Abstract:
A blur resistant barcode is disclosed. The blur resistant barcode comprise a plurality of parallel lines and spaces where information is encoded in the barcode by variations in the thicknesses of the plurality of parallel lines and by variations in the spacing between the plurality of parallel lines. The blur resistant barcode has at least one blur resistant feature that has a thickness in an axis of motion greater than a maximum thickness of any one of the plurality of parallel lines. The axis of motion is perpendicular to the plurality of parallel lines.
Abstract:
Various multi-modal security deterrents (10) and methods of generating the same are disclosed herein. One embodiment of the deterrent (10) includes first and second sets (12, 16) of 180° phase-insensitive glyphs (14). One or more of the glyphs (14, Gi8o) in the second set (16) are rotated 180° from corresponding glyphs (14, G0) in the first set (12) such that the sets (12, 16) of glyphs (14) have an identical signature pollable by a suitable transmitter/receiver operating in the GHz-THz range and such that the sets (12, 16) of glyphs (14) have a different visual appearance. Data is encoded in one or more of the glyphs (140 of the first set (12) and one or more of the glyphs (14) of the second set (16) such that each set encodes a different message.
Abstract:
The present disclosure is directed to method and systems of sorting print jobs for assignment to a plurality of printers having different printing characteristics. Print jobs can be received, sorted based on the print parameters of the print jobs, combined into print job groupings based on printing prioritizations, and sent to a plurality of printers having printing configurations that achieve the print parameters and the printing prioritizations.
Abstract:
A method for securely transmitting deterrent data includes generating a deterrent having a predesigned number and configuration of glyphs having deterrent data therein, and transmitting a portion of the deterrent data from a subset of the glyphs without transmitting deterrent data from a remainder of the glyphs. The glyphs form a predetermined structure with a single solution. The method further includes receiving the portion of the deterrent data, placing the portion of the deterrent data into the subset of the glyphs, and solving the predetermined structure with the single solution, thereby determining the remainder of the glyphs to be infilled in the predetermined structure with deterrent data gleaned from the solution.
Abstract:
A method for testing a printing system for printing information-embedded regions includes transmitting a test sheet data file to a print service provider. The test sheet data file includes a plurality of complete or incomplete information-embedded regions. A sample printed using the test sheet data file is received from the print service provider. The printed sample is evaluated, and a record of the evaluation is created. The evaluation record is stored.
Abstract:
Embodiments of the present invention recite a system and method for creating an editable template from a document image. In one embodiment of the present invention, the spatial characteristics and the color characteristics of at least one region of a document are identified. A set of characteristics of a graphic representation within the region are then determined without the necessity of recognizing a character comprising the graphic representation. An editable template is then created comprising a second region having the same spatial characteristics and the same color characteristics of the at least one region of the document and comprising a second graphic representation which is defined by the set of characteristics of the first graphic representation.
Abstract:
An image processing method includes applying a segmentation engine to different mappings of a digital image, and using the different segmented mappings to identify segments in the digital image.
Abstract:
A method for implementing a secure printing campaign to thwart counterfeiting is provided. The method includes the steps of selecting a first secure print technology and a second secure print technology that is distinct from the first secure print technology, selecting a first secure print variable for the first secure print technology and a second secure print variable for the second secure print technology, and establishing a first plurality of discrete values for the first secure print variable and a second plurality of discrete values for the second secure print variable.
Abstract:
A reading device reads ambiguous target elements of an authentication target printed on a medium. Each ambiguous target element has a number of different manners by which the ambiguous target element can be interpreted by the reading device. The authentication target as read by the reading device is compared against an authentication signature of the reading device. The authentication signature specifies for each ambiguous target element an expected manner by which the reading device interprets the ambiguous target element as one of the different manners by which the ambiguous target element can be interpreted. Where the authentication target as read by the reading device matches the authentication signature of the reading device, the reading device is signaled as having passed authentication.
Abstract:
Systems, methodologies, media, and other embodiments associated with electrocardiogram electrode characterization and compensation are described. One exemplary system embodiment includes a characterization logic configured to generate signals designed to facilitate characterizing an electrocardiogram electrode. The characterization logic may also be configured to analyze signals produced in response to introducing the signals into a subject. The example system may also include a compensation logic configured to determine whether an electrode is performing in a desired manner and to selectively compensate for electrode performance.