Abstract:
A method for enabling access to a secure document by a document service includes receiving the document, and an ordered sequence of signature verification keys that are to be selected in an orderly manner, from a document owner. Access is enabled to the document via an allocated access address. Uploading an uploaded document is enabled. A signature associated with the uploaded document is verified using a currently selected signature verification key from the ordered sequence. If verification fails, the uploaded document is rejected. If verification succeeds, the document accessible via the allocated access address is replaced with the uploaded document and a next signature verification key of the ordered sequence is selected to be the currently selected signature verification key.
Abstract:
A document management system includes a document. One or more of a plurality of map-files of the document correspond(s) with a step of a multi-step workflow associated with the document. A random nonce is generated for each of the steps of the multi-step workflow except for an initial step of the multi-step workflow. Each of the random nonces i) is incorporated as a map-file entry into a respective one of the plurality of map-files corresponding with a step of the multi-step workflow that directly precedes the step of the multi-step workflow for which the random nonce is generated and ii) is used to perform a nonce-based initiating operation a respective one of the plurality of map-files corresponding with the step of the multi-step workflow for which the random nonce is generated.
Abstract:
A variable data addition method and system are disclosed herein. The method includes generating an original image, and defining at least one sub-section of the original image to transform individually. A reversible transformation is applied to the defined at least one sub-section, thereby altering the original image to form an altered image that is non-readable until an inverse of the reversible transformation is applied to the altered image.
Abstract:
A method for model-based signature profile extraction includes capturing an image of an authentic glyph. An outline model is fit to the image of the authentic glyph, and an authentic signature profile is extracted based on the outline model. A signature profile extracted from an image of another glyph may be compared to the to the authentic signature profile so as to forensically verify authenticity of the other glyph The system for model-based signature profile extraction includes a controller, a capture unit, an outline unit, a profiling unit, and a forensic verification unit. A computer readable medium containing executable instructions is also described.
Abstract:
A counterfeit detection system is disclosed herein. The system includes an image reduction system for minimizing size of at least one original image using a plurality of different reduction strategies to generate a plurality of minimized images. The system further includes a classification system which includes a first sub-system for generating at least one accuracy comparative assessment metric for each of the plurality of minimized images, a second sub-system for comparing the at least one accuracy comparative assessment metric for each of the plurality of minimized images with an accuracy assessment metric for the at least one original image, and a third sub-system for determining if at least one of the plurality of minimized images can be transmitted with improved or equivalent classification accuracy at a reduced bandwidth when compared to the original image are also part of the system.
Abstract:
A method for decoding information from a physical image having a plurality of payload patches includes generating a digital representation of the physical image. A plurality of regions are mapped to the plurality of payload patches in the digital representation. A scramble pattern is identified and the plurality of mapped regions of the digital representation are reordered according to the identified scramble pattern. Information is decoded from the payload patches of the reordered plurality of mapped regions.
Abstract:
A method for using void pantographs involves generating a test sheet including multiple void pantographs, where each of the multiple void pantographs includes a pantograph foreground and a pantograph background. The test sheet is printed, and from the printed test sheet, at least one of the multiple void pantographs having a covert or semi-covert pantograph foreground and background is identified. The printed test sheet is scanned, and from the scanned test sheet, at least one of the multiple void pantographs having an overt pantograph foreground is identified. A workflow is developed for the at least one of the multiple void pantographs having both i) the covert or semi-covert pantograph foreground and background after printing, and ii) the overt pantograph foreground after scanning.
Abstract:
A void pantograph and a method for generating the same are disclosed herein. The void pantograph includes a foreground portion based on a region of an image that is defined using a predetermined filter, and a background portion based on another region of the image that is defined using the predetermined filter.
Abstract:
A system for enhancing security printing includes a segmentation system, a secure database in operative communication with the segmentation system, a secure registry in selective operative communication with the segmentation system, and an analysis system in operative communication with the segmentation system and the secure database, and in selective operative communication with the secure registry. The segmentation system performs zoning analysis on a scanned image to identifying a list of regions in the image. The secure database stores at least one of i) a template, or ii) prior zoning output specification. The secure registry stores region of interest information and information pertaining to strategies for identifying a region of interest. The analysis system identifies the region of interest utilizing at least one of the secure database or the secure registry.
Abstract:
A method for enhancing security printing of a layout template is disclosed. The method includes receiving the layout template, and acknowledging one or more constraints for the layout template. At least one unconstrained layout element of the layout template is varied, thereby generating a varied layout template. The varied layout template is printed and scanned. The method further includes determining a number of bits that can be encoded in the varied layout template, where the number of bits depends on the varying of the at least one unconstrained layout element.