摘要:
A system and method for dynamic zoom adjustment based, in part, upon: the raster data in the user selected local area is disclosed; and/or the knowledge of a prevailing font size in a user selected region such that the text in that region is enlarged to be just readable. To achieve this, the detail in the local area is examined and a zoom factor is calculated that depends on the image detail and/or the viewing screen resolution. A document server may be employed to develop the information needed to enable this functionality. In one embodiment, the information is developed by RIPping the document, and then storing a spatial map of localized details (e.g., font sizes at several display resolutions) to automatically adjust a zoom level or factor and thereby facilitate navigation and reading.
摘要:
A process for improving the reconstruction of images compressed by the wavelet-based JPEG2000 specification. The basic reconstruction is followed by an edge-preserving filter (such as a sigma filter), another transform to the wavelet domain, an adjustment in the wavelet domain to yield the same quantized values as the compressed input image, and, finally, an inverse wavelet transform to yield the improved image. The process reduces the artifacts in sharp text and graphics documents, yielding images that would otherwise require larger files.
摘要:
Systems and methods that allow for anti-counterfeiting marks that carry user information and other data to be embedded into an original coupon design. The marks may be invisible, or visible but difficult to remove. At the receiving sides of the coupons, the embedded data are used to detect fraud and trace back the coupon users.
摘要:
A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication with the data reception component generates at least one security mark configuration based at least in part upon the received information. The at least one security mark configuration includes at least one simulation mark which resembles a natural feature. An application component applies one configuration of the at least one security mark configurations to a recipient. The applied security mark configuration obeys at least one rule whereby the security mark is distinguishable from the natural feature which it resembles by a system for detection of security marks.
摘要:
A method for run-time streak removal from a scanned image includes providing a scan line of image data from the scanned image; detecting corrupted data within the scan line; evaluating image data located in a neighborhood before and after the corrupted data on the scan line; if the evaluated image data in the neighborhood is smooth, replacing the corrupted data with image data determined by a linear interpolation process; and else if the evaluated image data in the neighborhood is not smooth, replacing the corrupted data with image data determined by the linear prediction process. Various techniques can be used to evaluate the image data located in the surrounding neighborhood. For example, a filter selection step may be used based on prediction discrepancies.
摘要:
A system and method are disclosed for determining preferred image locations for placing watermark information (both hidden and obvious). The disclosure includes at least three criteria (image similarity, contrast, and image value range) that may be used alone or in combination to determine a preferred area of the target image for placing the watermark depending upon the user's intent for the mark (hiding or showing watermark).
摘要:
The present invention relates to the segmentation of an image into a main area and a image segment for variable data differential gloss image control. A single color is selected. Two or more different color definitions are created by combining the selected single color with two or more halftones having anisotropic structure characteristics which are significantly different in orientation to each other while remaining identical in density. By alternatively assigning the color definitions to the image segment in accord with the variable data content, a variable data differential gloss image may be superimposed within an image having reduced data processing and storage requirements.
摘要:
A method for run-time streak removal from a scanned image includes providing a scan line of image data from the scanned image; detecting corrupted data within the scan line; evaluating image data located in a neighborhood before and after the corrupted data on the scan line; if the evaluated image data in the neighborhood is smooth, replacing the corrupted data with image data determined by a linear interpolation process; and else if the evaluated image data in the neighborhood is not smooth, replacing the corrupted data with image data determined by the linear prediction process. Various techniques can be used to evaluate the image data located in the surrounding neighborhood. For example, a filter selection step may be used based on prediction discrepancies.
摘要:
The present invention relates to the segmentation of an image into a main area and a image segment for variable data differential gloss image control. A single color is selected. Two or more different color definitions are created by combining the selected single color with two or more halftones having anisotropic structure characteristics which are significantly different in orientation to each other while remaining identical in density. By alternatively assigning the color definitions to the image segment in accord with the variable data content, a variable data differential gloss image may be superimposed within an image having reduced data processing and storage requirements.
摘要:
A system for generating a security mark includes a data reception component that receives information. A security mark generation component in communication with the data reception component generates at least one security mark configuration based at least in part upon the received information. The at least one security mark configuration includes at least one simulation mark which resembles a natural feature. An application component applies one configuration of the at least one security mark configurations to a recipient. The applied security mark configuration obeys at least one rule whereby the security mark is distinguishable from the natural feature which it resembles by a system for detection of security marks.