Patent classifications
G06T2201/0062
Embedding 3D information in documents
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for obtaining information to be embedded within an identification document. Modifying the information to add depth when viewed through a three-dimensional (3D) viewing device, thereby yielding modified information. Embedding the modified information in a target image to yield a modified target image such that the modified information is not viewable to a naked eye and the modified information is visible with added depth when viewed through a 3D viewing device. Disposing the modified target image on an identification document to yield embedded 3D information. An identification document includes the target image and 3D information embedded within the target image. The 3D information embedded within the target image is not visible to a naked eye, but is visible with added depth when viewed through a 3D viewing device.
Method and apparatus of DRM systems for protecting enterprise confidentiality
One aspect of the present invention discloses a client device for content security. The device includes: an application execution unit configured to control content in response to a content control command requested in a user level; a DRM agent configured to communicate with a DRM server and the application execution unit in the user level, to detect the content control command, to receive an encryption/decryption key and security policy for content from the DRM server, to provide the received encryption/decryption key and security policy to a client kernel module, and to transmit an encryption/decryption request; and the client kernel module configured to receive the encryption/decryption key and the security policy, to store the encryption/decryption key and security policy in a secure box of a kernel level, and to perform encryption or decryption on the content based on the encryption/decryption key and security policy in response to the encryption/decryption request.
WATERMARKS FOR TEXT DOCUMENTS
According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to extract text from a document. The processor may retrieve images associated with characters in the extracted text and generate a stitched image using the retrieved images. The processor may watermark the stitched image and replace the characters in the document with the images associated with the characters from the watermarked and stitched image.
GENERATING SIGNAL BEARING ART USING STIPPLE, VORONOI AND DELAUNAY METHODS AND READING SAME
Optical code signal components are generated and then transformed into signal bearing art that conveys machine readable data. The components of an optical code are optimized to achieve improved signal robustness, reliability, capacity and/or visual quality. An optimization program can determine spatial density, dot distance, dot size and signal component priority to optimize robustness. An optical code generator transforms tiles of an optical code or image embedded with the optical code into signal-bearing art using stipple, Voronoi, Delaunay or other graphic drawing methods so as to retain prioritized components of the optical code. The optical code is merged into a host image, such as imagery, text and graphics of a package or label, or it may be printed by itself, e.g., on an otherwise blank label or carton. A great number of other features and arrangements are also detailed.
METHOD AND APPARATUS FOR GENERATNG A COVER IMAGE FOR STEGANOGRAPHY
A method and an apparatus for generating cover images for steganography are provided. The steganographic framework is designed based on an image generation system. The apparatus may encode a message to obtain a binary sequence. The apparatus may obtain a plurality of binary segments of a particular length based on the binary sequence. For each binary segment of the plurality of binary segments, the apparatus may select an image of a semantic content (e.g., a numeral digit) from a dictionary of images of random semantic contents (e.g., random numeral digits) based on the binary segment. The apparatus may combine the selected images to form at least a portion of a cover image denoting a combination of the semantic contents of the selected images (e.g., a plurality of numeral digits).
Anti-leak digital document marking system and method using distributed ledger
The system is disclosed for visual marking sensitive documents for leak prevention. Each time an action is taken with regard to a document (e.g., creation, viewing, downloading), that action is added to a distributed ledger, essentially creating a unique hash for a new instance of the document. This new hash is visually embedded in the document as a code comprising a plurality of differently shaded pixels, wherein some of the pixels directly encode information regarding the document (e.g., an account that generated the new instance of the document, a date, a time, a unique ID for the document, etc.) and some of the pixels do not encode information. The code is capable of being scanned either digitally or physically on a printed version of the document, such that the immediate source of the document, corresponding to who leaked the document, is able to be discerned.
Identification document with dynamic window
An identification document including a multilayer laminate having a core layer defining an opening therethrough, and a dynamic window in the opening. The dynamic window includes an optically variable coating on at least a front or a back of the dynamic window. The optically variable coating appears transparent when viewed from the front of the identification document in light transmitted through the dynamic window from the back of the identification document toward the front of the identification document, and appears nontransparent when viewed from the front of the identification document in light reflected from the front of the identification document. Fabricating an identification document with a dynamic window includes forming an opening in a core layer, positioning a dynamic window in the opening, and plate laminating the core layer and the dynamic window between at least one outer layer on each side of the core layer.
DIGITAL WATERMARK EMBEDDING METHOD AND EXTRACTION METHOD, DIGITAL WATERMARK EMBEDDING APPARATUS AND EXTRACTION APPARATUS, AND DIGITAL WATERMARK SYSTEM
This application relates to the field of digital watermark technologies and discloses a digital watermark embedding method and extraction method, a digital watermark embedding apparatus and extraction apparatus, and a digital watermark system. The method includes obtaining a digital watermark of a composite file, splitting the digital watermark into N sub-watermarks according to a carrier quantity N of the composite file, each sub-watermark being corresponding to partial content of the digital watermark, embedding an i.sup.th sub-watermark in an i.sup.th carrier of the composite file, to obtain an i.sup.th target carrier, and integrating N target carriers into a target file. This application resolves a problem in the related technology that a digital watermark technology cannot ensure integrity of an order file, and protects carriers of a composite file, thereby ensuring security and integrity of the composite file.
AUTOMATICALLY ATTACHING OPTICAL CHARACTER RECOGNITION DATA TO IMAGES
Techniques for automatically attaching optical character recognition data to images are provided. The techniques include receiving an image file containing an image and performing optical character recognition on the image to generate text output. The techniques then continue by identifying a particular text item from within the generated text output and determining that the particular text item is a value for particular corresponding key. Then metadata that indicates that the particular text item is a value for the particular key is stored in the image file.
Watermarking method for high-definition map based on invisible characters
A watermarking method for a high-definition map based on invisible characters includes: firstly, establishing mapping relations between invisible characters and bit characters, a space character, and decimal digits; and combining watermark characters with corresponding positions thereof, adding Hamming code into a watermark character sequence, and converting the watermark character sequence into invisible characters to construct a composite watermark character sequence. Before watermark detection, a sequence of elements in map data is scrambled according to logistic chaotic mapping, and then the composite watermark character sequence is embedded according to the scrambled sequence. During watermark detection, the data are preprocessed, a sequence during watermark embedding is obtained, and then watermark information is extracted, errors are corrected, and an error correcting code is removed after correction to obtain final watermark information. According to the watermarking method, watermark embedding and watermark detection can be realized not changing data availability and high-accuracy characteristic.