Abstract:
A signature device including a storage unit configured to store moving image data, and a processor configured to extract original metadata from moving image data for the image data of each of a plurality of images forming the moving image data, the original metadata including location data of the image data and identification data of the moving image data, to encode the image data of each of the images into still image data in accordance with an image format, to write the still image data into a first area, to write the original metadata extracted by the extractor into a second area, the first area and the second area being included in a storage area of a still image data file in which the still image data is filed, and to generate summary data for the still image data file.
Abstract:
A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is acquired. The image is decomposed into a hierarchy of images having a top level and one or more lower levels each having a higher level parent, each lower level image defining a smaller region of the corresponding higher level parent image, the top level image defining a region that covers the item of information. A first secure identifier of at least the top level image is computed and arranged in a first data arrangement. A second secure identifier of the data related to the item of information is computed and arranged in a second data arrangement with the data related to the item of information. The first and second data arrangements are embedded in the electronic document.
Abstract:
An information processing apparatus inputs image data including a first pixel group, a second pixel group generated by interpolating the first pixel group and verification data of the first pixel group, verifies whether the first pixel group has been altered using the first pixel group and the verification data, verifies whether the second pixel group has been altered by determining whether the second pixel group and the first pixel group are in a predetermined relationship, and determines whether the image data has been altered based on results of the verification as to whether the first pixel group has been altered and the verification as to whether the second pixel group has been altered.
Abstract:
Procedure for verifying the integrity of documents which comprises a characterization of the original document to obtain a hash (508) and a stage of integrity verification, this stage comprising in turn, representing (601) the digital document to be verified in a matrix format; adapting (602) said document to a determined resolution in the characterization and correcting (603) the inclination, obtaining a corrected image (604); obtaining (605), the displacement produced between the contents in the original document and the document to be verified; obtaining (610) optimal displacement coordinates for each one of the regions of the corrected image; obtaining (611) one metric from the quantified coefficients of the corrected image and the corresponding ones in the original document; deciding (612) on the integrity of each region of the digitalized document using the previous metrics; and finally deciding (613) on the integrity of the document based on the results of the previous step.
Abstract:
The invention is directed to techniques of facilitating document transmission from one entity through an electronic communications network. An entity may be a legally recognized person such as a corporation, partnership, organization, government, individual, and the like. As a legally recognized person, an entity may act as a principal with respect to one or more authorized agents. Furthermore, as a legal person, an entity may authorize one or more of its agents to use fax transmission equipment such as the fax certification system described herein. The techniques of this invention assure a second entity that a first entity has indeed authorized its agent to send a document from a fax station under the controls of the first entity.
Abstract:
A method of embedding authentication data in an electronic document image is described. Data related to an item of information on an image of at least one page in the electronic document is acquired. The image is decomposed into a hierarchy of images having a top level and one Or more lower levels each having a higher level parent, each lower level image defining a smaller region of the corresponding higher level parent image, the top level image defining a region that covers the item of information. A first secure identifier of at least the top level image is computed and arranged in a first data arrangement. A second secure identifier of the data related to the item of information is computed and arranged in a second data arrangement with the data related to the item of information. The first and second data arrangements are embedded in the electronic document.
Abstract:
In one version of a system according to the present invention, an MFP device and a storage server are connected to each other via a network. A user authentication is performed to acquire user information. Job information associated with the user information is acquired from the storage server. When scanning or printing is interrupted, scan or print setting information set before the interruption, and optionally the image data scanned before the interruption, are acquired. The MFP device performs the scanning or printing based on the setting information acquired from the storage server at the time of restart.
Abstract:
Among other things, at a cloud-based service, digital image files are received from which digital images can be displayed on devices. For each of the digital image files, data is embedded in the digital image file on behalf of a party who has rights in the digital image file. The existence of the embedded data is not perceptible in any digital image that is displayed using the digital image file. The embedded data includes information from which the digital image file can be authenticated. At the cloud-based service, a digital image file is received that is to be authenticated. The digital image file is authenticated based on the embedded data.
Abstract:
A signature device including a storage unit configured to store moving image data, and a processor configured to extract original metadata from moving image data for the image data of each of a plurality of images forming the moving image data, the original metadata including location data of the image data and identification data of the moving image data, to encode the image data of each of the images into still image data in accordance with an image format, to write the still image data into a first area, to write the original metadata extracted by the extractor into a second area, the first area and the second area being included in a storage area of a still image data file in which the still image data is filed, and to generate summary data for the still image data file.
Abstract:
Essentially coincident with the capture of an image by the imaging device, biometric information indicating the identity of the operator of the device is obtained from at least one biometric sensor. The biometric information and captured image are then stored in a manner reliably associating each with the other. At a later time, biometric information is obtained from a supposed operator of the imaging device. By comparing this candidate biometric information with the stored biometric information, the supposed operator may be authenticated as the operator of the imaging device at the time of capture of the stored image.