Abstract:
A system (10) for generating an incrementally completed security mark (20''') includes a computer-readable medium encoded with a computer program. The computer program includes computer readable code for selecting a carrier object (20, 20', 20'', 20'''); computer readable code for selecting a number of steps in a workflow associated with the carrier object (20, 20', 20'', 20''') and a security level for each step in the workflow; computer readable code for determining available carrier object candidate areas (T1, T2, T3, T4, T5) to which to write information at each step in the workflow; and computer readable code for determining a number of bits to be input at each step in the workflow based upon the respective security levels and the available candidate areas (T1, T2, T3, T4, T5). The system further includes memory and a processor operatively coupled to the memory and to the computer-readable medium.
Abstract:
A method for enhancing security printing of a layout template is disclosed. The method includes receiving the layout template, and acknowledging one or more constraints for the layout template. At least one unconstrained layout element of the layout template is varied, thereby generating a varied layout template. The varied layout template is printed and scanned. The method further includes determining a number of bits that can be encoded in the varied layout template, where the number of bits depends on the varying of the at least one unconstrained layout element.
Abstract:
Le procédé comporte : une étape de génération d'une image; une étape de marquage d'une pluralité de documents pour former ladite image sur chaque dit document avec des variations uniques sur chaque document, la majorité des images formées sur lesdits documents présentant une caractéristique anti-copie physique répondant à un critère prédéterminé telle que ladite caractéristique de la majorité des copies pouvant être réalisées à partir de ces images ne répondent pas audit critère prédéterminé; une étape de caractérisation desdites variations pour former une empreinte unique de la marque formée, pour chaque dit document; et une étape de mémorisation de ladite empreinte unique. Dans des modes de réalisation, l'image ne comporte que deux couleurs. Dans des modes de réalisation, au cours de l'étape de caractérisation des variations, on met en œuvre une analyse fréquentielle. Dans des modes de réalisation, au cours de l'étape de mémorisation, on mémorise l'empreinte dans une base de données et/ou on marque le document avec une marque représentative de l'empreinte, apposée individuellement sur le document.
Abstract:
A system and method for generating forensically marking image data from source material. A generated forensic mark will vary from copy (810) to copy (815) by using a selected forensic marking technique (810, 815) and forensic marking parameters that change from copy to copy of the source image data.
Abstract:
Apparatus for marking digital images being transferred digitally from an image store to an image recipient, the apparatus comprising a store (11) of one or more digital images, means (13) for selecting an image from the store, and marking means (15) for encoding the selected image with at least a recipient code identifying a recipient before transferring the encoded image to the recipient. A method of marking the digital images is also enclosed.
Abstract:
An image processing apparatus (10) includes: an operation receiver (102), an image processor (106) configured to perform image processing to add a digital watermark containing address information of the image processing apparatus (10) to a first image to thereby generate a second image; a communication controller (104) configured to receive a taking-out request to take out the digital watermark contained in the second image from an information processing device (20a, 20b, 20c); and a storage controller (109) configured to store a log in a storage unit (101). When receiving the taking-out request, the image processor (106) performs image processing to take out the digital watermark contained in the second image to thereby generate the first image. The communication controller (104) transmits the first image generated by the image processor (106) to the information processing device (20a, 20b, 20c). The storage controller (109) stores, in the storage unit (101), the log containing identification information identifying the user of the information processing device (20a, 20b, 20c) from which the taking-out request is transmitted.
Abstract:
Among other things, at a cloud-based service, digital image files are received from which digital images can be displayed on devices. For each of the digital image files, data is embedded in the digital image file on behalf of a party who has rights in the digital image file. The existence of the embedded data is not perceptible in any digital image that is displayed using the digital image file. The embedded data includes information from which the digital image file can be authenticated. At the cloud-based service, a digital image file is received that is to be authenticated. The digital image file is authenticated based on the embedded data.
Abstract:
Embodiments of techniques and systems for content protection and detection of protected media content are described. Visual tracking patterns may be displayed during rendering of protected media content that would be visible to a camcorder during recording. The visual tracking pattern may be placed in a background area or other less-active portion of the video in order to reduce perceptibility by a viewer. Audio tracking patterns may be inserted during rendering outside of the range of normal human hearing for reduced viewer perceptibility. The tracking patterns may encode media tracking codes that are included in to-be-rendered media during provision from a media server. Other embodiments may be described and claimed.