摘要:
The application discloses identification and security documents and methods, apparatus and systems for authenticating such identification and security documents. Some such methods and apparatus involve steganography or data hiding.
摘要:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too.
摘要:
This disclosure describes a distributed reader architecture for a mobile computing device such as cellular telephone handset. This architecture includes a reader library that reads device capabilities and business model parameters in the device, and in response, for selects an appropriate configuration of reader modules for identifying a content item. The reader modules each perform a function used in identifying a content item. The modules are selected so that the resources available on the device and in remote devices are used optimally, depending on available computing resources on the device and network bandwidth. One example of a reader module is a fast watermark detection module that quickly detects the presence of a watermark, enabling resources to be focused on portions of content that are most likely going to lead to successful content identification. A watermark signal structure for fast watermark detection is comprised of a dense array of impulse functions in a form of a circle in a Fourier magnitude domain, and the impulse functions having pseudorandom phase. Alternative structures are possible.
摘要:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too.
摘要:
The present invention relates to toys and game applications that are enhanced with digital watermarks. In one embodiment, a character card includes a unique identifier in the form of a digital watermark. The identifier is used to link to a database record, which can be updated to reflect changes in game attributes. Some such game attributes include life, character type and name, health, strength, and power levels. The data record can be updated or modified to reflect changes in attributes due to activity or events during a computer software game. The database record can be used by the computer software game to alter or enhance the game. In another embodiment, a toy interacts with toy components or cards via digital watermarks. Digital watermarks enhance games, toys and books in still other embodiments.
摘要:
This patent document relates generally to steganography and digital watermarking. One claim recites, in a watermark detector, a method of decoding auxiliary information encoded encoding in an image or video. The method includes: receiving data representing the image or video, wherein the data comprises first data corresponding to a first color channel, second data corresponding to a second color channel and third data corresponding to a third color channel; weighting the first data, the second data and the third data according to at least the following two factors: i) a color direction biased toward an anticipated embedding direction; and ii) anticipated image or video distortion introduced to the first data, second data or third data through scanning or signal processing; and determining from weighted first data, weighted second data and weighted third data, changes in an image or video attribute, in which the auxiliary information is conveyed through the changes to sample values representing the image or video. Of course, other claims and combinations are provided too.
摘要:
This disclosure describes methods for using embedded auxiliary signals in documents for copy detection and other applications. In on application, the auxiliary signal is formed as an array of elements selected from a set of print structures with properties that change differently in response to copy operations. These changes in properties of the print structures that carry the embedded auxiliary signal are automatically detectable. For example, the changes make the embedded auxiliary signal more or less detectable. The extent to which the auxiliary data is detected forms a detection metric used in combination with one or more other metrics to differentiate copies from originals. Examples of sets of properties of the print structures that change differently in response to copy operations include sets of colors (including different types of inks), sets of screens or dot structures that have varying dot gain, sets of structures with different aliasing effects, etc. Robust and fragile watermarks are used in Image Replacement Documents for a variety of applications. Digital watermarks act as on-board mediators in authentication of a variety of printed documents. Finally, digital watermarks are used to help manage quality of the scanners used in imaging systems.
摘要:
The application discloses identification and security documents and methods and systems for authenticating such identification and security documents. In one implementation, a document includes a first surface; and a second surface. The first surface comprises a first set of print structures and a second set of print structures. The first set of print structures and the second set of print structures cooperate to obscure the location on the first surface of the second set of print structures. The second set of print structures is arranged on the first surface so as to provide a reflection pattern. In one example, the reflection pattern includes a diffraction grating. The second set of print structures is preferably provided on the first surface with metallic ink. Of course, other claims and combinations are provided too.
摘要:
This patent document relates generally to steganography and digital watermarking. One claim recites, in a watermark encoder, a method of encoding auxiliary information in an image or video comprising: using a programmed electronic processor, computing a change in an attribute of an image or video sample to encode auxiliary information in the image or video; and changing color values of the image or video sample to effect the change in the attribute, in which changes to color values are determined based at least in part on both: i) visibility of the changes, and ii) anticipated watermark detection. Of course, other claims are provided too.
摘要:
A variety of systems responsive to watermarked documents are detailed. In one, watermarking is employed to facilitate system access. In another, security is provided through analyzing digitally watermarked documents. In yet another, a digital watermark-based combination lock is adapted to analyze a sequence (and perhaps an orientation) of presented digitally watermarked cards.