Abstract:
The present invention is concerned with detection of a “fragile watermark” in a printed image to aid in a determination whether a document under examination is an original or a copy. The watermark may be applied by phase-space encoding data to be included in the watermark. The image may be examined on a block-by-block basis after scanning. Correlation of detected watermark strength with block brightness and/or with wave vectors used for encoding may be used to detect that the image is a copy.
Abstract:
The present invention is concerned with inclusion of a “fragile watermark” in an original printed document to aid in a determination whether a document under examination is an original or a copy. The watermark may be applied by making small tonal adjustments on a pixel block by pixel block basis in data used to generate the original document. Documents to be verified may then be examined on a block-by-block basis after scanning.
Abstract:
Methods and systems for verification of indicia that do not require key management systems, and in which revocation of key pairs is easily performed without adding costs to the verification process are provided. Indicia are generated and authenticated utilizing an identity-based encryption (IBE) scheme. A key generating authority generates a private key for a PSD, distributes the private key securely to the PSD, and provides public information for use by a verification service when verifying cryptographic digital signatures generated with the private key. The corresponding public key is a string consisting of PSD information that is provided as part of the indicium. The verification service can verify the signature of each indicium by obtaining the public key string from the indicium, and utilizing the key generating authority's public information.
Abstract:
A method of printing an image having a graphic security element included therein includes receiving main image data representing a main image, receiving graphic security element data representing a graphic security element to be included in the main image, receiving a request to print the main image, responsive to receiving the request to print the main image, determining particular pixels of the main image data that are to be shifted based on the graphic security element data, and causing a plurality of ink deposits to be deposited on the print medium based on the main image data including causing the position of each of the ink deposits on the print medium that is determined to correspond to shifted pixels to be shifted relative to a normal position that would normally result from the main image data. Also, system that implements the method is provided.
Abstract:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
Abstract:
A method for printing secure source images of the type that contain specific critical elements and non-secure images on a single printer includes determining the origin of an image (secure source or non-secure source). If the image to be printed is from the non-secure source, a determination is made if the image contains the specific critical elements of the type contained in secure source images. Printing of the image from the non-secure source is disabled if the image contains specific critical elements of the type contained in secure source images. Printing of the image from a non-secure source is enabled if the image does not contain specific critical elements of the type contained in the secure image. The determination if the non-secure source image contains the specific critical elements of the type contained in secure source images can be made after printing has commenced of the non-secure image.
Abstract:
A method for detecting whether perforations are present on the edge of an image of a form, such as a check, includes obtaining a bitmap of the image, identifying a selected portion of the bitmap that corresponds to at least the edge and that includes a matrix of a plurality of rows and columns of brightness values, and selecting a particular one of the rows of brightness values. The method further includes performing a Fourier transform of the brightness values included in the particular selected row to generate a Fourier transform output, and determining whether a series of perforations is present based on the Fourier transform output. The method may also include steps wherein the brightness values are low pass filtered and wherein the values in the selected row are high pass filtered prior to the step of performing a Fourier transform.
Abstract:
A method of reconstructing an original image from a printed and scanned image includes determining a plurality of transformation parameters including a rotation a of the scanning grid relative to the printing grid and a plurality of translation parameters which give a position of a node on the printing grid in a coordinate system of the scanning grid, generating a system of non-linear equations which represent the printed and scanned image as a function of: (i) the original image, (ii) a print/scan resolution ratio, and (iii) the transformation parameters, computing coefficients for the system using the resolution ratio, the transformation parameters and the given print model, generating a linear approximation of the system of non-linear equations, solving the linear approximation for an approximation of the original image, and creating a reconstructed original image from the approximation of the original image.
Abstract:
An electronic voting system includes a vote security device (VSD), a user interface for presenting a ballot to a voter, and an audit trail printer operatively coupled to the VSD. The printer prints an audit trail ballot only in response to verifying encrypted and/or digitally signed messages received from the VSD that indicates the voter's ballot selections. The printer is structured to allow the voter to view but not access the audit trail ballot. The voter is able to accept or reject the audit trail ballot using the user interface. If the ballot is rejected, the VSD causes the printer to print a rejection indicator on the ballot, and if the voter accepts the ballot, the VSD causes the printer to print an acceptance indicator on the ballot. A digitally signed record of the voter's ballot selections is generated and stored.
Abstract:
Methods and systems that provide privacy of signatures on envelopes containing ballots are provided. The envelope for returning ballots includes a flap with a window that aligns with a signature area on the envelope. The window appears opaque under normal lighting conditions, but appears transparent when illuminated with light having a predetermined wavelength. A movable signature stub is positioned on top of the signature area. The voter signs the back of the envelope on the signature stub, thereby imprinting a signature on the signature area by transferring a material from the signature stub to the signature area, and moves the signature stub. The flap of the envelope is then sealed, thereby covering the voter's signature in the signature area with the window of the envelope flap. To read the signature, light having the predetermined wavelength can be directed onto the window, thereby rendering the window transparent and the signature visible.