摘要:
A method and apparatus for matching the print outputs of two printers having different characteristics. For the purpose of laser printing, or more generally for reproduction on any printing device with limited number of printing levels, a color or grayscale image has to be transformed into an array of printing decisions at each pixel of the output image. Sometimes this array is the only available representation of the original image. One may desire to print this array on a printer with different characteristics from the printer for which the array was originally prepared. The method and apparatus solve this problem by generating a printing decision matrix which takes into account the differences between the two printers.
摘要:
A method and apparatus to calibrate a printer which do not depend on geometric assumptions on the printed dots. The method takes account of the fundamentally probabilistic nature of the process of printing any dot on some types of printers such as laser printers. It allows estimating the probability distribution of what gets printed at each pixel depending on the local configuration of dots to be printed in such a way that only a limited number of tests need to be done, while no artificial cutoff is introduced on the size of local configurations to be taken into account. The calibration method can be applied to many problems encountered in digital printing, and permits computing printer dependent calibration of a dithering method without need for further direct measurements.
摘要:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.
摘要:
A method and apparatus for halftoning utilizes a truly aperiodic mask with memory requirements much smaller than the mask itself. The mask is constructed of several smaller compatible masks and a selector which selects between the smaller masks. In this way the computation of a large aperiodic mask is replaced by the computation of several much smaller masks. Using this technique, watermarks may be embedded for encrypting information in such a way that the quality of the image is not compromised.
摘要:
A technique combines most of the advantages of both blue noise and clustering in generating a clustered aperiodic mask and using it in a dither array algorithm for halftoning. The method of halftoning of grey scale images utilizes a pixel-by-pixel comparison of the image against a clustered aperiodic mask in which the clustered aperiodic mask is comprised of a partly random and partly deterministic single valued function which is designed to produce visually pleasing dot configurations when thresholded at any level of grey.
摘要:
A printing method and apparatus takes into account the errors in the amount of black due to dot shape and size at the pixel where these errors occur, propagates corrections of these errors in order to preserve the logics of error diffusion, and permits a trade-off between completeness of the correction and computational time. The method and apparatus corrects for the actual shape of the printer dots in most error diffusion methods usable in digital halftoning.
摘要:
Pages of books are copied without distortion due to curvature of the page near the book binding or the distortion in a copied page is corrected using the spacing of equidistant bars on tape strips applied to the top and bottom edges of a page before copying. The tape is preferably transparent and rather narrow and easily attached to a page to be copied. The first step in the distortion correction procedure is to locate the bars at the top and bottom of the page. The distortion of the spacing between the imaged bars is computed based on the known distance between the equidistant bars. The computed distortion of the spacing is then input to a distortion correction algorithm. The output of the distortion correction algorithm generates a corrected image. This image may also optionally delete the bars so that they are not printed in the copy. The corrected image is then copied.
摘要:
Pages of books are copied without distortion due to curvature of the page near the book binding or the distortion in a copied page is corrected using the spacing of equidistant bars on tape strips applied to the top and bottom edges of a page before copying. The tape is preferably transparent and rather narrow and easily attached to a page to be copied. The first step in the distortion correction procedure is to locate the bars at the top and bottom of the page. The distortion of the spacing between the imaged bars is computed based on the known distance between the equidistant bars. The computed distortion of the spacing is then input to a distortion correction algorithm. The output of the distortion correction algorithm generates a corrected image. This image may also optionally delete the bars so that they are not printed in the copy. The corrected image is then copied.
摘要:
A system and method for authenticating an image of an object, include at least one identifier associated with the object, a receiver for interrogating the at least one identifier to produce identification information, a camera system for recording an image from the object including the at least one identifier, and a composite generator for encoding the identification information from the receiver along with the image acquired by the camera system, to produce composite data.
摘要:
A watermarking scheme is provided that allows the watermarked image to be authenticated by an authentication agent without revealing the human-readable content of the image. There is disclosed an approach that combines privacy control with watermarking and authentication mechanisms. The watermark can be made to be imperceptible to humans. Public key cryptography allows the authentication agent to authenticate without being able to watermark an image. Watermark information may also be encoded in a vector graphics image that includes at least one stroke defined by coordinate values of an ordered sequence of points. This may be obtained by providing watermark information as a bit sequence, identifying one or more redundant properties of the image, modifying the redundant properties based upon the bit sequence to generate a representation of the image and storing the representation of the image for subsequent use.