Abstract:
The present invention is related to a method for generating an image file for forgery verification and a method for forgery verification. A method for generating an image file for forgery verification according to the present invention consists of a generating a bit map of the image file, a generating a horizontal check logic, a vertical check logic, and a check logic of each region from the bit map, a generating a two-dimensional bar code from the horizontal check logic, the vertical check logic, and the check logic of each region, and a generating an image file for forgery verification into which the two-dimensional bar code is inserted. A method for forgery verification according to the present invention consists of a generating a first horizontal check logic, a first vertical check logic, and a first check logic of each region from the bit map by generating a bit map of an image file for forgery verification into which a two-dimensional bar code is inserted, a generating a second horizontal check logic, a second vertical check logic, and a second check logic of each region from the two-dimensional bar code, and a comparing the first and the second horizontal check logics, the first and the second vertical check logics, and the first and the second check logics of each region.
Abstract:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In on application, the auxiliary signal is formed as an array of elements selected from a set of print structures with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. For example, the changes make the embedded auxiliary signal more or less detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Examples of sets of properties of the print structures that change differently in response to copy operations include sets of colors (including different types of inks), sets of screens or dot structures that have varying dot gain, sets of structures with different aliasing effects, etc. Robust and fragile watermarks are used in Image Replacement Documents for a variety of applications. Digital watermarks act as on-board mediators in authentication of a variety of printed documents. Finally, digital watermarks are used to help manage quality of the scanners used in imaging systems.
Abstract:
A method of embedding a watermarking in a host signal computes a first watermark depending on a particular party and computes a second watermark depending on the host signal. The method embeds the first and second watermarks in the host signal. At least one of the watermarks is embedded using a key derived from the host signal. In particular, one of the watermarks is embedded with a key derived from the host signal.
Abstract:
According to the present invention, authenticities of paper fingerprint information and of document information are collectively determined through formation of an original that is given an encoded image in which both paper fingerprint information and document information are encoded. By collectively guaranteeing identities of the paper form and of the document, it becomes possible to realize the more reliable authenticity guarantee.
Abstract:
A system and method for verifying that a document is included in a document management system is disclosed. This system and method includes scanning of a scan track of a document, generating document data dependently upon the scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior scanning of the scan track of the document, and outputting an indication of the document being included in the document management system as determined by the comparing.
Abstract:
Stationery, or other printable media, is encoded with a digital watermark. The watermark is not conspicuous to a human observer of the media, yet conveys plural bits of auxiliary information when optically scanned and digitally processed. The watermark can be formed by ink-jet printing, or otherwise. The encoded information can be used for various purposes, including authenticating the document as an original, linking to associated on-line resources, and distinguishing seemingly-identical versions of the same document (document serialization).
Abstract:
The present invention relates generally to steganographic encoding. One claim recites a consumer product including: a metallic or shinny surface including a machine-readable pattern, the machine-readable pattern including plural-bit auxiliary data hidden in a steganographic manner, and the pattern provides at least diffuse or Lambertian reflection. Another claim recites a consumer product including: a shiny or metallic surface including a pattern, the pattern including or representing the auxiliary data in a steganographic manner, and in which the pattern is provided with an ink or dye and in which at least one of a coloration or finish of the ink or dye is selected to hide the ink or dye with respect to at least one of a first coloration or the first finish. The auxiliary data comprises or links to information regarding the physical object. Of course, other claims and combinations are also provided.
Abstract:
The present invention relates generally to steganographic encoding. Once claim recites a method including: obtaining plural-bit auxiliary data; creating an original carrier signal representing the plural-bit auxiliary data; reducing information content of the original carrier signal so that the carrier still conveys the plural-bit auxiliary data, yielding a reduced carrier signal; and hiding the reduced carrier signal in host data. Another claim recites a mechanical part including: a metallic surface including a pattern, the pattern conveying plural-bit auxiliary data in a steganographic manner, and the pattern provides at least diffuse reflection. Of course, other claims and combinations are also provided.
Abstract:
A portable device uses a microphone to listen to ambient audio, derives data from captured audio signals, and uses the derived data to request delivery of the audio or related information to the user's home or other location. The device is desirably pocket-sized, or suitable for carrying on a key-ring. The device may also detect a watermark signal that is present in the user's environment (e.g., played through a public address speaker system) to aid the user in recalling the context from which the audio was requested.
Abstract:
The present invention relates generally to identification documents. In one implementation, a provided method includes: obtaining optical scan data associated with text characters provided on an identification document to obtain first data; using at least a portion of the first data to facilitate decryption of information—not the text characters—carried on or in the identification document. The information corresponds to the identification document or to an authorized bearer of the identification document. In another implementation, a method is providing including: obtaining optical scan data associated with an identification document to obtain first data; obtaining second data from the identification document, the second data comprising encrypted data; communicating the encrypted data and the first data to a remote device, the remote device decrypting the encrypted data with at least reference to the first data; and receiving decrypted data from the remote device. Other implementations and embodiments are provided as well.