Abstract:
A method is described for electronically storing images of previously copied documents and recalling them for reprinting later. When a user uses a copier to make a physical copy of a physical document, the document image is stored by the copier, and certain document management information is captured and stored in a document management database to facilitate later recall and reprint of the document images. A document management section, which resides either on the copier or on a server connected to the copier by a network, performs document management functions that allow a user to select a previously copied and stored document for reprinting.
Abstract:
A color barcode can record much more amount of information than black white barcode. However, the problem of the color barcode is that it is easy to lose integrity or authenticity in printing and copy generation. This invention provides an apparatus and a method to keep the integrity or authenticity of the color barcode. Such is accomplished by the color information portion of the color barcode representing the color information about what colors are used for color tiles of data portion of the color barcode and an apparatus and a method for producing and reproducing such color barcode.
Abstract:
A color barcode can record much more amount of information than black white barcode. However, the problem of the color barcode is that it is easy to lose integrity or authenticity in printing and copy generation. This invention provides an apparatus and a method to keep the integrity or authenticity of the color barcode. Such is accomplished by the color information portion of the color barcode representing the color information about what colors are used for color tiles of data portion of the color barcode and an apparatus and a method for producing and reproducing such color barcode.
Abstract:
A method is described for automatically predicting user-preferred printer settings based on past user behavior. A driver service module maintains an application/driver/user (ADU) settings database that stores printer settings associated with the application that initiated the print job, the printer driver and versions thereof, and (in a multiple user environment) the user's identity. Each time a print job is initiated, the driver service module analyzes the ADU database to determine a predicted user-preferred setting. The user may manually change the setting and confirm it, and the driver service module stores the user confirmed setting in the ADU database for future use. The method can transfer user-preferred settings associated with one application or one printer driver (or a version thereof) to another application or another printer driver (or another version thereof). It further allows user preference information to be accessed or transferred over a network.
Abstract:
A document authentication method determines the authenticity of a target hardcopy document, which purports to be a true copy of an original hardcopy document. The method compares a binarized image of the target document with a binarized image of the original document which has been stored in a storage device. The image of the original document is generated by binarizing a scanned grayscale image of the original document. Halftone and non-halftone text areas in the grayscale image area separated, and the two types of text are separately binarized. The non-halftone text areas are then down-sampled. During authenticating, a scanned grayscale image of the target document is binarized by separating halftone and non-halftone text areas and binarizing them separately, and then down-sampling the non-halftone text areas. The binarized images of the target document and the original document are compared to determine the authenticity of the target document.
Abstract:
A document authentication method employs Krawtchouk decomposition to analyze and compare document images. When printing an original document, the original document image is segmented into image patches, which preferably correspond to individual symbols of the document. Krawtchouk decomposition is applied to each image patch. The image patches are classified into image patch classes using their Krawtchouk coefficients. The locations of all image patches belonging to each class are obtained and stored along with the Krawtchouk coefficients for each class. When authenticating a target document, the same segmentation, Krawtchouk decomposition and classification steps are applied to the target document image, and the locations of all image patches belonging to each class are obtained. The image patch classes and the locations of image patches belonging to each class for the original and target document image are compared to detect alterations present in the target document.
Abstract:
A method for encoding and decoding color barcodes to increase their data capacity. The encoding steps include determining a shape, a foreground color and a background color for each data cell, wherein a combination of the shape, foreground and background colors for the data cell is chosen from a plurality of such combinations in accordance with a value of the digital data to be encoded; and coloring some pixels in the data cell with a foreground color and other pixels with a background color, in accordance with the shape, foreground and background colors for the data cell determined above. The decoding steps include segmenting the data cells, recognizing a shape, a foreground color of the shape and a background color of the data cell, and obtaining digital data from a combination of the shape and foreground and background colors in each data cell.
Abstract:
A document management method, including the steps of gathering data of a multi-page document for a first layer barcode, encoding the gathered data for the first layer barcode, writing the first layer barcode on at least one page of the document, deriving key information of the document from the gathered data; and for at least one other page of the document, gathering data of the at least one other page for a second layer barcode, encoding key information of the document and the data of the at least one other page for the second layer barcode, and writing the second layer barcode on the at least one other page of the document, such that the at least one other page of the document has its respective second layer barcode.
Abstract:
A method implemented in a fax machine for analyzing a received fax to determine whether it is an auto-reply fax. Auto-reply faxes are handled differently from other faxes to avoid unnecessary printing. The analysis method includes: determining whether the sender of the received fax is the same as the receiver of a fax sent by the fax machine within a predefined time period in the past; determining whether the received fax contains only one or two pages; extracting text from the image of the received fax using OCR; and detecting the presents of certain keywords in the extracted text which indicate an auto-reply or received status. These determination and detection results are combined to determine whether the received fax is an auto-reply. Auto-reply faxes may be saved but not automatically printed, or forwarded to an email box of the sender of the original fax, etc.
Abstract:
A method is described to obtain a binary image from the print-and-scan process to best match the known original. A point-spread function (PSF) of the PAS process is first obtained from its knife-edge responses, and deblurring is carried out on the scanned images using deconvolution. After image deskewing and preliminary registration, a supervised adaptive thresholding procedure is utilized to binarize the scanned image such that a measure of difference (e.g. the Euclidean distance) between the original and binarized images is minimized. The supervised adaptive thresholding procedure divides the scanned images into many rectangular sub-images. Otsu's method is used to find a starting threshold for each scanned sub-image. An optimal threshold is found around the Otsu's threshold via iterative search to minimize the measure of difference between the original sub-image and scanned sub-image. The sub-images are binarized using the optimal threshold. This method may be used in document authentication.