Abstract:
A system (10) for generating an incrementally completed 2D security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program has computer readable code for selecting a symbology for the 2D security mark (20′″), computer readable code for selecting a scrambling technique for data to be placed into a carrier object (20, 20′, 20″, 20′″) of the 2D security mark (20′″) at each stage in the workflow, and computer readable code for selecting a manner in which a state change of the carrier object (20, 20′, 20″, 20′″) at each stage in the workflow results in a predictable change in the 2D security mark (20′″). The system the system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
Systems and methods for tracking a slide comprising a tissue sample. In an embodiment, data is received from a Laboratory Information System (LIS) barcode associated with a slide and a proprietary barcode generated by a slide staining system, such as a Ventana slide staining system, to track the slide through the staining process. A new label is printed that contains both the LIS barcode and the proprietary barcode, and is attached to the slide. When the slide is subsequently scanned by a slide scanning system, the slide scanning system reads and decodes the LIS barcode to obtain a LIS barcode value. The LIS barcode value may then be used to retrieve information associated with the slide.
Abstract:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.
Abstract:
Methods (48, 100, 120) and systems are provided for tracing the source of a printed document (72). A method (48) may include receiving (50) a print job for printing a page having page content (54), generating a log (56) of the print job, encoding (60) the log (56) using a mule image (62) to produce a data-bearing halftone image, merging (64) the data-bearing halftone image with the page content (54), and printing (70) the merged data-bearing halftone image and page content (54) to produce a printed document (72).
Abstract:
A system (10) for generating an incrementally completed 2D security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program has computer readable code for selecting a symbology for the 2D security mark (20′″), computer readable code for selecting a scrambling technique for data to be placed into a carrier object (20, 20′, 20″, 20′″) of the 2D security mark (20′″) at each stage in the workflow, and computer readable code for selecting a manner in which a state change of the carrier object (20, 20′, 20″, 20′″) at each stage in the workflow results in a predictable change in the 2D security mark (20′″). The system the system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
A system (10) for generating an incrementally completed security mark (20′″) includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20′, 20″, 20′″); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20′, 20″, 20′″) and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
An image forming apparatus (100) to print an image on a recording medium based on print data. The image forming apparatus (100) includes a storing unit (5) to store the print data, an image processing unit to perform image processing on image data included in the print data; a printing operation specification unit to specify implementation of a printing operation; a marking unit to embed marking data in the image data, a marking printing operation specification unit to specify implementation of a marking printing operation, a printing operation implementation unit to implement the printing operation or the marking printing operation, a print data determination unit to determine whether or not the print data includes a setting for the marking printing operation, and a printing operation change unit to change a printing operation performed by the printing operation implementation unit.