Abstract:
A source electronic device, system and method that is configured to associate a digital image with the source electronic device that generated the digital image is described. The source electronic device comprises a camera, a source identification module, a processor and a memory module. The camera captures at least one unprocessed image. The source identification module identifies the source electronic device with one or more source identification information. The processor processes the captured unprocessed image, and generates a processed digital image. The processed digital image comprises an image header having the source identification information. The memory module stores the processed digital images having the source identification information in the image header. The system comprises a network server and the source electronic device, which further comprises an encryption module configured to encrypt the source identification information. The network server communicates with the source electronic device and assists in decrypting the image header having the encrypted source identification information.
Abstract:
An image forming apparatus and a method to control the same. The image forming apparatus determines whether the object to be printed is real money. If the object is real money, the image forming apparatus prints a variety of counterfeit money discrimination information (e.g., the counterfeit money preventing pattern, the warning message, or the unique number of the image forming apparatus used for printing the money) on the back side of the copy of the money, and prints the original image of the money on the front side of the copy of the money without any change. Therefore, the image forming apparatus can color-print the original image of the money without any change, and can prevent the copied money from being used as counterfeit money.
Abstract:
The present invention relates generally to steganography and data hiding. One claim recites: a method including: at an Internet access point, obtaining data representing audio or video content, the data including a steganographic signal hidden therein, the steganographic signal being hidden in the data representing the audio or video content through alterations to the data; analyzing the date to obtain the steganographic signal; upon obtaining the steganographic signal, determining whether to allow the audio or video content to be communicated through the Internet access point based at least on the steganographic signal and data that is separate from the steganographic signal; and providing a report including details of said act of determining. Of course, other combinations are provided and claimed as well.
Abstract:
An image processing apparatus includes a background image generation section and a combining section. The background image generation section generates a background image containing new updated trace information that identifies at least one of the image processing apparatus and a user who instructs the image processing apparatus to form an image. The combining section combines the background image generated by the background image generation section with a foreground image to generate a composite image. The combining section outputs the composite image to an image forming section that forms an image on a recording medium. The background image generation section arranges the updated trace information in an end region of the background image.
Abstract:
A visible first watermark and invisible second and third watermarks are embedded in digital media content, in order to protect the media content from piracy. The visible first watermark protects the media content during distribution and storage, while the invisible second and third watermarks are embedded in to identify an owner and displaying entity, respectively. The second and third watermark keys can be used to detect the associated watermarks for forensic purposes. The first, second and third watermark keys are symmetric keys. A distribution entity embeds the visible first watermark in the media content using the first watermark key and embeds an invisible second watermark in the media content using the second watermark key. The distribution entity transmits the media content with the embedded visible first watermark and invisible second watermark to a displaying entity, wherein the displaying entity removes the visible first watermark from the media content using the first watermark key and embeds the invisible third watermark in the media content using the third watermark key.
Abstract:
A transmission device including: copy unit that extracts part or all of partial contents, as tracking information, from a content, and copies the extracted tracking information, thereby generating pieces of tracking information; candidate information obtaining unit that obtains pieces of candidate information respectively corresponding to the pieces of tracking information; evidence information obtaining unit that obtains evidence information generated dependently on a piece of candidate information selected by the reception device from among the pieces of candidate information; hash generating unit that generates hash values respectively in accordance with the pieces of candidate information; embed unit that embeds the hash values respectively into the pieces of tracking information, and embeds the evidence information into each piece of tracking information; and transmit unit that transmits each piece of tracking information in which a hash value and the evidence information have been embedded.
Abstract:
Steganographic signals or digital watermarks are detected from media signals. A media signal may represent audio, video or imagery. In one implementation, a method of detecting a digital watermark in a media signal is provided. The method includes receiving blocks of the media signal; buffering the blocks; screening the blocks for a presence of the digital watermark to identify a plurality of blocks likely to include the digital watermark based on a detection metric; combining the blocks that have been identified as being likely to include the digital watermark; and detecting the watermark from the combined blocks. Other implementations are provided as well.
Abstract:
Digital watermarks are embedded and decoded from host media signals like images and audio using encryption keys. The encryption keys are used to encrypt different components of the digital watermark message. The encryption keys can be used to scramble the digital watermark and components of it in alternative ways, including scrambling the mapping of the message to the host signal and scrambling carrier signals used to encode the message. Spread spectrum, feature based, and quantization based embedding and decoding schemes may be used in various combinations in the watermark encoder and decoder. Portions of the digital watermark may be encrypted to provide private watermark data, while other portions may be un-encrypted to provide public watermark data.
Abstract:
Although a copying machine which has finally output a forged print can be specified by the forgery tracking function, a copying machine which has output an original used for copying or a scanner used to read the images of bills or securities cannot be specified. For this purpose, history information embedded in input image data is extracted. When the history information is extracted, information unique to the apparatus is added to the history information. When no history information is extracted, history information containing information unique to the apparatus is generated. The generated or updated history information is embedded in the image data.
Abstract:
The present invention provides a method for identifying copyrighted content on a network to help ensure legal uses of the copyrighted content. The method includes searching a network for steganographically embedded content based on predetermined information; comparing data extracted from located content to the predetermined information; and, if the extracted data matches the predetermined information, verifying with a database whether the located content has been licensed for on-line uses.