Abstract:
A method for routing a facsimile includes: receiving a facsimile in a computer readable format; locating one or more keywords in the facsimile, wherein at least two of the keywords are not adjacent in the facsimile; analyzing the facsimile to determine at least one of a meaning of the facsimile and a context of the facsimile; attempting to initiate a business process based at least in part on analysis; and routing at least a portion of the facsimile comprising text to one or more destinations based at least in part on the analysis. Corresponding systems and computer program products are also disclosed.
Abstract:
Among other things, at a cloud-based service, digital image files are received from which digital images can be displayed on devices. For each of the digital image files, data is embedded in the digital image file on behalf of a party who has rights in the digital image file. The existence of the embedded data is not perceptible in any digital image that is displayed using the digital image file. The embedded data includes information from which the digital image file can be authenticated. At the cloud-based service, a digital image file is received that is to be authenticated. The digital image file is authenticated based on the embedded data.
Abstract:
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve this problem, the print control apparatus includes: determining unit for determining an interval between a pattern element and a pattern element adjacent to the pattern element from the received image data; and control unit for performing a control so as to scale the image at a magnification specified by a user and have the scaled image printed by a printing apparatus when the product of the magnification specified by the user and the interval determined by the determining unit falls within a predetermined range, and configured to terminate or interrupt the printing of the image by the printing apparatus when the product of the magnification specified by the user and the interval determined by the determining unit does not fall within the predetermined range.
Abstract:
A forensic verification system (900) extracts a print signature via a print signature extractor (910) from a captured image of a printed halftone. The system (900) utilizes a comparator (920) to compare the print signature to a reference signature stored in a registry to determine differences between the print signature and the reference signature. The system (900) utilizes a forensic analyzer (930) to perform a forensic analysis on the signatures based on the comparison to authenticate the printed halftone.
Abstract:
A process for securing a document including a step of printing a distribution of dots on said document, said printing, as a result of unanticipated unknowns in printing, causing an unpredictable variation, dot by dot, of at least one geometric characteristic of the printed dots and prior to said print step, a step generating said distribution of dots so that at least half the dots of said distribution are not laterally juxtaposed to four other dots of said dot distribution, and at least one dimension of at least one part of the dots of said distribution of dots is of the same order of magnitude as the average for the absolute value of said unpredictable variation. In embodiments, during the step generating the dot distribution, more than half the dots do not touch any other dot of said distribution. In embodiments, during the step of generating the dot distribution, dots are produced of which at least one geometric characteristic is variable, the geometric amplitude of the generated variation having the order of magnitude of the average dimension of at least one part of the dots.
Abstract:
The presently claimed invention relates generally to methods and apparatus employing digital watermarking. Once claim recites an apparatus including: electronic memory for storing received digital imagery or audio, in which the digital imagery or audio comprises digital watermarking including a first instruction, in which the digital watermarking is hidden in the digital imagery or audio through alterations of data representing the digital imagery or through alterations of data representing the audio; and an electronic processor programmed for: decoding the digital watermark from the digital imagery or audio to obtain a first instruction; and based at least in part on the obtained first instruction, updating said apparatus when an address associated with the digital imagery or audio changes. Of course, other claims and combinations are provided too.
Abstract:
The image forming apparatus includes: a random number information generation part that generates random number information; a first encryption part that encrypts the random number information generated by the random number information generation part with using a first encryption key; a second encryption key generation part that newly generates a second encryption key from the random number information generated by the random number information generation part; a second encryption part that encrypts specific information for identifying the apparatus with using the second encryption key generated by the second encryption key generation part; a code data creation part that creates code data based on encrypted random number information encrypted by the first encryption part and encrypted specific information encrypted by the second encryption part; and an image forming part that forms a code image based on the code data created by the code data creation part on a recording medium.
Abstract:
The present invention provides specific image adding section for adding the specific image to inputted image data includes a first counter for deciding positions of a main scanning direction and a vertical scanning direction and a second counter for specifying a form of the specific image. The second counter counts up addresses of pixels with a starting point at one corner on a matrix made up of the main scanning direction and vertical scanning direction. If the first counter counts a predetermined count value, the second counter starts. When a maximum value of the count value of the second counter is equal to or less than a count set value, an image is formed on each of the pixels. The pixel on which the image is formed is changed and the form of the specific image is also changed by changing the count set value.
Abstract:
A method for making an authenticating system for an object includes selecting an image and adding a watermark in a predetermined area of the image. The predetermined area may be a portion of the image. The method also includes establishing the image having the watermark therein on the object, and associating the watermark with the object to render object-specific authenticating data.
Abstract:
An output apparatus includes a generation unit configured to generate a two-dimensional code by encoding information indicative of the output apparatus, information indicative of an output time of an image output by the output apparatus, and information indicative of a page number and a print copy number when the image is output, a combining unit configured to combine the generated two-dimensional code with the image, and an output unit configured to output the image including the two-dimensional code.