Abstract:
Systems and methods for generating an incremental information object with an embedded information region (IIOEIR) are provided. A method includes analyzing an IIOEIR to determine a first code, wherein the IIOEIR includes a plurality of tiles, and wherein a first set of the plurality of tiles includes a first code and a second set of the plurality of tiles includes a second code. The first code is confirmed, and, if the confirmation succeeds, generating a new code comprising a bitstream, overwriting the bitstream onto the first region. A new second code is generated, wherein the new second code is related to the first code, and the new second code is overwritten onto a second region.
Abstract:
A counterfeit identification performance attribute (CIPA) sensitivity to changes in resolution of the image for features of an image is determined (102). The CIPA sensitivity for the features is used to choose at least one feature to determine whether the image on a sample is a counterfeit (106).
Abstract:
Systems and methods for adapting an incremental information object (IIO) to accommodate a change in a workflow are provided. A method includes analyzing an IIO, wherein the IIO comprises a plurality of tiles, and wherein the plurality of tiles comprise a code. The code is confirmed and, if the confirmation is successful, a determination is made as to whether the workflow has changed. If the workflow has changed the IIO is modified to change the information density of the IIO, a new code comprising a bitstream is generated, and the bitstream is overwritten on the plurality of tiles.
Abstract:
Systems and methods for generating a dual deterrent information object (IIO) are provided. A method includes analyzing a dual deterrent IIO to determine a first code, wherein the dual deterrent IIO comprises an IIO comprising a plurality of tiles and an associated mark, wherein each tile in the plurality of tiles represents a data element encoded by color, intensity, or both, and the associated mark comprises information related to the IIO. The first code is confirmed, and, if the first code passes the confirmation a new code comprising a bitstream is generated. The bitstream is overwritten on the plurality of tiles, wherein the dual deterrent IIO is the same size after writing of the bitstream. A new associated mark related to the dual deterrent IIO is generated and the associated mark is overwritten with the new associated mark.
Abstract:
Systems and methods for generating a dual deterrent information object (IIO) are provided. A method includes analyzing a dual deterrent IIO to determine a first code, wherein the dual deterrent IIO comprises an IIO comprising a plurality of tiles and an associated mark, wherein each tile in the plurality of tiles represents a data element encoded by color, intensity, or both, and the associated mark comprises information related to the IIO. The first code is confirmed, and, if the first code passes the confirmation a new code comprising a bitstream is generated. The bitstream is overwritten on the plurality of tiles, wherein the dual deterrent IIO is the same size after writing of the bitstream. A new associated mark related to the dual deterrent IIO is generated and the associated mark is overwritten with the new associated mark.
Abstract:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
Automated inspection method for detecting a defect in a printed image, comprising processing a raster image, sending the raster image to a print process, printing a printed image corresponding to the raster image onto a medium, capturing a target image from at least a part of the printed image at a lower resolution than the printed image, at least in a medium moving direction, converting at least a part of the raster image to a reference image, and comparing the reference image to the target image.
Abstract:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
An image is obtained of an identifying object that is on a printed document. A forensic signature is extracted from the image. Access to the extracted forensic signature profile is enabled via information encoded in the identifying object. The identifying object may be interpreted to access the forensic signature for comparison with another.
Abstract:
An image analyzer (120) aggregates image samples (140) into a cluster (170) based on the image samples (140) being classified from a subset of image metrics applied to a reference sample (130). The image analyzer (120) generates an image quality output (150) by analyzing a distance (180) from the cluster (180) relative to another cluster.