Abstract:
Stationery, or other printable media, is encoded with a digital watermark. The watermark is not conspicuous to a human observer of the media, yet conveys plural bits of auxiliary information when optically scanned and digitally processed. The watermark can be formed by ink-jet printing, or otherwise. The encoded information can be used for various purposes, including authenticating the document as an original, linking to associated on-line resources, and distinguishing seemingly-identical versions of the same document (document serialization).
Abstract:
An image processing apparatus is configured to extract paper-fingerprint information from a printing sheet and to identify unique information unique to the printing sheet and attached to the printing sheet. The image processing apparatus is further configured to compare the identified unique information associated with the printing sheet with previously registered unique information and to store the unique information and the extracted paper-fingerprint information in association with each other when it is determined that the identified unique information matches the previously registered unique information.
Abstract:
A camera-equipped portable device captures visual information (e.g., from a movie), ascertains a corresponding identifier, and uses the identifier to enable one or more further functions. One of these can be internet search. Such functionality can also be based on digital data—without requiring a camera capability.
Abstract:
Embodiments of the invention provide a method and a system for fingerprinting a data object at a server system and a method and a system for extracting the fingerprint from the data object at a client system. Sections of a data object are watermarked with known watermark data to create a first and a second variant of the data object, whereby the section boundaries are optionally saved as metadata. Using the metadata, the first and second variant are combined by taking sections from the variants to create a fingerprinted data object. From the fingerprinted data object, the watermark data can be extracted again.
Abstract:
The present invention relates generally to steganography and digital watermarking. One method recites: encoding content with a plural-bit digital watermark in accordance with initial encoding parameters; determining an assessment of the encoded plural-bit digital watermark in each of two or more portions of the content; for each of the two or more portions of the content, adjusting at least one of the initial encoding parameters according to a determined assessment for a respective portion of the content; and encoding the content with said plural-bit watermark in accordance with adjusted encoding parameters. Other methods are provided and claimed as well.
Abstract:
Various improvements to digital watermarking are disclosed. For example, a digitally watermarked object can steganographically convey a payload that includes computer instructions (e.g., JAVA, ActiveX, or HTML) that—when decoded—control some manner of operation of an associated instruction processor. One application is a digital movie that, when double-clicked, automatically executes a watermark-embedded Java applet which links through a browser to the movie's distributor. The user is then prompted to input a credit card number. After the number has been verified and a charge made, the applet releases the content of the file to the computer's viewer for viewing of the movie.
Abstract:
A network-based image forming device and method for storing and printing files sent from at least one user terminal connected through a network is disclosed. The network-based image forming device and method comprises an interface unit for providing a communication interface with the user terminal; a storage unit for storing a protected file and the print-authorized user information if the protected file having print-authorized user information set therein is sent from the user terminal through the interface unit; and a control unit for displaying a list of the files stored in the storage unit in response to a display request signal, and if a file selected out of the displayed list of files is a protected file, displaying a request message to request an input of user information and determine whether the user is an authorized user, and, if the user information input in response to the message matches the print-authorized user's information set in the selected file, printing the selected file.
Abstract:
Data defining several different information-carrying patterns can be stored on mass storage of a computer workstation and serve as a library of design elements for future designs. The same user-interface techniques that are employed to pick colors in image-editing software (e.g. Adobe Photoshop) and fill textures in presentation programs (e.g. Microsoft PowerPoint) can similarly be used to present a palette of information patterns to a security document designer. Clicking on a visual representation of the desired pattern makes the pattern available for inclusion in a security document being designed (e.g. filling a desired area). A great variety of other features and arrangements are also detailed.
Abstract:
A media object authentication system uses layers of security features based on digital watermarks embedded in media objects. The system generates a first digital watermark with a message payload carrying data about the object, such as a hash of text data printed on the object. The first digital watermark is combined with a content signature derived from features of the media object, such as frequency domain attributes, edge attributes, or other filtered version of the media signal (e.g., image photo on a secure document) on the media object. This combination forms a new digital watermark signal that is embedded in the host media object. To verify the object, the digital watermark payload is extracted and compared with the data about the object. The combined digital watermark and content signature is also evaluated to authenticate the media signal on the media object.
Abstract:
A system and method for verifying that a document is included in a document management system is disclosed. This system and method includes radio frequency scanning at least a portion of the document, generating document data dependently upon the radio frequency scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior radio frequency scanning of at least a portion of the document, and outputting an indication of the document being included in the document management system as determined by the comparing.