Patent classifications
H04N1/32149
Embedded variable line patterns for images
In some implementations, a system is capable of generating identifications that include distinctive line patterns corresponding to different portions of secure customer information. Data indicating an input image, and a dithering matrix representing a two-dimensional array of pixel values is obtained. Pixel values of pixels included in the input image are transformed using the dithering matrix. For each pixel within the input image, the transformation includes identifying a particular pixel value within the dithering matrix that represents a particular pixel within the input image, and adjusting an intensity value of the particular pixel based on attributes of the dithering matrix. A transformed image is generated based on the transformation and then provided for output.
Detecting conflicts between multiple different encoded signals within imagery
Various image processing arrangements are detailed for detecting mis-marking of product packaging artwork with two conflicting steganographically-encoded product identifiers. Some embodiments concern detection in a pre-press or test-print quality assurance stage. Others concern detection post-press. All help serve to assure accurate product identification by point of sale scanners. A great number of other features and arrangements are also detailed.
Tracking image senders on client devices
Methods and systems for tracking image senders using client devices are described herein. A computing system may receive an image containing a first watermark vector corresponding to a user account of an image sender. The computing system may convert the image to a frequency domain image that contains the first watermark vector. From the frequency domain image, the computing system may identify the first watermark vector. The computing system may compare the first watermark vector to each of a plurality of stored watermark vectors, each corresponding to a known user account, to determine a probability of a match. The computing system may determine the user account of the sender of the image by determining which of the plurality of stored watermark vectors has a highest probability of a match, and may send, to a workplace administrator platform, an indication of the user account.
SYSTEMS AND METHODS FOR PROVIDING WATERMARKED CONTENT
A content processing system obtains an identification associated with a device configured to receive content, generates a digital watermark reflecting the receiving device's identification, provides watermarked content by including the digital watermark in the content, and transmits the watermarked content from an edge computing device to the receiving device for the playback. The digital watermark is not visually observable during playback of the watermarked content, and it enables tracking of transmission of the watermarked content.
Digital faxing through existing fax servers
Traditional fax servers may be improved to interoperate with secure fax servers, enabling high-resolution, color fax receipt by the traditional fax server in addition to traditional low-resolution, black-and-white fax receipt. A process for authenticating and registering allows the traditional fax server to receive digital faxes sent through the secure fax server. Further, an automated registration process allows sending to any existing fax number through the secure fax server. If no verified destination is known, a traditional fax is sent. If that reaches a interoperable traditional fax server, the number may be verified, digital fax retrieved, and all future faxes to that number through the secure fax server delivered as high-resolution color digital faxes. This enables seamless fax quality upgrades within existing fax servers.
Segmentation hiding layer for vector pattern correlation marks
A printable electronic document is received into a computerized device. The printable document contains original markings that can be printed on print media to produce a printed document. However, before printing, a computerized device adds first hidden markings to the printable electronic document. Such first hidden markings have a first vector graphic size. Further, the computerized device removes a pattern from the first hidden markings in the printable electronic document and adds (only to the removed pattern in the printable electronic document) second hidden markings that have the same vector graphic size as, but are out of phase with, the first hidden markings. Also, the computerized device adds geometrically shaped distraction markings to the printable electronic document. The geometrically shaped distraction markings have a second vector graphic size that is much larger than the first vector graphic size of the first and second hidden markings.
Systems, processes, and computer program products for detecting and verifying invisible information in documents
Embodiments identify documents with invisible or hidden information such as tracking codes and extract the tracking codes, which may be leveraged for different applications. Aspects may protect an individual's right to privacy by extracting invisible codes from a document. Other aspects preserve the authenticity of documents by converting the information of an extracted tracking code into other metadata which may accompany the document and copies of the document. In an embodiment, a blockchain ledger may be used to verify the authenticity of a document using information from the original tracking code.
AN INDICATION FOR HARQ-ACK FEEDBACK
Apparatuses, methods, and systems are disclosed for transmitting and/or receiving an indication of feedback. One apparatus (200) includes a transmitter (210) that transmits (702) feedback information. The feedback information corresponds to first data. The apparatus (200) includes a receiver (212) that receives (704) a signal indicating whether the feedback information is received and receives (706) second data. The apparatus (200) includes a processor (202) that determines (708), based on the feedback information and the signal, whether the second data is a complete retransmission of the first data or a partial retransmission of the first data.
Detection of steganography on the perimeter
A method to detect a plurality of steganography based information embedded in a multimedia file associated with an online computer environment is provided. The method may include detecting the multimedia file entering or exiting an online environment associated with a network or an organization. The method may also include comparing a stored hashed version of the detected multimedia file to the detected version of the multimedia file. The method may also include comparing a stored perceptual hashed version of the detected multimedia file to the detected version of the multimedia file based on the detected multimedia file not matching the stored hashed version of the detected multimedia file. The method may further include assigning a flag attribute to the detected multimedia file based on the detected multimedia file matching the stored perceptual hashed version of the detected multimedia file.
IMAGE PROCESSING APPARATUS, AND METHOD FOR CONTROLLING IMAGE PROCESSING APPARATUS
A controller of an image processing apparatus performs one or both of an enlargement process and a conversion process when a coded image in which information is coded is included in the image data. The enlargement process is a process of pasting an enlarged coded image instead of the coded image on the image data. The conversion process is a process of pasting decoded information instead of the coded image.