Abstract:
An apparatus for reducing a first document image and a second document image in a size and producing output images on a single sheet, the apparatus including: a creating unit configured to create a code containing information with a higher security level selected from first information contained in a code of the first document image and second information contained in a code of the second document image; and a unit configured to add the code created by the creating unit to the output image.
Abstract:
When embedded information having a data format version that is not supported by an image processing apparatus currently being employed is extracted, the image processing apparatus can not determine whether the embedded information should be output, even though the embedded information is available to be displayed. Ina case wherein embedded information having a data format for a next generation, which is not supported by the image processing apparatus currently being employed, is extracted, output of the embedded information is halted to prevent the unintentional output of data.
Abstract:
Embodiments of techniques and systems for content protection and detection of protected media content are described. Visual tracking patterns may be displayed during rendering of protected media content that would be visible to a camcorder during recording. The visual tracking pattern may be placed in a background area or other less-active portion of the video in order to reduce perceptibility by a viewer. Audio tracking patterns may be inserted during rendering outside of the range of normal human hearing for reduced viewer perceptibility. The tracking patterns may encode media tracking codes that are included in to-be-rendered media during provision from a media server. Other embodiments may be described and claimed.
Abstract:
Methods, devices and computer program products for enabling secure and efficient extraction of embedded watermarks from digital host content are provided. Upon the reception of a multi-channel digital host content with embedded watermarks, a subset of the received channels are selected and combined together to form a composite content. The composite content is then examined to recover embedded watermarks. The particular subset of channels can be selected according to a probability value. Further, a set of new channels can be selected and combined after a particular time interval has elapsed. The number of selected channels can also be varied each time a new selection is made.
Abstract:
In a copy generation management on paper, the present invention aims to detect a falsification in embedded information and increase the capacity of embedded information while maintaining security. The image processing device embeds second additional information into document image data embedded with first additional information. The image processing device deletes a part where the first additional information is embedded in the document image data, and embeds the second additional information into the part of the first additional information thus deleted. The image processing device further embeds third information different from the first and second additional information at a position different from position at which the second additional information is embedded. Further, the embedding means embeds the third information at a position indicated by the second additional information.
Abstract:
The invention relates to a method and system for embedding in a digital media file user fingerprint which the user cannot detect when using the digital media file. In the method, a user-detectable watermark is first embedded in the digital media file. This watermark can be transformed in a client device to a non-detectable fingerprint of the user by utilizing digital media file-specific information issued by a digital media rights owner when the user has bought a user license. Afterwards the digital media rights owner can read the embedded user fingerprint from the digital media file if it is illegally distributed between other users.
Abstract:
An image forming apparatus and a method to control the same. The image forming apparatus determines whether the object to be printed is real money. If the object is real money, the image forming apparatus prints a variety of counterfeit money discrimination information (e.g., the counterfeit money preventing pattern, the warning message, or the unique number of the image forming apparatus used for printing the money) on the back side of the copy of the money, and prints the original image of the money on the front side of the copy of the money without any change. Therefore, the image forming apparatus can color-print the original image of the money without any change, and can prevent the copied money from being used as counterfeit money.
Abstract:
Watermarks may be used to deter certain types of information leaks. In one example, leaks occur in the form of posting, in public forums, screen shots of private pages. To deter this example kind of leak, private web pages within an organization may be watermarked with an experience identifier that identifies the session in which the screen shot is captured. Other information may also be included in the watermark. The watermark may be designed to survive image compression, so that it can be recovered from either a compressed or uncompressed image of the web page. By using an experience identifier recovered from the watermark, and logs that describe activity associated with that experience identifier, it may be possible to identify the source of the information leak.
Abstract:
Electronic content data (e.g., audio or visual) can be steganographically encoded for a variety of purposes. One claim recites a method practiced by a first party, including the acts: (a) receiving content that has been previously steganographically encoded by a second party with first plural-bit data; and (b) utilizing a programmed electronic processor, further steganographically encoding the content with a second plural-bit data different than the first. The further encoding includes altering digital data representing human-perceptible attributes of the content, in a manner that is dependent on the content. Both of the first and second plural-bit data are represented in encoded content. Of course, a great variety of other claims, arrangements and features are provided.
Abstract:
Methods, devices and computer program products for enabling secure and efficient extraction of embedded watermarks from digital host content are provided. Upon the reception of a multi-channel digital host content with embedded watermarks, a subset of the received channels are selected and combined together to from a composite content. The composite content is then examined to recover embedded watermarks. The particular subset of channels can be selected according to a probability value. Further, a set of new channels can be selected and combined after a particular time interval has elapsed. The number of selected channels can also be varied each time a new selection is made.