Abstract:
The disclosure describes systems for creating and authenticating printed objects using authentication information. Techniques for incorporating authentication information into digital representations of objects and using the authentication information to authenticate the objects are also provided.
Abstract:
In a data transmission apparatus and method of the present invention, a specific operator ID for an operator who uses a data processing device to process image data to be copied or transmitted, is selected. Specific owner IDs for owners who are authorized to access the image data, are selected. User identification data, inclusive of all operator IDs and owner IDs correlated to the data processing device, are stored in a storage device each time image data is captured by the data processing device. Allocation of the stored user identification data to each of the image data is managed by reading items of the user identification data from the storage device in response to the selections of the specific operator ID and the specific owner IDs and displaying the user identification data items.
Abstract:
What has been disclosed is a system and method for authentication of JPEG image data prior to transmission to an intended recipient which enables the recipient to ascertain whether the received image file originated from a known identified source or whether the contents of the file have been altered in some fashion prior to receipt. In accordance to the present invention, to encode verification information a unique hashing function is derived from a first section of image data contained in the JPEG compressed image in such a way that any changes subsequently made to said first section of image data would be reflected in a different hashing function being derived therefrom. An integrity checking number is produced from the first section's derived hashing function. The integrity checking number is subsequently encrypted into a signature string. The signature string is then embedded into a next section of the image data. The process is repeated until all sections of image data have been processed. The signature string corresponding to the very last section of data is self-embedded therein. As the embedding of a previous section's integrity checking number is done without modifying the JPEG bit stream any JPEG decoder found in the arts can thereafter properly decode the image. The image file is then transmitted to an intended recipient. To decode the embedded verification information upon receipt of the JPEG image file by the recipient a hashing function is computed by the recipient from a first section of image data contained in the received image file. A second section of data is identified wherein the signature string for the first section of data had been embedded. The signature is then decoded from the data. The signature string is thereafter decrypted to yield the hashing function (integrity checking) number contained therein. The two numbers are then compared against each other. If the first checking number matches the number contained in retrieved signature string which had been previously embedded therein by the author then it can be ascertained that the image data for that first section is authentic. The process is repeated for each successive section of data until all the data sections of the image file have been processed.
Abstract:
A record medium for recording an information signal in which a first watermark and a second watermark have been embedded, the first watermark being transmitted when the information signal is transmitted as an analog signal, the second watermark being transmitted when the information signal is transmitted.
Abstract:
Image, video, or audio data is encoded with both a frail and a robust watermark. The two watermarks respond differently to different forms of processing (e.g., copying the object may render the frail watermark unreadable), permitting an original object to be distinguished from a processed object. Appropriate action can then taken in response thereto.
Abstract:
Image, video, or audio data is encoded with both a frail and a robust watermark. The two watermarks respond differently to different forms of processing (e.g., copying the object may render the frail watermark unreadable), permitting an original object to be distinguished from a processed object. Appropriate action can then taken in response thereto.
Abstract:
Enables identification and detection of processing and type of digital content, while using multiple electronic watermarks. One embodiment provides a data processing detection system having an embedding apparatus for adding a predetermined additional signal to digital content, including a watermark design unit and embedding signal generators for generating multiple types of additional signals, correlated with each other and of differing robustness from each other for the processing of the content data, and a synthesis unit for adding the multiple types of additional signals to the content data; and detection apparatus for detecting additional signals in the digital content, and for detecting the additional signals embedded by the embedding apparatus, including an individual detector for detecting in the content data multiple additional signals, and a determination unit for examining deterioration levels of the additional signals to determine the type of processing performed for the content data.
Abstract:
A watermarking system allowing an appended-type watermark to be easily inserted into a scaled-up/down image without deteriorating the detection accuracy of the appended-type watermark is disclosed. A first scaling factor of an input watermarked image is detected by detecting a copy control watermark from the input watermarked image. It is determined whether a watermark including a second scaling factor is detected from the input watermarked image. When the watermark including the second scaling factor fails to be detected, a second watermark including the first scaling factor is created and embedded into the input watermarked image and further an appended-type watermark is inserted into the input watermarked image. When the watermark including the second scaling factor is detected, the first and second scaling factors are used to calculate a third scaling factor, which is used to detect the appended-type watermark.
Abstract:
The disclosure describes systems for creating and authenticating printed objects using authentication and copy detection watermarks. For example, one verification system includes a watermark decoder and a verification module. The watermark decoder detects a copy detection watermark in a printed object to determine whether the printed object has been reproduced. The verification module processes a message decoded from an authentication watermark on the printed object to authenticate the printed object or bearer of the printed object. The authentication and copy detection watermarks may be implemented as the same or different watermarks. For example, the copy detection watermark may be a fragile watermark that carries the message and that degrades in response to a reproduction operation, such as photocopying or scanning and then reprinting the object. Alternatively, the authentication and copy detection watermarks may be separate watermarks embedded in an image that is printed on the object. The authentication watermark, in some applications, includes an identifier that links the object to a database entry with related information about the object. This related information can be used to check the bearer of the object by comparing it with attributes of the bearer (such as a user ID or photo) or the validity of the object by comparing it with attributes that are visible or machine readable on the object.
Abstract:
A control device is configured to: control the scanner unit, when a first instruction is received from a user to insert a first scanned data in a first file stored in a file storage server, to scan a document to generate the first scanned data; and to provide a first insertion request to the file storage server through a communication interface, the first insertion request requesting the file storage server to insert the first scanned data at a target location in the first file, the target location being a location designated by the user through a terminal device that is configured separately from the control device.