摘要:
The invention provides methods for embedding digital watermarks for authentication of printed objects, and corresponding methods for authenticating these objects. One aspect of the invention is a method of embedding a digital watermark in a digital image to be printed on an object. The method embeds an auxiliary signal in the digital image so that the auxiliary signal is substantially imperceptible, yet machine readable. It converts the image to a halftone image using an inherently unstable halftone screen structure that is likely to cause ink flow errors when reproduced. The errors introduced by reproducing the unstable halftone screen structure incorrectly are automatically detectable by reading the auxiliary signal.
摘要:
The invention provides methods for embedding digital watermarks for authentication of printed objects, and corresponding methods for authenticating these objects. One aspect of the invention is a method of embedding a digital watermark in a digital image to be printed on an object. The method embeds an auxiliary signal in the digital image so that the auxiliary signal is substantially imperceptible, yet machine readable. It converts the image to a halftone image using a halftoning process. If copies are made of the printed image, the image characteristics change due a change in the halftoning process used to create the copies. These changes are detected to determine whether a suspect document is authentic.
摘要:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In on application, the auxiliary signal is formed as an array of elements selected from a set of print structures with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. For example, the changes make the embedded auxiliary signal more or less detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Examples of sets of properties of the print structures that change differently in response to copy operations include sets of colors (including different types of inks), sets of screens or dot structures that have varying dot gain, sets of structures with different aliasing effects, etc. Robust and fragile watermarks are used in Image Replacement Documents for a variety of applications. Digital watermarks act as on-board mediators in authentication of a variety of printed documents. Finally, digital watermarks are used to help manage quality of the scanners used in imaging systems.
摘要:
Methods for integrating digital watermarks into holograms, watermarked hologram structures, and related applications. One method creates a watermark image, and then embeds the watermark image into a holographic structure. The holographic structure is created using computer generated holography to create a digital representation of the holographic structure. This digital representation is recorded on a physical substrate using optical techniques or microlithography. As an alterative, a watermark signal is embedded in a physical holographic structure by embedding the signal into an image that is optically merged with the holographic structure as it is optically recorded, or by embedding the signal into an image or physical model from which the holographic structure is formed. Another approach the creates a halftone watermarked image, and forms the halftone watermarked image in the hologram by creating hologram dots corresponding to the dots in the halftone watermarked image.
摘要:
The present invention relates generally to digital watermarking holographic structures. One method recites: creating a computer model; executing a transform domain iterative method to convert the computer model into a holographic structure; combining a digital watermark with the holographic structure; and conveying the combined digital watermark and holographic structure to a surface. Other combinations are provided and claimed as well.
摘要:
The presently claimed invention relates generally to steganography and fingerprinting or hashing. In one embodiment, a method includes: obtaining a first set of plural-bit data, the first set of plural-bit data corresponding to at least a portion of steganographically encoded data in a media signal in the form of a digital watermark; obtaining a second set of plural-bit data, the second set of pural-bit data corresponding to a fingerprint or hash of the media signal. THe fingerprint or hash includes a reduced-bit representation of the media signal, and the first set of plural-bit data is not dependent on information in the second set of plural-bit data. The method further includes carrying out a first action associated with the first set of plural-bit data; and carrying out a second action associated with the second set of plural-bit data. Other embodiments are described and claimed as well.
摘要:
A system for determining location and timing information in a cellular network includes a space-time calibration unit (SCU) and a plurality of nodes in communication with the SCU. Each node includes a node ping driver that receives frame synchronization information from a respective subset of cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local node clock. The system also includes a user handset that includes a handset ping driver that receives the frame synchronization information from a serving cell site and one or more neighbor cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local handset clock. The SCU uses the information from the node and handset ping drivers to determine a handset location.
摘要:
A system for determining location and timing information in a cellular network includes a space-time calibration unit (SCU) and a plurality of nodes in communication with the SCU. Each node includes a node ping driver that receives frame synchronization information from a respective subset of cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local node clock. The system also includes a user handset that includes a handset ping driver that receives the frame synchronization information from a serving cell site and one or more neighbor cell sites, and associates the frame synchronization information with respective receive count stamps generated using a local handset clock. The SCU uses the information from the node and handset ping drivers to determine a handset location.
摘要:
Identification of media content, such as audio, can be performed through use of watermarking or fingerprinting (aka content signature) technologies. Aspects of these technologies may be combined to advantageous effect. For example, in dealing with the problem of fingerprint errors arising from object distortion, operations known from digital watermarking systems can be employed.
摘要:
Various improvements relating to digital watermarking and related technologies are detailed, including methods that enhance security and functionality, and new articles including watermarked puzzles and marked DNA.