摘要:
Improved techniques for making copy detection patterns and using them to detect copying relationships between digital representations. The techniques include techniques for including a message in a copy detection pattern without altering the copy detection patterns entropy and reading the message, techniques for using a copy detection pattern on an analog form to determine whether the analog form is an original analog form without reference to a digital representation of the original of the analog form's copy detection pattern, techniques for increasing the sensitivity of copy detection using copy detection patterns by modifying one of two copy detection patterns that are being compared to take into account alterations resulting from the copying process, techniques for distributing a copy detection pattern across a document, and techniques for using the entropy of a copy detection pattern to locate the copy detection pattern. Also disclosed are applications of copy detection patterns with copying that involves transformations between the digital and analog forms and with digital-to-digital copying.
摘要:
Improved techniques for making copy detection patterns and using them to detect copying relationships between digital representations. The techniques include techniques for including a message in a copy detection pattern without altering the copy detection patterns entropy and reading the message, techniques for using a copy detection pattern on an analog form to determine whether the analog form is an original analog form without reference to a digital representation of the original of the analog form's copy detection pattern, techniques for increasing the sensitivity of copy detection using copy detection patterns by modifying one of two copy detection patterns that are being compared to take into account alterations resulting from the copying process, techniques for distributing a copy detection pattern across a document, and techniques for using the entropy of a copy detection pattern to locate the copy detection pattern. Also disclosed are applications of copy detection patterns with copying that involves transformations between the digital and analog forms and with digital-to-digital copying.
摘要:
Disclosed is a user interface apparatus to be utilized in an image reading apparatus for forming image data by reading an original image. The user interface apparatus comprises: a setting section for setting a condition of reading the original image; and an instruction section for instructing start of reading the original image according to the condition of reading having been set by the setting section, wherein the setting section is provided with a selecting section for selecting whether to imprint a time stamp to the digital data formed by reading the original image.
摘要:
The present invention provides a method of securing messages steganographically embedded in media (e.g., printed or electronic objects, audio, and video). In one implementation, a message inclues a first portion and a second portion. The first portion includes a first message and a first checksum, which are encrypted with a private key. The encrypted first protion is combined with the second portion. The second portion includes a second message and a second checksum. The combined encrypted first portion and the second portion form a signature. The signature is encrypted wth a common key or universal key, perhaps after error correction coding. The private key is uniquely associated with an entity such as a document issuing jurisdiction.
摘要:
A character recognition process is executed for image data written with text information, and a digital signature is given to the character recognition results and image data. The digital signature is given to data coupling both digest values of the character recognition results and image data. The digital signature is verified, a character recognition process is executed for the image data, and further a digest value of the character recognition results is calculated and compared with the digest value of the stored character recognition results. The location where both the digest values are incoincident is identified as an alteration position.
摘要:
A method (2), an apparatus, a computer readable medium and use of said method for authenticating an audio-visual signal (10), such as a digital image or video, are disclosed. A signature is derived from all image regions, including areas with flat or otherwise un-watermarkable content. By combining signature bits from all regions of the audio-visual signal and spreading the signature bits over the whole audio-visual signal or at least a large area of it, preferably by applying a spread spectrum watermarking technique (2.40), the authenticity of flat regions is verified.
摘要:
A method, system and computer readable medium for the authenticating of an audio-visual signal, such as digital images or video comprising the generation of a robust image signature with variable size. In a preferred embodiment DC-values of blocks of a digital image are calculated and areas with similar DC-values are merged into regions. The signature is based on said regions and of variable length, depending on the desired localization ability or an allowable signature length. The resulting signature bits are robust to compression and other allowable image operations. The hierarchical solution provides both robustness and tampering localization.
摘要:
A handheld device (100) is capable of communicating wirelessly with a ticket issuer (200) through a network (300) or by using a short-range link such as Bluetooth, IrDA, or the like. A ticket is purchased using a payment system (400). A user selects an image from a data store (120) and transmits it to the ticket issuer (200) along with data associated with the requested ticket. This data may comprise identification data of the user and/or the device (100), data concerning a requested validity of the ticket, data concerning the payment method and/or an optional reservation number. The ticket issuer (200) receives the request then transmits to the user a template, which the user then fills in before transmitting payment data, the completed template and the selected image from the user device (100) to the ticket issuer (200), as one or more SMS and/or MMS messages. If the data is verified as satisfactory, the ticket is then created by the ticket issuer (200) and visible and/or invisible watermarks are embedded into the image. The processed picture/image and the template are combined with additional data to generate a valid image digital ticket for the ticket user, which is then sent to the user or to an address or device which the user has given.
摘要:
A method of protecting a digital object (111) against unauthorized tampering, comprising computing a digital signature over the contents of the digital object (111), creating a summary of the computed digital signature, and embedding the summary in the digital object (111). The authenticity of the thusly protected digital object (111) can be verified by extracting the embedded summary from the digital object (111), computing a digital signature over the contents of the digital object (111), creating a summary of the computed digital signature, and matching the extracted summary and the created summary, whereby the digital object (111) is verified as authentic if the matching is successful. Also devices and computer programs for implementing the protecting and verification methods.