METHODS AND A COMPUTING DEVICE FOR DETERMINING WHETHER A MARK IS GENUINE
    74.
    发明申请
    METHODS AND A COMPUTING DEVICE FOR DETERMINING WHETHER A MARK IS GENUINE 有权
    方法和用于确定标记是否符合的计算设备

    公开(公告)号:US20160239934A1

    公开(公告)日:2016-08-18

    申请号:US14623925

    申请日:2015-02-17

    Abstract: The present disclosure is generally directed to a method and computing device for determining whether a mark is genuine. According to various embodiments, a computing device (or logic circuitry thereof) uses unintentionally-produced artifacts within a genuine mark to define an identifiable electronic signature, and extracts certain location identifiers corresponding to certain measured features of the signature in order to enhance the ease and speed with which numerous genuine signatures can be searched and compared with signatures of candidate marks.

    Abstract translation: 本公开通常涉及用于确定标记是否是真实的方法和计算装置。 根据各种实施例,计算设备(或其逻辑电路)使用真实标记内的无意产生的伪影来定义可识别的电子签名,并且提取与特征的某些测量特征相对应的某些位置标识符,以便增强容易度 可以搜索许多真实签名并与候选标记的签名进行比较的速度。

    Detecting alteration of an image based on pattern information of color filter array
    77.
    发明授权
    Detecting alteration of an image based on pattern information of color filter array 有权
    基于滤色器阵列的图案信息检测图像的变化

    公开(公告)号:US08983115B2

    公开(公告)日:2015-03-17

    申请号:US13755832

    申请日:2013-01-31

    Inventor: Ayuta Kawazu

    CPC classification number: G06K9/46 G06K2009/00583 G06T1/0028 G06T2201/0201

    Abstract: A CFA pattern is extracted from captured image data for each first unit region. A first altered region is detected from disturbance of the periodicity of the CFA pattern, and the first altered region is an image region in which copying has been performed from image data different from the captured image data to the captured image data. The feature amount of the captured image data is extracted for each second unit region different in size from the first unit region. The feature amounts are compared for each second unit region to detect a second altered region, and the second altered region is an image region in which copying has been performed from the captured image data to the captured image data. Information concerning the first and second altered regions are output as alteration detection results in the captured image data.

    Abstract translation: 从每个第一单位区域的捕获图像数据中提取CFA图案。 从CFA图案的周期性的干扰中检测第一改变区域,并且第一改变区域是其中已经从与捕获的图像数据不同的图像数据执行复制到图像数据的图像区域。 对于与第一单位区域不同的大小的第二单位区域,提取拍摄图像数据的特征量。 对于每个第二单位区域比较特征量以检测第二改变区域,并且第二改变区域是其中已经从捕获的图像数据执行复制到捕获的图像数据的图像区域。 关于第一和第二改变区域的信息作为捕获图像数据中的改变检测结果被输出。

    IMAGE PROCESSOR AND IMAGE PROCESSING METHOD
    79.
    发明申请
    IMAGE PROCESSOR AND IMAGE PROCESSING METHOD 有权
    图像处理器和图像处理方法

    公开(公告)号:US20140023277A1

    公开(公告)日:2014-01-23

    申请号:US14032532

    申请日:2013-09-20

    Abstract: An image processor includes an image degradation measuring unit configured to compute a degradation level of block data with respect to each of blocks within an image, a degradation determining unit configured to select, with respect to each of the blocks within the image, the block data of a target block of one of a plurality of the images based on degradation levels of respective block data of the target blocks of the plurality of the images, and an image synthesis unit configured to generate a sheet of an image by synthesizing the block data selected with respect to the blocks within the image.

    Abstract translation: 图像处理器包括:图像劣化测量单元,被配置为针对图像中的每个块计算块数据的劣化水平;劣化确定单元,被配置为针对图像中的每个块选择块数据 基于多个图像中的目标块的各个块数据的劣化程度,对多个图像中的一个图像的目标块进行合成;图像合成单元,被配置为通过合成所选择的块数据来生成图像片段 相对于图像中的块。

    Steganalysis of suspect media
    80.
    发明授权
    Steganalysis of suspect media 有权
    嫌疑媒体的分析

    公开(公告)号:US08281138B2

    公开(公告)日:2012-10-02

    申请号:US12422677

    申请日:2009-04-13

    Inventor: Yun-Qing Shi Bin Li

    Abstract: Techniques described herein are generally related to steganalysis of suspect media. Steganalysis techniques may include receiving instances of suspect media as input for steganalytic processing. A first set of quantized blocks of data elements may be identified within the media, with this first set of blocks being eligible to be embedded with steganographic data. A second set of quantized blocks of data elements may be identified within the media, with this second set of blocks being ineligible to be embedded with steganographic data. The steganalysis techniques may requantize the first and second blocks. In turn, these techniques may compare statistics resulting from requantizing the first block with statistics resulting from requantizing the second block. The steganalysis techniques may then assess whether the first block of data elements is embedded with steganographic features based on how the statistics of the second blocks compare with the statistics of the first blocks.

    Abstract translation: 本文描述的技术通常涉及可疑介质的隐写分析。 隐匿分析技术可以包括接收可疑媒体的实例作为隐写处理的输入。 可以在媒体内识别数据元素的第一组量化块,其中该第一组块有资格嵌入隐写数据。 可以在媒体内识别第二组数据元素的量化块,其中第二组块不符合隐写数据​​的嵌入。 隐写分析技术可以重新调整第一和第二块。 反过来,这些技术可以将从重新量化第一个块得到的统计数据与由再量化第二个块产生的统计数据进行比较。 隐写分析技术可以基于第二块的统计数据如何与第一块的统计量进行比较来评估第一块数据元素是否嵌入隐写特征。

Patent Agency Ranking