摘要:
A composite information bearing device comprising an image pattern and a human readable data device. The human readable data device includes a set of human readable data symbols representing a first set of data. The first set of data includes a first data portion and a second data portion. The image pattern represents a second set of data and comprises a third data portion. One of the first or said second data portions is to form an identification code upon combination or concatenation with said third data portion, and the other one of said first or said second data portions not forming part of said identification code is to form a verification code, the verification code being related to said identification code by a scheme of operation.
摘要:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
摘要:
A data-bearing image (391) is created from a carrier image (371). The carrier image (371) is scaled to produce a scaled image. A clustered-dot halftone screen is applied to the scaled image to produce a halftone image. A resulting number of cells in the halftone image conforms to a cell count (372) that includes a horizontal cell value and a vertical cell value. Payload data is encoded into the halftone image to produce a data-bearing halftone image, including shifting pixel clusters within cells of the halftone image that include pixel clusters.
摘要:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
摘要:
The present invention is relate to watermark information embedding apparatus and method for the same, watermark information detecting apparatus and method for the same, and method of containing watermark document. A document image generator (101) generates a document image according to document data (105). A watermark image generator (102) generates a watermark image. The watermark information (106) is denoted with dot pattern, and the dot pattern within the outline of the watermark information are of special value. A synthesizer (103) overlaps document image generated from the document image generator (101) and the watermark image generated from the watermark image generator (102) so as to generate a containing watermark document image.
摘要:
Composite image information which is generated by embedding invisible sub-information in visible main image information and recorded on a recording medium (M) is read. A spatial frequency component unique to key information used to restore the sub-information is extracted from the composite image information read from the recording medium (M). The sub-information is reconstructed from the extracted spatial frequency component.
摘要:
A pseudo-symmetric watermark is watermark pattern that is built up from a finite number of basic pattern by tiling. The well-known WaterCast pattern that is built up from one single pattern is a special case of this, and is referred to as a symmetric watermark pattern. It is well known that symmetric patterns allow an efficient detection method that consist of two phases, viz. first an accumulation phase, followed by a cyclic sliding correlation with the basic pattern over the accumulated data. The invention provides a detection method for pseudo-symmetric watermarks with a similar reduction in complexity as with symmetric watermarks, i.e. an accumulation phase followed by one or more cyclic sliding correlation steps (using the finite number of basic patterns). Let W1, ...., WN be the set of basic patterns, all of size M. The suspect signal is folded (31) as if there was only a single basic pattern. The fold buffer will have the sum pattern W = W1 + .... + WN (39) as a strong component. The presence of the watermark can then be detected by a cyclic sliding correlating with W.
摘要:
A method for embedding information in a digital image by an imaging device that is electronically connected to a network server includes storing a digital image having first embedded information in an electronic memory at a network server and sending the digital image having the first embedded information from the network server to the imaging device. The method further includes producing second information and using the imaging device to embed the second information in the digital image having the first embedded information to produce a digital image having the first and second embedded information.
摘要:
A method for embedding a watermark into digital data, when the watermark is to be embedded in a digital image, independently changes real number components and imaginary number components of each of coefficient values of a complex watermark coefficient matrix using key, from the watermark to be embedded in the digital image, a step for performing a discrete Fourier transform on the sequence matrix of the changed watermark and generating a watermark pattern; and a step for adding like tiling the water mark pattern to the original image, and generating an embedded image. Further more, a watermark detection method for detecting a watermark from a digital data, a step for separating a block from an arbitrary position on the detected object image, a step for performing a discrete Fourier transform on the block and obtaining a sequence matrix, a step for generating position information for a component that is to be detected and that is specified by the key, a step for detecting a position marker sequence by calculating a phase difference of a sequence by an amount of parallel displacement, for each item of the position information, and extracting offset information which is the amount of parallel displacement when there is agreement between a start point of an embedded watermark and a start point of the block cut from the detected object image, and a step for detecting the embedded watermark cut from the detected object image.