Abstract:
A method of determining if at least a portion of a suspect signal (58) is derived from a watermarked original signal (56) includes the steps of providing a watermark (50) and creating the watermarked original signal (56) by incorporating the watermark (50) onto an original signal (52). At least one first watermark indicator is generated (64) based on the watermarked original signal (56) and the watermark (50) and at least one second watermark indicator is generated (62) based on the suspect signal (58) and the watermark (50). A determination is made (66, 68, 70) whether at least a portion of the suspect signal (58) is derived from the watermarked original signal (56) based on the at least one first watermark indicator (64) and the at least one second watermark indicator (62).
Abstract:
Systems and methods for context based scanning are described. In one implementation, the method for context based scanning comprises initiating context based scanning from an application running on a computing system (100) by pressing at least one of a dedicated scan button (130) and a pre-configured combination of keys of the computing system (100) and scanning a document on initiation of the context based scanning. The method further comprises analyzing the scanned document, using optical recognition techniques, to generate a digital document containing text and pasting the text onto the application.
Abstract:
The problem to be solved of the present invention is that if a language for display and an OCR language used at a time of OCR for a document name are set to be different, there are cases in which the name of a document which is transmitted that is displayed upon a screen is not displayed correctly. The present invention is characterized in having: document name setting means for setting a document name which includes a character string, which is recognized on the basis of document data, to document data which is generated by reading means; and control means for controlling how the document name setting means sets the document name if the language specified by character recognition language specification means and the language specified by display language specification means are different.
Abstract:
A system for capturing images of an event includes at least one data correlator (216). The data correlator is operable to receive still images captured by a camera (218) and to receive identification/time pairs from a sensor (220). Each identification/time pair includes an identity of at least one respective object and a time that the at least one respective object was within the camera's field of view (222). The data correlator is operable to automatically correlate the still images with identities of respective objects included in the still images by correlating an identity of at least one respective object of each identification/time pair to a still image that is closest in time to a time of the identification/time pair.
Abstract:
A system for capturing images of an event includes at least one data correlator. The data correlator is operable to receive still images captured by a camera and to receive identification/time pairs from a sensor. Each identification/time pair includes an identity of at least one respective object and a time that the at least one respective object was within the camera's field of view. The data correlator is operable to automatically correlate the still images with identities of respective objects included in the still images by correlating an identity of at least one respective object of each identification/time pair to a still image that is closest in time to a time of the identification/time pair.
Abstract:
A method of producing a digital multiple-level encoded image (Fig. 7) is presented. The method comprises obtaining a digital authentication image (S110), obtaining a first encoding parameter set (S115) comprising one or more encoding parameters, and constructing a first encoded image (S125). The first encoded image is constructed using a first encoding methodology, the digital authentication image and the first encoding parameter set. The method further comprises obtaining a second encoding parameter set (S130) comprising one or more encoding parameters and constructing a second encoded image (140) using a second encoding methodology, the first encoded image and the second encoding parameter set. The second encoded image may be decoded to reveal the first encoded image using a decoder having characteristics corresponding to at least a portion of the encoding parameters of the second encoding parameter set. The first encoded image may be decoded to reveal the authentication image using a decoder having characteristics corresponding to at least a portion of the encoding parameters of the first encoding parameter set.
Abstract:
An apparatus (100) for processing electronic messages is disclosed herein. In a preferred embodiment, the apparatus (100) comprises a printing device (502) for printing an electronic message received from a sender on a sheet of paper (508); and a scanning device (504) connected to the printing device (502) for automatically scanning the sheet of paper (508) to capture an image of the printed electronic message. The recipient may then send the electronic image to the sender as confirming receipt of the original electronic message.
Abstract:
An image printing apparatus includes a print head for printing images. A microcontroller that includes a wafer substrate is provided. Processor circuitry is positioned on the wafer substrate. Print head interface circuitry is also positioned on the wafer substrate and is connected between the processor circuitry and the print head. The print head interface circuitry is configured to facilitate communication between the processor circuitry and the print head. Bus interface circuitry that is discrete from the print head interface circuitry is connected to the processor circuitry so that the processor circuitry can communicate with devices other than the print head via a bus.
Abstract:
In embedding a watermark, it is possible to effectively detect the watermark even in case of rotating, cutting, and enlarging/shrinking an image by designing the watermark to be robust against geometric modification and embedding the watermark as 2-dimensional form, for example radial or concentric form. Also, in detecting a watermark, it is possible to detect a peak formed by the watermark through the convolution of the watermark and an input image while accommodating a size of the generated watermark, thereby effectively detecting the watermark using correlation between the input image and the watermark.
Abstract:
A method for decoding auxiliary data from media signals in multimedia content decodes watermarks (40 and 42) from different media signals (44 and 46) and uses the watermarks to control processing of the multimedia content (58). A copy control method decodes a watermark from one of the media signals in multimedia content, and uses the watermark to control processing of the multimedia content. Another method uses a watermark decoded from a media signal to decode metadata associated with the media signal. Finaly, another method forms a key for decoding data from at least first and second watermarks extracted from first and second media signals.