Abstract:
A method of producing a digital multiple-level encoded image is presented. The method comprises obtaining a digital authentication image, obtaining a first encoding parameter set comprising one or more encoding parameters, and constructing a first encoded image. The first encoded image is constructed using a first encoding methodology, the digital authentication image and the first encoding parameter set. The method further comprises obtaining a second encoding parameter set comprising one or more encoding parameters and constructing a second encoded image using a second encoding methodology, the first encoded image and the second encoding parameter set. The second encoded image may be decoded to reveal the first encoded image using a decoder having characteristics corresponding to at least a portion of the encoding parameters of the second encoding parameter set. The first encoded image may be decoded to reveal the authentication image using a decoder having characteristics corresponding to at least a portion of the encoding parameters of the first encoding parameter set.
Abstract:
Security documents (e.g. passports, currency, event tickets) are encoded to convey machine-readable multi-bit binary information (e.g. digital watermark), usually in a manner not alerting human viewers that such information is present. The documents can be provided with overt or subliminal calibration patterns. When a document incorporating such a pattern is scanned, the pattern facilitates detection of the encoded information notwithstanding possible scaling or rotation of the scan data.
Abstract:
The present invention is a method (Fig. 1) for hiding data in document contents. The method comprises receiving information relating to the document contents, (102) , wherein at least part of the document contents are of a binary nature, converting the data to halftone pixel groups according to predefined binary classifications associated with combinations of halftone pixels, (104), and embedding the halftone pixel groups into a binary portion of the document contents (104 and 114). Further, the present invention is a method for extracting data hidden in document contents (Fig. 7) The method comprises receiving information relating to the document contents (702), wherein the document contents include halftone pixel groups, extracting the halftone pixel groups from the document contents (712), and converting the halftone pixel groups to the data according to predefined binary classifications associated with combinations of halftone pixels (714).
Abstract:
A method of incorporating a second image into a primary image. A vectorial grid is created that is adapted for mapping on to the primary image. A deformation is applied to the grid using data from the second image. The deformed grid is then mapped onto the primary image to create an output image. The second image is revealable by applying a decoder to the output image.
Abstract:
A block dividing unit (41) divides a binary image into a plurality of blocks (S104). A unit for counting the number of pixels (42) calculates a number of black pixels B i for each block A i (S106). A calculation unit (44) calculates a remainder b i of the number of black pixels B i with respect to a reference value p (S112). A unit for counting the number of modification pixels (45) decides whether the watermark information d i to be embedded in the object block Ai is “1” or “0” (S114). When the watermark information d i is decided to be “1”, the number of modification pixels c i is calculated so that the remainder b i is (3/4)p (S116). When the watermark information d i is decided to be “0”, the number of modification pixels c i is calculated so that the remainder b i is (1/4)p (S118). A pixel modification unit (46) modifies the pixel value of pixels in the object block A i (S124). Thus, it is possible to embed watermark information appropriate for an image based on a line drawing such as a cartoon.
Abstract translation:块分割单元(41)将二进制图像划分为多个块(S104)。 用于对像素数进行计数的单元(42)针对每个块A (S106)计算黑色像素数目B s i i / sb(S106)。 计算单元(44)相对于参考值p计算黑色像素数目B s i i / sb的余数b i sb>(S112)。 用于对修改像素数进行计数的单元(45)判定要嵌入在对象块Ai中的水印信息d i = i 1是否为“1”或“0”(S114)。 当水印信息d / i> / sb>被确定为“1”时,计算修正像素数目i i,以使剩余部分b i sb> 是(3/4)p(S116)。 当水印信息d i sb>被确定为“0”时,计算修改像素数目i i / sb,使得剩余部分b i sb> 是(1/4)p(S118)。 像素修改单元(46)修改对象块A(s4)中的像素的像素值(S124)。 因此,可以基于诸如卡通的线条绘制适合于图像的水印信息。
Abstract:
Techniques for incorporating authentication information into digital representations of objects and using the authentication information to authenticate the objects. The authentication information may be made from information in one portion of the digital representation and incorporated into another portion of the digital representation that does not overlap the first portion. Where the digital representation is made into an analog form (703) and that in turn is made into a digital representation (706) and the second digital representation is verified, the two portions must further be non-overlapping in the analog form. The information from which the authentication is made may exist at many levels: representations of physical effects produced by the object, representations of features of the object, codes that represent the object's contents, and representations of descriptions of the object. Also disclosed are a verification server and techniques for reducing errors by an OCR. The verification server (717) verifies authenticated documents. When a document is verified, an identifier is associated with the document and the identifier is used to locate a key for authentication information and in some cases a second copy of the authentication information. The verification process may also involve security patterns that are a physical part of the analog form. The error reduction techniques include an error code specifying characters in the object that are confusing to OCR devices, and the error code is used to correct the results of an OCR reading of an analog form.
Abstract:
A specific frequency component signal is extracted from an input image signal (10) by a predetermined frequency component extraction unit (11), at least one of the phase and amplitude of the specific frequency component signal is controlled according to watermark information by a phase controller (12) and an amplitude controller (13), and an image signal embedded with watermark information is generated by superposing the specific frequency component signal on the input image signal by a watermark information superposing unit (16).
Abstract:
Systems and method of detecting halftone modulations that are embedded in an image (18) are described. The halftone modulations represent an ordered sequence of digital halftone microscreens (46) that encodes information (14) that has been embedded in the image (18). In one embodiment, the embedded information (14) is detected by applying a respective matched filter (82) to the image (18) for each of two or more different halftone modulations to identify the ordered sequence of halftone modulations embedded in the image (18). This approach provides an effective, robust and efficient scheme for detecting such halftone modulations without knowledge of the original image (16) before halftone modulation.
Abstract:
A watermark is embedded in spatial domain. However, the same effect as the watermark is embedded in frequency domain is obtained by inverse frequency transforming the watermark, and then embedding it. By doing that, robustness of the watermark is enhanced in comparison with conventional method for generating a watermark and adding it in spatial domain. Also, the watermark can be detected, even though an image is passed through stirmark, by enlarging the size of the watermark generated by inverse frequency transforming through re-sampling. In detecting the watermark, by high frequency filtering the watermarked image and getting all blocks of the watermarked image together, the effect of removing image component is obtained. Thereby, the detection speed of the watermark is improved, and the detection rate is increased as well.
Abstract:
Techniques are detailed for steganographically embedding auxiliary data (1030) within electronic content (e.g., audio, video, still imagery, etc.) (1020) in manners that are computationally simple, yet highly inconspicuous (1010). The embedded data can convey copyright or other ownership information, or may be used for device control purposes (e.g., preventing unauthorized reproduction). A number of countermeasures against removal of the auxiliary data are contemplated, including keying use of the content to the presence of such data. The embedded data may be made dependent on the media encoded, e.g., by modifying the embedded data in accordance with characteristics from the media. Encryption can also advantageously be employed (1040). Playback devices may be equipped to track IDs from previously-accessed content, and enforce usage rules. Some embodiments employ multiple watermarks to advantage, e.g., a robust watermark is encoded prior to distribution and indicates the content is protected, and a second watermark is encoded by the playback device and serves to uniquely link that content to that device. Some applications benefit from scrambling of content, in a manner that leaves certain information (e.g., from a header) unscrambled and freely accessible.