Abstract:
Bit data is encoded into characters in an input image by providing different darkness levels for pixels in either half of a text character. To determine if the input image is of a right-side up document, or an upside-down document, multiple scans of the input image at 90° rotations between scans may be made. Each scan result is searched for occurrences of a indicator prefix bit-sequence. The scan that contains the indicator prefix bit-sequence is elected as the right-side up orientation for the input image. If multiple scans show occurrences of the indicator prefix bit-sequence, then the scan that has the highest number of occurrences is elected as the correct orientation. Alternatively, the number of data bits between repeated occurrences of the indicator prefix bit-sequence is compared with a predefined message bit size, and the scan that matches most closely is elected as the correct orientation.
Abstract:
Character string heights and line spacing values are acquired as character string information on a document image, and fluctuations in the character string height and fluctuations in the line spacing value are calculated as variances. If the calculated variance is equal to or lower than a threshold value, the character string information is determined as being appropriate for use in extracting line-spacing watermarks, and line-spacing watermark information is extracted from the character string information.
Abstract:
To provide image processing device and method which can achieve embedding and extracting of watermark message which secures certain or more message embedding accuracy and amount as suppressing deterioration of quality in an original document image, it inputs a document image to an image input unit, it extracts by an image analysis unit a character image included in the input document image, and it embeds by an embedding unit watermark message by constituting the character image by means of a predetermined dot pattern.
Abstract:
Directional albedo of a particular article, such as an identity card, is measured and stored. When the article is later presented, it can be confirmed to be the same particular article by re-measuring the albedo function, and checking for correspondence against the earlier-stored data. The re-measuring can be performed through us of a handheld optical device, such as a camera-equipped cell phone. The albedo function can serve as random key data in a variety of cryptographic applications. The function can be changed during the life of the article. A variety of other features are also detailed.
Abstract:
An information hiding system such as a digital-watermark information system has an embedding side and an extracting side for recognizing an identical character string in which digital-watermark information is embedded, and the extracting side reliably extracts all digital-watermark information from the character string. In order to realize this, an image processing method of the present invention includes a determining step of determining whether a predetermined distance between each target character and an adjoining character can be maintained if any digital-watermark information which may be embedded in the target character is actually embedded; and a setting step of setting an object which is to be embedded with digital-watermark information according to the determination result.
Abstract:
Distance d1 between the right edges of A1 and B2, and distance d2 between the right edges of A3 and B4 are calculated. If data to be embedded is 1, one or a combination of a process for increasing the size of B2 in the column direction or decreasing the size of B4 in the column and a process for moving the position of B2 toward B3 or moving the position of B4 toward B3 is executed to meet d1>d2. If data to be embedded is 0, one or a combination of a process for decreasing the size of B2 in the column direction or increasing the size of B4 in the column direction, and a process for moving the position of B2 toward B1 or moving the position of B4 toward B5 is executed to meet d1
Abstract:
A digital watermarking system and method is provided. The digital watermarking system mainly includes a storing unit, a text obtaining module, a pixel determining module, an encrypting module, and a storing module. The storing unit is for storing text information, the text information including one or more dot matrix files. The text obtaining module is for obtaining one dot matrix file to be watermarked from the storing unit. The dot matrix file includes plural dot matrixes, each of the dot matrixes includes plural pixels, each of the pixels has a brightness value. The pixel determining module is for earmarking the pixel to be adjusted, an initial brightness value of the earmarked pixel being in a predetermined range. The encrypting module is for adjusting the brightness value of the earmarked pixel. The storing module is for storing watermarked text information in the storing unit. Related methods are provided.
Abstract:
The invention is to precisely extract a digital watermark from image data which are subjected to embedding of the digital watermark in a state of a binary image and are then converted into a multi-value image (gray scale image).For attaining the foregoing object, a digital watermark extracting apparatus for extracting a digital watermark for example in an original includes an acquiring unit for acquiring multi-value image data obtained by reading the original with a predetermined reading unit, a pre-processing unit for selecting one of plural threshold values and binarizing the multi-value image data with the selected threshold value, and an extracting unit for extracting the digital watermark from image data binarized in the pre-processing unit, wherein selection of the threshold value, binarization an extraction of the digital watermark are repeated to obtain an optimum extraction result of the digital watermark.
Abstract:
One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a DRM agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the DRM agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage.
Abstract:
According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to extract text from a document. The processor may retrieve images associated with characters in the extracted text and generate a stitched image using the retrieved images. The processor may watermark the stitched image and replace the characters in the document with the images associated with the characters from the watermarked and stitched image.