摘要:
The present invention provides a method of securing messages steganographically embedded in media (e.g., printed or electronic objects, audio and video). In one implementation, a message includes a first portion and a second portion. The first portion includes a first message and a first checksum, which are encrypted with a private key. The encrypted first portion is combined with the second portion. The second portion includes a second message and as second checksum. The combined encrypted first portion and the second portion form a signature. The signature is encrypted with a common or universal key, perhaps after error correction coding. The private key is uniquely associated with an entity such as a document issuing jurisdiction. In another implementation, a method appends information to a watermark message received from a remote device. The information preferably corresponds to the remote device or to a user of the remote device. In yet another implementation, a method provides standardized watermark payloads from various input data, regardless of the size of the input data.
摘要:
The application discloses signals and identification and security documents and methods and systems for authenticating such. In one implementation, a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document. Other implementations and embodiments are provided as well.
摘要:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection. In one implementation we embed an auxiliary signal with a first color that is out of gamut with process color inks or with a particular range of printers. A process color approximation of the first color yields a relatively different contrast when, e.g., viewed with an interference filter. A copy is determined based on the relative presence or absence of the auxiliary signal. In another implementation, we provide a first auxiliary signal with a first color and a second auxiliary signal with a second color. A filter is matched according to the spectral response of the first color. The second color preferably includes a spectral response that is inversely related to the matched filter. The first signal is then detectable in a process color copy, but less so in the original. However, the second signal is detectable in the original, but less so in the copy. In still other implementations we compare relative contrast of a signal to determine an original from a copy.
摘要:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. In other implementations a financial instrument or identification document is provided with an organic light emitting diode (OLED) array. The OLED array displays information thereon. The information is preferably correlated to the information on or in the financial instrument or identification document.
摘要:
This disclosure describes a distributed reader architecture for a mobile computing device such as cellular telephone handset. This architecture includes a reader library that reads device capabilities and business model parameters in the device, and in response, for selects an appropriate configuration of reader modules for identifying a content item. The reader modules each perform a function used in identifying a content item. The modules are selected so that the resources available on the device and in remote devices are used optimally, depending on available computing resources on the device and network bandwidth. One example of a reader module is a fast watermark detection module that quickly detects the presence of a watermark, enabling resources to be focused on portions of content that are most likely going to lead to successful content identification. A watermark signal structure for fast watermark detection is comprised of a dense array of impulse functions in a form of a circle in a Fourier magnitude domain, and the impulse functions having pseudorandom phase. Alternative structures are possible.
摘要:
A method of associating a content object with metadata uses a combination of a content identifier and a bounding identifier to enable handling of disparate sets of content identifiers for content objects with potentially conflicting content identifiers. The method receives a content identifier for a content object from among a set of content identifiers. It provides a unique bounding identifier for the set of content identifiers. This unique bounding identifier is used in combination with the content identifier to form a globally unique identifier for the content object. This globally unique identifier is associated with a metadata source, which enables routing of a user to the metadata source. Another novel method addresses content objects with two or more content identifiers, potentially referencing different metadata sources. This method registers different globally unique identifiers for a content object. These globally unique identifiers each comprise a content identifier provided with the content object and a bounding identifier identifying a set of content identifiers of which the content identifier is a member. For each of the globally unique identifiers, information is maintained about a metadata source. The method receives a first content identifier for the content object, and uses a bounding identifier associated with the set of the first content identifier to determine the globally unique identifier for the first content identifier. The user is routed to the metadata source associated with globally unique identifier. This document describes a novel system that enables multiple identity providers (ID Providers) to register and use the system. The ID Provider registers with a metadata directory system, receives a unique bounding identifier, and uses this bounding ID (e.g., an ID provider ID) with subsequent interactions with the metadata directory system. Separately, metadata source providers register metadata sources with the metadata directory system. This enables many different participants to associate content objects with metadata sources using one or more identify providers. Examples of metadata source providers include content providers, like content owners or retailers that have the flexibility of working with different ID providers to associate content objects with metadata. Both content providers and ID providers can register and use the system. The metadata source is the system or device that provides the metadata, like a web site. The directory system uses an identifier for the metadata source, which enables it to maintain an association between a content object and its corresponding metadata source. For example, in some embodiments, a URL serves to identify the location of the source. The Content Metadata Directory Services (CMDS) is a global trusted directory service that connects consumers of identified content to content-provider authorized and managed metadata databases and other digital resources. It includes mostly links to metadata, forms globally unique IDs based upon overlapping content identifiers and unique bounding identifiers, enables multiple content identifiers within a content object, and enables multiple content identity technology providers, even when they are using different technology.
摘要:
A method for issuing a credential includes scanning in documents (e.g., breeder or ID documents) used to verify the applicant of the credential and creating data records including the image of the documents. As a means to reduce fraud, these data records are linked to the credential and to the issuer location, operator and time and place of issuance. If the document includes machine readable information, the method automatically reads the machine readable information from the document and uses at least part of the machine readable information from the document to pre-populate a form used to create a credential, such as an identification document. The method includes applying a transformation to the image of the document that enables protection against fraudulent use. The transformation secures the image of the document from tampering and/or enables tracking of the use of the document image to deter fraud. A method of verifying a credential comprises reading a physical security feature attribute on the credential, reading a logical attribute on the credential, and comparing information from the physical security feature with the logical storage element on the credential to verify the credential.
摘要:
Content identifiers are associated with respective metadata. Through use of the metadata, a user's experience with the content can be enhanced. A variety of other arrangements are also detailed.
摘要:
A number of novel watermarking applications, and improvements to watermarking methods, are disclosed. Included are techniques for encoding printed circuit boards and street signs with watermarks, deterring credit card fraud and controlling software licensing using watermarks, registering collectibles via watermarks, encoding the margins of printed pages with watermarks, and using watermarks to convey extra information in video by which fidelity of the rendered video may be improved. One particular arrangement is a method in which a PDA, wristwatch, or other portable device with a display screen presents a pattern that includes a machine-readable identifier. This image is sensed by a separate device, such as a webcam or a camera-equipped cell phone. The sensing device can then take an action based on the identifier. In some arrangements, the action is personalized to the user.
摘要:
The present invention relates to methods and apparatus employing digital watermarking and/or steganography. In one implementation a printer includes watermarking capabilities to facilitate image management. Other implementations are detailed herein as well.