Abstract:
PROBLEM TO BE SOLVED: To improve security and to prevent copying by applying digital watermarking to banknotes and other security documents. SOLUTION: Machine-readable data are digital watermarked into banknotes 16. Such watermarking is optically sensed using an optically scanner 13 and is detected by various devices 11. In response, such various devices 11 intervene to prevent banknotes from being copied. This arrangement addresses various problems, e.g., the use of digital image editing tools to circumvent other banknote anti-copy systems. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method which can identify a verification signal later, and identify a carrier by this. SOLUTION: A device has a processor which embeds the verification signal in a carrier signal on real time. The method includes a step of receiving two or more bit input data; a step of forming image data corresponding to a physical object; and a step which processes the image data and encodes the image data at a steganography way according to two or more above-mentioned bit input data, The steganography coding changes a specific pixel of a picture according to two or more bits of two or more above-mentioned bit input data. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To integrate watermark encoders and decode function, to enable a watermark-enabled application or device to provide additional functionality and information available via the watermark. SOLUTION: Watermark encoders and decoders are integrated into operating systems, Internet browsers 300, media players, and other applications and devices. The watermark, for example, may link to metadata or actions related to a media object. To exploit this watermark enabled functionality, the integrated application uses a watermark decoder to access the related metadata and actions. The user interface of the integrated application is enhanced to present metadata and actions linked via the watermark. Similarly, watermark encoders may be integrated into applications to convert media objects into enhanced, watermarked objects. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To facilitate scale and rotation calibrations for steganographic decoding, improve techniques for decoding without access to unencoded originals, and also improve robustness of steganographic coding in motion pictures. SOLUTION: A system includes: a step of creating a set of standards by which URL addresses are steganographically embedded within images, video, audio, and other forms of data objects; and a step of designing web site development tools 1008 and web software such that they recognize the new type of data objects 1006 (the hot object). The tools are designed such that when the objects 1006 are presented to a user and that user points and clicks on the object 1006, a user's software 1010 reads or decodes the steganographic information and notifies the user to the decoded URL address. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method of embedding an authentication signal robust to errors and tampering. SOLUTION: A video processing method includes the steps of providing input video data representing video and comprising a plurality of samples each including a value; providing a plurality of symbol auxiliary data encoded into a steganographic form within the video data to generate encoded video data; receiving first data, in a part of the video data, regarding a capability of hiding excessive data; generating an intermediate data (signals) containing elements, as functions of the plurality of symbol auxiliary data and the first data, corresponding to each of the plurality of video data samples; and encoding the video data into a steganographic form by means of the auxiliary data by changing the value of a sample in a certain version of the input video data in accordance with a corresponding element of the intermediate data (signals), thereby generating encoded video data. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for embedding a strong authentication code which can be recognized even after a medium is distorted or altered. SOLUTION: An identification code signal is added on a carrier to be identified (such as an electronic data signal or a physical medium) in a manner that permits the identification signal to be discerned later and the carrier to be thereby identified. This method and apparatus are characterized in the degradation of the impregnability of the encoded carrier and by the holographic permeation of the identification signal throughout the carrier. In an exemplary embodiment, a processor that embeds the identification signal to a carrier signal in real time is provided. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To cost effectively monitor for unauthorized uses of material and perform "quick checks".SOLUTION: This method includes the steps of: providing input video data representing video and comprising a plurality of samples each including a value; providing a plurality of pieces of symbol auxiliary data encoded into a steganographic form within the video data to generate encoded video data; receiving first data, that is a part of the video data, regarding a capability of hiding excessive data; generating intermediate data (signals) containing elements, as functions of the plurality of pieces of symbol auxiliary data and the first data, corresponding to each of the plurality of video data samples; and encoding the video data into a steganographic form by means of the auxiliary data by changing the value of a sample in a certain version of the input video data in accordance with a corresponding element of the intermediate data (signals), thereby generating encoded video data.
Abstract:
PROBLEM TO BE SOLVED: To prevent banknotes and other securities from being copied. SOLUTION: Machine-readable data are digitally watermarked into banknotes (16). Such watermarking is optically sensed (13) and is detected by various devices (11). In response, such various devices (11) intervene to prevent banknote from being copied. This arrangement addresses various problems, e.g., the use of digital image editing tools to circumvent other banknote anti-copy systems. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To improve a steganographic system and applications therefor in an extended security financial commercial transaction, a forged prevention identification card, a fraud suppression system for a cellular telephone, a modem channel hiding in a video transmission, photocopy kiosk having an automatic copyright detection, and an image object subjected to hot-link mode (for example, with embedded URL) used in the Internet. SOLUTION: The present invention is disclosed to facilitate scale and rotation registration for steganographic decoding, to improve techniques for enhancement in decoding without accessing originals which are not coded and robustness of steganographic coding in motion pictures and/or in the presence of lossy compression/tensile, and to represent data with patterned bit cells for making energy in a spatial domain facilitate decoding registration. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To improve a steganographic system and applications therefor, more particularly to facilitate scale and rotation registration for steganographic decoding, to decode without accessing originals which are not coded, to increase robustness of steganographic coding and/or in the presence of lossy compression/decompression, and to make energy in a spatial domain facilitate decoding registration in motion pictures. SOLUTION: The steganographic system uses a pattern embedded steganographically in a rotary symmetry and a subliminal digital graticule, and represents data by patterned bit cell. Its use includes an extended security financial commercial transaction, a forged prevention identification card, a fraud suppression system for a cellular telephone, a modem channel hiding in a video transmission, a photocopy kiosk having an automatic copyright detection, and an image object, for example, the object subjected to hot-link mode with embedded URL (user requirement language) used in an internet. COPYRIGHT: (C)2005,JPO&NCIPI