Abstract:
A data-bearing image (391) is created from a carrier image (371). The carrier image (371) is scaled to produce a scaled image. A clustered-dot halftone screen is applied to the scaled image to produce a halftone image. A resulting number of cells in the halftone image conforms to a cell count (372) that includes a horizontal cell value and a vertical cell value. Payload data is encoded into the halftone image to produce a data-bearing halftone image, including shifting pixel clusters within cells of the halftone image that include pixel clusters.
Abstract:
An encoding system (100) includes data in an underlying image by controlling or modifying halftone settings, which are used in the associated printing color process to produce a hard-copy document or an on screen image. The system (100) uses a halftone encoder (104) to encode the data into the image by selectively varying, in accordance with the data, the order of various color channels, and/or the screen angles using an angle table (105o) and/or spatial frequencies, or scales using a scale table (105r), of associated halftone screens. The system (100) encodes an N-bit payload in the image at the halftone encoder (104) by modifying the halftone settings of certain or all of the color channels in accordance with the data, thus using the color channels also as "data channels." The system (100) prints the encode image at a printer (108) by incorporating the modified halftone settings into the respective halftone screens, and applying the inks in a conventional manner.
Abstract:
We propose new methods for creating color varying prints with classical cyan, magenta, yellow inks on a metallic substrate. We use a special crossline halftone with optimized surface coverages of the inks to create color prints on a metallic surface whose colors change when rotating the print in-plane under specular reflection. These prints enable viewing on the same metallic print a first image with a first set of colors and upon in-plane rotation, the same image with parts colored with a different set of colors. They also enable viewing a first color image and upon rotation a second independent color image. Applications comprise counterfeit prevention, art, advertisement exhibitions and amusement parks.
Abstract:
A data-bearing medium has an array of data-bearing elements. The array of data-bearing elements represents an array of bits. A certain number of the bits repeat within the array of bits. Positions of the bits in each row of the array of bits are circularly shifted from positions of the bits in an immediately preceding row.
Abstract:
A forensic verification system (1100) extracts a print signature via a print signature extractor (1110) from an interior of a halftone contained in an image. The system (1100) utilizes a comparator (1120) to compare the print signature to a reference signature stored in a registry to determine differences between the print signature and the reference signature. The system (1100) utilizes a forensic analyzer (1130) to perform a forensic analysis on the signatures based on the comparison to authenticate the image.
Abstract:
Methods (48, 100, 120) and systems are provided for tracing the source of a printed document (72). A method (48) may include receiving (50) a print job for printing a page having page content (54), generating a log (56) of the print job, encoding (60) the log (56) using a mule image (62) to produce a data-bearing halftone image, merging (64) the data-bearing halftone image with the page content (54), and printing (70) the merged data-bearing halftone image and page content (54) to produce a printed document (72).
Abstract:
The present invention proposes a method for generating a security bi-level image used to form one of the inks of a banknote, said image comprising an original bi-level image and a security pattern, said security pattern being obtained in the spatial domain by the inverse Fourier transform of the combination in the frequency domain between the Fourier transform of an auxiliary image and a two-dimensional sweep, said two-dimensional sweep being a circularly symmetric, two-dimensional pattern created by sweeping a self-similar, one-dimensional function along a 360-degree arc, such as said security pattern being detectable from the maximum value of the cross- correlation of said one-dimensional function with the Fourier transform of one line of said banknote, said method comprising the step of: -determining a distance map of the original bi-level image, -generating a merged image by linearly interpolating at least a part of said distance map with said security pattern, -thresholding the merged image to obtain the security bi-level image, -applying the security bi-level image on a support.
Abstract:
A framework is provided for reducing the number of locations modified when hiding data, such as a digital watermark, in binary data. The framework complements data hiding techniques, such as digital watermarking techniques. After determining potential embedding locations according to an underlying technique, a data structure is created with values associated with those locations. A parity calculation is performed on the values in the data structure. The calculated parity is compared with hidden data to determine locations for modifications. Manipulations are then performed to reduce the total number of modifications needed to represent the hidden data. Modifications are made to the binary data according to the underlying technique. During decoding of the hidden data, the same locations can be determined, the same data structure can be created with the modified values, and a parity calculation is then performed to decode the hidden data.
Abstract:
Digital signature authentication systems and methods are disclosed. An example method of authenticating a digital signature extracted from a high resolution image includes comparing an extracted signature from an image to a reference signature. The example method also includes authenticating the extracted signature against the reference signature according to one of a plurality of different authentication protocols.
Abstract:
An example method for forming a data-bearing medium in accordance with aspects of the present disclosure includes setting variables associated with the data- bearing medium, the variables comprising a bit length of a codeword, identifying a phase-invariant codeword based on the variables, and arranging rows of the data- bearing medium with the phase-invariant codewords.