H04N1/32331

Program verification and decision system

Embodiments herein describe a content distribution system that verifies a media presentation (or portions thereof) using a broadcast schedule. In one embodiment, the content verification system evaluates the media presentation to identify a unique identification data for the presentation such as a fingerprint or watermark. Using the broadcast schedule, the content verification system can identify what content the media presentation should (or is expected) to contain. The content verification system can retrieve a previously stored unique identifier from a database corresponding to the content identified using the broadcast schedule. If the stored unique identifier matches the unique identifier derived by the content verification system, the system verifies the content in the media presentation is correct. The verified media presentation can then be transmitted to a content distribution networke.g., a broadcast network or video-on-demand provider.

METHOD AND APPARATUS FOR WATERMARK EMBEDDING AND EXTRACTING
20200111190 · 2020-04-09 ·

Methods and apparatuses for watermark embedding and extracting are provided. A method for watermark embedding includes obtaining a carrier object and watermark information to be embedded in the carrier object; generating at least one encoding region including the watermark information according to the watermark information, the at least one encoding region including a plurality of template lattices; obtaining a watermark image according to the at least one encoding region; and embedding the watermark image in the carrier object.

Semi-transparent embedded watermarks

A watermark image may be generated that includes a first set of encoded pixels each of which is assigned a first transparency value and a second set of encoded pixels each of which is assigned a second transparency value, the second transparency level being different from the first transparency level. The encoded pixels may be distributed among a set of blank pixels such that each encoded pixel neighbors one or more blank pixels in the watermark image, and in particular at least two blank pixels in the watermark image. Herein, each blank pixel may be assigned the second transparency value. The watermark image may be overlaid and blended over a background source image to create an encoded source image. A decoder system may recover encoded information from the encoded source image.

IMAGE CODING DEVICE, IMAGE CODING METHOD, AND IMAGE FALSIFICATION IDENTIFICATION PROGRAM
20190379899 · 2019-12-12 ·

An image coding device adapted to code time-continuous pictures is provided. An embedding position information conversion unit acquires embedding position information indicating a position in a picture, by using a one-way function based on time-continuous information. An image coding unit selects a coding block in the picture based on the embedding position information, embeds electronic watermark information in a coding parameter used to code the coding block, and codes the coding block by using the coding parameter in which the electronic watermark information is embedded.

Semi-transparent embedded watermarks

A watermark image may be generated that includes a first set of encoded pixels each of which is assigned a first transparency value and a second set of encoded pixels each of which is assigned a second transparency value, the second transparency level being different from the first transparency level. The encoded pixels may be distributed among a set of blank pixels such that each encoded pixel neighbors one or more blank pixels in the watermark image, and in particular at least two blank pixels in the watermark image. Herein, each blank pixel may be assigned the second transparency value. The watermark image may be overlaid and blended over a background source image to create an encoded source image. A decoder system may recover encoded information from the encoded source image.

METHOD AND DEVICE FOR SECURING AN OBJECT AND METHOD FOR AUTHENTICATING AN OBJECT
20240129131 · 2024-04-18 ·

The method (100) for securing an object comprises: a step of encoding a first message (301) in a two-dimensional barcode (303), the first message comprising at least a header identifying a certification resource and a signature produced by means of this resource; a step of generating a fragile anti-copy mark (304) encoding a second message (302) representative of the signature produced, the second message comprising redundancies; and a step of marking the object with the first 2D barcode and the fragile anti-copy mark.

Incorporation of source-identifying information in scanned documents

An embedding component is described which embeds information in a scanned document. The embedding component includes a document acquisition component, which acquires a scanned document from an associated scanning device. An information acquisition component acquires variable information associated with the scanned document. An encoding component generates a machine-readable representation of the variable information. A pattern insertion component uses the machine-readable representation to insert at least one machine readable pattern in the scanned document, to generate a modified document. An output component outputs the modified document to an associated output device, such that when the modified document is rendered on print media, the machine-readable pattern is not noticeable to the unaided eye of a person. A processor implements the document acquisition component, information acquisition component, encoding component, pattern insertion component, and output component.

Security mark with anti-copyable effect

A document contains a security element that combines a correlation mark and pantograph mark. The pantograph mark includes a dot pattern, part of which is printed to correspond to foreground pixels of the correlation mark, and another part of which is printed to correspond to background pixels of the correlation mark.

Semi-Transparent Embedded Watermarks

A watermark image may be generated that includes a first set of encoded pixels each of which is assigned a first transparency value and a second set of encoded pixels each of which is assigned a second transparency value, the second transparency level being different from the first transparency level. The encoded pixels may be distributed among a set of blank pixels such that each encoded pixel neighbors one or more blank pixels in the watermark image, and in particular at least two blank pixels in the watermark image. Herein, each blank pixel may be assigned the second transparency value. The watermark image may be overlaid and blended over a background source image to create an encoded source image. A decoder system may recover encoded information from the encoded source image.

Authentication and validation of smartphone imagery

A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.