摘要:
The present invention detects the presence of a watermark in-an image by using a multi-step process. First, the image is examined to determine which regions of the image have characteristics such that there is a high probability that a watermark signal can be detected in that region of the image. Next the regions that have a high probability that a watermark can be detected (in contrast to all regions of the image) are examined to find watermark data. In order to determine the probability of finding watermark data in a particular region of an image, the amount of “variance” in the intensity of the pixels in the region is first examined. For example a region that is entirely white or entirely black has zero variance in luminance. Such a region can not carry watermark data, hence regions with zero or low variance can be eliminated from further processing. Furthermore, if a high variance in a region is a result of the fact that the region has an abrupt border or edge between two highly contrasting regions, the high variance does not indicate a high probability that a watermark signal will be detected in the region. Therefore, after regions with high variance are located, these regions are next examined to look for regions with high edginess spread. Finally, regions with the high variance and high edginess spread are selected for further processing to detect watermark data. For those regions selected for further processing, the detection process can be enhanced by filtering the data with a two step process to increase the signal to noise ratio of the watermark signal. First a high pass filter (e.g. a Laplacian operator) is applied to each region. This filtering operation in effect established a new intensity value for each pixel in the region. Next a nonlinear operator (e.g. a signum function) is applied to the output from the first filter operation. The resulting data is examined to detect watermark data.
摘要:
Utilizes pre-processing (pre-filtering) of target data in order to facilitate and enable robust extraction of a watermark signal. With the present invention the watermarked data is pre-filtered using knowledge of the watermark signal. That is, utilizing knowledge of the characteristics of the watermark signal (for example that it falls in a certain frequency range), aspects or portions of the signal that do not carry the watermark signal are eliminated by filtering. Such filtering can amplify the watermark signal and/or simultaneously reduces the strength of the original (host) content or noise in the data signal that contains the watermark. That is, pre-filtering increases the signal-to-noise ratio of the watermark signal and facilitates the watermark extraction steps (detection and decoding). With the present invention it is possible to extract weak watermark signals from target data.
摘要:
This disclosure describes novel methods for generating unique copies of content. One method combines the functions of the master copy and unique copy watermarks. In particular, the method generates a unique copy by varying the manner in which the master copy watermark is embedded in unique copies of a content item. In one embodiment, the master copy watermark is repeated within the content item and its location is varied in a unique pattern that comprises the unique copy watermark. The unique copy is generated by producing a copy in which master copy watermarks are embedded in a unique pattern. For instance in one embodiment, the locations of the master copy watermarks in the content item are represented as a vector of delta values in which each delta value corresponds to the distance between a corresponding instance of the master copy watermark, and a neighboring instance of the master copy watermark. This vector is stored in a transaction record in association with transaction information, such as information identifying the master copy and information associated with the unique copy. Other ways of representing the unique pattern of attributes of the master copy watermark are also possible. In other embodiments, properties of the master copy watermark other than its location are varied through the content. The unique copy watermark is conveyed in the vector of deltas in these properties of the master copy watermark. Some examples of these properties of the master copy watermark signal include phase characteristics (e.g., the phase shift of a watermark carrier signal), frequency magnitude characteristics, etc. These properties are varied in a manner that does not alter the information carried in the master copy watermark. However, it does provide a variation that creates a unique copy, and the unique copy watermark is conveyed in this variation. The variation in location of the instances of the master copy watermark can be in different domains, such as a spatial domain, a time domain, a time-space domain, a transform domain (including frequency transform domains), a compressed domain, etc.
摘要:
The application discloses identification and security documents and methods, apparatus and systems for authenticating such identification and security documents. Some such methods and apparatus involve steganography or data hiding.
摘要:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too.
摘要:
This disclosure describes a distributed reader architecture for a mobile computing device such as cellular telephone handset. This architecture includes a reader library that reads device capabilities and business model parameters in the device, and in response, for selects an appropriate configuration of reader modules for identifying a content item. The reader modules each perform a function used in identifying a content item. The modules are selected so that the resources available on the device and in remote devices are used optimally, depending on available computing resources on the device and network bandwidth. One example of a reader module is a fast watermark detection module that quickly detects the presence of a watermark, enabling resources to be focused on portions of content that are most likely going to lead to successful content identification. A watermark signal structure for fast watermark detection is comprised of a dense array of impulse functions in a form of a circle in a Fourier magnitude domain, and the impulse functions having pseudorandom phase. Alternative structures are possible.
摘要:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too.
摘要:
Various improvements and applications for digital watermarking technology are detailed. One concerns techniques for making watermarks resistant to malicious attacks. Another involves using digital watermarking with ID cards and credentials, such as a watermarked driver's license conveying a user's cryptographic PKI. Still another uses digital watermarks in connection with automated compliance audits for corporate users of electronic content. A variety of other technologies are also detailed.
摘要:
The present invention relates generally to access control. One claim recites a method of determining whether to allow access to a location, including: receiving optical data from an optical sensor, the optical data being associated with an object presented to the optical sensor, wherein the object comprises optically-detectable, machine-readable indicia encoded in a predetermined symbology thereon, the indicia including at least an orientation component; determining an orientation of the orientation component; obtaining from a data store a predetermined orientation; and comparing the predetermined orientation with the determined orientation to decide whether to allow access to the location. Of course, other claims are provided as well.
摘要:
Content fingerprints and watermarks are combined in various ways for content identification applications. Fingerprints are used to identify content generally while watermarks provide more detailed localization of parts within the content, and vice versa. Fingerprint techniques are further used for signal synchronization and other pre-processing steps to assist in digital watermark decoding. A variety of fingerprint/watermark techniques identify characteristics of the channel of content from content samples.