Abstract:
A system and method for verifying a printed document. Generally, the system is implemented to automatically compare first and second images and provide an output with respect thereto. In an illustrative embodiment, the inventive system includes a computer for providing a first electronic image of a document. The image may be provided via a network such as the Internet. A printer is coupled to the computer and driven to print the document. The document is then scanned to provide a second electronic image of the document. The scanned image is then compared to the original image to provide verification of the printed output. For text based documents, the first and second images may be converted to text using conventional optical character recognition software to facilitate comparison. In a refinement of the present teachings, a mechanism is provided to detect a file characterization by which a restriction may be imposed on the number of the documents to be printed. If a document is restricted, successful printouts above the restriction are disabled. As a further refinement, a second mechanism is included to enable a fingerprint to be printed on the restricted document. When scanned, the fingerprint provides an indication of the operability of the printer and the scanner. In the event the fingerprint is not detected, the printer is disabled. This mechanism would be useful in a pay-to-print application to frustrate fraudulent efforts to disable the scanner and thereby cause the printer to output unauthorized printouts.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system encrypts a content purchased by the purchaser using a public key of a purchaser system and sends the encrypted content to the purchaser system. The purchaser system creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
Abstract:
An automated system checks networked computers, such as computers on the internet, for watermarked audio, video, or image data. A report listing the location of such audio, video or image data is generated, and provided to the proprietor(s) thereof identified by the watermark information.
Abstract:
A document administration system includes an administration unit, a discrimination information image discriminating unit, and an image forming apparatus which, forms an image on a recording medium in case that the discrimination information image discriminating unit discriminates that the recording medium has the discrimination information image before the image is formed on the recording medium, and forms the image and the discrimination information image based on the discrimination information connected to the image on the recording medium in case that the discrimination information image discriminating unit discriminates that the recording medium does not have the discrimination information image before the image is formed on the recording medium.
Abstract:
Methods and systems are provided for tracing the source of a printed document. A method may include receiving a print job for printing a page having page content, generating a log of the print job, encoding the log using a mule image to produce a data-bearing halftone image, merging the data-bearing halftone image with the page content, and printing the merged data-bearing halftone image and page content to produce a printed document.
Abstract:
Among other things, at a cloud-based service, digital image files are received from which digital images can be displayed on devices. For each of the digital image files, data is embedded in the digital image file on behalf of a party who has rights in the digital image file. The existence of the embedded data is not perceptible in any digital image that is displayed using the digital image file. The embedded data includes information from which the digital image file can be authenticated. At the cloud-based service, a digital image file is received that is to be authenticated. The digital image file is authenticated based on the embedded data.
Abstract:
Systems and methods for tracking a slide comprising a tissue sample. In an embodiment, data is received from a Laboratory Information System (LIS) barcode associated with a slide and a proprietary barcode generated by a slide staining system, such as a Ventana slide staining system, to track the slide through the staining process. A new label is printed that contains both the LIS barcode and the proprietary barcode, and is attached to the slide. When the slide is subsequently scanned by a slide scanning system, the slide scanning system reads and decodes the LIS barcode to obtain a LIS barcode value. The LIS barcode value may then be used to retrieve information associated with the slide.
Abstract:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents.
Abstract:
An image processing apparatus reads an original to which a restriction item such as copy restriction is embed to input image data. The image processing apparatus restricts an image processing on the input image data which involves a loss of the embedded information on the restriction item to maintain a state where the restriction item is embedded for the output. Alternatively, the image processing apparatus outputs the image data of a format where the restriction information is added to the input electric data.