Abstract:
Methods and systems rasterize a document to produce a bitmap having first pixels of a first color as background uniformly located across a watermark region and second pixels of a second color located in a pattern forming foreground items within the watermark region. The rasterization causes the first pixels to deposit a first marking material (forming the first color) to a first height on the print media, and the rasterization causes the second pixels to deposit a second marking material (forming the second color) to a second height (different from the first height) on the print media. In the printed document, by having the first color be different from the second color and the second height be different from the first height, this causes the relative darkness between the background and the foreground items to reverse when the printed document is viewed from different angles (relative to a light source).
Abstract:
A computer-implemented process can be operated to create a watermarked copy of a unique original copy of an electronic sales receipt in a first computerized device to a second computerized device. The watermarked copy includes an electronic watermark identifying the copy. The process includes creating the watermarked copy of the electronic sales receipt by copying information from the original copy of the electronic sales receipt to the watermarked copy and providing the electronic watermark within the watermarked copy.
Abstract:
A method for water-marking digital books with parameters involves developing, for each parameter, a new typeface on the basis of a pre-existing typeface, by creating at least one new code/glyph pair. The method also includes developing a new coded text on the basis of the pre-existing coded text by replacing, in the pre-existing coded text, at least one code or group of codes from the pre-existing typeface. The method further includes allowing display of a character or a combination of characters from the digital book by the code or the group of codes from the new typeface allowing display of the graphically identical character or combination of characters on any screen. The code or this group of codes from the new typeface having at least the code from the new code/glyph pair, providing the new coded text and the new typeface as a water-marked digital book.
Abstract:
The invention relates to a security element applied onto printing substrates (bank-notes, securities, product packagings, identity cards/labels or other similar documents) by printing, comprising a unique identifier as primary information visible to the naked eye and secondary information protecting against copying non-visible to the naked eye. The unique identifier is typically a point code. Said secondary information is represented by a structure with the largest dimension of 2 to 40 microns, and due to printing distortions arising when the security element is applied onto a printing substrate, said secondary information is non-reconstructable from the print of the security element and a statistically analyzable inherent feature is associated to it. The invention also relates to a printed matter with such an inventive security element and to a method to check authenticity of a printed matter with the inventive security element in visible light (380-750 nm).
Abstract:
Described herein is a level I (overt) feature for security printing intended to deter unauthorized modification of text documents. The exemplary method includes generating a textured background that follows the contour of the text it surrounds and is difficult to modify. The background patterns may be generated with a two-step procedure that first creates a smooth function and then modulates it to produce patterns with sharp contrast. Tampering will be deterred as visible artifacts will be created when text is altered. Compared to the levels II and III features, the exemplary method relies on human vision for detection and does not require any special tools and instruments. It can be used in applications where fast, simple and inexpensive inspection is essential, or combined with other technologies for enhancing overall effectiveness.
Abstract:
A novel method is disclosed for detecting hidden information in a document comprising characters, including: determining layout transformation for each character in the document for detection compared with the original document; obtaining a code sequence embedded in the document for detection based on the layout transformation of each character in the document for detection and the predetermined embedding rule; decoding the code sequence to get the hidden information embedded in the document for detection.
Abstract:
A text watermarking method embeds an auxiliary message in an original electronic text document to form a watermarked text document. The method applies a spreading function to message symbols to spread the symbols over a carrier, which forms a modulated carrier. It maps elements of the modulated carrier to corresponding inter-word spaces in the electronic text document, and applies an embedding function to modify the corresponding inter-word spaces according to elements of the modulated carrier signal such that the modified inter-word spaces hide the modulated carrier signal in the watermarked text document. The message symbols are automatically decodable from the watermarked document without the original electronic text document. A compatible decoder extracts the auxiliary message from a printed or electronic watermarked text document. The decoder automatically measures inter-word spaces in the watermarked text document. It estimates elements of a modulated carrier signal embedded in the inter-word spaces to form an estimated modulated carrier signal, and applies a de-spreading function to the estimated modulated carrier signal to extract message symbols.
Abstract:
A novel method is disclosed for embedding hidden information in a document comprising characters, including: determining hidden information to be embedded in each class of layout transformation respectively; acquiring a code sequence for each class of layout transformation by coding the hidden information to be embedded in the class of layout transformation; performing layout transformation on characters from the document according to the acquired code sequence for each class of layout transformation respectively.
Abstract:
Described herein is a level I (overt) feature for security printing intended to deter unauthorized modification of text documents. The exemplary method includes generating a textured background that follows the contour of the text it surrounds and is difficult to modify. The background patterns may be generated with a two-step procedure that first creates a smooth function and then modulates it to produce patterns with sharp contrast. Tampering will be deterred as visible artifacts will be created when text is altered. Compared to the levels II and III features, the exemplary method relies on human vision for detection and does not require any special tools and instruments. It can be used in applications where fast, simple and inexpensive inspection is essential, or combined with other technologies for enhancing overall effectiveness.
Abstract:
In an image processing apparatus, an input part inputs additional information to be embedded when printing a document. A developing part develops a character contained in the document, into which character the additional information is to be embedded, using a form deformed according to the additional information.