Abstract:
PROBLEM TO BE SOLVED: To maintain the perceivability as to a watermarked data set I made by embedding a watermark in a source data set I, and also to allow an authenticator to precisely authenticate the contents of I while keeping it secret to him. SOLUTION: Bits constituting the watermark data set I are divided into the least significant bit and other superordinate bits. The superordinate bits I t are extracted from I. I s =f 2 (I t ) as an encrypted version or a hash version of It is generated. Watermark I 1 =V(I s ) is calculated. The watermark data set I is obtained by inserting I 1 into the least significant bit of I. The authenticator receives I s and I 1 from an authentication requester, and calculates I 1 '=V(I s ), and compares I 1 ' with I 1 . COPYRIGHT: (C)2004,JPO
Abstract translation:要解决的问题:为了保持对通过在源数据集I中嵌入水印而做出的水印数据集的可感知性,并且还允许认证者精确地认证I的内容,同时保持对其的秘密 。 解决方案:构成水印数据集I的位被分成最低有效位和其他上位。 上级位I t SB>作为加密的数据从I I / SB> = f 2(SBB)中提取 版本或哈希版本的生成。 计算水印I 1 SB> = V(I s SB>)。 水印数据集I通过将I 1 SB>插入到I的最低有效位中来获得。认证器从一个I / S> S SB>和I 1 SB> 认证请求者,并且计算I 1 SB>'= V(I s SB>),并将I 1 SB>与I 1 SB >。 版权所有(C)2004,JPO
Abstract:
A method and system for generating halftone tables, using a spot function, subdivides the pixels within the halftone cell of a halftone matrix into a plurality of sub-pixels, determines the value of the spot function corresponding to the position of each of the sub-pixels within the halftone matrix, repeats the subdividing and determining for all of the sub-pixels in the halftone matrix, ranks the values for the entire halftone matrix, normalizes the ranked values, generates a cumulative histogram based upon the normalized values, and stores the cumulative histogram as a halftone table.
Abstract:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.
Abstract:
PROBLEM TO BE SOLVED: To provide technique to realize digital half tone which controls a spot function in order to cope with gear noise, printer stress and general printing quality. SOLUTION: A method for forming spots to be used for realizing half tone includes a step for defining a spot function combining two functions which are selected in order to provide a prescribed spot form to be used in a half tone cell, and a step for scaling the spot function by using a scaling function which changes in accordance with values of a first spot function ordinate and a second spot function ordinate. By using asymmetrical modulation of the spot function, contact of adjacent spots is controlled, and a form of the spot accompanied by a gray region is changed.
Abstract:
PROBLEM TO BE SOLVED: To fulfill a requirement according to an intended use and to obtain as inconspicuous, safe and quick water-marking as possible by converting a water-marked edition by using an identified privacy encoding method and extracting a water-mark from the privacy coded water-marked edition of a source data set. SOLUTION: Privacy control 202 is added to source data 201. Thus, authentication can be attained, and simultaneously the privacy of the content of a data set can be protected. Then, water-marking algorithm is applied (203). Thus, privacy reinforced water-marked data 204 can be obtained. The water-mark is present in an image so that only the least significant bit of the image can be affected, and the maximum picture quality protection can be attained. An authenticated result 212 can be obtained from the privacy reinforced water- marked data 204.
Abstract:
A watermarking scheme which allows the watermarked image to be authenticated by an authentication agent without revealing the human-readable content of the image. There is disclosed an approach which combines privacy control with watermarking and authentication mechanisms. The watermark can be made to be imperceptible to humans. Public key cryptography allows the authentication agent to authenticate without being able to watermark an image.
Abstract:
A watermarking method for an image wherein a number N is embedded into an image as a invisible or visible robust watermark. The number N is generated from the essential components of the image such that the number N will be the same when generated from analysis of the image after processing (such as compression or printing) or noise introduces minor discrepancies or modifications which do not effect the images authenticity. The number N can be generated by performing a principal component analysis on a sample set of images with minor discrepancies or by using Wold's decomposition. Alternatively the image can be divided into n x n blocks and then transform coefficients are generated for each block, these are then quantized, the result is encrypted using a private key and this is then hashed using an algorithm to generate the number N. The authenticity of an image can be verified by generating the number N again when verifying and then comparing this to the number N embedded in the image, if the two do not match then it is considered that the image has been altered deliberately.
Abstract:
A communication link is provided between a certified document owner and a remote printing station. The printing station is provided with a leaf of special paper and determines whether the leaf is legitimate by comparing a representative number and its encrypted version (encrypted using a first key) at locations on the leaf Extra hidden data may also be provided on the leaf for checking its authenticity. The printing station transmits the representative number and its encrypted version to the certified document owner who can also perform the authenticity check. The certified document owner appends a document with the representative number, computes a digitally signed version of the appended document (using a second key) and transmits the document and the signed version to the printing station for printing. As such, further unauthorised prints of this document as well as copies of this document can be recognized as non-authentic. The printer used does not need to be specialised with security controls.
Abstract:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.
Abstract:
Techniques for generating dither masks are provided. A dither mask is generated by selecting a sequence of at least three original patterns comprising pixels of at least one of a first color and a second color. At least two patterns are interpolated to generate interpolated patterns in the sequence between the at least three original patterns. If a pattern having at least one specified characteristic exists in the sequence, the steps of interpolating between at least two patterns, and determining if a pattern having at least one specified characteristic exists in the sequence, are repeated. The interpolation is between at least one pattern from each side of the pattern having at least one specified characteristic in the sequence.