摘要:
A method is presented for marking high-quality digital images with a robust and invisible watermark. It requires the mark to survive and remain detectable and authenticatable through all image manipulations that in themselves do not damage the image beyond useability. These manipulations include JPEG “lossy” compression and, in the extreme, the printing and rescanning of the image. The watermark also has the property that it can detect if the essential contents of the image has changed. The first phase of the method comprises extracting a digest or number N from the image so that N only (or mostly) depends on the essential information content, such that the same number N can be obtained from a scan of a high quality print of the image, from the compressed form of the image, or in general, from the image after minor modifications (introduced inadvertently by processing, noise etc.). The second phase comprises the marking. This can be done in form of an invisible robust watermark, or in form of some visible signature or watermark.
摘要:
An apparatus and method allow to deposit ordinary checks from home or office. A special scanner is used to scan an endorsed check for deposit. The check may have printed thereon encryptions in at least selected locations. Scanning the endorsed check with the scanner to generates a digitized version of the check. The scanner virtually partitions the digitized version of the check into a plurality of regions. These regions may be stripes or zones. Each region is successively examined to extract from the digitized version of the check information from that region. The information extracted from a region is encrypted and transmitted to a bank. Upon acknowledgment from the bank, at least some of the regions of the plurality of regions voided by a form of indelible but non-invasive (e.g. allowing reading after voiding) marking such as punched holes, burned areas, overprinting of a pattern. The processing by the scanner continues until all regions have been processed. This progressively voiding scheme is an important security feature of the invention. The scanner is preferably contained in a secure housing with an encryption processor and the housing preferably includes an arrangement for detecting tampering and preventing normal operation if tampering is detected.
摘要:
A digital watermarking method encodes different pairs of watermarks into each of a plurality of images offered for use by a vendor. The watermarks in each pair are derived from two separate collections of watermarks and sufficiently different so as to prevent false positives. Because each pair of watermarks is assigned to a different customer relative to a particular image, unauthorized use of a digital image sold to a customer may be determined by locating the associated pair of watermarks assigned to the customer in the image. Collusion detection is also realized by forming each pair of masks from sub-collections of masks which are detectable in an image formed by combining the same images sold to one or more customers.
摘要:
A method and apparatus for halftoning digital images renders color data subject to constraints on the number of colorants which can be deposited on a single pixel and constraints on consecutive pixels rendered with the same color. The color data to be rendered is mapped into a second data set in an achievable color gamut space. Then, using a digital halftoning method in the achievable color gamut space, the second data set is rendered, so that the constraints are satisfied.
摘要:
Calibrated dither masks adaptable to most printers are constructed in such a way that the threshold values can be adapted to a printer so that said printer can print the originally intended number of distinct tone levels. This adaptation can be done computationally so that the time it takes is not prohibitive. Furthermore, the resulting calibrated dither mask is such that there is no need for a tone reproduction curve in the halftoning process.
摘要:
An electronic event recorder for attachment to a vehicle is provided which can broadcast encrypted signature and data, thereby leaving behind an electronic version of a “fingerprint” in the event of an accident or traffic violation. The fingerprint, captured by an external data acquisition system or another vehicle so equipped, provides a history of events related to the vehicle. The event recorder is preferably integrated on a smart card and housed in a tamper proof casing. In a first mode of operation, monitoring stations along the roadways periodically send an interrogation signal, such as when radar detects that the vehicle is speeding. Upon receiving the interrogation signal the smart card transmits the vehicle's signature information to the monitoring station where it is time and date stamped along with the speed of the vehicle. In a second mode of operation, when a sensor detects a sudden or violent acceleration or deceleration, such as occurs during a collision, a smart card mounted in each car will exchange signature information automatically. This is particularly useful when the collision occurs in a parking lot when one of the hit vehicles is typically unattended.
摘要:
Digital halftoning techniques in printers which construct and utilize a mask in a dithering algorithm for a multitone printer are generalized by using a decision matrix in conjunction with a dithering matrix. For each pixel in the image, pixel grey value and a mask threshold value are obtained. Based on these values, a decision is made on the grey level to be printed at each pixel. For extensions to multiple component color images, each component is treated independently as if it were a grey scale image. The mask threshold values and sizes are likely to be tuned per component and therefore different.
摘要:
The present invention provides methods and apparatus to detect and reliably record the physical history of a product including effects due to one or more of the following: 1) product use 2) handling 3) tampering and 4) environment of the product (as changes in the environment, such as excessive temperatures, humidity, or shocks, can result in degradation to a product). The apparatus includes a “smart card”, or, more generally, “smart token”, in combination with one or more sensors which record the external influences on the product and/or the environment and records those changes in an encrypted form. This information can then be verified by any individual who is equipped with a (possibly public) decryption key, but capability to modify this information, depending on the application, is restricted to those with access to the encrypting key. Furthermore, the apparatus contains authentication information which can be reliably verified, in particular to confirm that the apparatus is attached to the product it supposed to be attached to.
摘要:
A watermarking method involves mostly invisible artifacts and is sensitive to any modification of the picture at the level of precision rendered by the compressed version of the image. The image is compressed according to a known compression standard, such as the JPEG standard, and with a fixed quality setting. Using the JPEG standard, the original image is cut into blocks to which the Discrete Cosine Transform (DCT) is applied and the DCT coefficients quantized. The watermark according to the invention is applied to the quantized DCT coefficients. This is done using an encryption function, such as a secret key/public key algorithm. The JPEG compression is then completed using a lossless compression scheme, such as Huffman coding, to produce the compressed and watermarked image. Authentication of the compressed and watermarked image begins with a lossless decompression scheme to obtain the set of quantized DCT coefficients. The coefficients are authenticated, and the DCT output of each block is dequantized. If necessary, an inverse DCT is applied to each block to output the decompressed watermarked image.
摘要:
An electronic event recorder for attachment to a vehicle is provided which can broadcast encrypted signature and data, thereby leaving behind an electronic version of a “fingerprint” in the event of an accident or traffic violation. The fingerprint, captured by an external data acquisition system or another vehicle so equipped, provides a history of events related to the vehicle. The event recorder is preferably integrated on a smart card and housed in a tamper proof casing. In a first mode of operation, monitoring stations along the roadways periodically send an interrogation signal, such as when radar detects that the vehicle is speeding. Upon receiving the interrogation signal the smart card transmits the vehicle's signature information to the monitoring station where it is time and date stamped along with the speed of the vehicle. In a second mode of operation, when a sensor detects a sudden or violent acceleration or deceleration, such as occurs during a collision, a smart card mounted in each car will exchange signature information automatically. This is particularly useful when the collision occurs in a parking lot when one of the hit vehicles is typically unattended.