Abstract:
The invention provides methods for embedding digital watermarks for authentication of printed objects, and corresponding methods for authenticating these objects. One aspect of the invention is a method of embedding a digital watermark in a digital image to be printed on an object. The method embeds an auxiliary signal in the digital image so that the auxiliary signal is substantially imperceptible, yet machine readable. It converts the image to a halftone image using a halftoning process. If copies are made of the printed image, the image characteristics change due a change in the halftoning process used to create the copies. These changes are detected to determine whether a suspect document is authentic.
Abstract:
A user gestures with a wireless mobile phone device to control some aspect of its operation, or the operation of a remote system with which the device communicates. (The gestures may be sensed by tracking movement of a feature across a field of view of a mobile phone device camera.) The resultant operation may additionally depend on other data obtained by the wireless device, e.g., obtained from an electronic or physical object, or sensed from the environment. A variety of other features and arrangements are also detailed.
Abstract:
The disclosure describes methods and apparatus of providing steganographic indicia or digital watermarking in image or video data. One implementation provides a method of embedding a digital watermark in image data captured by an imager, with watermark embedding occurring on-chip with the imager. Another implementation provides a method of managing images. Each of the images comprises plural-bit data steganographically embedded therein in the form of a digital watermark, with the plural-bit data corresponding to a geo-location. Yet another implementation provides a method of identifying locations on a map, with the map being for display via a computer display. Still another implementation provides a method of introducing a watermark message to a watermark embedder located on-chip with an image array. Other implementations and embodiments are provided as well.
Abstract:
The application discloses signals and identification and security documents and methods and systems for authenticating such. In one implementation, a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document. Other implementations and embodiments are provided as well.
Abstract:
The invention relates to a process to manufacture an object using at least one granular material (16) having a large particle size, for example greater than or equal to 0.1 mm, such process being characterised by the following stages: the granular material or materials are placed in a mould (2) at the same dimensions as the object to be made and incorporating at least one evacuation opening (6), said opening being of a size that is less than the particle size of the material, a liquid-phase binder (21) is poured into the mould, the binder is mixed between the grains of material and the excess binder is drained off through the evacuation opening using suction means (11). Application in the manufacture of igniting tubes or propellant charges for artillery ammunition.
Abstract:
A wireless phone is equipped with a 2D optical sensor, enabling a variety of applications. For example, such a phone may also be provided with a digital watermark decoder, permitting decoding of steganographic data on imaged objects. Movement of a phone may be inferred by sensing movement of an imaged pattern across the optical sensor's field of view, allowing use of the phone as a gestural input device through which a user can signal instructions to a computer-based process. A variety of other arrangements by which electronic devices can interact with the physical world are also detailed, e.g., involving sensing and responding to digital watermarks, bar codes, RFIDs, etc. Other novel arrangements are also detailed.
Abstract:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract:
Stationery, or other printable media, is encoded with a digital watermark. The watermark is not conspicuous to a human observer of the media, yet conveys plural bits of auxiliary information when optically scanned and digitally processed. The watermark can be formed by ink-jet printing, or otherwise. The encoded information can be used for various purposes, including authenticating the document as an original, linking to associated on-line resources, and distinguishing seemingly-identical versions of the same document (document serialization).
Abstract:
An image is processed to encode a digital watermark, with different regions thereof processed using different levels of watermark intensity. In an image comprised of elements of differing sizes (e.g., halftone shapes of different sizes, or lines of different width), the different regions can be defined by reference to the sizes of elements contained therein. Regions characterized by relatively small elements can be watermarked at a relatively low intensity. Regions characterized by relatively large elements can be watermarked at a relatively high intensity. A variety of other features are also discussed.
Abstract:
Various arrangements for use of biometric data are detailed. For example, a police officer may capture image data from a driver license (e.g., by using a camera cell phone). Facial recognition vectors are derived from the captured image data corresponding to photo on the license, and compared against a watch list. In another arrangement, a watch list of facial image data is compiled from a number of government and private sources. This consolidated database is then made available as a resource against which facial information from various sources can be checked. In still another arrangement, entities that issue photo ID credentials check each newly-captured facial portrait against a consolidated watch list database, to identify persons of interest. In yet another arrangement, existing catalogs of facial images that are maintained by such entities are checked for possible matches between cataloged faces, and faces in the consolidated watch list database.