H04N1/32272

METHOD OF USING MIDDLEWARE FOR GENERATING VECTOR GRAPHICS IMAGED SECURITY DOCUMENTS
20200204703 · 2020-06-25 ·

A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.

METHOD AND APPARATUS FOR DIGITAL WATERMARKING OF THREE DIMENSIONAL OBJECT
20200175641 · 2020-06-04 · ·

In one embodiment, a method for 3D digital watermarking for a triangular mesh using one or more key parameters is disclosed including forming a Hamiltonian path of a desired length around a selected vertex in a selected direction of a spiral; marking the selected vertex a dead end if there is a deadlock and continuing the spiral; and applying a watermark by introducing points in a path order on edges of the spiral, wherein information is encoded at a partition of adjacent triangles at one or more of the points.

PSEUDO-RANDOM STEGANOGRAPHIC CAMOUFLAGE

A pseudo-random steganographic camouflage includes a graphic design printed or painted as camouflage on an outer side of a substrate like Mylar thermal blanket sheets, uniforms, and adhesive tapes. The graphic design is uniquely generated from pseudo-random noise in four overlaying colors that each begin as a raster of randomly generated noise CDMA encoded with a PRN and a message in a standardized tile size. E.g., gray, green, tan, and brown colors natural for concealment applications are each masked by two-tone image contrast rasters. The four results are mixed in groups together with a monochrome mixing mask to produce a whole tile of concealment camouflage that will conjoin seamlessly within arrays of such tiles. A further refinement visually adds a distorted-grid mesh-texture to the pseudo-random steganographic camouflage, and even faint watermarks of commercial trademarks.

METHOD FOR MANUFACTURING PSEUDO-RANDOM STEGANOGRAPHIC CAMOUFLAGE
20200103204 · 2020-04-02 ·

A concealment substrate manufacturing process begins by printing or painting a graphic design as camouflage on substrates like mesh-textured uniforms, military equipment, Mylar thermal blanket sheets, adhesive tapes, etc. The graphic design is uniquely generated from pseudo-random noise in four overlaying color pigments that each begin as a raster of randomly generated noise in a standardized tile size. E.g., gray, green, tan, and brown colors natural for concealment applications are each masked by two-tone image contrast rasters. The four results are mixed together in groups with a monochrome mixing mask to produce a whole tile. Such concealment camouflage tile conjoins seamlessly on-edge within other arrays of identical tiles. One variation adds a distorted-grid mesh-texture overly texture to the concealment camouflage, and even a faint watermark related to a commercial trademark.

Printing apparatus, control method for printing apparatus, and storage medium
10602016 · 2020-03-24 · ·

Ability information about an authentication printing function to be transmitted from a printing apparatus to a print client is varied depending on whether a communication path between the apparatuses is encrypted.

INFORMATION PROCESSING APPARATUS AND DATA STORAGE PROGRAM

An information processing apparatus includes: a non-volatile memory; and a hardware processor that controls the non-volatile memory, wherein the hardware processor determines whether communication speed of a communication path to the non-volatile memory is equal to or less than a threshold value and encrypts the data transmitted to the non-volatile memory when the communication speed is determined to be equal to or less than the threshold value.

Method of using middleware for generating vector graphics imaged security documents
10516800 · 2019-12-24 · ·

A method is provided of digitally imaging a secure portion and a non-secure portion of scratch-off-coating protected documents of at least one game using middleware. The method includes: (a) generating the secure variable indicia in non-vector raster format; (b) generating vector graphics to be imaged on physical document locations; (c) assigning the secure variable indicia in a non-vector raster format to documents in and shuffling the documents throughout a print run; and (d) linking via middleware the secure variable indicia in the non-vector raster format to associated vector graphics variable indicia to be digitally imaged on the documents and to generate vector graphics-formatted data for each document in the print run. The secure variable indicia assignment and shuffling are executed by non-vector raster game generation software output that is reinterpreted by the middleware to produce related vector graphic output for the secure variable indicia.

METHOD AND APPARATUS FOR DIGITAL WATERMARKING OF THREE DIMENSIONAL OBJECT
20190385268 · 2019-12-19 · ·

In one embodiment, a method for 3D digital watermarking for a triangular mesh using one or more key parameters is disclosed including forming a Hamiltonian path of a desired length around a selected vertex in a selected direction of a spiral; marking the selected vertex a dead end if there is a deadlock and continuing the spiral; and applying a watermark by introducing points in a path order on edges of the spiral, wherein information is encoded at a partition of adjacent triangles at one or more of the points.

Method and apparatus for providing secure image encryption and decryption

Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image. The method then displays the portion of the image that is decrypted and also displays the adjacent portion of the image using the partial information for the adjacent portion of the image. Another method includes capturing a first portion of an image that is encrypted using a first key and a second key, decrypting the first portion of the image using a first key and displaying the first portion of the image that is decrypted.

Utilizing data reduction in steganographic and cryptographic systems
10461930 · 2019-10-29 · ·

The present invention relates to methods for protecting a data signal using the following techniques: applying a data reduction technique to reduce the data signal into a reduced data signal; subtracting the reduced data signal from the data signal to produce a remainder signal; embedding a first watermark into the reduced data signal to produce a watermarked, reduced data signal; and adding the watermarked, reduced data signal to the remainder signal to produce an output signal. A second watermark may be embedded into the remainder signal before the final addition step. Further, cryptographic techniques may be used to encrypt the reduced data signals and to encrypt the remainder signals before the final addition step.