A secured tag for implementation of traceability in textile and clothing supply chain

Textile and clothing industry is one of the oldest manufacturing industries and is a major contributor in the economic growth of developing countries. However, from past few decades, it has been criticised for its opaque, unsecured and untraceable nature of supply chain. Addressing these challenges, the paper proposes a system approach to introduce an item-centric secured traceability concept to monitor and control manufacturing processes and supply chain activities. In order to implement such secured traceability system, the paper describes the process for manufacturing, encoding and validating an innovative two-factor secured tag based on particle randomness that is printed on the surface of textile. Being micro-sized, the particles are easy to read and validate with pattern recognition. Further, as achieved through an uncontrolled manufacturing process, the randomness is unclonable to produce counterfeit tags. Furthermore, a sequence of experimental analyses has been conducted using various simulated scenarios to verify its applicability. A secured tag can be a low-cost and durable substitute for detachable, unsecured identifiers commercially available in the market.


Introduction
Supply chain transparency and security have emerged as key concerns for various industries.With growing number of ethical issues and increasing counterfeits, it has become a necessity to make the supply chains more secure and transparent [1][2][3].Textile and clothing (T&C) supply chain is one such example.Complex supply chain structure with large geographical distance among actors has made the T&C sector one of the most opaque and vulnerable networks [4].Although all T&C supply chain partners are linked together as a network, yet, they do not have sufficient information about their supply chain.Owing to this, suppliers and other involved actors use unethical means of production and distribution, which have resulted in several catastrophic events in the past.This has distressed the governments and drew their attention towards the sustainability issues in T&C industries [5].
Security and counterfeits are other major concerns of the T&C supply chain [6].According to McMillen et al. [7], manufacturing industries including T&C have experienced a high level of security issues in past few years.In the European Union (EU), T&C sector has lost more than EUR 26 billion of revenue in the years 2010-2011, resulting in approximately 500,000 direct and indirect jobs and EUR 17 billion sales loss in the related sectors [8].Unlike other sectors, the problem of counterfeits in T&C supply chain is not only limited to the final product.It is also a major concern in the intermediate products [6].The fake products not only result in financial losses for the companies but also endanger the health and well-being of the end users [9].
Adoption of a secured traceability system has emerged as a possible solution to overcome the aforementioned problems [10,11].Traceability is a key concept related to all types of products and supply chains [12].It is an itemcentric approach for tracking and tracing a product [13].It generally uses a unique identifier tag (such as RFIDs, QR codes and barcodes) assigned to each traceable unit.The tags track the products at various levels of the supply chain.However, they are often detached, removed or deactivated at the point of sale due to privacy concerns [14].Moreover, most of the tags can easily be replicated and do not have any security mechanism for authentication.As a result, the T&C market is vulnerable to unsafe, counterfeit products, and often, the internal operational information cannot be recalled which may expose the end users to serious security concerns.For instance, clothing is one of the most recalled products [15], albeit only a small fraction of items are taken back from market due to lack of traceability.In this direction, barcodes (such as linear barcodes and QR-codes) are generally used to track products in the supply chain.On one hand, the barcodes are relatively cheap to manufacture and implement [16], they do not create privacy concerns (unlike RFID) on the other hand [17].Moreover, linear barcodes and QR codes are eco-friendly and degradable [16].With selection of appropriate printing mechanism and ink, they can be made waterproof and durable.These characteristics make them appropriate for application in T&C product.
In the context of implementing secured traceability, the present paper introduces a two-factor product authentication and tracking system for T&C supply chain.With the view of securing the existing QR code, a random particlebased secured tag as an additional security layer has been introduced.The unique and random feature of each secured tag is associated with the corresponding QR code.This combination acts as a key to unlock the traceability code, authenticates the product and traces its history.Unlike widely used detachable RFID and barcode tags, the proposed system is to be integrated onto the surface of the textile product.This makes the tag almost inseparable, preventing loss or replacement with counterfeits in the supply chain.Produced by conventional textile printing mechanism, the tags are anticipated to be of low-cost and easy to manufacture on a large scale.This can be one of the useful contributions to the T&C supply chain with low-cost product wherein a slightly higher investment in the traceability technology can increase the final product cost and reduce profit margin.Particle randomness generated during printing process with no control on the distribution acts as a unique feature for each product, which is hard to replicate.This randomness is read and encoded as a secured code to access the product database through the QR code and prevent it from cloning.To prove the uniqueness and evaluate its performance, a series of experiments have been conducted which simulate various mechanical agitations that a textile tag usually undergoes during its use phase.Although the proposed system is developed for T&C supply chain, the methodology can be used for other similar supply chains.

Literature review
According to (ISO 9000:2015), 'Traceability is the ability to identify and trace the history, distribution, location, and application of products, parts, materials, and services.A traceability system records and follows the trail as products, parts, materials, and services come from suppliers and are processed and ultimately distributed as final products and services'.It has multiple benefits including transparency, enhanced quality perception, and better control of the material flow [18,19].Traceability is a useful tool to overcome challenges in an omnichannel retailing and to reduce the risks in supply chain by identifying the upstream source and downstream recipients in real time.It further helps in decision making, product recall, recycling and remanufacturing.Its applications can also be explored for shared economy business models where traceability can act as an authenticating mechanism and information related to the history, origin, date of purchase, etc. could be shared at customer-to-customer level.
A significant research has been carried out in the past to develop various technologies to prevent counterfeiting and/or tracking and tracing the product in a supply chain [20][21][22].There are authentication technologies that aim to identify counterfeits without tracing the product footprint in the supply chain.On the other hand, there are track and trace technologies which are used for locating the products within the supply chain.It relies on tagging each product or group of products with a unique identifier such as RFIDs and barcodes, and then these identifiers are used as a tracing element.However, due to lack of security mechanism, these identifiers are cloned or replicated and then used with counterfeit products [23].As a result, track and trace systems cannot rely solely on traceability tags and requires an additional security mechanism for authentication and prevention of unauthorised reproduction/cloning [10].Such system is often known as a 'secured traceability' system [11] and can be found in food, pharmaceutical, cosmetics and luxury product supply chain [10,11,24].Table 1 provides an overview of the various technologies and their pros and cons with respect to product authentication, tracking and security.
In general, the security mechanisms in a secured traceability system are applied at two levels; first, at a product level, where authentication and traceability are ensured by identification and tracking of each product using unique featurebased secured traceability tags; second, at a business level, where information flow is controlled and secured by using mechanisms such as 'circle of trust' and 'block chain' [10].
Given the peculiarities of the T&C supply chain, the traceability requirements are special and it cannot use offthe-shelf solutions in the market [40].Durability, clonability and detachability of the traceability tags are some of the major issues in T&C products [4].A secured traceability tag for textiles should have security (WARDS): two-factor authentication system.Uses scanned watermark information from labels along with product's identification code from RFIDs as a two-factor authentication system [21] b.Physical unclonable function (PUF) based RFIDs: RFID IC chip equipped with PUF to prevent product clonability [33] c.Fingerprinting RFID tags: prevent cloning by using physical attributes or features based on minimum power responses measured at multiple frequencies [34] d.Other examples can be found in [35,36] 3.2 Secured barcodes/QR codes a. Cryptographic barcode [6] for traceability and brand authentication in the textile industry.Printed directly on the surface of textile and tested against deformation due to the unstable textile surface b.QR code and a digital signature [16] for fishery product.
The system uses weight of individual fish as their digital signature c.Microtaggant [24]: lithographically fabricated to consider the QR code pattern for traceability on pharmaceutical industries 3.3 Miscellaneous a. Yarn-based traceability tags by [37] used yarn-based feature to secured traceability system b.Permanent sub-surface tattoo [38] developed for leather products for traceability and counterfeits reduction c.SigNature® T [39] protects the product using unique molecular-based tagging of each textile and clothing product.
Int J Adv Manuf Technol (2018) 99:2563-2577 mechanism preventing the easy and unauthorised reproduction of tags.However, at the same time, it should be durable to withstand mechanical agitation during washing and abrasion.It should also be integrated onto the flexible textile product to prevent the disintegration of tracking tag.Finally, taking into account the usual low cost of textile product, the developed solution should be inexpensive, eco-friendly and readable by a readily available device to allow the customer to authenticate and trace the product.

Ideal secured traceability system
As aforementioned, traceability is an item-centric approach tracking, tracing and connecting each physical product with their information.Within this context, traceability tag plays a crucial role in uniquely identifying the products and acts as an information-recalling agent.However, from a practical point of view, a tag also acts as the weakest point while implementing a secured traceability in the supply chain [23].The whole traceability system can be compromised if the tag is copied, washed away or detached.In an ideal secured traceability system, each product should be tagged with a secured tag.These tags should be hard to replicate, easy to integrate in the product or developed using inherent features and should remain with the product throughout its life cycle.For such a system in T&C supply chain, since the material lots are combined and transformed into new materials with changed physical or chemical characteristics; therefore, a single tag may not be sufficient to cover the complete supply chain.
As shown in Fig. 1, these secured tags should be integrated with the product/intermediate product at each supply chain stage before it passes to the next downstream level.Thus, each tag acts as a link to access the product data management system, responsible for stacking data in a time-based function, as the product passes through different life cycle stages.This database system must retain and should include the data related to current stage and that received from previous stages.Finally, the  The current study focuses on the secured tags that must be integrated on each textile product during the manufacturing (apparel production) stage before it passes to the retailer and finally to the customer.Design and concept of such integrated secured tags are presented in the following section.

Concept
According to Oxford Dictionary [41], security can be defined as 'procedures followed or measures taken to ensure the security of a state or organization'.One such measure to ensure the security of a physical entity consists of introducing features or markers that cannot be replicated or altered, and any attempt to tamper them leads to noticeable changes.These markers or features are usually introduced directly on the surface of the product through direct part marking (e.g.[42]) and act as a unique identifier to track and trace the product throughout the life cycle.Within this context, the study presents a novel methodology for the development of a secured tag or unique identifier for T&C supply chain.To develop these, micro-sized particles are mixed with printing paste and then screenprinted on the surface of the fabric.The natural positioning of the particles on the fabric surface forms a random and unique distribution on each product.These random distributions are characterised and converted into security features.It primarily has two advantages.Firstly, the use of conventional screen printing (which is a mature manufacturing process with low capital cost and find wide applications in surface functionalization; for example, see [43]) and commercially available printing materials, which are widely used.Selection of such printing mechanism and material does not significantly influence the production process.It generates value from the existing technology with possible low implementation cost.Secondly, the position of the particles cannot be controlled during the printing process; therefore, practically, it is extremely difficult-if not impossible-to control the position of each individual particle while printing on the fabric surface.This provides an extraordinary advantage as no one can replicate the positioning of the particles through a controlled process, thus acts as a strong security feature.In order to implement it, the positioning of particles has to be mapped with 2D QR code, i.e.QR code would retain the information related to the positioning of the particles and the tracking code.As shown in Fig. 2, for verification, the information of particle positioning and tracking code associated with QR code should match with that of particle position printed on the textile surface and this correct mapping will only be possible for an authentic product.
It can be noted that the particle positioning can be either directly stored on the tag or indirectly on a server with reference to the QR code.

Design
The design of the secured tag is inspired from the coating Physical Unclonable Function (PUF) generated using explicitly introduced randomness.Widely used in the integrated circuit chip manufacturing industries to prevent counterfeits, these PUFs are easy to evaluate and read but hard to replicate [33].The randomness acts as a fundamental building block of the cryptographic system and plays a crucial role in generating a strong secured communication key [44].Therefore, randomness similar to PUFs is generated by scattering micro-particles in a confined area, on the surface of textile by an uncontrolled process.This type of security mechanism does not give control of code generation and security to a single trusted party or dependency on a single special product (e.g.special ink and microfiber); on the other hand, it would cast traceability onto the product (e.g.[45]).Therefore, the same tag cannot be reproduced even by the original manufacturer.Moreover, with an inconsistent concentration of the micro-size particle in relatively high tag area (in a few square centimetres), numerous tags can be printed with a very low probability of reproducing the same particle positioning again.The particle distribution on the secured tag is located using image-processing tools that are frequently used in surface classification and identification technologies (one such example can be found in [46]).Further, two distinct features (strong particle clusters and empty areas location, further explained in the 'Methodology' section) were extracted using particle locations and encoded to form the secure code.These innovative features take into account the flexible nature of textile surface, the durability concerns and also possible tampering of code through particle addition or erosion.Besides, use of image-based characterisation makes the secured tag readable by the smartphone-based camera, thereby giving customers the power to trace back the history of the product and making the supply chain more transparent and visible.

Methodology
The methodology followed in this study involves the printing of the secured particle-based tag (from hereafter referred as 'secured tag') on the textile surface, image of which is captured using smartphone, followed by processing of these images through image-processing algorithm to extract the tag features.Later, these features are registered, taking into account the flexible, unstable and non-uniform nature of textile surface, through a fuzzy membership function to get a code and mapped with the QR code.The current study focuses on particle-based secured tag, whereas printing of QR code is already a mature technology.

Screen printing of secured tag
Secured tag is integrated on the textile surface through screen printing mechanism and textile printing paste.Screen printing is a stencil printing method in which printing paste or ink is squeezed through a fine mesh (made up of synthetic or metallic fibre) onto the fabric surface, except the areas that are made impermeable by the blocking stencil.The printing paste is formulated by mixing micro-sized dark glitter particles (sourced from Geotech International B.V., Netherlands) with a commercial textile binder in a fixed weight-by-volume ratio.First, a square frame of inner area 3 cm × 3 cm was printed on the textile surface using black ink on a light-coloured fabric.(Relatively, a larger area of the tag will increase the possibility of numerous distributions and decrease the probability of generating same distribution).On the other hand, corner points of the black frame help in easy and fast detection of the quadrangles of the tag by referring to only a few pixels instead of the entire captured image [47].It is also useful to determine the transformation caused by scaling, rotation and translation during the image-processing operations [48].Printing paste (with micro particles) is then squeezed through the screen onto the fabric area inside the empty frame.The binder being almost transparent does not impart any colour to the light background; however, it strongly holds the particles onto the surface of the textile.This makes a good colour contrast that can easily be detected and captured in a digital image.For constant and uniform placement of the printing paste, an automatic squeezing mechanism was adopted using a magnetic table as shown in Fig. 3.
It should be noted, for commercial processes with large batch size, fully automated rotary screen printing can be adopted to reduce the process time.

Tag encoding and validation mechanism
As illustrated in Fig. 4, the tag encoding and validation mechanism followed mainly two steps.First set of steps were carried out to pre-process the image and extract the area of interest (particle area) followed by membership calculation (optical feature extraction and defining decision support system) and finally the validation step, where   3 Magnetic table and screen printing setup adopted in the current study the particle mapping (AUTH 1) is matched with QR code (AUTH 2) to authenticate trace the product.It should be noted here that image pre-processing, code area extraction, particle detection and location steps would remain common for encoding and validation mechanism.

Image pre-processing and code area extraction
Image pre-processing is an important operation involving improvement of image data to suppress unwilling distortions and enhance image features that are important for further processing [49].Mainly two groups of operations are applied to the captured image during this step.The first set of operations involved morphological operators and linear contract adjustment to correct the non-uniform illumination [49].These are general methods applied by estimating the properties of degradation and evaluating image pixels during processing.The image was then converted to greyscale before further processing.The second group of operations was dedicated to detecting the quadrangle frame and its corner points followed by extraction of inner tag area printed with particle.For this, a copy of the processed greyscale image is converted to binary images using Otsu method (Otsu [50]).Otsu's method is a histogram threshold method that assumes the pixels of the image consist of classes, i.e. background and foreground, and calculate optimum threshold t separating the two classes.Thus, the greyscale 2D image in Cartesian plane with coordinates (x,y) and pixel intensity I (x,y) is converted to binary image B (x,y) with intensity 0 or 1 based on the derived threshold t where, This was followed by flood fill method [51] to remove all the unwanted background (including the particles) to extract only the frame.Flood fill algorithm checks each pixel in an image and analyses the connected area.It removes any unwanted noise by filling/changing the intensity of the pixel to be the same as the intensity of the majority of neighbour.As a result, image in Fig. 5b is obtained.
Further, Hough transformation [52] was applied to the obtained image to detect straight lines of the frame and thereafter the corner points, as shown in Fig. 5c.In Hough transformation, all the high-level pixels of a binary image are converted to polar coordinate (r, θ) form 2D Cartesian coordinate (m,n) following relationship: Such that θ is confined between [0,π) and results in forming a unique Hough's peak/points on the polar plane for all mutually linear points in the Cartesian plane.However, in practice, due to geometric distortions, the location of the corner might change from initial to subsequent readings.Therefore, 2D projective transform [53] was performed along the detected corner points of the tag on the initial greyscale image to normalise it by correcting the alignment and scaling it down to a fixed dimension.Finally, the normalised image was cropped along the corner points to extract the actual area of interest, i.e. particle area as shown in Fig. 5d.

Particle location detection
After pre-processing operations, histogram-based intermode thresholding [54] was applied on the cropped image to extract the particle by subtracting the background (consisting of light colour textile), as illustrated in Fig. 5e.The input in this process was a greyscale image for which a histogram of the pixel intensity values (ranging from 0 to 255) was plotted and iteratively smoothed until only two peaks remained.The threshold value lies in the midpoint of the two peaks or the minimum point between the peaks corresponding to low-intensity white background pixels and high-intensity pixels with particles [55].After identification of particles, in order to locate the center coordinates of particle, Circular Hough Transformation (CHT) [52] was applied on the obtained binary image.The resultant image is shown in Fig. 5f.CHT is similar to the standard Hough transform; however, the later tries and searches for circles in the given image between a predefined range of radius.Due to this predefined radius range (derived from calculating the average particle size and standard deviation), it is easy for the algorithm to differentiate two or more close or connected particles.

Membership calculation
After determining the location of each particle, two key features were extracted.The first key feature was the location of the strong clusters of the particles.In other words, areas in the tag where particles are very close to each other having a strong degree of belongingness in the cluster.The second feature was the locations of empty areas in the tag, especially the largest empty areas.It should be noted that these two features are inter-dependent.Any attempt to copy the features is made by increasing or decreasing the concentration of particles in the tag, one of the two features will vary significantly.There should be a balance between the two features that has a high probability to be present only in the original/authentic tag.

Locating strong clusters of particle
Initially, all the particle locations (observations) were divided into k predefined optimum clusters based on their location (Euclidean distance) using k-means clustering algorithm described below.
where x = observation (particle coordinates), c j = centroid for the cluster j and S j = set of particle location in j cluster.
The value of k is obtained through Elbow method.During clustering, given set data is divided into groups of similar elements; however, there are set of data that have high fuzziness or uncertainty of belongingness to allotted cluster/group.Similarly, in case of k-means clustering, the data points on the edge of the clusters will have a high probability of lying in the neighbourhood cluster.Hence, it becomes an important criterion to locate and store the strong clusters removing out all the outliers.Therefore, to eliminate all the outliers or points with high uncertainty of belongingness, the following steps were taken: Abovementioned steps were applied on the particle locations obtained from the image in Fig. 5f.These locations were divided into five clusters (marked with different symbols in Fig. 6), and later five strong clusters were extracted (encircled in Fig. 6).
The main reason for considering the location of strong particle cluster as an encoding feature is to avoid dependency on the location of a single particle.Therefore, even if some are eroded or added (noise), the average membership of the particles in the respective cluster should not vary significantly.

Locating empty areas
A more logical and systematic approach of locating and encoding empty area is to find the largest circle which can fit in that empty area without any particle inside.For this, Voronoi diagram and Delaunay triangulation methods were opted [56].Delaunay triangulation, which is a popular computational geometry method of subdividing a given 2D Euclidean plane with a finite number of points in it into triangles such that none of the points on the given Euclidean plane, lies inside the circumcircle of any triangle.Voronoi diagram of a set of points is dual to its Delaunay triangulation.
For K different points in the 2D space, R 2 the Voronoi cell V k (i) of k i is denoted by: After applying Delaunay triangulation, radiuses and centres of all the distinct circumcircles with no overlapping areas  were recorded and top k largest circles (same as the optimum number of clusters obtained through Elbow method) were selected from them as a part of the optical feature.Figure 7, illustrates the application of Voronoi diagram on the particle locations obtained from the image in Fig. 5f and location of five biggest empty areas encircled in Fig. 7.

Decision support system for tag feature encoding
For an effective and fast decision support system (DSS) algorithm, it is not necessary to match exactly the true pattern with subsequent reading; rather, it should compute the difference between distributions of correlated like pattern with that of unlike pattern.Moreover, taking into account the flexible, non-uniform and uneven textile surface, while defining a membership function, it is necessary to incorporate some tolerance.In this direction, fuzzy set principle introduced by Zadeh [57] using the concept of similarity of inputs instead of crisp values were used to define and assign a fuzzy membership function to these features.Membership function f(x) is a function that assigns, to every number x, the degree f(x) [0 ;1] to what this number satisfies the corresponding property.For example, in the proposed secured tag, the degree to which the obtained feature will belong to the original code while decoding.For the current study, one of the most frequently used trapezoidal membership function was selected.As described in the previous section, the location particles of the strong cluster and the empty areas are encircled and referred by the centre (c) and radius (r) of the circle.Therefore, the trapezoid membership f(x) is defined as: where x is calculated as the Euclidean distance of the particle from the centroid of the cluster, i.e.
x ¼ such that (a 0 ,b 0 ) are the coordinates of the cluster centroid and (a,b) are the position of a particle.Since there are more than one particle in each cluster, the average membership of the cluster (μ) is calculated as: where n is the total number of particles and f(x i ) is the membership to the i th particle in the cluster.Moreover, since each tag consists of multiple clusters, the membership of all clusters can be represented asμ i , i ∈ {1, k} where k is the total number of clusters.In order to increase the robustness of DSS and avoid ambiguity and uncertainty, individual membership of two optical features extracted in the previous section was aggregated.For the first feature, membership of each particle as per their location in the respective cluster was calculated and average membership values of each cluster were added to get the final membership of the first feature (strong clusters).For the second feature (empty area), the initial membership value will remain zero, as there will be no particle inside while encoding.However, while decoding, the membership value may vary due to deformation.

Membership difference for code validation
The membership difference is calculated as: Such that μ o i represents the membership of the i th cluster for the original tag and μ T i represents the membership of the i th cluster of the tested tag.It should be noted that the coordinate points of the clusters and their average membership value of the original tag should be stored in order to make a comparison as shown in Fig. 8.

Experimental
As mentioned before, in practice, unavoidable variations can occur in the initial and subsequent reading of the tag due to variations in camera, image resolution, light intensity, light temperature, etc.The most common variations that can occur in such textile-based tags are particle erosion due to washing or abrasion during textile use phase, pattern deformation due to elastic nature of textiles, noise (in form of migrated particle or foreign particle/lint) and alignment variation due to inappropriate handling of the camera while decoding.Therefore, to test the developed system for these variations, 50 different tags were printed.Images of these tags were captured with Fig. 8 Different parts of the traceability code that would be encoded and printed as QR code on the textile surface digital camera and processed using MATLAB 2015b as per the methodology explained in the secured traceability system' section.Variations were introduced synthetically followed by image decoding operation to verify the tag identity.Results obtained after decoding each tag were compared with the actual authentic code and with other 49 codes of different tags to validate the code and test the randomness.

Inter-tag analysis
An initial experiment was conducted to prove the uniqueness of each tag and estimate an average membership difference between two unlike tags.Membership code of each tag was applied on itself and on the other 49 tags.Frequency distribution of membership difference of 2500 possible combination thus obtained was plotted, to estimate the average and standard deviation value.

Alignment analysis
The tags are unidirectional and encoded in one fixed alignment.During verification, the algorithm would check the image by aligning and decoding it in all four directions, i.e. 0, 90, 180 and 270 (alternately, a positioning marker can be added like the QR code).The code should only validate with the original authentic code in one alignment and there should be variation in membership value in all other direction.Code of the authentic tag was compared with decoded images of 50 tags by rotating them in all directions.The experiment was repeated for all the 50 codes, and 50 images.The differences thus obtained were recorded.

Particle addition/erosion analysis
The proposed textile tag should be durable to withstand mechanical agitation.Washing and abrasion during the regular ig. 9 Variation of membership difference for inter-tag analysis use of the T&C product can erode some particles or add some unwanted noise in the tag.To simulate the up to 20% of the particle locations were randomly added and removed in the obtained particle locations in original image and results were analysed in the subsequent section.

Pattern distortion analysis
Due to flexible nature of textiles, the original tag might stretch in due course of usage.In order to simulate such conditions, the original tag images were stretched to 20% in vertical, horizontal and diagonal direction and realigned about the corners using projective transform.

Particle shift
Due to improper image capturing method or shift in corner points, the particle location might shift to a certain extent.To simulate the same, all the obtained particle locations from the original tags were rotated up to 10°, leading to a rotational and linear shift.The obtained locations were then validated to check the difference.

Results
For a robust, secured traceability system, the tags should be durable to last until the recycling stage.Pertaining to this, the experiments analysed the tag performance under common variations that might affect the subsequent tag reading due to its textile nature.The results are presented in terms of membership difference of 50 tags.To ensure low probability of false detection, the average value of membership difference between like patterns of the authentic tags before and after variation should be zero or very low, whereas the average difference between two unlike pattern should be high enough to result in significant and complete separation to facilitate selection of a threshold value.All the difference value below the threshold will have a high probability that the read pattern corresponds to the original tag even after variation, whereas the difference value above threshold corresponds to unlike or unauthentic code.

Results for inter-tag analysis
The frequency distribution the membership difference for all the comparisons was plotted.It was observed that it followed a normal distribution, as shown in Fig. 9.
The average membership difference among two unlike tag was 3.89 with 0.59 standard deviation.It should be noted that membership difference for the tag, when compared with itself for all the 50 cases, came out to be zero and all those values were neglected for the distribution evaluation.

Results for alignment analysis
Figure 10 shows the average difference in membership value obtained by subtracting the original or authentic tag membership value with the correctly aligned original tag, followed by average difference between the membership value of authentic tag and membership obtained after rotating the same with 90°s ubsequent rotation.A complete and vast separation can be observed between the correctly aligned and misaligned tag, proving that the pattern is random and will authenticate only with correct alignment and correct pattern.

Results for particle addition/erosion analysis
Figure 11 shows the results of the average difference in membership values obtained after one-to-one comparison between first the distorted pattern with the authentic tag patterns and then with pattern of the 50 unlike tags.These distorted patterns are obtained after randomly removing or adding particle location values up to ± 20%.It can be observed that the membership difference for the like or authentic tags with distorted pattern increases with increasing the level of erosion or addition.However, the difference between the unlike tags membership value is still high that proves the probability of false detection is still low even after removing or adding up to 20% of particles.

Results for pattern distortion analysis
All the 50 patterns were stretched to 20% horizontally (x-direction), vertically (y-direction) and diagonally (in 45°direction) and realigned using proposed methodology.
Figure 12 shows the mean difference in membership values of original/authentic tags with undistorted patterns and that obtained after realigning the like pattern on one side.This is followed by mean difference in membership values of the realigned tag with other 50 tags on other.The results show a significant variation among the differences of like tags and differences of two unlike tags even after realignment and pattern distortion.This verifies that the algorithm proves effective even after stretching the tags and tolerates pattern distortion to a certain extent.

Results for particle shift
Figure 13 shows the mean difference in membership values of authentic/original tag with undistorted patterns and that obtained after shifting/rotating the locations of all the particle of the like pattern up to 10°on one side and the average difference in membership values of the shifted pattern tag with other 50 tags on the other.It can be observed that the difference up to 5°is not very high and the probability of false detection is comparatively low.However, a greater distortion more than 7.5°can affect the algorithm and increase the probability of false detection.This factor can be studied further and improved in the future study.This paper introduces and validates concept, design and methodology an integrated and secured traceability tag for the T&C supply chain.The main novelty and contribution in this work (1) in the form of a secured tag specially designed and developed for the T&C supply chain, taking into account the particularities of the T&C product, (2) in terms of value generation from the existing conventional printing technology and material with low capital investment and (3) selection and encoding of distinct features that complement each other and lead to high probability of true positive validation of the secured tag.It is anticipated that such tag would make the supply chain traceable and would be helpful in anti-counterfeiting.The developed tag showed good results when tested for use-phase treatment of the textile product.The tag only validates in one alignment, which proves that the distribution is random and unique.There was not a significant change in the membership difference value even after addition or removal of around 20% of particles.In addition, the membership difference did not increase (within the authentic tag) even after shape distortion due to stretching (up to 20%).This is an important criterion for the durability of the tag, as it should be validated (if authentic) even after some distortion due to washing or handling process.
However, it has certain limitations that need be addressed in future research works.A physical wash and abrasion resistance analysis should be done to examine the impact of washing and abrasion of the tag under standard test conditions.It should also be noted the difference in membership value (for original tag) increased with the particle rotational shift.Therefore, the validation process can be affected by this distortion.An in-depth analysis of various commercially available textile binders can be done in future research work to restrict particle movement over the textile surface.This can be followed by piloting of the developed tag in the actual T&C supply chain to find and address the implementation challenges.
These secured tags presented in this study are helpful in securing the T&C supply chain at the product level and restrict unauthorised access to the product database.Nonetheless, future research can be undertaken to secure the traceability system at the business level to prevent the attack on the information sharing mechanism.

Fig. 1
Fig. 1 An ideal secured traceability system for T&C supply chain

Fig. 2
Fig. 2 Tag registration (mapping of code with QR code) and verification process

Fig. 4
Fig. 4 Flow chart for tag encoding and validation mechanism.a Steps for image pre-process and code area extraction.b Steps for extracting the features, calculating the membership and validating the code

Fig.
Fig.3Magnetic table and screen printing setup adopted in the current study

Fig. 5
Fig. 5 Image obtained during different stages of encoding and validation process.a Original.b After correction, Otsu thresholding, and flood fill operations.c After Hough transformation.d Cropped image (area of interest).e Particle detection.f Particle location (after CHT)

&
Data from each obtained clusters were segregated and treated separately.& Euclidean distance between each data point and cluster centroid was calculated.& Area of the largest circle with the centre as the centroid of the cluster and radius equal to the distance of most distant particle in the same cluster was calculated.& Graph of percentage increases in the area of the circle (from 0 to 100%, i.e. the area of the largest circle, at an interval of 10) against a cumulative number of particles within given area was plotted.& The bending (elbow) point of the curve was calculated and the percentage area against it became the threshold area for the new cluster.Value of radius corresponding to the threshold area became the new largest radius.& The centroid of the previous cluster later shifted to the centroid of the new cluster with reduced points.& The radius and centres of all the k cluster were selected as part of the code.

Fig. 6
Fig. 6 Particles in different clusters marked with different symbols with circle enclosing the newly formed cluster

Fig. 7
Fig. 7 Partition of the image plane into Voronoi cells and five largest circles, encircling the five biggest empty spots in the image

Fig. 10
Fig. 10 Difference in membership value of the original tag and membership obtained when it is rotated by a 0°, b 90°, c 180°, and d 270°F

Fig. 12 Fig. 11
Fig. 12 Difference in membership value when the tags are stretched to 20% in a horizontal, b vertical, and c diagonal directions

Fig. 13
Fig. 13 Difference in membership value with particle rotational shift