to provide information on changes to the object, such as damage, use, or fading of material properties over time.
22. The optical measurement and processing system of claim 1, where the patterned illumination sources are light emitting diodes (LEDs), micro-LEDs, vertical cavity surface emitting lasers or laser diodes, or the processing circuitry is contained on a field-programmable gate array (FPGA).
Description
BRIEF DESCRIPTION OF DRAWINGS
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
DESCRIPTION OF EMBODIMENTS
[0024] Referring to
[0025] In any event, at a first time and location A, the optical measurement system will acquire multiple measurements of the object over both space and potentially variable illumination conditions. To change the illumination condition, the invention changes the optical radiation emerging from a variable illumination source [102] that is included with the optical measurement system. Variation can take the form of changing the intensity, location, combination of sources, phase, polarization, angle of illumination, or wavelength of the variable illumination source. This will subsequently change the optical radiation that it creates, which then changes what impinges upon the object and is then detected by the optical measurement system.
[0026] One or more measurements are acquired by the optical measurement system, digitized and then compiled into a dataset [103]. In one preferred embodiment, the illumination from the variable illumination source is varied between successive measurements. As an optional step in [112], metadata (e.g., time of imaging experiment, focus settings, conditions of object, location of object with respect to MCAMI, etc.) may be attached to the dataset. Next, this dataset is post-processed by a digital processing system [104]. The digital processing step will distill the dataset into one or more random cryptographic keys, which are then saved in a secure storage system [105] that may be accessed at a later time and/or a different location to help determine object uniqueness. The above three steps can be completed either on a personal computer, computer cluster, field-programmable gate array, a dedicated ASIC chip using random access memory (RAM) for storage or any other means to digitally compute and store the digitized optical information. Secure storage may be located on a hard-drive, database, or within FPGA memory, for example. Although the digital processing system [104] and secure storage [105] are described herein as being separate steps, it should be appreciated that portions or all functionality of the digital processing system [104] and secure storage [105] may be performed by a single computing device. Furthermore, although all of the functionality of the digital processing system [104] is described herein as being performed by a single device, and likewise all of the functionality of the secure storage [105] is described herein as being performed by a single device, such functionality each may be distributed amongst several computing devices. In relation to the secure storage of the secure keys generated in [104], this large set of keys can be encrypted using standard encryption algorithms, enabling the potentially large set of keys to be stored in an otherwise unsecure location, but with the ability of the owner to decrypt the keys using a much smaller key. Moreover, it should be appreciated that those skilled in the art are familiar with the terms processor, storage, and encryption, and that they may be implemented in software, firmware, hardware, or any suitable combination thereof.
[0027] At a later time and/or location B, a similar process as outlined above may be performed to capture multiple optical measurements from a second object of interest [106] over time, where a patterned illumination source is varied between each set of measurements [107]. This results in a second dataset [108], which is then post-processed into one or more cryptographic keys [109]. In one embodiment, the same optical measurement device and variable illumination source as used for the first object may be used to acquire the second dataset for the second object. In a second embodiment, a different yet similarly designed optical measurement device and variable illumination source may be used to acquire the second dataset for the second object. For example, the first dataset of object 1 may be acquired by an MCAMI system in location A, and the second dataset of object 2 may be acquired by a different MCAMI system, but of similar design, in location B. In a third embodiment, a differently designed optical measurement device and variable illumination source may be used to acquire the second dataset of object 2. For example, the first dataset of object 1 may be acquired by an MCAMI system in location A, and the second dataset of object 2 may be acquired by a digital optical microscope with a variable illumination source in location B. In the first two embodiments, less post-processing will be required to ensure that the structure of the first dataset acquired at time/location A matches the structure of the second dataset acquired at time/location B (as compared to the third embodiment). Nevertheless, as detailed later, it will still be possible to directly compare the first and second dataset to test if object 1 and object 2 are the same object.
[0028] In any event, after acquiring optical measurements and forming a dataset, the second dataset is then post-processed to form a second set of random cryptographic keys in step [109]. Post-processing for the second set of random cryptographic keys can follow the same post-processing steps or different post-processing steps as those used for the first set of random cryptographic keys. In either case, after creating the second set of random cryptographic keys, these keys can then be compared to one or more of any other set of random cryptographic keys that have been created via the same process described above (optical measurement, dataset creation, key formation). Comparison is achieved via an authentication protocol.
[0029] Referring to
[0030] The final output of the authentication protocol in step [112] can take the form of a confidence score that specifies what confidence level one can use to describe object 2, measured at time and location B, as the same object or not with respect to object 1. The confidence score can also be used to compare object 2 to any other object that has been previously measured and has their associated keys stored within the secure storage unit in [105]. Additional optical measurements can be requested via an electronic signal [111] and then obtained and processed by the authentication protocol one or more times as needed to ensure a user-defined level of confidence in object uniqueness. The remainder of this section provides further details about each step of this invention.
A. Optical Measurement with the MCAMI System
[0031] In one preferred embodiment, the present invention captures optical measurements using a type of optical system referred to here as an MCAMI system. With reference to
[0032] To form an image, a particular subset of the illumination sources may be activated to illuminate the sample with a particular pattern of spatial, angular and variable wavelength light. In reference to
[0033] Light from this subset of illumination sources then reflects off of the object of interest [220] (also sometimes referred to as the sample) and enters one or more of the micro-cameras within the micro-camera array. The image data from one or more of the micro-camera sensors is acquired in parallel and fed to a computer or a processing unit [208] via an electronic signal [207], which can be comprised of one or more USB cables, PCIe cables, Ethernet cables, or wires within a PCB board, for example. The illumination source activation and image acquisition process is repeated one or more times using a different subset of illumination sources for each acquisition, as diagrammed in
B. The MCAMI System
[0034] The MCAMI system contains one or more micro-cameras that are physically and attached and arranged into an array. In
[0035] In one embodiment, referred to as the continuous MCAMI embodiment, the FOV of each micro-camera in the array may overlap with the FOV of immediately adjacent micro-cameras, such that light from every point of a continuous object surface passes through at least one of the lenses of the micro-camera array. This scenario is shown in
[0036] In a second preferred embodiment for the MCAMI system, the FOV of each micro-camera in the array may not overlap with the FOV of immediately adjacent micro-cameras. This non-continuous MCAMI embodiment is shown in
[0037]
[0038] The resolution of the micro-camera array is in the microscopic regime (approximately 10 m or less). This level of microscopic resolution enables our authentication process to reach a higher level of accuracy than other approaches based on an image taken by a single camera or a laser-scanning system, for example, which are typically limited to 30 m resolution or more. A second benefit of the micro-camera array over a single camera is the ability to extract 3D information about the surface profile of the sample from overlapping FOV areas. In the area marked FOV Overlap 1-2 in
C. The Variable Illumination Source
[0039] The present invention uses a variable illumination source that is comprised of more than one illumination source as marked in
[0040] A bottom view of one variation of a distribution of illumination sources, which comprise a variable illumination source, is shown in
C. Data Acquisition with Variable Illumination
[0041] One embodiment of the MCAMI data acquisition pipeline is presented in the flow chart in
[0042] The flow chart next returns back to step [601] to activate a different subset of illumination sources to create a second illumination pattern s(2). The position and spectral properties of the illumination pattern s(2) will be different than the illumination pattern s(1). Once again, images are captured, processed and saved. This loop is repeated N times for a set of N different image acquisitions in [602], where each acquisition of images is achieved while the object is under illumination from an illumination pattern s(j), for j=1 to N. In practice, N can range from anywhere between 1 and 10,000. Here, j is a counter variable that increases as the acquisition conditions are changed to denote the jth time that a particular subset of illumination sources is activated. Finally, if the micro-camera array is not imaging a continuous field-of-view of the sample, or if the entire sample does not fit within the field-of-view of the micro-camera array, then the sample and/or the camera array can be mechanically scanned to M different positions, where at each position the illuminate-and-capture process is again repeated N times. This process results in NM unique acquisitions, which comprise the full dataset D. We note that this process of multi-angle, multispectral and multi-FOV image acquisition of a large dataset is similar in concept to the registration process of a physical unclonable function [Pappu1], in which a large amount of data is acquired from a physical object of interest.
D. Example Experimental Parameters
[0043] Here are some example numbers for the MCAMI data acquisition process. In one preferred embodiment, an example micro-camera array includes 96 individual CMOS sensors that are 10 megapixels each and arranged in a 812 grid. A single set of images from this micro-camera array with 96 cameras is 0.96 gigapixels (approximately 1 gigapixel). In this preferred embodiment, the micro-camera array follows a similar geometry as shown in
[0044] In one preferred embodiment, it is possible to turn on 16 illumination sources at a time, selected from a total number of 384 illumination sources (4 or the illumination arrays shown in
E. Post-Processing into Cryptographic Keys
[0045] After the proposed invention acquires and forms a full dataset D (containing several to thousands of gigapixels), as shown in step [103] in
[0046] Distillation is carried out in such a way that the semi-random keys are robust against errors or changes between successive measurements of the same object, but are still sensitive to imaging one object versus a different. In other words, the goal of the post-processing step in [104] is to create a set of random cryptographic keys that are unique to the object being measured, and will not change very much when the same object is measured under different experimental conditions that may include errors, but will change when the imaged object is different. Example errors here include optical shot noise, detector noise, electronic noise, position errors, as well as the potential effects of object aging (e.g., crack formation and dust accumulation across the surface of the object) and unexpected illumination variations. These errors may cause a mismatch between the originally acquired dataset and future measurements that are captured for authentication.
[0047] One preferred embodiment of dataset post-processing is presented in the flow chart shown in
[0048] Following the work in [Pappu1], post-processing may also involve taking the wavelet transform of one or more portions of the dataset D and selecting the largest wavelet coefficients from each wavelet transform. Large wavelet coefficients are relatively invariant to changes in position, orientation and the addition of noise, and may also be selected selectively to be invariant to the influence of dust and hairline cracks, which will primarily manifest themselves within a particular frequency/orientation band of wavelet space and can thus be partially filtered out. Thus, in one preferred embodiment, one or more portions of the dataset D will undergo a wavelet decomposition (i.e., is transformed into a wavelet basis) in [702] to form one or more smaller datasets D. This wavelet transformation may either follow the wavelet transformation used in [Pappu1] or follow an alternative wavelet transformation. In either case, a select number of transformation coefficients are selected to send to step [703], where it is desirable to select transformation coefficients that do not vary much if the object is translated, or rotated, or if noise is added to the object image. In one embodiment, one may select the largest 10%-30% of the computed wavelet coefficients to form D and send to step [703]. In another embodiment, one may select the largest 10%-30% of all Fourier transform coefficients to form D and send to step [703]. In a third embodiment, one may select a number of locations of prominent features, determined with a feature detection algorithm, to form D and send to step [703].
[0049] In either case, one or more smaller datasets D, each comprised of a set of transformation coefficients, are then processed by step [703] to create an array of values with high entropy. In one embodiment, this high-entropy array may be created with a digital whitening technique. For example, digital whitening can be achieved by using Von Neumann whitening, or alternatively by forming each D into a vector and then multiplying this vector with a large random binary matrix as performed in [Horstmeyer]. In either case, digital whitening of each D in step [703] creates one or more arrays of values that are smaller than each D (in number of bits) but exhibits a higher per-bit entropy. Smaller datasets with increased entropy are easier to digitally save and offer approximately the same security as the original large, low-entropy datasets. For example, the whitened dataset may be 1-10% of the size of the low entropy dataset. These smaller, high-entropy datasets contain one or more random cryptographic keys.
[0050] In a fourth post-processing step in
[0051] In one simplified example, let us assume that we form response 1, r(1), within the large dataset D by capturing and processing the image from the micro-camera 1, acquired under illumination from the first illumination source in the illumination array. Then, in one embodiment, challenge 1 will specify that s(1) is the first LED in the array, possibly with a vector s(1)[1 0 . . . 0], and that the region of interest ROI(1) is associated with the first micro-camera, possibly with a vector ROI(1)[1 0 . . . 0], such that the challenge c(1)=[s(1),ROI(1)]=[[1 0 . . . 0],[1 0 . . . 0]. In another embodiment, c(1) may be defined by the position and FOV of camera 1, as well as the position and spectral properties of the first illumination source used to capture the data for response 1. In any case, the challenge is defined such that it contains enough information for another party to use at a later date to recreate response 1 with the same object. It may also contain enough information for another party to use at a later date to recreate response 1 with the same object and a smaller MCAMI system (for example, using another MCAMI system that contains fewer micro-cameras). In practice, the instructions (i.e., challenges) may be more complex than this, but defined in such a way that a similar system to the original MCAMI system can automatically acquire this information in a simple and time-efficient manner. We discuss this scenario in more detail below.
F. Secure Storage
[0052] In a fifth post-processing step in
[0053] The challenges for a particular object are stored in one table column and the responses for the same object are stored in another table column. Multiple tables, each associated with a different object, may be stored within the same digital database. Alternatively, the challenge-response key pairs for one or more objects may be stored as a linked list, structure, or class.
[0054] Furthermore, instead of directly storing the challenge-response key pairs within one particular location in memory, it is also possible to store the challenge-response key pairs across an entire network. For example, challenge-response key pairs may be stored within a distributed ledger, such as a blockchain, where the authenticity of the challenge-response key pairs are maintained within a peer-to-peer network. Alternatively, different portions of the challenge-response key pairs may be stored in different locations across a network, such that there is no particular way to access the entire collection of challenge-response key pairs without knowledge of all nodes within the network.
[0055] Independent of the exact format of storage, the challenge-response key-pairs are saved in such a way that it is possible to determine which challenge is associated with each response for a particular object. Furthermore, the challenge-response key-pairs are also saved in such a way that they can be securely accessed at a later date by a trusted party. In one preferred embodiment, secure access is accomplished via the use of a fuzzy commitment protocol (detailed below), as described in detail in [Dodis]. In short, by using a fuzzy commitment protocol, each response is mixed with a pseudo-random string and processed via an error-correction protocol before and after saving. The benefit of a fuzzy commitment-type protocol is to account for possible errors that arise between measurements used to form the challenge-response key pair and measurements obtained from the same object at a later date. In another preferred embodiment, the challenge and response pairs may be saved directly to digital memory without the use of a fuzzy commitment protocol. In a third preferred embodiment, another type of processing step may be used to remove potential errors (e.g., as outlined in [Yu]) that might arise between the first measured set of challenge-response key pair (e.g., between measurements made during object registration and subsequent measurements for object verification, as detailed next).
G. Authentication and Verification Process
[0056] In general, the challenge-response key pairs may be accessed by a party at a particular date to aid with a number of different objectives that concern an object of interest. For example, the challenge-response key pairs may be used as a means to fully characterize the optical properties of one or more objects at high resolution in a limited amount of time. Such a large amount of optical data can provide a means to comprehensively record the state of an object at a certain period of time, which may be beneficial in a conservation setting or to monitor the aging and variation of various types of artwork, documents or other historical artifacts. Alternatively, this type of characterization can be used to provide a certain degree of security regarding the object of interest.
[0057] In one preferred embodiment, object characterization may be used to obtain a measure of object uniqueness. In this scenario, a set of challenge-response response key pairs are obtained and securely stored for one object at one instance in time and at one location (e.g., Time and Location A, as in
[0058] In another preferred embodiment, determination of object uniqueness may be carried out by a challenge-and-response scheme, as first described in [Pappu]. Here, we describe in detail one possible implementation of a challenge-and-response scheme. However, we note that the present invention may be used with a wide variety of challenge-and-response schemes to determine object uniqueness, and that the particular details provided below are meant for illustrative purposes. In general, the proposed system can operate with one of many security protocols that checks whether measurements of an object match those of the same object acquired and saved at an earlier date (e.g., as in a biometric security setting where fingerprints or irises must be matched to previously acquired examples). A major benefit of a challenge-and-response scheme is its ability to hide the majority of sensitive information about the object of interest from a multi-request attack, and also remain robust to variations between measurements acquired during the original object registration process (e.g., at Time and Location A) and then subsequently at the time of object verification (e.g., at Time and Location B).
[0059] One preferred embodiment of a challenge-and-response scheme is diagrammed in the flow charts in
[0060] The first step for the trusted authority in a challenge-and-response scheme is to receive a request in step [722] by an untrusted party, who may or may not hold the original object in question in their possession. In this request, which may be made via digital communication (e.g., an e-mail), the untrusted party asks the verifier (i.e., the trusted authority) to send them one or more challenges associated with one or more particular objects of interest. The untrusted party does not necessarily need to be co-located with the trusted party, nor have access to an MCAMI system, which we assume is located at a trusted node. As described above, the saved challenge is a set of instructions of how to obtain measurements of the object of interest, for example within a particular FOV and/or with a particular angular and spectral illumination source pattern. The trusted authority selects a particular challenge c.sub.k from the securely stored challenge-response table associated with the object of interest (step [723]). This kth challenge is within the challenge-response key pair table at [750]. In one preferred embodiment, the index k may be selected at random. Next, the trusted authority sends the challenge c.sub.k associated with the object of interest via a digital communication link to the untrusted party (step [724]). In one preferred embodiment, this communication can be performed via a private channel that an outside eavesdropper cannot easily monitor. In a second preferred embodiment, this communication can be performed via a public communication channel (e.g., a webpage).
[0061] Once the untrusted party receives the challenge c.sub.k, the goal of the untrusted party is to acquire a limited dataset d.sub.k of the object that, when processed into a key s.sub.k, can be used by the trusted authority to determine if the object of interest matches one or more objects that have challenge-response key pairs within the key database. The actions carried out by the untrusted party to generate the key s.sub.k are carried out at step [730] in
[0062] Once the trusted authority receives the key s.sub.k, it is possible to compare this newly generated key s.sub.k to the original response a produced by the kth challenge during object registration. If the new key s.sub.k matches the saved response r.sub.k up to a certain error threshold, then the trusted authority may increase their confidence that the object used to generate the key s.sub.k (i.e., the object of interest at Time and Location B). This increased confidence is used to make a final determination of object uniqueness in step [726], which can then be reported back to the untrusted party. If a certain level of confidence regarding object uniqueness is not met, then this entire process may be repeated via the loop [727] using different challenges and responses within the challenge-response key pair database.
[0063] As noted above, one preferred embodiment of how the untrusted party creates a key s.sub.k to test for object uniqueness is outlined in the workflow in
[0064] Following the flow chart in
[0065] In a second preferred embodiment, the optical measurements for the limited dataset d.sub.k can be acquired by a separate micro-camera illumination device, here referred to as an MCI device. For example, this MCI device can consist of a single or several micro-cameras whose specifications match those for the micro-cameras used within the MCAMI system, as well as a fewer number of illumination sources than used within the MCAMI system. In general, an MCI device may take the form of a simpler MCAMI system that has less complex hardware, which may not necessarily acquire as large a number of measurements per snapshot as an MCAMI system, or whose measurements are not as high-resolution.
[0066] In any case, an example of an MCI device is shown in
[0067] In any case, after the challenge is configured, the untrusted party will acquire optical measurements of the object of interest in step [803], which will produce a limited dataset d.sub.k. Next, the untrusted party may take one of two steps. In one preferred embodiment, the untrusted party may send the limited dataset d.sub.k to the trusted authority (
[0068] Alternatively, in another preferred embodiment, the untrusted party may process the limited dataset d.sub.k into a key s.sub.k before sending any information to the trusted authority. This case is shown in
[0069] Although particular embodiments of the present inventions have been shown and described, it will be understood that it is not intended to limit the present inventions to the preferred embodiments, and it will be obvious to those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the present inventions. Thus, the present inventions are intended to cover alternatives, modifications, and equivalents, which may be included within the spirit and scope of the present inventions as defined by the claims.
INDUSTRIAL APPLICABILITY
[0070] The invention has been explained in the context of several embodiments already mentioned above. There are a number of commercial and industrial advantages to the invention that have been demonstrated. These include the ability to image large objects at microscopic resolution using a compact system that does not need any moving parts, the ability to acquire many gigabytes of optical image data in an efficient amount of time, the ability to use variable illumination to capture additional optical measurements from objects of interest, and the ability to post-process these optical measurements into cryptographic keys. The invention also provides in varying embodiments additional commercial benefits like the ability to use its generated cryptographic keys for object authentication and/or to determine object uniqueness, to characterize objects with multi-gigabyte datasets, to aid in the process of forgery detection, and to monitor the change of objects over time at a microscopic level, to name a few.
[0071] While the invention was explained above with reference to the aforementioned embodiments, it is clear that the invention is not restricted to only these embodiments, but comprises all possible embodiments within the spirit and scope of the inventive thought and the following patent claims.
CITATION LIST
Patent Literature
[0072] [Fraser] J. Fraser and L. Weber, Authentication method and system, U.S. Pat. No. 9,251,634B1 (2002). [0073] [Jung]: L. Jung et al., Dna marking of previously undistinguished items for traceability, US Patent Application 20140272097A1 [0074] [Kwok] T. Kwok et al., Methods for authenticating articles with optical reporters, U.S. Pat. No. 8,426,216B2 [0075] [Colineau] J. Colineau et al., Method for optical authentication and identification of objects and device therefor, US Patent US 20060104103 A1 [0076] [Cowburn] R. Cowburn et al., Optical Authentication, U.S. Pat. No. 7,812,935 B2 [0077] [Rhoads] G. B. Rhoads and T. F. Rodriquez, Capturing physical feature data, U.S. Pat. No. 8,077,905 B2 [0078] [Alfano] R. R. Alfano and Y. Pu, Spatial frequency spectrometer for and method of detection of spatial structures in materials, U.S. Pat. No. 9,804,088B2 [0079] [Balas] K. Balas and D. Pelecoudas, Imaging method and apparatus for the non-destructive analysis of paintings and monuments, U.S. Pat. No. 7,042,567B2 [0080] [Sharma] A. Sharma et al., System, method and computer-accessible medium for authenticating physical objects using microscopic textures, U.S. Pat. No. 9,759,902B2 [0081] [Horstmeyer] Multiple camera microscope imaging with patterned illumination, PCT Patent PCT/US 2017/024610 [0082] [Pappu2] R. Pappu et al., Identification and verification using complex, three-dimensional structural features, U.S. Pat. No. 6,584,214 [0083] [Prokoski] F. Prokoski, Method and apparatus for alignment, comparison and identification of characteristic tool marks, including ballistic signatures, U.S. Pat. No. 8,090,223
Non-Patent Literature
[0084] [Crilly] Crilly R. The ten most expensive paintings in history. The Telegraph. 12 May 2015. Available: http://www.telegraph.co.uk/news/worldnews/northamerica/usa/11596376/The-ten-most-expensive-paintings-in-history.html. [0085] [Khandekar] Khandekar N, Carol M-U, Cooper H Rosenberger C, Eremin K, Smith K, et al. A technical analysis of three paintings attributed to Jackson Pollock. Stud Conserv. 2010; 55: 204-215 [0086] [Ragai] Ragai J. The Scientific Detect on of Forgery in Paintings. P Am Philos Soc. 2013; 157: 164-175. [0087] [Dantzig] M. M. van Dantzig. Pictology: An Analytical Method for Attribution and Evaluation of Pictures. E. J. Brill, Leiden, Netherlands, 1973. [0088] [Riederer] Josef Riederer. The detection of art forgeries with scientific methods. In Forensic science progress, pages 153-168. Springer, 1986. [0089] [Elgammal] A. Elgammal et al., Picasso, Matisse, or a Fake? Automated analysis of drawings at the stroke level for attribution and authentication, arXiv:1711.03536v1 [0090] [Strezowski] G. Strezowski and M. Worring, OmniArt: Multi-task Deep Learning for Artistic Data Analysis, arXiv:1708.00684v1 (2017), available here: https://arxiv.org/pdf/1708.00684 [0091] [Dong] J. Dong, A. Locquet, M. Melis and D. S. Citrin, Global mapping of stratigraphy of an old-master painting using sparsity-based terahertz reflectometry, Nature Sci. Rep. 7, 15098 (2017) [0092] [Hwang] S. Hwang et al., Optical measurements of paintings and the creation of an artwork database for authenticity, PLOS One (2017). [0093] [Ruhrmair] U. Ruhrmair et al., On the foundations of physical unclonable functions, IACR Cryptology ePrint Archive (2009). Available here: https://eprint.iacr.org/2009/277.pdf [0094] [Pappu1] R. Pappu et al., Physical one-way functions, Science 297 (2002) [0095] [Horstmeyer] R. Horstmeyer, Physical key-protected one-time pad, Sci. Reports (2013) [0096] [Dodis] Y. Dodis et al., Fuzzy extractors: How to generate strong keys from biometrics and other noisy data, Proc. EUROCRYPT 2004 3027, 523-540 (2004). [0097] [Yu] M. Yu and S. Devadas, Secure and robust error correction for physical unclonable functions, IEEE Des. Test Comput. 27, 48-65 (2010).