Abstract:
A print management system includes a policy (113) that determines a protection level for a document to be printed. The document is printed using forgery detection and deterrence technologies, such as fragile and robust watermarks, glyphs, and digital signatures, that are appropriate to the level of protection determined by the policy. A plurality of printers (130) are managed by a print management system (112). Each printer (130) can provide a range of protection technologies. The policy determines the protection technologies for the document to be printed. The print management system (112) routes the print job to a printer (130) that can apply the appropriate protections and sets the appropriate parameters in the printer. Copy evidence that can establish that a document is a forgery and/or tracing information that identifies the custodian of the document and restrictions on copying of the document and use of the information in the document are included in the watermark that is printed on the document. A document can be verified as an original or established as a forgery by inspecting the copy evidence and/or tracing information in the watermark.
Abstract:
A method for embedding information in a digital image by an imaging device that is electronically connected to a network server includes storing a digital image having first embedded information in an electronic memory at a network server and sending the digital image having the first embedded information from the network server to the imaging device. The method further includes producing second information and using the imaging device to embed the second information in the digital image having the first embedded information to produce a digital image having the first and second embedded information.
Abstract:
An electronic watermark data insertion apparatus comprises an insertion information memory (39) for preliminarily storing insertion information for designating electronic watermark data to be inserted block by block and an electronic watermark data insertion unit (33) for inserting, on the basis of the insertion information, the designated electronic watermark data from an electronic watermark data table (37) in a quantized image block by block. An electronic watermark data detection apparatus comprises an electronic watermark date extracting unit (45) for extracting the image data having a biased frequency region projecting in dependency on the inserted electronic watermark data block by block and an electronic watermark data detection unit (50) for calculating a statistical similarity between the extracted data and the electronic watermark data stored in an electronic watermark data table (48). An electronic watermark data accumulator (51) accumulates the statistical similarity for a predetermined time interval to produce an accumulated addition result which is reset after the elapse of the predetermined time interval or when the accumulated addition result exceeds the a predetermined threshold value. A determining unit (52) determines that the electronic watermark data is detected when the accumulated addition result exceeds the predetermined threshold value.
Abstract:
A method for detecting an embedded code which is embedded in a predetermined content and concatenates a plurality of component codes, comprising the steps of:
dividing the embedded code into the plurality of component codes; decoding each of the component codes divided, thereby to obtain a plurality of residues pairs each comprising two residues, taking a plurality of integers which are predetermined and are relatively prime to each other, as moduli, the plurality of integers being inputted from a modulus storage section which stores k' different relatively prime numbers p i (i=1,2,...,k'), and calculating a user identification number of a colluder who made a collusion attack on the content, from the plurality of residue pairs, wherein the plurality of component codes are component codes that have a possibility to have a method of decoding at least one of the residues with respect to the user identification number of the colluder.
Abstract:
An image forming apparatus having a hardware resource used in image forming processing and an application executing the image forming processing, and performing authentication relating to the execution of the image forming processing is disclosed. The image forming apparatus includes a character string display part and a type character string display part. The character string display part displays a character string that does not include the type of the image forming processing, and prompts the authentication. The type character string display part displays the type of the image forming processing.
Abstract:
Techniques for secure distribution of digital representations that combine encryption and watermarking. When a user at a client desires to download a digital representation, the user makes a request to a server for the digital representation, which encrypts the digital representation using a first key and downloads the encrypted digital representation to the user. Before the user performs any operation on the decrypted digital representation, a secret fingerprint watermark identifying the user is added to the digital representation. The fingerprint watermark is added either at the server or at the client and a copy of the fingerprinted digital representation is kept at the server. If the user makes an impermissible use of the digital representation, the secret fingerprint watermark can be used to identify the user. The request made by the user indicates the type of use that the user whished to make of the digital representation. If the use involves storage of the digital representation at the client, the server provides a second key that the client employs to encrypt the digital representation. If the user has permission to do so, the user may modify the digital representation and return the modified digital representation to the server for further distribution. In this case, the second key is used to encrypt the digital representation when it is sent to the server. The second key also serves as the user identification in the fingerprint watermark. If the user loses the second key, it can be recovered from the copy of the fingerprinted digital representation kept at the server. The first and second keys and any decrypted copy of the digital representation are kept in secure storage in the client.
Abstract:
A method of embedding information in digital content representing media streams. The method includes selecting a set of locations within that digital content representing the media stream to embed information (601), selecting a set of possible alteration to make at those locations (602), and making a subset of the possible alterations. The set of locations and possible alteration is herein sometimes called a “watermark”. The subset of actual alterations that are made is herein sometimes called a “fingerprint”. The method determines a set of locations at which there are alternative versions of digital content (603) representing the same media stream.
Abstract:
This invention relates to a method and an arrangement for embedding auxiliary data in an information signal. Only a part of a noise signal representing the auxiliary data is embedded but the complete noise signal may be detecting. This allows for a greater payload of the embedded signal. The invention also relates to a corresponding method and arrangement for detecting auxiliary data in an information signal.
Abstract:
Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital blocks and a subset of the identified amplitudes is selected for each of the digital blocks using a primary mask from a key. Message information is selected from a message using a transformation table generated with a convolution mask. The chosen message information is encoded into each of the transformed digital blocks by altering the selected amplitudes based on the selected message information.