Abstract:
Conventionally, during a copy operation, certain advanced mode settings make the extraction of additional security information impossible. In order to solve this problem, the print control apparatus includes: determining unit (1404) for determining an interval between a pattern element and a pattern element adjacent to the pattern element from the received image data; and control unit (1405) for performing a control so as to scale the image at a magnification specified by a user and have the scaled image printed by a printing apparatus when the product of the magnification specified by the user and the interval determined by the determining unit falls within a predetermined range (S4012), and configured to terminate or interrupt the printing of the image by the printing apparatus when the product of the magnification specified by the user and the interval determined by the determining unit does not fall within the predetermined range (S4013).
Abstract:
Methods for adapting the operation of a system in response to the detection of embedded watermarks from a digital host content are provided. A digital host content is received and examined for the presence of watermarks. In response to the detection of embedded watermarks and in accordance with the value, type, density or spacing of the detected watermarks, one or more system reactions may take place. These reactions include conditionally allowing the system to resume its normal operation, prohibiting the system from resuming its normal operation, degrading the quality of the digital host content or changing the security status of the digital host content. In response to the extraction of weak watermarks that do not meet the desired system requirements, the extraction operation may be modified or extended to enable the detection of strong watermarks.
Abstract:
Image identification information specific to image data to be inputted to an image replicating apparatus is embedded, as steganography, into the image data in advance. In the image replicating apparatus, a replication control apparatus decodes the steganography in the image data to detect the image identification information, then compares the detected image identification information with license information provided in advance, and permits, if they are coincident with each other, a copy operation, such as printing of the image data into a printing medium, storing of the image data into a storing medium, or the like.
Abstract:
Die Erfindung ermöglicht Manipulationen von Käufen oder Gruppen von Käfern der elektronischen Dokumenten nachzuweisen. Erfindungsgemäß wird ausgehend von einer vorher festgelegten Anzahl von Kopien und von einer maximalen Zahl von kooperierenden Angreifern zum Dokument für jede Kopie eine Stellen oder ein Bereiche für den digitalen Fingerabdruck des Kunden definiert. Alle im Rahmen des Dokuments definierten Stellen und Bereiche für die digitalen Fingerabdrücke unterliegen in ihrer Gesamtheit einem in sich geschlossenen endlichen geometrischen Ordnungssystem, in dem an definierten Stellen oder Bereichen Überschneidungen der digitalen Fingerabdrücke erfolgen. Anhand der Auswertung der durch die Angreifer nicht gefundenen Schnittstellen können die an der Manipulation beteiligten Angreifer eindeutig ermittelt werden. Das erfindungsgemäße Verfahren eignet sich insbesondere für die Kennzeichnung von Kopien von Dokumenten, die dem Copyrightschutz unterliegen.3
Abstract:
Various improvements to steganographic systems, and applications therefore, are disclosed. The improvements include facilitating scale and rotation registration for steganographic decoding by use of rotationally symmetric steganographically embedded patterns and subliminal digital graticules; improved techniques for decoding without access to unencoded originals; improving robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/decompression; and representing data (1690) by patterned bit cells (802) whose energy in the spatial domain facilitates decoding registration (1692). Applications include enhanced-security financial transactions, counterfeit resistant identification cards, fraud deterrent systems for cellular telephony, covert modem channels in video transmissions, photo duplication kiosks with automatic copyright detection, and hotlinked image objects (e.g., with embedded URLs) for use on the Internet.
Abstract:
This invention provides a method for identifying a purchaser who purchased content from which an illegal copy was produced. A provider system (100) encrypts a content purchased by the purchaser using a public key of a purchaser system (200) and sends the encrypted content to the purchaser system. The purchaser system 200 creates a digital signature of the content with the use of a private key of its own and embeds the created digital signature into the received content. When an illegal copy is found, the provider system 100 verifies the digital signature, embedded in the illegal copy as a digital watermark, to identify the purchaser who purchased the content from which the illegal copy was produced.
Abstract:
The invention relates to a method and system for embedding in a digital media file user fingerprint which the user cannot detect when using the digital media file. In the method, a user-detectable watermark is first embedded in the digital media file. This watermark can be transformed in a client device to a non-detectable fingerprint of the user by utilizing digital media file-specific information issued by a digital media rights owner when the user has bought a user license. Afterwards the digital media rights owner can read the embedded user fingerprint from the digital media file if it is illegally distributed between other users.
Abstract:
A forensic authentication system includes an imaging device to capture an image of a printed mark and a non-printed area of a substrate directly adjacent to the printed mark, and a processor to run computer readable instructions. The processor can run computer readable instructions to utilize a model to define a substrate region that corresponds with at least a portion of the non-printed area of the substrate directly adjacent to the printed mark; and computer readable instructions to generate a substrate signature for the defined substrate region. Each of the computer readable instructions is embedded on a non-transitory, tangible computer readable medium.