Abstract:
An image processing apparatus includes a background image generation section and a combining section. The background image generation section generates a background image containing new updated trace information that identifies at least one of the image processing apparatus and a user who instructs the image processing apparatus to form an image. The combining section combines the background image generated by the background image generation section with a foreground image to generate a composite image. The combining section outputs the composite image to an image forming section that forms an image on a recording medium. The background image generation section arranges the updated trace information in an end region of the background image.
Abstract:
This invention uses a storage device more effectively than ever before to store image data in a predetermined storage device for future security chasing. A determination unit (203) determines whether related image data which can be considered substantially identical to image data acquired by an acquisition unit (210) is stored in a predetermined storage device (202) for future chasing. If related image data is stored, link information to the related image data is written instead of writing the acquired image data to the storage device (202). On the other hand, no related image data is stored, the acquired image data is written to the storage device (202).
Abstract:
The present disclosure relates generally to encoding and decoding signals from media signals. One claim recites an apparatus comprising: electronic memory for storing blocks of a media signal; an electronic processor programmed for: determining a detection metric for the blocks, the detection metric comprising a measure of coincidence of detection parameters of different blocks; and performing detection operations based on the measure of coincidence of the detection parameters. Of course, other claims and combinations are provided as well.
Abstract:
The present claims utilize steganographic embedding to help facilitate tracing of unauthorized copies to a location and particular time. One claim recites a method including: obtaining data representing audio or video, the audio or video to be communicated to an audience assembled at a location at a particular time; and steganographic embedding binary information in the data with a programmed electronic processor, said steganographic embedding modifies portions of the data to hide the binary information in the data, the binary information is associated with the location and particular time of communicating the audio or video to the audience assembled at the location at the particular time. The binary information enables an unauthorized version of the communicated audio or video to be traced back to the location and particular time. Of course, other combination and claims are provided too.
Abstract:
This invention uses a storage device more effectively than ever before to store image data in a predetermined storage device for future security chasing. A determination unit (203) determines whether related image data which can be considered substantially identical to image data acquired by an acquisition unit (210) is stored in a predetermined storage device (202) for future chasing. If related image data is stored, link information to the related image data is written instead of writing the acquired image data to the storage device (202). On the other hand, no related image data is stored, the acquired image data is written to the storage device (202).
Abstract:
The present invention relates to steganographic systems and methods. One claim recites an apparatus including: electronic memory to buffer a compressed digital watermark object, the digital watermark object is a separate object relative to a compressed video object; and an electronic processor. The electronic processor is programmed for: decompressing the compressed video object to yield a decompressed video object, the decompressed video object comprising data representing video picture elements and data representing audio elements; decompressing the digital watermark object to obtain digital watermark data; steganographically hiding the digital watermark data in the data representing video picture elements or in the data representing audio elements to yield digital watermarked video or audio; and rendering the digital watermarked video or audio. Other claims and combinations are provided too.
Abstract:
A source electronic device, system and method that is configured to associate a digital image with the source electronic device that generated the digital image is described. The source electronic device comprises a camera, a source identification module, a processor and a memory module. The camera captures at least one unprocessed image. The source identification module identifies the source electronic device with one or more source identification information. The processor processes the captured unprocessed image, and generates a processed digital image. The processed digital image comprises an image header having the source identification information. The memory module stores the processed digital images having the source identification information in the image header. The system comprises a network server and the source electronic device, which further comprises an encryption module configured to encrypt the source identification information. The network server communicates with the source electronic device and assists in decrypting the image header having the encrypted source identification information.
Abstract:
An image forming apparatus to print an image on a recording medium based on print data. The image forming apparatus includes a storing unit to store the print data, an image processing unit to perform image processing on image data included in the print data; a printing operation specification unit to specify implementation of a printing operation; a marking unit to embed marking data in the image data, a marking printing operation specification unit to specify implementation of a marking printing operation, a printing operation implementation unit to implement the printing operation or the marking printing operation, a print data determination unit to determine whether or not the print data includes a setting for the marking printing operation, and a printing operation change unit to change a printing operation performed by the printing operation implementation unit.
Abstract:
The present invention relates to steganographic systems and methods. Once claim recites a method including: obtaining video content, wherein the video content comprises a steganographic signal embedded in picture elements of the video content, with multiple instances of the steganographic signal embedded in the picture elements of the video content, the steganographic signal comprising a plural-bit identifier that is uniquely associated with an intended recipient of the video content; encrypting—utilizing a processor or electronic processing circuitry—the video content with an encryption key that comprises mathematical relationship to the plural-bit identifier that is uniquely associated with the intended recipient of the video content; obtaining a decryption key that comprises a cryptographic relationship to the encryption key; communicating the encrypted video content and the decryption key to the intended user of the video content; and maintaining an association of the plural-bit identifier with the intended recipient. Other claims and combinations are provided as well.
Abstract:
A system for creating non-repudiation (undeniable) watermarks, wherein a content provider uses outside distribution entities to distribute media content supplied by the content provider. Content watermarked by a distribution entity using this system is undeniably recognizable by the content provider as originating with that particular distribution entity. In other words, given N distribution entities, the content provider is able to tell which particular distribution entity watermarked the media content. The system does not allow any distribution entity to watermark media content so that would appear to have been watermarked by another distribution entity and the system does also not allow the content provider to watermark media content so that would appear to have been watermarked by a particular distribution entity. Consequently, this allows the content provider to place a high degree of trust in the identification of the distribution entity by means of the watermark.