Abstract:
An electronic watermark embedding device that embeds a graphic pattern representing information in image data includes a signaling feature period changing unit configured to change a period of signaling feature of a graphic pattern, a graphic pattern embedding unit configured to embed the graphic pattern in the image data as a period of the signaling feature changed by the signaling feature period changing unit, and an embedment region detecting unit configured to detect an embedding position where the graphic pattern is embedded from a region of the image data other than a background, whereby the signaling feature period changing unit changes the period of the signaling feature while maintaining the signaling feature when the image data undergo image enlargement or reduction processing, and the graphic pattern embedding unit embeds the graphic pattern in the embedding position on the region of the image data other than the background.
Abstract:
Character spacing values in a document image are extracted and a variance is calculated for fluctuations in the character spacing values. When the calculated variance is lower than a preset threshold value, the document image is determined as having watermark information embedded therein. Such use of the variance in the character spacing values enables high-speed determination of the presence or absence of character-spacing watermark information. At this time, it is possible to speed up the determination by using only some character spacing values in the document, instead of using all character spacing values.
Abstract:
To provide a technique of embedding information in a document image containing character strings, photos, and graphics, an image processing apparatus for inputting a document image and embedding watermark information by controlling the line spacing between character strings in the document image includes an input unit which inputs a document image as image data, an image reduction unit which generates reduced image data from the image data, a determination unit which determines reduced objects corresponding to character strings in the image data, a specifying unit which specifies the position of each character string in the image data based on the positions of the reduced objects in the reduced image data, and an embedding unit which embeds the watermark information in the image data by moving the positions of a plurality of specified character strings in the image data based on a preset line spacing correspondence relationship.
Abstract:
A document image undergoes document analysis to obtain circumscribing rectangles of characters (S601), and two distances between non-neighboring circumscribing rectangles from the head of the document are respectively calculated as d1 and d2 (S603). If information to be embedded is 1, one or a combination of a process for changing a parameter associated with the size of a circumscribing rectangle and a process for changing a parameter associated with the position of a circumscribing rectangle is executed to satisfy d1>d2 (S605). If information to be embedded is 0, one or a combination of the above two parameter change processes is executed to satisfy d1
Abstract:
A digital watermarking system and method is provided. The digital watermarking system mainly includes a storing unit, a text obtaining module, a pixel determining module, an encrypting module, and a storing module. The storing unit is for storing text information, the text information including one or more dot matrix files. The text obtaining module is for obtaining one dot matrix file to be watermarked from the storing unit. The dot matrix file includes plural dot matrixes, each of which includes plural pixels, each pixel possessing a display property. The pixel determining module is for earmarking the pixel to be adjusted to obtain a watermark. The encrypting module is for adjusting the display property the earmarked pixel. The storing module is for storing watermarked text information in the storing unit. Related methods are provided.
Abstract:
Distance d1 between the right edges of A1 and B2, and distance d2 between the right edges of A3 and B4 are calculated. If data to be embedded is 1, one or a combination of a process for increasing the size of B2 in the column direction or decreasing the size of B4 in the column and a process for moving the position of B2 toward B3 or moving the position of B4 toward B3 is executed to meet d1>d2. If data to be embedded is 0, one or a combination of a process for decreasing the size of B2 in the column direction or increasing the size of B4 in the column direction, and a process for moving the position of B2 toward B1 or moving the position of B4 toward B5 is executed to meet d1
Abstract:
The system is disclosed for visual marking sensitive documents for leak prevention. Each time an action is taken with regard to a document (e.g., creation, viewing, downloading), that action is added to a distributed ledger, essentially creating a unique hash for a new instance of the document. This new hash is visually embedded in the document as a code comprising a plurality of differently shaded pixels, wherein some of the pixels directly encode information regarding the document (e.g., an account that generated the new instance of the document, a date, a time, a unique ID for the document, etc.) and some of the pixels do not encode information. The code is capable of being scanned either digitally or physically on a printed version of the document, such that the immediate source of the document, corresponding to who leaked the document, is able to be discerned.
Abstract:
The system is disclosed for visual marking sensitive documents for leak prevention. Each time an action is taken with regard to a document (e.g., creation, viewing, downloading), that action is added to a distributed ledger, essentially creating a unique hash for a new instance of the document. This new hash is visually embedded in the document as a code comprising a plurality of differently shaded pixels, wherein some of the pixels directly encode information regarding the document (e.g., an account that generated the new instance of the document, a date, a time, a unique ID for the document, etc.) and some of the pixels do not encode information. The code is capable of being scanned either digitally or physically on a printed version of the document, such that the immediate source of the document, corresponding to who leaked the document, is able to be discerned.
Abstract:
Techniques for automatically attaching optical character recognition data to images are provided. The techniques include receiving an image file containing an image and performing optical character recognition on the image to generate text output. The techniques then continue by identifying a particular text item from within the generated text output and determining that the particular text item is a value for particular corresponding key. Then metadata that indicates that the particular text item is a value for the particular key is stored in the image file.
Abstract:
One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a DRM agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the DRM agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage.