摘要:
A method of processing semiotic data includes receiving semiotic data including at least one data set P, selecting a function h, and for at least one of each data set P to be collected, computing h(P), destroying data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P). The method further includes selecting a private key/public key (K, k) once for all cases, one of destroying the private key K and sending the private key K to a trusted party, and choosing function h as the public encryption function corresponding to k.
摘要:
Pages of books are copied without distortion due to curvature of the page near the book binding or the distortion in a copied page is corrected using the spacing of equidistant bars on tape strips applied to the top and bottom edges of a page before copying. The tape is preferably transparent and rather narrow and easily attached to a page to be copied. The first step in the distortion correction procedure is to locate the bars at the top and bottom of the page. The distortion of the spacing between the imaged bars is computed based on the known distance between the equidistant bars. The computed distortion of the spacing is then input to a distortion correction algorithm. The output of the distortion correction algorithm generates a corrected image. This image may also optionally delete the bars so that they are not printed in the copy. The corrected image is then copied.
摘要:
A method (as well as system and signal-bearing medium) of processing biometric data, includes receiving biometric data including a data set P, selecting a secure hash function h, and for each data set P to be collected, computing h(P), destroying the data set P, and storing h(P) in a database, wherein data set P cannot be extracted from h(P).
摘要:
A method and system for efficient scaling in the transform domain, wherein transform coefficient data is provided as an input to a data processing system and scaled in the transform domain by application of a combined matrix. Some embodiments utilize discrete cosine transform data. One embodiment of the invention generates a combined matrix for one-dimensional scaling by selecting a rational scaling factor and matrix dimension value, generating a matrix with some zero values, applying a one-dimensional inverse transform, regrouping, and applying a one-dimensional forward transform. One application of the invention performs up-scaling operations, and another performs down-scaling operations. The invention also provides for two-dimensional scaling by selecting horizontal and vertical scaling parameters and generating first and second combined matrices responsive to the parameters and combining them into a single combined matrix. The invention may also incorporate a predetermined cost function.
摘要:
A method and apparatus for authenticating (or identifying) a subject, includes using one or a plurality of biometric measurements for authentication (or identification) without any sharing of the subject's biometric data with a party requesting authentication.
摘要:
A one-dimensional algorithm for perform the merging of complementary portions from two independent overlapped images on the same 8×8 grid without the computational expense of conversion to and from the real domain is extended to a two-dimensional procedure. The merging process is performed exclusively in the frequency domain. The extension to two dimensions is done by shifting and/or merging rows of side-by-side two-dimensional transformed data blocks using the one-dimensional algorithm. Then a vertical shifting and/or merging can be performed on the horizontally shifted and/or merged blocks again using the one-dimensional algorithm with an independent shift/merge parameter.
摘要:
A method for scaling a signal sample rate includes interpolating between at least two scaling ratios to calculate an arbitrary scaling ratio, using a predetermined interpolation algorithm, and scaling a sample rate for a first portion of the signal using a first scaling ratio, and scaling a sample rate for a second portion of the signal using a second scaling ratio, to form a scaled signal having an average scaling ratio equal to the arbitrary scaling ratio.
摘要:
Methods and systems for efficient scaling in the transform domain are provided when transform coefficient data is provided as an input to a data processing system, comprising generating a first matrix from transform coefficient data; zeroing out a row or column of, or inserting a row or column of zeros into, the first matrix; generating a second matrix by applying a one-dimensional inverse transform to the first matrix with the zeroed-out at least one row, the at least one column, the inserted at least one row of zeros or the at least one column of zeros; generating a third matrix by regrouping the second matrix; generating a combined matrix by applying a forward transform to the third matrix; and the data processing system scaling the data represented by the transform coefficient data by applying the combined matrix to the transform coefficient data.
摘要:
A method (and system) for guaranteeing authenticity of an object, includes providing a sample of material obtainable only by at least one of chemical and physical processes such that the sample is random and not reproducible, associating a number reproducibly to the sample by using a specific reader, and forming at least one coded version of the number, the at least one coded version being obtained by a key signature, and the version being recorded into an area of the object.
摘要:
A one-dimensional (1D) Inverse Discrete Cosine Transform (IDCT) is applied to an input two-dimensional (2D) transform block along the axis to be modified. Since the one-dimensional IDCT is not performed on the other axis, each block is left in a one-dimensional transform space (called hybrid space). For a shift (merge), the appropriate “m” elements are picked up from one block and the “8−m” elements are picked up from the other block and are used as input to the one-dimensional forward DCT (FDCT) along that same axis. For two-dimensional shifts or merges, the results of the first one-dimensional IDCT and FDCT can be stored with extra precision to be used as input to a second one-dimensional IDCT and FDCT along the other axis. The execution time worst case conditions are approximately constant for all shift/merger amounts. Taking advantage of fast paths can improve the execution times for typical blocks.