US 12,462,593 B2
Image processing and authentication of unclonable functions
Young L Kim, West Lafayette, IN (US); and Jung Woo Leem, West Lafayette, IN (US)
Assigned to Purdue Research Foundation, West Lafayette, IN (US)
Appl. No. 17/768,293
Filed by Purdue Research Foundation, West Lafayette, IN (US)
PCT Filed Aug. 15, 2020, PCT No. PCT/US2020/046579
§ 371(c)(1), (2) Date Apr. 12, 2022,
PCT Pub. No. WO2021/076216, PCT Pub. Date Apr. 22, 2021.
Claims priority of provisional application 62/945,816, filed on Dec. 9, 2019.
Claims priority of provisional application 62/915,666, filed on Oct. 16, 2019.
Claims priority of provisional application 62/915,667, filed on Oct. 16, 2019.
Prior Publication US 2024/0127614 A1, Apr. 18, 2024
Int. Cl. G06V 20/00 (2022.01); G06T 5/70 (2024.01); H04L 9/32 (2006.01)
CPC G06V 20/95 (2022.01) [G06T 5/70 (2024.01); H04L 9/3278 (2013.01); G06T 2207/10064 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method of authenticating an item, comprising:
randomly distributing one or more types of edible fluorescent particles on to an area of an item (Area), thus generating a physical unclonable function on the item based on locations of the edible fluorescent particles and illumination wavelength;
applying light to the Area;
capturing one or more images from the Area;
binarizing each of the one or more images by associating a “1” or a “0” to each pixel in the one or more images whereby a “1” is assigned to a pixel representing a local highest fluorescent intensity within each of the edible fluorescent particles and a “0” is assigned to all other pixels, thereby determining a spatial location based on location of a pixel with the maximum intensity for each edible fluorescent particle;
generating a cryptographic pattern from the one or more captured images based on the determined spatial locations by a host processing system;
communicating the cryptographic pattern to a remote processing system having a plurality of cryptographic keys in a database each uniquely associated with a corresponding item;
comparing the cryptographic pattern with the plurality of cryptographic keys in the database; and
communicating a positive evaluation for authentication to the host processing system if a match is found between one of the plurality of cryptographic keys and the communicated cryptographic pattern, else communicating a negative evaluation,
wherein the one or more types of edible fluorescent particles are chosen from the group consisting of enhanced cyan fluorescent protein (eCFP), enhanced green fluorescent protein (eGFP), enhanced yellow fluorescent protein (eYFP), and mKate2 (far-red) fluorescent protein.