H04N2201/3281

Method for producing security elements in an image which are not visible to the human eye and cannot be copied, and printed image

A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.

IMAGE PROCESSING DEVICE AND IMAGE PROCESSING METHOD
20220261488 · 2022-08-18 ·

According to one embodiment, an image processing device includes storage means, encryption means, and output means. The storage means stores an encryption key in correlation with a built-in application during installation of the built-in application. The encryption means encrypts a debug log relating to the built-in application with the encryption key in correlation with the corresponding built-in application. The output means outputs the debug log encrypted by the encryption means.

IMAGE FORMING APPARATUS HAVING PORT TO WHICH PORTABLE MEMORY IS ATTACHABLE
20220217246 · 2022-07-07 ·

An image forming apparatus includes a controller configured to, in response to a target portable memory being attached to a port, determine whether the target portable memory is set as a dedicated memory for a storage printing process, based on whether identification information is stored in the target portable memory, when determining that the target portable memory is set as the dedicated memory, cause a user interface to display a first screen configured to receive an instruction to specify a storage destination to store print data in the storage printing process, and when determining that the target portable memory is not set as the dedicated memory, cause the user interface to display a second screen differing depending on whether the port to which the target portable memory has been attached is set as a dedicated port for the storage printing process.

SYSTEM FOR EMBEDDING SEARCHABLE INFORMATION, ENCRYPTION, SIGNING OPERATION, TRANSMISSION, STORAGE AND RETRIEVAL
20220101475 · 2022-03-31 ·

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and time information in association with the captured information forms augmented captured information. The processor also places the augmented captured information in association with subscriber information in a transmission of the augmented captured information to a receiving facility requiring such subscriber information. A transmitter transmits the transmission including the augmented captured information and the subscriber information to the receiving facility. An encryptor encrypts the augmented captured information with a symmetrical encryption algorithm to provide encrypted augmented captured information in the transmission with the subscriber information.

Method for Producing Security Elements in an Image Which are not Visible to the Human Eye and Cannot be Copied, and Printed Image
20210245542 · 2021-08-12 ·

A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.

Method for Checking the Authenticity of Products and Printed Image
20210248369 · 2021-08-12 ·

A method for checking the authenticity of products, by checking an image (A) of a product. The proof of authenticity is not visible to the human eye and cannot be copied. This is characterized in that a code stored in a halftone image by manipulation of dots and/or a manipulated field bounded in the halftone image can be read by means of an optical device and compared with a retrievable value in at least one database. In at least one field (F1 to F5) a part of a serial number is determined which describes the structure of the serial number and a hash function used for transmitting the serial number to the database, and this is also characterized in that the serial number is subsequently assembled and encrypted with the corresponding hash function.

Method of combining image files and other files
10972746 · 2021-04-06 · ·

A method and system for combining, communicating, storing and/or separating image data and non-image data. The method involves a computer programmed to identify an end-of-file (EOF) marker of an image file, and being programmed to add the non-image data to the image file after the EOF marker.

Security documents with text security feature
11007805 · 2021-05-18 · ·

Printing, engraving, etching, or embossing techniques and security documents produced therefrom that can help inhibit or prevent tampering or forgery, particularly forgery or tampering of security document blanks or blank security documents. For example, for at least one character of a given alphabet used for the text in the security document, the character may include one or more slight variations or differences between instances of such character based on, for example, human selection, a predefined pattern, an automated selection algorithm or formula, or random or semi-random selection. In order to duplicate the security document blank, a forger would need to painstakingly review and copy each individual character including the slight variation or difference provided with that instance of the character.

Method and apparatus to generate encrypted codes associated with a document

A multi-function device (MFD) is disclosed. For example, the MFD includes a communication interface to establish a communication path with a remote server, a user interface to receive a request to create an electronic file based on a scan of a document, a processor, and a non-transitory computer-readable medium storing a plurality of instructions. The instructions when executed by the processor cause the processor to scan the document to create the electronic file of the document, generate an encryption code associated with the electronic file of the document that is scanned, and transmit the electronic file to the remote server.

Imaging method and device using biometric information for operator authentication

Essentially coincident with the capture of an image by the imaging device, biometric information indicating the identity of the operator of the device is obtained from at least one biometric sensor. The biometric information and captured image are then stored in a manner reliably associating each with the other. At a later time, biometric information is obtained from a supposed operator of the imaging device. By comparing this candidate biometric information with the stored biometric information, the supposed operator may be authenticated as the operator of the imaging device at the time of capture of the stored image.