G06T1/0042

METHOD AND DEVICE FOR SECURING AN OBJECT AND METHOD FOR AUTHENTICATING AN OBJECT
20240129131 · 2024-04-18 ·

The method (100) for securing an object comprises: a step of encoding a first message (301) in a two-dimensional barcode (303), the first message comprising at least a header identifying a certification resource and a signature produced by means of this resource; a step of generating a fragile anti-copy mark (304) encoding a second message (302) representative of the signature produced, the second message comprising redundancies; and a step of marking the object with the first 2D barcode and the fragile anti-copy mark.

DOCUMENT AUTHENTICITY DETECTION IN A COMMUNICATION NETWORK

System, apparatus, device, method and/or computer program product are disclosed for detecting the authenticity of an image file transferred from a device to a server based on an image authenticity detection configuration determined by a server application. A device application is operated by a device, and a server application is operated by a server. The device application sends, to the server application, user data, device data, or environment data. The server application determines an image authenticity detection configuration to indicate one or more parameters to be used by the device to generate a first image file, and authorized changes to be made to the first image file to generate a second image file. The device application sends the second image file to the server application. The server application detects whether the received second image file contains changes matching authorized changes indicated by the image authenticity detection configuration.

Anonymous image/video digital signature insertion and authentication
10439821 · 2019-10-08 · ·

Embodiments herein relate to an electronic device that includes a camera sensor to capture a digital image that includes a plurality of pixels. The electronic device may further include a digital signature calculation engine coupled with the camera sensor, the digital signature calculation engine to generate, based on a private key that is shared between a plurality of image/video acquisition modules and a pixel of the plurality of pixels, a digital signature. The electronic device may further include digital signature insertion logic coupled with the digital signature calculation engine, the digital signature insertion logic to insert an indication of the digital signature into the digital image. Other embodiments may be described and/or claimed.

NEURAL NETWORK BASED INSERTION OF WATERMARK INTO IMAGES AND TAMPERING DETECTION THEREOF

Systems and methods for insertion of a watermark into images and tampering detection of the watermarked images by a Convolutional Neural Network (CNN) technique. The traditional systems and methods provide for detecting the tampering of the watermarked images by simply identifying a presence of an inserted watermark into an image but none them provide for inserting a random sequence into input image(s) and then detect the tampering by classifying the input image(s) by a neural network. Embodiments of the present disclosure provide for insertion of the watermark into the input image(s) and tampering detection of the watermarked images by training a Convolutional Neural Network (CNN) 201 to classify the images as tampered or non-tampered, extracting random noise, obtaining non-classified watermarked images from the random noise, and obtaining, from the non-classified watermarked images, classified watermarked images and detecting an absence or a presence of the tampering based upon the classified watermarked images.

MULTIPLE SOURCE WATERMARKING FOR SURVEILLANCE
20190244321 · 2019-08-08 ·

A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.

DIGITAL WATERMARK EMBEDDING METHOD AND EXTRACTION METHOD, DIGITAL WATERMARK EMBEDDING APPARATUS AND EXTRACTION APPARATUS, AND DIGITAL WATERMARK SYSTEM

This application relates to the field of digital watermark technologies and discloses a digital watermark embedding method and extraction method, a digital watermark embedding apparatus and extraction apparatus, and a digital watermark system. The method includes obtaining a digital watermark of a composite file, splitting the digital watermark into N sub-watermarks according to a carrier quantity N of the composite file, each sub-watermark being corresponding to partial content of the digital watermark, embedding an i.sup.th sub-watermark in an i.sup.th carrier of the composite file, to obtain an i.sup.th target carrier, and integrating N target carriers into a target file. This application resolves a problem in the related technology that a digital watermark technology cannot ensure integrity of an order file, and protects carriers of a composite file, thereby ensuring security and integrity of the composite file.

Multiple source watermarking for surveillance

A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.

Correlation mark destroyed on copy
12015753 · 2024-06-18 · ·

A security apparatus and a method for rendering a security mark can involve creating a security mark that includes a correlation mark having a correlation effect and comprising black pixels and white pixels, and subjecting the security mark to a filter that can removes at least some of the black pixels or the white pixels so that the correlation effect no longer functions and the security mark is not visible when rendered on a recording medium.

Robust selective image, video, and audio content authentication

A method for processing a digital content includes acquiring content data using a sensor. Compressed reference data is generated from the acquired content data. A hash of the compressed reference data is generated using a hashing function. The generated hash is signed using an encryption function. The acquired content data is transmitted along with the compressed reference data and the signed hash.

MULTIPLE SOURCE WATERMARKING FOR SURVEILLANCE
20190130518 · 2019-05-02 ·

A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.