Abstract:
Image integrity in an archive can be verified using document characteristics. Embodiments of the invention provide a way to verify the integrity of a stored document image by determining document characteristics, which can also be embedded in the image file. Before allowing access to the image file by an application, the characteristics data from an image analysis can be compared to either or both of, characteristics information otherwise stored, or embedded characteristics data. The embedded data can optionally be encrypted. In example embodiments the data can include a result of an optical character recognition of contents of the document, a length of data describing the image, a percentage of a specified color of pixels in the image, or a checksum. Example embedding techniques can include those making use of a tagged image file format (TIFF) header, a steganographic watermark, or an image artifact.
Abstract:
A counterfeit identification performance attribute (CIPA) sensitivity to changes in resolution of the image for features of an image is determined (102). The CIPA sensitivity for the features is used to choose at least one feature to determine whether the image on a sample is a counterfeit (106).
Abstract:
Substrat de sécurité et méthode d'authentification et de mise en évidence des tentatives de falsification Un substrat de sécurité comportant au moins une zone d'authentification et/ou de mise en évidence des tentatives de falsification par des solvants, caractérisé en ce que ladite zone comprend des particules individualisées de base polymère ou copolymère comportant au moins un marqueur et en ce que ledit polymère ou copolymère est au moins partiellement soluble dans les solvants de falsification.
Abstract:
A digital data false alteration detection program causes a computer to execute (a) a step (S1) of dividing digital data into a plurality of smaller block data, (b) a step (S2) of extracting noise inherent to a digital data acquisition device for each of the small block data, (c) a step (S3) of calculating correlation of the noise between adjacent small block data, and (d) a step (S4) of detecting small block data having noise correlation lower than a level predetermined for the surrounding small block data, as falsely altered data.
Abstract:
컴퓨터에 대해서, (a) 디지털 데이터를 복수의 소 블록 데이터로 분할하는 단계 (S1)과, (b) 소 블록 데이터 별로 디지털 데이터 취득장치에 특유한 노이즈를 추출하는 단계 (S2)와, (c) 인접하는 소 블록 데이터 사이에서의 노이즈의 상관을 계산하는 단계 (S3)과, (d) 노이즈의 상관이 주위의 소 블록 데이터에 대해서 미리 설정된 레벨보다 낮은 소 블록 데이터를 개찬된 것으로서 검출하는 단계 (S4)를 실행시킨다. 디지털 데이터 개찬 프로그램
Abstract:
PURPOSE: An information processing unit and an information processing method for effecting an inspection of image data are provided to generate validation data of image data by calculating the relative relation between the coefficient of inputted image data or the pixel values. CONSTITUTION: An input unit(111) inputs image data and verification data by using relative relation between the pixel values of image data. Production units(112, 113) produce relative relation of large and small between the pixel values of the inputted image data. A verification data generator generates second validation data by using relative relation. A verification unit(114) uses the first and second validation data. The alteration of image data effects an inspection of evidence.
Abstract:
The present disclosure is generally directed to a method and computing device for determining whether a mark is genuine. According to various implementations, a computing device (or logic circuitry thereof) uses unintentionally-produced artifacts within a genuine mark to define an identifiable electronic signature, extracts certain attributes of the signature (such as deviation from the mean value for each band of the signature), and assigns numerical values to the extracted attributes in order to create a hash identifier that is significantly smaller than the electronic signature itself. The hash identifier is then used as an index for a database of electronic signatures (of genuine marks) to enhance the ease and speed with which numerous genuine signatures can be searched (e.g., in a database) and compared with signatures (of candidate marks.