Abstract:
Example implementations relate to multiple payload pantographs. Some examples may include a first pattern generation engine to generate a first pattern. The first pattern may be a data-bearing pattern encoding a first payload. Additionally, some examples may include a second pattern generation engine to generate a second pattern, the second pattern (by itself or in combination with the first pattern) may represent a second payload. The second payload may be camouflaged by a combination of the first pattern and the second pattern. Some examples may also include a pantograph generation engine to generate a multiple payload pantograph including the first pattern and the second pattern. The multiple payload pantograph may include the first pattern in one of the pantograph background or the pantograph foreground.
Abstract:
A method of watermarking an image (l o ). A visible watermark (T) is inserted (23) in the image (I0) to obtain a visibly watermarked image (l v ). Information (22) allowing removal of the visible watermark (T) is protected (24) to obtain protected information (26) that is inserted (27) as an invisible watermark in the visibly watermarked image (l v ) to obtain a visibly and invisibly watermarked image (l Vι ). The information (22) allowing removal of the visible watermark may be image values of the pixels to be covered by the visible watermark and, possibly, the position and size of the visible watermark, in which case these values are first memorised. The visible watermark may be opaque. Also provided are an apparatus for inserting the watermarks, a method for removing the visible watermark, essentially by performing the method "in a mirror", and an apparatus for removing the visible watermark.
Abstract:
Le procédé comporte : une étape de génération d'une image; une étape de marquage d'une pluralité de documents pour former ladite image sur chaque dit document avec des variations uniques sur chaque document, la majorité des images formées sur lesdits documents présentant une caractéristique anti-copie physique répondant à un critère prédéterminé telle que ladite caractéristique de la majorité des copies pouvant être réalisées à partir de ces images ne répondent pas audit critère prédéterminé; une étape de caractérisation desdites variations pour former une empreinte unique de la marque formée, pour chaque dit document; et une étape de mémorisation de ladite empreinte unique. Dans des modes de réalisation, l'image ne comporte que deux couleurs. Dans des modes de réalisation, au cours de l'étape de caractérisation des variations, on met en œuvre une analyse fréquentielle. Dans des modes de réalisation, au cours de l'étape de mémorisation, on mémorise l'empreinte dans une base de données et/ou on marque le document avec une marque représentative de l'empreinte, apposée individuellement sur le document.
Abstract:
An information-detecting apparatus (1) including a receiving unit (3) operable to receive digital data (2) that includes several pieces of element data, in which a change amount is imparted to a value of each of first and second element data among the several pieces of element data, a first selecting unit (4) operable to select, as target data (6), a data set that includes the first and second element data, a second selecting unit (5) operable to select, as neighboring data (7), element data in proximity to each of the first and second element data, a calculating unit (8) operable to calculate, based on both of the target data (6) and the neighboring data (7), the change amount imparted to each of the first and second element data, and a detecting unit (10) operable to detect the additional information in accordance with the change amount.
Abstract:
A non-algebraic method of encrypting and decrypting data. A cryptographic algorithm based on the properties of certain nonlinear equations (115, 130) is used to encrypt and decrypt data without algebraic computations. In particular, the present invention utilizes those nonlinear equations for which the solution space includes attractors to obtain intractable quantities and then operates on clear text data (120) and the intractable quantities to produce secure cipher text. Data needed or desirable for decryption are retained during the encryption process, thus optimizing the decryption process of the present invention.
Abstract:
A non-algebraic cryptographic architecture. The non-algebraic cryptographic architecture is a logical implementation of a non-algebraic cryptographic engine (sometimes referred to as a "NACE"). The architecture uses a NACE in conjunction with cryptographic key lengths up to 2048 bits to achieve real-time encryption at speeds sufficient to permit wideband digital data to be decrypted in real time thereby obviating the need for store-and-forward. The architecture is inherently parallel and can accept extended block lengths, which are several multiples of the length of the cryptographic key.
Abstract:
This invention relates to a method and an arrangement for embedding auxiliary data in an information signal. Only a part of a noise signal representing the auxiliary data is embedded but the complete noise signal may be detecting. This allows for a greater payload of the embedded signal. The invention also relates to a corresponding method and arrangement for detecting auxiliary data in an information signal.