Abstract:
An image data verification system for verifying image data using a computer and method are provided. The method includes registering image data of an original and extracting information regarding a part of information forming the original image data. The method also includes generating a feature value of the partial information and generating signature information.
Abstract:
An approach is provided for printing locked print data using user and print data authentication. The approach is applicable to a wide variety of contexts and implementations and includes the use of bi-directional security measures to ensure a secure transmission of a document to a printer and secure retrieval of the document from the printer by one or more intended recipients. In particular, the bi-directional security measures ensure that: 1) the document is received only by the intended recipient designated by the creator, 2) both the document's creator and the intended recipient are successfully authenticated, 3) the document received by the intended recipient is the document that was created by the creator, and 4) the document received by the intended recipient is identical to the document created by the creator.
Abstract:
Embodiments of the present invention relate to attesting a document that contains encoded data, such as a barcode or DataGlyph. When a document contains encoded data that is not in human-readable form, the document is checked to determine whether content in the encoded data appears somewhere in the document in human-readable form. Based on the amount of content that appears in the document, the document may be marked with a seal that attests to the amount of content in the encoded data that appears in human-readable form. The seal may be visually distinctive to facilitate easy recognition by a user or device.
Abstract:
In a card serving as an external storage device to be inserted into a digital color multi-function printer, features of a reference image and processing rule information indicating processing content to be applied to input image data judged to be similar to the reference image are prestored. Then, in cases where the input image data is judged to be similar to the reference image, the content of a process to be performed on the input image data is controlled in accordance with the processing rule information corresponding to the reference image. This makes it possible to save users the trouble of setting the content of a process to be performed on input image data, and to prevent a shortage of memory capacity of a memory of the image processing apparatus even in cases where there is an increase in the number of reference images.
Abstract:
The invention is directed to techniques of facilitating document transmission from one entity through an electronic communications network. An entity may be a legally recognized person such as a corporation, partnership, organization, government, individual, and the like. As a legally recognized person, an entity may act as a principal with respect to one or more authorized agents. Furthermore, as a legal person, an entity may authorize one or more of its agents to use fax transmission equipment such as the fax certification system described herein. The techniques of this invention assure a second entity that a first entity has indeed authorized its agent to send a document from a fax station under the controls of the first entity.
Abstract:
Embodiments of the invention provide a method of authenticating a physical document, comprising obtaining an electronic representation of at least part of the physical document; extracting at least one error detection code from the electronic representation; and using the at least one error detection code to detect errors in image data within the electronic representation. Embodiments of the invention also provide a method of securing a physical document, comprising obtaining an electronic representation of at least part of the physical document; determining at least one error detection code for image data within the electronic representation; and producing a secure physical document comprising the electronic representation and a machine readable marking including the at least one error detection code.
Abstract:
When a reference image to which a document image is judged as being similar for the first time is not the first document sheet of the document type which contains this reference image, error occurrence is concluded so that the page number indicated by a counter is set to be an error occurrence position. In case that the reference image to which the document image is similar is the last document sheet of the document type, when the number of document images having been counted up by the time when this document image is judged as being similar to the reference image does not correspond with the number of reference images contained in the document type, error occurrence is concluded so that the page number indicated by a counter is set to be an error occurrence position.
Abstract:
A steganographic embedder embeds authentication data and value data into an object. This data is hidden yet machine readable from the object by, for example, scanning an image of the object and extracting a digital watermark from the object. A system for extracting this data includes an image capture device for capturing an image of the object and a steganographic decoder for extracting the steganographic data embedded in the image. The system uses the extracted data to authenticate the object and to associate an amount of value with the object. The value can be refreshed by using the steganographic data to reference a database where an updatable amount of value is stored.
Abstract:
The disclosure describes systems for creating and authenticating printed objects using authentication and copy detection watermarks. For example, one verification system includes a watermark decoder and a verification module. The watermark decoder detects a copy detection watermark in a printed object to determine whether the printed object has been reproduced. The verification module processes a message decoded from an authentication watermark on the printed object to authenticate the printed object or bearer of the printed object. The authentication and copy detection watermarks may be implemented as the same or different watermarks. For example, the copy detection watermark may be a fragile watermark that carries the message and that degrades in response to a reproduction operation, such as photocopying or scanning and then reprinting the object. Alternatively, the authentication and copy detection watermarks may be separate watermarks embedded in an image that is printed on the object. The authentication watermark, in some applications, includes an identifier that links the object to a database entry with related information about the object. This related information can be used to check the bearer of the object by comparing it with attributes of the bearer (such as a user ID or photo) or the validity of the object by comparing it with attributes that are visible or machine readable on the object.
Abstract:
This disclosure describes a method of making a secure product using data hidden in the product itself and a method of using the hidden data to authenticate the product. The method assigns a product identifier to the product, such as a unique serial number. It also steganographically embeds security data into the product. The security data includes the product identifier (e.g., a hashed version of it). The security data is embedded such that it is machine readable and enables automated authentication of the product by comparing the security data decoded from the product with the product identifier.