摘要:
This method of water-marking digital books with parameters comprises: - the formulation (56) for each parameter of a new character font on the basis of a pre-existing font, by creating at least one new code‑glyph pair, - the formulation (58) of a new text coded on the basis of a pre-existing coded text by replacing in the pre-existing coded text at least one code or group of codes of the pre-existing font making it possible to display a character or a combination of characters of the digital book by the code or the group of codes of the new font making it possible to display the graphically identical character or the combination of characters on any screen, this code or this group of codes of the new font comprising at least the code of the new code‑glyph pair, - the provision (64) in the guise of a watermarked digital book of the new coded text and of the new font.
摘要:
The invention provides a method and a system for fingerprinting a data object at a server system and a method and a system for extracting the fingerprint from the data object at a client system. Sections of a data object are watermarked with known watermark data to create a first and a second variant of the data object, whereby the section boundaries are optionally saved as metadata. Using the metadata the first and second variant are combined by taking sections from the variants to create a fingerprinted data object. From the fingerprinted data object the watermark data can be extracted again.
摘要:
Information available at a decoder is embedded into image content after decoding by first representing that information by at least one film grain pattern and then blending that at least one film grain pattern with the decoded image content. Such image content is typically in the form of a movie and examples of the information to be embedded include identification of the specific decoding device, the user of the decoding device, the time and date of decoding, the model number of the device, the versions of software running on the device, the status of the device or connections to the device, the contents of device registers or memory locations within the device, among many other possible data. When an unauthorized copy of image content is discovered, the copied image content undergoes a comparison to the decoded image content to generate difference data. Thereafter, the difference data undergoes comparison with a database of film grain patterns to recover the embedded data.
摘要:
Security documents which has multiple field each of which contains information that is perceptible in more than one way. One field can contain a visually perceptible image (23, 24, 25) and a ditigal watermark (22) that can be detected when the image is scanned (302) and processed, another field can contain machine readable OCR text (24) that can be read by both a human and by a programmed computer, and still another field can contain watermark data (22). Documents are produced by beginning with a template (21) which defines the placement of elements on the document and the interrelationships between hidden and visual information on the document. Pictures, graphics and digital data are extracted from a data bank, and watermark data is embedded (27) in the pictures and graphics as appropriate. An automatic validation system (312) of the present invention reads multiple fields on the document, and it also automatically detects information about the user.
摘要:
Machine-readable data is digitally watermarked into banknotes. Such watermarking can be optically sensed and detected by various devices. In response, such devices can intervene to prevent banknote reproduction. This arrangement addresses various problems, e.g., the use of digital image editing tools to circumvent prior art banknote anti-copy systems. In some embodiments, visible structures characteristic of banknotes are also detected (e.g. by pattern recognition analysis of image data), and reproduction can be halted if either the visible structures or the digital watermark data are detected. In other embodiments, automatic teller machines that accept, as well as dispense, banknotes can check for the presence of digitally watermarked data to help confirm the authenticity of banknotes. In other embodiments, scanners, printers and photocopiers can be provided with digital watermarking capabilities so that image data, or printed output, produced by such devices includes digital watermark data, permitting subsequent identification of the particular device used. The digital watermarking can be effected by making slight alterations to ink color, density, etc., or by texturing the microtopology of the banknote surface. Some embodiments effect the watermarking by modulating the width or placement of component lines that form line art imagery on the banknote.
摘要:
A method for enhancing security printing includes determining fields associated with print job variability. Physical security information is entered, and a physical security data stream is generated from the physical security information. The physical security data stream is mapped to a data stream that is used to provide settings for the fields for the print job variability. The fields for the print job variability are set based upon the mapping the physical security data stream.
摘要:
A method for encoding coding a message including the steps of performing two-channel encoding of the message into a robust string and a fragile string; transmitting the robust string through a fragile channel; and transmitting the fragile string though a robust channel. Before the step of performing two-channel encoding of the message into a robust string and a fragile string the number of characters in the message may be reduced to reduce the size of the encode message. The two- channel encoding step includes the steps of creating the robust string by encoding the message using the codeword dictionary; and creating the fragile string by encoding the message using a compression algorithm. The robust string may be transmitted by embedding the robust string in an image. The fragile string may be transmitted by embedding the fragile string in a 2-D bar code.
摘要:
Methods and apparatus for embedding digital watermarks into a digital host content are provided. A digital host content is received, e.g., at a receiver or other device incorporating a receiver. One or more watermark embedding technologies is selected. Multiple embedding opportunities are identified within the host content. A subset of the identified embedding opportunities is selected. A multiplicity of digital watermarks are then embedded into the host content in accordance with the selected subset of embedding opportunities utilizing the one or more selected watermark embedding technologies. The selecting of the subset of embedding opportunities may be adapted to provide a desired tradeoff between levels of robustness, security, and transparency of the watermark. A plurality of watermarking embedding technologies may be selected and used in the embedding step.
摘要:
A method for encoding a message including the steps of performing two-channel encoding of the message into a robust string and a fragile string; transmitting the robust string through a fragile channel; and transmitting the fragile string though a robust channel (Fig. 6) . Before the step of performing two-channel encoding of the message into a robust string and a fragile string the number of characters in the message may be reduced to reduce the size of the encode message. The two channel encoding step includes the steps of creating the robust string by encoding the message using the codeword dictionary; and creating the fragile string by encoding the message using a compression algorithm. The robust string may be transmitted by embedding the robust string in an image. The fragile string may be transmitted by embedding the fragile string in a 2-D bar code.
摘要:
The invention relates to watermarking systems, which irregularly change the embedded watermark so as to avoid hacking the system by averaging-attacks. In averagingattacks, segments of the watermarked signal are accumulated. This causes the host signal to be cancelled out whereas the embedded watermark accumulates coherently. A watermark A thus determined is then subtracted by a hacker from the watermarked signal. This invention exploits the insight that the hacker does not know when the embedded watermark changes (from A to B, or from A to none). Accordingly, fragments of the hacked signal will contain the negative watermark -A being unintentionally embedded by the hacker. This causes the watermark detector to produce a correlation peak of opposite polarity. The invention resides in the detection of such a negative peak, and concluding therefrom that the signal has been tampered. The payload of the watermark is preserved. This provides the possibility to trace back the hacker.