摘要:
In an embodiment of a method of automatically modifying a data-bearing image, a number of first modules and a number of second modules of the data-bearing image used to encode first data and extra data, corresponding to the first data, are determined, where portions of the first data and/or portions of the extra data encoded in second modules cannot be modified. When the number of first modules is greater than or equal to the number of second modules, at least some of the number of first modules are modified to encode at least some of the first data and at least some of the extra data. When the number of first modules is less than the number of second modules, at least some of the number of first modules are modified to encode the first data.
摘要:
A forensic verification system (1100) extracts a print signature via a print signature extractor (1110) from an interior of a halftone contained in an image. The system (1100) utilizes a comparator (1120) to compare the print signature to a reference signature stored in a registry to determine differences between the print signature and the reference signature. The system (1100) utilizes a forensic analyzer (1130) to perform a forensic analysis on the signatures based on the comparison to authenticate the image.
摘要:
A method for tracking customer loyalty information using an incremental information object (IIO) includes capturing an information object (IO), wherein the IO include a number of tiles, and wherein the number of tiles include a standard code. The method also includes analyzing the IO to identify the standard code and analyzing the IO to determine if the IO is an IIO containing a progressive code, wherein the progressive code does not interfere with the reading of the standard. The method further include confirming the progressive code and, if the progressive code is successfully confirmed, obtaining customer loyalty data from the progressive code within the IIO.
摘要:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.
摘要:
In a method for providing differential access to a digital document among workflow participants, in which at least one of the workflow participants is outside of a common secure environment (300), a first set of keys including an encryption key, a signature key, and a verification key is associated with atomic unit(s) (304). The atomic unit(s) is encrypted using the encryption key and signed using the signature key (306, 308). A level of access to the atomic unit(s) to be granted to each of the workflow participants and the keys in the first set of keys to supply to each of the workflow participants based upon the identified level of access are identified (310, 312). In addition, each of the workflow participants is supplied with the identified one or more keys (314) and the encrypted and signed atomic unit(s) is supplied to a first workflow participant (316).
摘要:
An embodiment of a two-dimensional barcode has a number of regions. A first region of the number of regions comprises black and white modules and one or more first colored modules. The one or more first colored modules encode data that is readable by reading the one or more first colored modules as white modules and different data that is readable by reading the one or more first colored modules based on their color. A second region of the number of regions comprises black and white modules only or comprises black and white modules and one or more second colored modules. The one or more second colored modules encode data that is readable by reading the one or more second colored modules as white modules and different data that is readable by reading the one or more second colored modules based on their color.