Patent classifications
H04N1/32272
INFORMATION PROCESSING APPARATUS, NON-TRANSITORY COMPUTER READABLE MEDIUM, AND INFORMATION PROCESSING SYSTEM
An information processing apparatus includes a processor configured to store a storage range identifier for identification of a range of a location at which image data is stored in a data storing apparatus, and an identifier common to an identifier that is retained by the data storing apparatus, transmit read image data and the identifier to the data storing apparatus, generate a storage position identifier for identification of a position at which the read image data is stored, the storage position identifier being generated by using the storage range identifier and a character string that is generated by an algorithm common to an algorithm in the data storing apparatus, and transmit the generated storage position identifier to a terminal that uses the image data stored at the position that is identified by using the storage position identifier.
USING MIDDLEWARE FOR GENERATING VECTOR GRAPHICS IMAGED SECURITY DOCUMENTS
A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.
Method for Producing Security Elements in an Image Which are not Visible to the Human Eye and Cannot be Copied, and Printed Image
A method for producing security elements in an image which are not visible to the human eye and which cannot be copied, in particular for checking the authenticity of images. The image is imaged by means of a halftone, the halftone consisting of individual image dots arranged adjacent to each other. This is characterized in that at least one field having a random geometric shape or freeform is defined in the image/the halftone. By means of manipulation of image dots in the field and/or by means of manipulation of the entire field, an encrypted information that cannot be copied is stored for comparison with at least one database and the serial number is displayed by means of contours formed in the halftone.
Method for Checking the Authenticity of Products and Printed Image
A method for checking the authenticity of products, by checking an image (A) of a product. The proof of authenticity is not visible to the human eye and cannot be copied. This is characterized in that a code stored in a halftone image by manipulation of dots and/or a manipulated field bounded in the halftone image can be read by means of an optical device and compared with a retrievable value in at least one database. In at least one field (F1 to F5) a part of a serial number is determined which describes the structure of the serial number and a hash function used for transmitting the serial number to the database, and this is also characterized in that the serial number is subsequently assembled and encrypted with the corresponding hash function.
Method for manufacturing pseudo-random steganographic camouflage
A concealment substrate manufacturing process begins by printing or painting a graphic design as camouflage on substrates like mesh-textured uniforms, military equipment, Mylar thermal blanket sheets, adhesive tapes, etc. The graphic design is uniquely generated from pseudo-random noise in four overlaying color pigments that each begin as a raster of randomly generated noise in a standardized tile size. E.g., gray, green, tan, and brown colors natural for concealment applications are each masked by two-tone image contrast rasters. The four results are mixed together in groups with a monochrome mixing mask to produce a whole tile. Such concealment camouflage tile conjoins seamlessly on-edge within other arrays of identical tiles. One variation adds a distorted-grid mesh-texture overly texture to the concealment camouflage, and even a faint “watermark” related to a commercial trademark.
Encrypting and decrypting postscript language
A method of encrypting at least a portion of PostScript vector language, where the PostScript vector language includes a cleartext portion and a ciphertext portion, the method including: (a) encrypting at least a part of the PostScript cleartext portion via an encryption algorithm with a generated encryption key resulting in at least a part of the ciphertext portion and overwriting the PostScript cleartext portion with the resulting at least part of the ciphertext portion; (b) saving the encryption key in a file separate from a file containing the PostScript vector language; (c) linking both the encryption key file and the PostScript file in an image processor interpreting the PostScript vector language to display or print PostScript graphics; (d) decrypting the at least part of the ciphertext portion resulting in decrypted PostScript cleartext; and (e) executing the resulting decrypted Postscript cleartext to produce an image on a document or screen.
METHOD AND DEVICE FOR STEGANOGRAPHIC PROCESSING AND COMPRESSION OF IMAGE DATA
A method for steganographic processing and compression of image data with negligible information loss, wherein said image data comprises noise and information. The method includes the steps of: acquiring image data to be processed and/or compressed, storing and/or transmitting the image data, and preparing the acquired image data for compression. The preparation step includes determining an input noise model and corresponding parameters adapted to reflect noise created by an image sensor used to capture said image data, and removing, with negligible information loss, noise from the acquired image data by use of the input noise model such as to produce noise-reduced image data.
Reproducing Hash Values From Printed Documents To Validate With A Blockchain
A system and method are disclosed for rendering printed documents tamper evident. Examples render classes of documents tamper evident with cryptographic level security or detect tampering events, where such security was previously unavailable, for example, in documents printed using common printers without special paper or ink. Examples enable proving the date of document content without the need for expensive third party archival, including documents held, since their creation, entirely in secrecy or in untrustworthy environments, such as on easily-altered, publicly-accessible internet sites. Examples can use a document's prior registration date in a blockchain to establish a no-later than date-of-existence for that document. Examples can extend the useful life of integrity verification algorithms, such as hash functions, even when applied to binary executable files. Examples can efficiently identify whether multiple document versions are substantially similar, even if they are not identical, thus potentially reducing storage space requirements.
Image encryption method, image viewing method, system, and terminal
An image encryption method, an image viewing method, a system, and a terminal are provided. The image encryption method includes: editing an original image, saving the edited original image as a first image file; encrypting the original image to generate an encrypted data block; and, splicing the first image file with the encrypted data block to generate and save a partially-encrypted image file. The image viewing method includes: when determining that indication information used for indicating partial encryption process is carried in an image file, decrypting an encrypted data block, and displaying data of an original image obtained after decrypting successfully; herein, the partially-encrypted image file is formed by splicing the first image file and the encrypted data block, the first image file contains edited original image data, and the encrypted data block corresponds to encrypted original image data.
Using middleware for generating vector graphics imaged security documents
A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.