Patent classifications
G06T2201/0062
COMPUTER VISION METHOD FOR DETECTING DOCUMENT REGIONS THAT WILL BE EXCLUDED FROM AN EMBEDDING PROCESS AND COMPUTER PROGRAMS THEREOF
A method and computer programs for detecting document regions that will be excluded from a watermark embedding process are disclosed. The method comprises converting, by an adapter module, at least one page of a received document into a visual representation thereof, the visual representation keeping the position of the characters of the at least one page; receiving, by a text detector, the visual representation; processing, by the text detector, the visual representation using one or more artificial intelligence algorithms, and returning a list of invalid regions with their associated page positions as a result, wherein each invalid region of the list of invalid regions may have associated thereto a confidence score; and using, by a watermark embedding module or by a watermark extracting module, the list of invalid regions to provide a watermarked document or a message embedded in the document.
Method for marking visuals of information for subsequent identification or authentication
A method for authenticating digital information includes obtaining, in digital form, information for authentication; preparing the information for processing, such preparation including converting the information into a digital image; identifying segments of content in the digital image; grouping the segments of content into one or more segment groups; generating a marking sequence comprising shifting at least one of the one or more segment groups in one or more directions; and applying the marking sequence to the digital image, creating a unique marked copy of the digital image.
Device and method for inserting identification code for tracking duplicated image
The present disclosure a method of providing identification code insertion service for tracking a duplicated image, which is performed by a server, including: (a) receiving an image from a user terminal; (b) converting the received image to black and white, and selecting a plurality of insertion regions in the converted image; (c) transforming an image of at least one of a plurality of insertion regions selected at random; and (d) mapping an identification code and image information included in the transformed image of the insertion region, storing the identification code and the image information in a database, and providing the image in which the identification code is inserted to the user terminal.
METHOD AND APPARATUS FOR EMBEDDING AND EXTRACTING TEXT WATERMARK
One aspect of the present invention discloses a watermark insertion method. The method includes: segmenting target text into pieces of page content; obtaining a watermark variable comprising a line alternation value indicative of a watermark mode changed for each line of the segmented page content and a watermark mode setting value; and applying a flip-flop component insertion algorithm for inserting a watermark into each of the pieces of segmented page content based on the obtained watermark variable.
GENERATING SIGNAL BEARING ART USING STIPPLE, VORONOI AND DELAUNAY METHODS AND READING SAME
Optical code signal components are generated and then transformed into signal bearing art that conveys machine readable data. The components of an optical code are optimized to achieve improved signal robustness, reliability, capacity and/or visual quality. An optimization program can determine spatial density, dot distance, dot size and signal component priority to optimize robustness. An optical code generator transforms tiles of an optical code or image embedded with the optical code into signal-bearing art using stipple, Voronoi, Delaunay or other graphic drawing methods so as to retain prioritized components of the optical code. The optical code is merged into a host image, such as imagery, text and graphics of a package or label, or it may be printed by itself, e.g., on an otherwise blank label or carton. A great number of other features and arrangements are also detailed.
METHOD AND APPARATUS OF DRM SYSTEMS FOR PROTECTING ENTERPRISE CONFIDENTIALITY
One aspect of the present invention discloses a device for content security. The device includes: an application execution unit configured to generate and control content in response to a content control command requested by a user; and a DRM agent configured to communicate with the application execution unit, to detect the content control command generated by the application execution unit, and to perform control on the content, and the DRM agent comprises a tracing module configured to insert security information into the content in order to prevent and trace content leakage.
Method For Marking Visuals Of Information For Subsequent Identification Or Authentication
A method for authenticating digital information includes obtaining, in digital form, information for authentication; preparing the information for processing, such preparation including converting the information into a digital image; identifying segments of content in the digital image; grouping the segments of content into one or more segment groups; generating a marking sequence comprising shifting at least one of the one or more segment groups in one or more directions; and applying the marking sequence to the digital image, creating a unique marked copy of the digital image.
Automatically attaching optical character recognition data to images
Techniques for automatically attaching optical character recognition data to images are provided. The techniques include receiving an image file containing an image and performing optical character recognition on the image to generate text output. The techniques then continue by identifying a particular text item from within the generated text output and determining that the particular text item is a value for particular corresponding key. Then metadata that indicates that the particular text item is a value for the particular key is stored in the image file.
Reducing nonvisual noise byte codes in machine readable format documents
A method may include obtaining a first byte stream from first document code and a second byte stream from second document code. The first document code has a document type and the second document code has the document type. The method may further include identifying, in the first byte stream, nonvisual noise corresponding to a custom byte code defined in a custom character encoding set. The nonvisual noise is invisible when rendering the first document code. The method may further include replacing, in the first byte stream, the custom byte code with at least one standard byte code defined in a standard character encoding set to obtain modified document code. The second document code uses the standard character encoding set. The method may further include comparing the modified document code with the second document code by comparing the first byte stream with the second byte stream.
Generating signal bearing art using Stipple, Voronoi and Delaunay methods and reading same
Optical code signal components are generated and then transformed into signal bearing art that conveys machine readable data. The components of an optical code are optimized to achieve improved signal robustness, reliability, capacity and/or visual quality. An optimization program can determine spatial density, dot distance, dot size and signal component priority to optimize robustness. An optical code generator transforms tiles of an optical code or image embedded with the optical code into signal-bearing art using stipple, Voronoi, Delaunay or other graphic drawing methods so as to retain prioritized components of the optical code. The optical code is merged into a host image, such as imagery, text and graphics of a package or label, or it may be printed by itself, e.g., on an otherwise blank label or carton. A great number of other features and arrangements are also detailed.