H04N2201/3236

Proving digital photograph authorship using ECG biometrics
10057460 · 2018-08-21 · ·

Techniques for proving digital photograph authorship using ECG biometrics are described. Electrodes are located on the exterior of a digital camera and are electrically coupled to an ECG circuit. When a photographer holds the camera with both hands, the electrodes detect electrical voltages from the photographer's hands and the ECG circuit produces a digital ECG signal. When the photographer uses the digital camera to capture a photograph, the camera's stenographic engine uses a stenographic key to embedded the ECG signal into the raw image file, producing a watermarked image. The camera's cryptographic engine uses a cryptographic key to encrypt the watermarked image to produce an encrypted image. If a dispute arises regarding authorship of the photograph, the stenographic and cryptographic engines convert the encrypted image into the raw image file and the photographer's ECG signals, which are compared to the ECG signals of the disputed author(s).

Authentication and validation of smartphone imagery

A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.

Authentication and validation of smartphone imagery

A method, system, and processor-executable software for processing images or video captured by a smartphone or other digital image capture device for subsequent validation and authentication captures not only the image, but also metadata relevant to the authenticity of validity of the image, such as position, time, camera movement and orientation, image parameters, and so forth. The image is watermarked and both the watermarked image and the metadata, as well as a symmetric key used in the watermarking, are digitally signed and transmitted or uploaded to a web server or authentication centric entity for authentication and storage. When a third party submits an image to the web server or authentication centric entity, the submitted image is compared with the stored watermarked image for authentication and validation of the submitted image, and the metadata is then retrieved to enable analysis of the contents of authenticated and validated image.

Authentication device and associated authentication method based on a difference in alignment or a similarity in relative position of features of unique identifiers printed over images and/or text
10015354 · 2018-07-03 · ·

A method including generating first images and/or text on a plurality of items, printing a plurality of unique identifiers, each unique identifier being printed over the images and/or text on a corresponding one of the plurality of items, capturing a plurality of second images, each second image including a corresponding one of the plurality of unique identifiers, and storing the captured plurality of second images in a computer readable memory.

EMBEDDING A PATTERN IN OUTPUT CONTENT

Certain examples described herein relate to the embedding a pattern in an output content having at least two-dimensions, for example a printed output. Content data having at least two dimensions is processed to generate an array of spatial elements, each spatial element corresponding to a respective location in the output content and comprising a probabilistic distribution for a set of output material compositions. A threshold matrix is generated using pattern data corresponding to a pattern, and the array of spatial elements is halftoned using the threshold matrix. The threshold matrix is generated such that the pattern is embedded in the output content.

System and method for identifying a genuine printed document
09886612 · 2018-02-06 · ·

A system and method for verifying that a document is included in a document management system is disclosed. This system and method includes scanning of a scan track of a document, generating document data dependently upon the scanning, comparing the generated document data to stored document data, the stored document data generated dependently upon a prior scanning of the scan track of the document, and outputting an indication of the document being included in the document management system as determined by the comparing.

SYSTEM AND METHOD FOR PRINTING A BANNER PAGE HAVING INDENTIFING INDICIA
20180035010 · 2018-02-01 · ·

A printing system generating a personalized banner page has a client device that transmits print data. An image forming device receives the print data transmitted by the client device. A banner creation module is in communication with the client device and the image forming device. The banner creation module transmits a user selected personalized indicia to be inserted on a banner page to be printed with the print data to identify the user.

Method and device for picture-based barcode encoding and decoding
09860415 · 2018-01-02 · ·

A method for picture-based barcode encoding and decoding is provided herein. The method for picture-based barcode encoding includes: transforming an original data into an original data bitstream; performing an error correction on the original data bitstream for translating the original data bitstream into an error corrected bitstream; selecting all or part of the picture as an encoded area; calculating a data storage capacity of the encoded area; adjusting a size of the error corrected bitstream or a size of the encoded area for equalizing a data storage capacity of an encoded data bitstream and the data storage capacity of the encoded area; and adjusting a pixel value of the encoded area according to the encoded data bitstream.

METHOD AND DEVICE FOR PICTURE-BASED BARCODE DECODING
20170366700 · 2017-12-21 ·

A method for picture-based barcode decoding is provided herein. The method for picture-based barcode decoding includes the following steps: capturing all or part of a picture as a captured image; normalizing the captured image for generating a transformed image; calculating a mean color value of a plurality of blocks of the transformed image for generating a decoded data; performing an inverse error correction on the decoded data for generating an original data bitstream; transforming the original data bitstream into an original data; and outputting the original data with an output device.

Authenticating Printed Paper Documents and Websites Against a Blockchain Record
20170329996 · 2017-11-16 ·

A system and method are disclosed for rendering published documents tamper evident. Embodiments render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Embodiments enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Embodiments can use a document's prior registration date in a blockchain to establish a no-later-than date-of-existence for that document. Embodiments can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Embodiments can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.