G06T2201/0062

SYSTEMS AND METHODS FOR TOKEN AUTHENTICATION

In some embodiments, an authentication system may be configured to process one or more tokens that incorporates one or more tailored-wavelength-range coded patterns, codes represented within a steganographic image, or “overlapping” codes. As an example, such a token may include (i) one or more invisible-ink-printed patterns printed using infrared ink corresponding to different tailored wavelength ranges within the infrared light spectrum, (ii) one or more steganographic images in which invisible-ink-printed patterns are interweaved within the steganographic images, (iii) visible-ink-printed patterns and invisible-ink-printed patterns printed substantially within the visible ink portions of the visible-ink-printed patterns, or (iv) other features, where the invisible-ink-printed patterns correspond to one or more authentication codes or other data for token authentication.

Anti-leak digital document marking system and method using distributed ledger

The system is disclosed for visual marking sensitive documents for leak prevention. Each time an action is taken with regard to a document (e.g., creation, viewing, downloading), that action is added to a distributed ledger, essentially creating a unique hash for a new instance of the document. This new hash is visually embedded in the document as a code comprising a plurality of differently shaded pixels, wherein some of the pixels directly encode information regarding the document (e.g., an account that generated the new instance of the document, a date, a time, a unique ID for the document, etc.) and some of the pixels do not encode information. The code is capable of being scanned either digitally or physically on a printed version of the document, such that the immediate source of the document, corresponding to who leaked the document, is able to be discerned.

Method for generating variable guilloche patterns, implementing device and identification document comprising such patterns

Generation of one dimensional guilloche patterns able to be affixed on a document, each guilloche pattern being able to encode variable alphanumeric data providing a different appearance to each guilloche pattern, by formatting alphanumeric data to be encoded in the form of a predefined number of data blocks with a predefined size, generating a carrier function having a plurality of parameters, the formatted data blocks forming at least one of the parameters, and modulating the carrier function by the formatted data blocks so as to encode the alphanumeric data graphically, each data block defining a guilloche pattern, the number of data blocks defining the number of guilloche patterns, the carrier function associated with a formatted data block is modulated locally, each datum of the block being encoded locally in the guilloche pattern, by interpolation of a predefined point associated with the carrier function.

Generating signal bearing art using stipple, Voronoi and Delaunay methods and reading same
11276133 · 2022-03-15 · ·

Optical code signal components are generated and then transformed into signal bearing art that conveys machine readable data. The components of an optical code are optimized to achieve improved signal robustness, reliability, capacity and/or visual quality. An optimization program can determine spatial density, dot distance, dot size and signal component priority to optimize robustness. An optical code generator transforms tiles of an optical code or image embedded with the optical code into signal-bearing art using stipple, Voronoi, Delaunay or other graphic drawing methods so as to retain prioritized components of the optical code. The optical code is merged into a host image, such as imagery, text and graphics of a package or label, or it may be printed by itself, e.g., on an otherwise blank label or carton. A great number of other features and arrangements are also detailed.

AUTOMATICALLY ATTACHING OPTICAL CHARACTER RECOGNITION DATA TO IMAGES
20210264556 · 2021-08-26 ·

Techniques for automatically attaching optical character recognition data to images are provided. The techniques include receiving an image file containing an image and performing optical character recognition on the image to generate text output. The techniques then continue by identifying a particular text item from within the generated text output and determining that the particular text item is a value for particular corresponding key. Then metadata that indicates that the particular text item is a value for the particular key is stored in the image file.

Identification document with dynamic window

An identification document including a multilayer laminate having a core layer defining an opening therethrough, and a dynamic window in the opening. The dynamic window includes an optically variable coating on at least a front or a back of the dynamic window. The optically variable coating appears transparent when viewed from the front of the identification document in light transmitted through the dynamic window from the back of the identification document toward the front of the identification document, and appears nontransparent when viewed from the front of the identification document in light reflected from the front of the identification document. Fabricating an identification document with a dynamic window includes forming an opening in a core layer, positioning a dynamic window in the opening, and plate laminating the core layer and the dynamic window between at least one outer layer on each side of the core layer.

DEVICE AND METHOD FOR INSERTING IDENTIFICATION CODE FOR TRACKING DUPLICATED IMAGE
20210233201 · 2021-07-29 · ·

The present disclosure a method of providing identification code insertion service for tracking a duplicated image, which is performed by a server, including: (a) receiving an image from a user terminal; (b) converting the received image to black and white, and selecting a plurality of insertion regions in the converted image; (c) transforming an image of at least one of a plurality of insertion regions selected at random; and (d) mapping an identification code and image information included in the transformed image of the insertion region, storing the identification code and the image information in a database, and providing the image in which the identification code is inserted to the user terminal.

Automatically attaching optical character recognition data to images
11080808 · 2021-08-03 · ·

Techniques for automatically attaching optical character recognition data to images are provided. The techniques include receiving an image file containing an image and performing optical character recognition on the image to generate text output. The techniques then continue by identifying a particular text item from within the generated text output and determining that the particular text item is a value for particular corresponding key. Then metadata that indicates that the particular text item is a value for the particular key is stored in the image file.

Method for marking visuals of information for subsequent identification or authentication

A method for authenticating digital information includes obtaining, in digital form, information for authentication; preparing the information for processing; such preparation including converting the information into a digital image; identifying segments of content in the digital image; grouping the segments of content into one or more segment groups; generating a marking sequence comprising shifting at least one of the one or more segment groups in one or more directions; and applying the marking sequence to the digital image, creating a unique marked copy of the digital image.

WATERMARK EMBEDDING AND EXTRACTING METHOD FOR PROTECTING DOCUMENTS

A method for watermarking documents comprising: identifying and locating spaces in a received original document (10) by a location analysis (110) module which distinguishes between intra-word spaces and inter-word spaces; minimizing an error probability of interference between intra-word spaces and inter-word spaces in the watermarked document (20) by an optimization module (111); encoding (113) the message (30) into codewords and encoding (114) the codewords into the watermark;
embedding the watermark to generate (115) the watermarked document (20) by modifying the intra-word spaces and inter-word spaces of the original document (10).