Abstract:
A system and method is provided for management of digital watermarks, including a system and method for identifying the source of counterfeit copies of multimedia works using layered simple digital watermarks which are difficult to locate, identify and circumvent. The layered digital watermarks may be modulated in a variety of ways, and may be individualized to assist in detection of unlawful copyrighted material infringement by endpoint device and/or the user committing the copyright infringement. In addition, multiple layers of watermarks may be selected and applied by various schemes, such as on-the-fly remotely by the distributor of the copyrighted material. This system and method for management of digital watermarks effectively makes it impossible for a potential copyright infringer to have complete confidence that they located and disabled all of the watermarks in the copyrighted material, and therefore substantially increases the risk of infringer identification and prosecution for copyright violations.
Abstract:
A device for applying or extracting a digital watermark of two or more dimensions and a method of applying or extracting the digital watermark. The digital watermark is generated by adding a suitable number of watermarking arrays. Each watermarking array is constructed by convolving a multi-periodic shift array having a correlation bounded by a constant (two or greater) with a balanced periodic substitution sequence.
Abstract:
An image acquisition device is provided for use in determining whether a test object is an authentic object having an authentication image applied to an authentication image area thereof. The authentication image includes indicia formed based on authentication parameters. The image acquisition device comprises an image capture arrangement configured for capturing a digital image of a target area of a test object. The image acquisition device further comprises a data processor having an image processing portion configured for receiving and processing the digital image to produce a processing result. The processing result may be established at least in part using one or more of the authentication parameters.
Abstract:
The invention relates to a method for securing documents that comprises the step of printing a distribution of points on said document, said printing inducing due to printing randomness a point-by-point unpredictable variation of at least one geometrical variation of the printed points and, before said printing step, the step of generating said point distribution so that the points of said distribution have at least one variable geometrical characteristic between them, the geometrical amplitude of the variation generated having the same magnitude as said unpredictable variation. In some embodiments, during the generation step and in said point distribution, at least one half of the points of said distribution are not laterally juxtaposed to four other points of said point distribution, and at least one dimension of at least a portion of the points of said point distribution has the same magnitude as the average of the absolute value of said unpredictable variation.
Abstract:
The present invention is directed to a method and system for printing documents with a security image. The security image is formed of dots of a particular size and arranged in a pattern. The size and pattern are selected such that when the printed document is copied on a standard printer, the security image is faded or invisible and therefore the resulting copy is clearly not an original document.
Abstract:
A latent image (16) is incorporated into an apparent solid-color background (28) for representing a desired solid-color background having a target color. An underlying solid-color background (20) is printed on a print medium (18) using a first color composition that differs from the target color. Line-screen patterns (24) embedding a latent image (16) in a visually- integrated setting (26) are printed over the solid-color background (20) using a second color composition that differs from both the first color composition and the target color. The visual characteristics of the line-screen patterns (24) forming the latent image (16) and the visually integrated setting (26) are matched for rendering the latent image (16) practically indistinguishable from the visually integrated setting (26) without a visual aid (30). The print densities of the line-screen patterns and the first and second color compositions are interrelated so that the line-screen patterns (24) in combination with the underlying solid-color background (20) produce the apparent solid-color background (28) in the target color.
Abstract:
A document and a related viewer for the document are constructed as image files capable of transmission to a printing site. The document file contains information for printing a document having hidden security indicia, and the viewer file contains information for printing a document viewer having a decrypting portion for revealing the hidden security indicia in the document.
Abstract:
A latent image is incorporated into an apparent solid-color background for representing a desired solid-color background having a target color. An underlying solid-color background is printed on a print medium using a first color composition that differs from the target color. Line-screen patterns embedding a latent image in a visually integrated setting are printed over the solid-color background using a second color composition that differs from both the first color composition and the target color. The visual characteristics of the line-screen patterns forming the latent image and the visually integrated setting are matched for rendering the latent image practically indistinguishable from the visually integrated setting without a visual aid. The print densities of the line-screen patterns and the first and second color compositions are interrelated so that the line-screen patterns in combination with the underlying solid-color background produce the apparent solid-color background in the target color.