Abstract:
A method for creating a differential gloss image includes providing first and second anisotropic halftone structures. The first and second anisotropic structures have different orientations. One of the first and second anisotropic structures is applied to image data in a first region of an image to be halftoned. The other of the first and second anisotropic structures may be applied to image data in a second region of an image to be halftoned. A mixture of the first and second anisotropic structures is applied to image data in a third region of the image to be halftoned, whereby when printed, the three regions each have a gloss characteristic which differs from that of the other two regions.
Abstract:
According to aspects of the embodiments, there is provided methods of decomposing and modifying a bitmap image before it is rendered by an output device. Segments of a print image are determined by an aptly programmed processor. In a bitmap driver process, dimensions and location of an area on each print image is processed so as to form objects that can be deleted, modified, or replaced. The process allows for the addition of objects such as tracking or security and the processing of objects to interpret the data found, remove it, and possibly replace it with data based on what was read. These modified objects are embedded in the output bitmap image without increasing its size by reusing dimensions and location of selected areas of the print image.
Abstract:
The image forming apparatus includes: a random number information generation part that generates random number information; a first encryption part that encrypts the random number information generated by the random number information generation part with using a first encryption key; a second encryption key generation part that newly generates a second encryption key from the random number information generated by the random number information generation part; a second encryption part that encrypts specific information for identifying the apparatus with using the second encryption key generated by the second encryption key generation part; a code data creation part that creates code data based on encrypted random number information encrypted by the first encryption part and encrypted specific information encrypted by the second encryption part; and an image forming part that forms a code image based on the code data created by the code data creation part on a recording medium.
Abstract:
The present disclosure includes methods and apparatus for analyzing audio and video. One claim recites: a method including at a network access point, and using a programmed electronic processor, analyzing data representing audio or video to extract identifying information therefrom, the analyzing operates on data representing audible portions of the audio or operates on data representing picture elements of the video; using the identifying information, determining whether to allow the audio or video to be communicated through the network access point; and providing details associated with said act of determining. Of course, other combinations are provided and claimed as well.
Abstract:
The disclosure concerns content identification, such as extracting identifying information from content itself. One combination described in the disclosure is a method including: extracting first identifying information from data representing audio elements of an audio signal, the act of extracting first identifying information from data representing audio elements of the audio signal utilizes a programmed electronic processor; extracting second identifying information from data representing picture elements of a video signal that is associated with the audio signal, the act of extracting second identifying information from data representing picture elements of the video signal utilizes a programmed electronic processor; and utilizing the first identifying information or the second identifying information in a synchronization process, the synchronization process controls content synchronization during rendering of the audio signal or the video signal. Of course, other combinations are provided as well.
Abstract:
According to an embodiment, an image forming apparatus includes a user information acquiring unit, a scanner, a display, a processing unit, and a printer. The user information acquiring unit acquires user information. The scanner scans a document image added with a tracking ID. The display displays a list of selectable destinations according to the tracking ID extracted from the image scanned by the scanner and the user information acquired by the user information acquiring unit. The processing unit acquires the tracking ID added to a print for destinations selected out of the list of the destinations displayed on the display and acquires print data obtained by combining the acquired tracking ID and the document image scanned by the scanner. The printer prints the print data acquired by the processing unit on a recording medium.
Abstract:
A print image generating program is capable of printing information that discourages fraudulent distribution of printed documents, irrespective of the type of printer. A print image generating apparatus has an application, a printer driver, a print management unit, and a virtual driver, and is designed to add tracking information that discourages distribution of printed documents when print data is printed. The print management unit monitors print requests from the application. When detecting a print request which was output from the application to the printer driver, the print management unit acquires and interrupts the print request destined for the printer driver. When the virtual driver receives a command from the print management unit, it acquires print data and tracking information, and generates tracking print image data by adding the tracking information to the print data, and gives the generated data to the printer driver.
Abstract:
An apparatus for reducing a first document image and a second document image in a size and producing output images on a single sheet, the apparatus including: a creating unit configured to create a code containing information with a higher security level selected from first information contained in a code of the first document image and second information contained in a code of the second document image; and a unit configured to add the code created by the creating unit to the output image.
Abstract:
Media content (e.g., audio or visual) can be steganographically encoded for a variety of purposes. One such purpose relates to tracing rendered media content back to a particular time and place. For example, one claim recites a method including: receiving data representing media content, the media content is to be rendered to an audience assembled at a location; and then encoding tracing information in the data utilizing at least a programmed electronic processor, said encoding alters at least some portions of the data to hide the tracing information in the data, the tracing information is associated with a time and location of rendering the media content to the audience assembled at the location, the tracing information will permit an illicitly captured version of the rendered media content to be traced back to the time and location of the rendering. Of course, other combinations and claims are presented as well.
Abstract:
The present invention relates generally to controlling use of audio or image content (e.g., which may comprise video). In one claim, a method is provided including: receiving information, the information having been obtained from analyzing data representing audio elements or image picture elements to derive the information there from, accessing a database with the information to obtain permitted usage rights for audio or image content associated with the data; and providing the information to a remote device to allow control of the audio or image content in accordance with the permitted usage rights. Of course, other combinations are provided and claimed as well.