Abstract:
PROBLEM TO BE SOLVED: To maintain the perceivability as to a watermarked data set I made by embedding a watermark in a source data set I, and also to allow an authenticator to precisely authenticate the contents of I while keeping it secret to him. SOLUTION: Bits constituting the watermark data set I are divided into the least significant bit and other superordinate bits. The superordinate bits I t are extracted from I. I s =f 2 (I t ) as an encrypted version or a hash version of It is generated. Watermark I 1 =V(I s ) is calculated. The watermark data set I is obtained by inserting I 1 into the least significant bit of I. The authenticator receives I s and I 1 from an authentication requester, and calculates I 1 '=V(I s ), and compares I 1 ' with I 1 . COPYRIGHT: (C)2004,JPO
Abstract translation:要解决的问题:为了保持对通过在源数据集I中嵌入水印而做出的水印数据集的可感知性,并且还允许认证者精确地认证I的内容,同时保持对其的秘密 。 解决方案:构成水印数据集I的位被分成最低有效位和其他上位。 上级位I t SB>作为加密的数据从I I / SB> = f 2(SBB)中提取 版本或哈希版本的生成。 计算水印I 1 SB> = V(I s SB>)。 水印数据集I通过将I 1 SB>插入到I的最低有效位中来获得。认证器从一个I / S> S SB>和I 1 SB> 认证请求者,并且计算I 1 SB>'= V(I s SB>),并将I 1 SB>与I 1 SB >。 版权所有(C)2004,JPO
Abstract:
PROBLEM TO BE SOLVED: To prevent illegal resale by forming at least one of coat and code on an item and determining whether the item has been resold from an authorized merchant to an unauthorized merchant by checking the coat or code. SOLUTION: This identifier is extremely difficult if not impossible to remove. The identifier has its allocation and encoded code known only to a manufacturer. When the manufacturer suspects that parallel commercial transaction is occurring, he easily identifies an unauthorized reseller and can take appropriate countermeasures to prevent unauthorized activity. The system 50 includes a processor 51, a special coat/ruled code to be attached onto an item of interest and a detector 53 for determining information contents of the special coat/ scribing code. Although the detector 53 is shown separately from the processor 51, the detector can incorporate the processor therein.
Abstract:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.
Abstract:
PROBLEM TO BE SOLVED: To provide a safe data transmitting means from an unsafe place. SOLUTION: The access code of a client is managed in a database by a service facility. When the client tries to access the service facility, first of all, a random character sequence is generated and dispatched to the client. When the client is coupled with the random character sequence, the client performs a response by means of offset to become the access code of that client. The client transmits this code to the service facility and access to the account of the client is permitted.
Abstract:
PROBLEM TO BE SOLVED: To fulfill a requirement according to an intended use and to obtain as inconspicuous, safe and quick water-marking as possible by converting a water-marked edition by using an identified privacy encoding method and extracting a water-mark from the privacy coded water-marked edition of a source data set. SOLUTION: Privacy control 202 is added to source data 201. Thus, authentication can be attained, and simultaneously the privacy of the content of a data set can be protected. Then, water-marking algorithm is applied (203). Thus, privacy reinforced water-marked data 204 can be obtained. The water-mark is present in an image so that only the least significant bit of the image can be affected, and the maximum picture quality protection can be attained. An authenticated result 212 can be obtained from the privacy reinforced water- marked data 204.
Abstract:
An apparatus, business method and program product for selectively providing access to a service facility such as a financial institution or bank. Client access codes (passwords, PINs) are maintained by the service facility in a database. When a client seeks access to the service facility, e.g., access to the client's account, a random sequence of character is generated and passed to the client. The client responds with an offset that when combined with the random character sequence is the client's access code. The client sends the code to the service facility and is granted access to the client's account. Optionally, the service facility may specify an intended relationship between the offset and the random character sequence, e.g., the offset is added/subtracted from the random character sequence. For additional security, dummy characters may be embedded in the random character sequence.
Abstract:
A watermarking scheme which allows the watermarked image to be authenticated by an authentication agent without revealing the human-readable content of the image. There is disclosed an approach which combines privacy control with watermarking and authentication mechanisms. The watermark can be made to be imperceptible to humans. Public key cryptography allows the authentication agent to authenticate without being able to watermark an image.
Abstract:
The device has a database of client access codes, a device that generates a random sequence of characters on request after access by a client, an arrangement for communicating the sequence to the client, an arrangement for receiving an additional item from the client and an arrangement for combining the additional item with the sequence; a correct additional item combines with the sequence to provide the access code to the requesting client. Independent claims are also included for the following: a business method for providing selective access to a service provision device, a computer program product and a computer readable program code for providing selective access to a service provision device.
Abstract:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.
Abstract:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.