Abstract:
According to an embodiment, a creation device creates a code table including a plurality of code words. A recognition device identifies a code word represented by a code image based on a result of character recognition of the code image formed on an object, the code table, and a confusion matrix preliminarily created. The confusion matrix represents probabilities that characters are recognized when the recognition device performs character recognition on an image. The creation device includes a change unit, an evaluation value calculation unit, and a control unit. The change unit changes the code table. The evaluation value calculation unit calculates an evaluation value of the changed code table using the confusion matrix. The control unit causes the change of the code table and the calculation of the evaluation value to be repeated such that the evaluation value becomes small.
Abstract:
A document administration system includes an administration unit, a discrimination information image discriminating unit, and an image forming apparatus which, forms an image on a recording medium in case that the discrimination information image discriminating unit discriminates that the recording medium has the discrimination information image before the image is formed on the recording medium, and forms the image and the discrimination information image based on the discrimination information connected to the image on the recording medium in case that the discrimination information image discriminating unit discriminates that the recording medium does not have the discrimination information image before the image is formed on the recording medium.
Abstract:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.
Abstract:
When embedded information having a data format version that is not supported by an image processing apparatus currently being employed is extracted, the image processing apparatus can not determine whether the embedded information should be output, even though the embedded information is available to be displayed. In a case wherein embedded information having a data format for a next generation, which is not supported by the image processing apparatus currently being employed, is extracted, output of the embedded information is halted to prevent the unintentional output of data.
Abstract:
A forensic verification system (900) extracts a print signature via a print signature extractor (910) from a captured image of a printed halftone. The system (900) utilizes a comparator (920) to compare the print signature to a reference signature stored in a registry to determine differences between the print signature and the reference signature. The system (900) utilizes a forensic analyzer (930) to perform a forensic analysis on the signatures based on the comparison to authenticate the printed halftone.
Abstract:
A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents.
Abstract:
A method and apparatus are provided for tracking documents. The documents are tracked by simultaneously monitoring each document's electronic processing status and physical location. Determinations are made whether specific combinations of electronic processing states and physical locations are valid and whether specific movements of documents are permitted. Invalid combinations or movements are reported to a reporting station. The preparation of batches of documents prior to scanning may be monitored and operator metrics related to the batch prep process may be tracked. Exception documents rejected during document processing may be monitored to enable retrieval of such documents.
Abstract:
Among other things, at a cloud-based service, digital image files are received from which digital images can be displayed on devices. For each of the digital image files, data is embedded in the digital image file on behalf of a party who has rights in the digital image file. The existence of the embedded data is not perceptible in any digital image that is displayed using the digital image file. The embedded data includes information from which the digital image file can be authenticated. At the cloud-based service, a digital image file is received that is to be authenticated. The digital image file is authenticated based on the embedded data.
Abstract:
Watermarks may be used to deter certain types of information leaks. In one example, leaks occur in the form of posting, in public forums, screen shots of private pages. To deter this example kind of leak, private web pages within an organization may be watermarked with an experience identifier that identifies the session in which the screen shot is captured. Other information may also be included in the watermark. The watermark may be designed to survive image compression, so that it can be recovered from either a compressed or uncompressed image of the web page. By using an experience identifier recovered from the watermark, and logs that describe activity associated with that experience identifier, it may be possible to identify the source of the information leak.
Abstract:
A method for routing a facsimile includes: receiving a facsimile in a computer readable format; locating one or more keywords in the facsimile, wherein at least two of the keywords are not adjacent in the facsimile; analyzing the facsimile to determine at least one of a meaning of the facsimile and a context of the facsimile; attempting to initiate a business process based at least in part on analysis; and routing at least a portion of the facsimile comprising text to one or more destinations based at least in part on the analysis. Corresponding systems and computer program products are also disclosed.