Abstract:
A method and apparatus for providing media-independent security for a document is provided. In one embodiment, a method includes inputting image data corresponding to an interpretable image displayable by a display device in an interpretable format to be readily interpretable by a user; inputting security data corresponding to security information; creating, in a first medium, a document including a substantive portion; and a security portion inseparable from the substantive portion. The method further includes transferring the document into a second medium; decoding symbols into binary security data representing the security information; and outputting the binary security data in a format retrievable to be interpretable as the security information.
Abstract:
A visible first watermark and invisible second and third watermarks are embedded in digital media content, in order to protect the media content from piracy. The visible first watermark protects the media content during distribution and storage, while the invisible second and third watermarks are embedded in to identify an owner and displaying entity, respectively. The second and third watermark keys can be used to detect the associated watermarks for forensic purposes. The first, second and third watermark keys are symmetric keys. A distribution entity embeds the visible first watermark in the media content using the first watermark key and embeds an invisible second watermark in the media content using the second watermark key. The distribution entity transmits the media content with the embedded visible first watermark and invisible second watermark to a displaying entity, wherein the displaying entity removes the visible first watermark from the media content using the first watermark key and embeds the invisible third watermark in the media content using the third watermark key.
Abstract:
In a method for embedding collusion-secure digital fingerprints in electronic documents, using a geometric order system one point in the projective space PG (d, q) is unambiguously assigned to each flagging position in a document via a secret function. At least two hyperplanes of PG (d, q) are assigned to each fingerprint, each being exclusively assigned to one fingerprint only, and for each fingerprint precisely those flagging positions that correspond to the points of the selected hyperplane are flagged. To trace attempts to delete fingerprints, an intersection of hyperplanes is reconstructed from the flagged flagging positions that have been found in the document, by analyzing linear dependencies the hyperplanes are determined, and by calculating these hyperplanes the fingerprints of colluding customers may be determined.
Abstract:
The present invention relates to digital watermarking systems and methods. In a first implementation, so-called movie studio rough-cuts are watermarked to provide a forensic tracking clue or to provide security for distributed rough-cuts. In another implementation, a watermark is determined for a compressed video object. The watermark is compressed as an object and the watermarked object is then associated with the compressed video object. The two separate objects are provided to a rendering device, which after decompressing both objects, embeds the watermark in the video prior to rendering.
Abstract:
An image capture device is provided with processing circuitry that steganographically embeds plural-bit auxiliary data within the captured image data. The embedding may be accomplished by adding a low level noise signal to the image data, where the noise signal has the auxiliary data encoded therein. Image data output by the device thus conveys auxiliary data that can be used for a variety of purposes.
Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data by patterned bit cells whose energy in the spatial domain facilitates decoding registration. Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g. with embedded URLs) for use on the internet.
Abstract:
A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents.
Abstract:
A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents.
Abstract:
According to one embodiment, a document administration system includes an administration unit to administer administration information of an image formed on a recording medium in connection with discrimination information of the recording medium and a decoloring device. The decoloring device includes a reading unit to read a discrimination information image based on the discrimination information, the discrimination information image being formed on the recording medium with erasable coloring agent, a decoloring unit to decolor the image formed on the recording medium with erasable coloring agent after the reading unit has read the discrimination information image, and a printer to print the discrimination information image in which at least the number of times of decoloring has been updated based on the discrimination information image read by the reading unit on the recording medium after decoloring.
Abstract:
To prevent forgery of printouts by a simple configuration that can be easily introduced to an existing system, a printer 3 that prints a receipt based on print data sent from a POS terminal 2 has: a code generating unit 33 that generates a unique code unique to each receipt based on the print data; a print control unit 31 and print unit 45 that print a receipt based on the print data, and print the unique code on the receipt; and a code transmission unit 34 that outputs the unique code to a receipt history server 6.