[go: up one dir, main page]

GB2360893A - Incorporating a fingerprint in a document at the printer driver - Google Patents

Incorporating a fingerprint in a document at the printer driver Download PDF

Info

Publication number
GB2360893A
GB2360893A GB0007330A GB0007330A GB2360893A GB 2360893 A GB2360893 A GB 2360893A GB 0007330 A GB0007330 A GB 0007330A GB 0007330 A GB0007330 A GB 0007330A GB 2360893 A GB2360893 A GB 2360893A
Authority
GB
United Kingdom
Prior art keywords
fingerprint
image
printed
printer driver
image data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0007330A
Other versions
GB0007330D0 (en
Inventor
Anthony William Harris
David Hilton
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SIGNUM TECHNOLOGIES Ltd
Software 2000 Ltd
Original Assignee
SIGNUM TECHNOLOGIES Ltd
Software 2000 Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SIGNUM TECHNOLOGIES Ltd, Software 2000 Ltd filed Critical SIGNUM TECHNOLOGIES Ltd
Priority to GB0007330A priority Critical patent/GB2360893A/en
Publication of GB0007330D0 publication Critical patent/GB0007330D0/en
Priority to GB0224255A priority patent/GB2379119B/en
Priority to AU2001240806A priority patent/AU2001240806A1/en
Priority to PCT/GB2001/001088 priority patent/WO2001074053A1/en
Publication of GB2360893A publication Critical patent/GB2360893A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/00127Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
    • H04N1/00204Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server
    • H04N1/00236Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server using an image reading or reproducing device, e.g. a facsimile reader or printer, as a local input to or local output from a computer
    • H04N1/00238Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server using an image reading or reproducing device, e.g. a facsimile reader or printer, as a local input to or local output from a computer using an image reproducing device as a local output from a computer
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3225Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
    • H04N2201/3233Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N2201/00Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
    • H04N2201/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N2201/3201Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N2201/3269Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
    • H04N2201/327Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Accessory Devices And Overall Control Thereof (AREA)
  • Editing Of Facsimile Originals (AREA)
  • Record Information Processing For Printing (AREA)
  • Processing Or Creating Images (AREA)

Abstract

A method of incorporating a fingerprint into a printed work, which fingerprint is substantially invisible to the naked eye but can be recognised by image processing techniques. The method comprises the steps of sending digital data corresponding to an image to be printed to a printer driver 5, incorporating at least one fingerprint into the data during processing by the printer driver 5, and sending the data processed by the printer driver 5 to a printer 2. The fingerprint may be subjected to a one way hashing operation. The level of the fingerprint may be altered in accordance with the required image quality.

Description

2360893 DOCUMENT MARKING The present invention relates to document marking
and in particular to a method, apparatus, and computer program for incorporating a unique identifier into a printed document.
The counterfeiting of bank notes and of other intrinsically valuable documents has always been a serious problem which has exercised the minds of individuals, companies, and governments alike. The counterfeiting of bank notes in the US alone is estimated to run at 70 million dollars per annum. Recently, the problem of counterfeiting has increased due to the availability of high quality, low cost digital printers and scanners, and the quality of counterfeits produced by such means is approaching that which can be achieved by conventional offset lithography equipment.
It will be appreciated that the potential for damage is enormous, if every home and office is capable of producing extremely high quality forgeries.
There is only a limited amount which can be done- to stop a person producing counterfeits if they have the desire to do so. Attempts have been made to produce bank notes which are in some ways resistant to photocopying or digital scanning, but these have met with only limited success and at best achieve only some degree of degradation in the copies or scanned image. In the light of this, enforcement agencies still rely on more conventional methods of policing. However, in the event that a suspected counterfeiter is apprehended by the authorities, there is often a problem in obtaining sufficient information to achieve a successful prosecution. Particularly where counterfeits are prepared using a home PC and printer, it is very easy for the counterfeiter to erase any trace of his activities.
One solution to the problem of obtaining evidence for use in a court of law, involves incorporating a "fingerprint" into printed or copied documents which is unique to the equipment used to prepare the document. For example, certain photocopiers comprise a chip on which is encoded a unique identifier which is incorporated into a copied document in such a way that, whilst substantially invisible to the naked eye, it can be 2 discerned using special imaging technology. The requirement for a special chip adds to manufacturing costs however and, whilst contributing only a relatively small fraction of the total cost of a photocopier, would be more significant if the same technology were to be incorporated into desktop printers.
It is an object of the present invention to overcome or at least mitigate the disadvantages of existing anti-counterfeiting measures noted above. In particular, it is an object of the present invention to provide a relatively simple and low cost anti- counterfeiting means which may be incorporated into desktop PCs, workstations, and the like. It is also an object of the present invention to provide a mechanism for combating the pirating of printer driver software and software components.
According to a first aspect of the present invention there is provided a method of incorporating a fingerprint into a printed work, which fingerprint is substantially invisible to the naked eye but can be recognised by image processing techniques, the method comprising the steps of..
sending digital data corresponding to an image to be printed to a printer driver; incorporating at least one fingerprint into the data during processing by the printer driver; and sending the data processed by the printer driver to a printer.
The printer driver represents a "poinC through which all data to be printed must pass, and is aware of both the format of the data received from the printing application and of the format of data required by the printer. It therefore represents a more comprehensive solution than could be achieved by incorporating a fingerprint into image data at say an image scanner (using either a software or a hardware solution) or by way of a specific application (e.g. Microsoft WordTm). Implementing a solution at the operating system level is also unlikely to be feasible as many operating systems are already in use and it would be difficult or impossible to "retrofit" a fingerprint solution. In contrast, printer drivers tend to be replaced or updated (e.g. to introduce bug fixes) fairly often, and so a solution introduced at this level would percolate through computer systems fairly rapidly.
3 Preferably, the step of incorporating at least one fingerprint into the image data is carried out automatically by the printer driver substantially without any possibility for intervention by the user of the equipment on which the printer driver resides.
Preferably, said fingerprint corresponds to an identification (e.g. serial number) associated with the host computer system (e.g. the ID of the host computer BIOS, the operating system ID or a chip ID), the printer, or the printer driver. More preferably, the identification is a unique identifier. The method of the present invention may comprise the steps of determining whether or not the printer has an ID which can be used as said fingerprint and, if not, determining whether or not the computer system has a usable ED. The latter step may comprise determining whether or not the computer operating system has an ID which can be used as said fingerprint and, if not, determining whether or not the motherboard or microprocessor of the computer system has a usable ID. The step(s) of determining a suitable fingerprint may be carded for example out during the installation of the printer driver, or each time the printer driver receives a new print job.
The fffigerprint may be incorporated into the image data to.be printed, in an encrypted form so that it can only be determined after image processing and decryption steps. The use of encryption may prevent unauthorised parties from determining the source of a printed document. Encryption may be achieved, for example, using an encryption key based algorithm.
In certain embodiments of the present invention, the fingerprint may be subjected to a one way hashing operation using a hashing function prior to incorporation into the image data. This would make it difficult or impossible to reverse the process, i.e. to determine the fingerprint from data recovered from a printed work. However, it would be possible to associate a printed work to a computer system if the computer system is available. The use of a fingerprint which is generated using multiple IDs, e.g. an ID of the printer and an ID of the printer driver, may result in an increased level of security.
Preferably, the step of incorporating a fingerprint into the image data comprises altering the colour and/or intensity of pixels of the image data. Preferably, this step is carried 4 out after the received image data has been rasterised by the printer driver. More preferably, the luminance of pixels is varied, whilst the chrominance remains substantially unchanged. This may be achieved, in a colour image, by varying each of the Red, Green, and Blue components.
Preferably, the level by which the image data is altered to incorporate the fingerprint depends upon the quality of the image to be printed. The level of alteration may vary with one or more of the following; the printing resolution, paper quality, and bit depth of the image.
The level of alteration may vary across the image to be printed. A single fingerprint may be repeated at intervals across the image to be printed, or different fingerprints may be incorporated into a single image.
According to a second aspect of the present invention there is provided a computer memory encoded with executable instructions representing a printer driver computer program for causing a computer system to output digital data to a printer, wherein the resulting printed image comprises an image corresponding to the image data received by the printer driver and a fingerprint which is substantially invisible to the naked eye but can be recognised by image processing techniques.
Preferably, said computer program is'arranged to be inoperable in the event that software code relating to said fingerprint or to the incorporation of said fingerprint into an image to be printed is tampered with.
According to a third aspect of the present invention there is provided a method of combating the counterfeiting of printed works, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
According to a fourth aspect of the present invention there is provided a method of combating the pirating of driver software or images, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
According to a fifth aspect of the present invention there is provided a computer system having memory means storing a computer program according to the above second aspect of the present invention, and processing means for executing said program so as to cause a fingerprint to be incorporated into an image printed from the computer system.
According to a sixth aspect of the present invention there is provided a method of incorporating a fingerprint into printed image, which fingerprint is substantially invisible to the naked eye, the method comprising encrypting the fingerprint using a one-way hashing function prior to its incorporation into image data to be printed, and subsequently printing the modified image data, wherein the fingerprint may only. be recovered from the printed image using a knowledge of the hashing function.
For a better understanding of the present invention and in order to show how the same may be carried into effect reference will now be made, by way of example, to the accompanying drawings, in which:
Figure 1 illustrates a typical computer system; and Figure 2 illustrates in block diagram form a printing portion of the computer system of Figure 1.
There is illustrated in Figure 1 a personal computer (PC) 1 and a digital printer 2. The PC is controlled by a software operating system 3 such as Microsoft Windows 98Tm, LINUX, or UNIX7m, and is arranged to run applications 4 such as Microsoft WordTm, Adobe PhotoShopym and the like. In use, data to be printed is transferred from an application 4, under the control of the operating system 3, to a software module known as a printer driver 5. Printer drivers are often printer specific and are typically installed 6 into a PC from a printer manufacturer's CD ROM or from a driver library provided with the operating system. Printer drivers may be updated, e.g. to add new features or to fix bugs, using executable files supplied by the driver manufacturers.
The printer driver 5 typically takes image data to be printed (the image may correspond to text, pictures, diagrams, etc), and converts this into a grid (or raster space) of values, where each value represents the colour of the image at that point in the grid. This process is referred to as "rasterising". Following the rasterising of the image data, the data is modified in order to incorporate into the image a unique fingerprint. This fingerprint is preferably a unique ID which is encoded into the printer hardware or software and which is detected by the printer driver 5 during its installation. The determined ID is stored in an appropriate secure location for later use by the printer driver 5. If the printer 2 has no useable ID, or the ED cannot be determined for any reason, the printer driver 5 may then try to identify a motherboard serial number or CPU serial number (as for example on the Intel Pentium III). If a usable ID still cannot be obtained, then the printer driver 5 may look for a hard disk serial number, an Ethernet MAC address (when the computer has a card with a non-null address), a hash value generated based on the bad sector map on the boot drive, a Plug and Play serial number (on PCs with PC1 only), or an MS-DOS serial number (on PCs). If there is no convenient permanent value, then one may be generated, for example using CoCreateGuid (under MS Windows on a PC), and stored in the PC's registry or its equivalent, or in a custom generated file. A unique ID may also be generated using some combination of the listed codes. An advantage of using such a combination would be that even though a user changes some parts of his system, it may still be possible to link the fingerprint to remaining parts of the system.
Figure 2 illustrates schematically a printing system of the computer system of Figure 1. In essence, the printing system consists of a printer driver 5 which uses a set of data processing modules to process image data received from the operating system. A first of the modules used by the driver 5 is a rasterising module 6, the function of which has already been described above. The second module which receives the rasterised data from the rasterising module is a fingerprint application module 7.
7 The operation of the fingerprint module 7 will not be describer in detail here. Instead, reference should be made to International application no. PCT/GB/00491 in the name of Highwater FBI Ltd. Briefly, this document describes a method of incorporating a fingerprint into a printed image in such a way that the fingerprint is not readily visible to 5 the naked eye, but can be determined by scanning and processing the printed image. The method uses a technique known as the "permutation" method and involves applying a code to modify the luminance (with the chrominance remaining substantially unchanged) of a sequence of pixels of the rasterised image data. Permutations of the code are applied in sequence to modify the entire image (alternatively, the process may be repeated for multiple tiled regions of the image). Orientation markers are incorporated into the image to allow analysis software to correctly orient the image. PCT/GB/00491 describes how the fingerprint may be recovered using a statistical analysis of a subsequently scanned version of the image, and the encryption key. The fingerprint module of the printer driver 5 uses the permutation technique, where the code used to modify the image data is generated using the fingerprint described above and an encryption key. Both the fingerprint and the encryption key are stored in secure block of memory and are retrieved by the fingerprint module when required.
The "strength" of the fingerprint may be scaled prior to its incorporation into the image in order to prevent the encrypted fingerprint from visibly altering the image quality (obviously any distortion of a printed image is undesirable). The strength may be determined on the basis of a number of factors including the resolution at which the printing occurs, the quality of the paper on which the image is to be printed, and the bit depth of the image data. The strength may vary across an image depending upon local conditions, e.g. the fingerprint is applied more heavily in noisy regions.
It will be appreciated that in order to be useful, the fingerprint module should be secure against tampering, e.g. to modify the fingerprint. A satisfactory level of security may be achieved, for example, by using the multiple storage and cross-referencing of the fingerprint, and/or storage of the fingerprint within a self-modifying driver.
The image data output from the fingerprint module 7 is passed by the printer driver 5 to a rendering module 8. A main function of the rendering module 8 is to convert the pixel 8 intensity data into corresponding halftone values (most printers are incapable of varying the intensity of a printed pixel, and so intensity variations are achieved by mixing colour and white pixels to an appropriate degree, a process known as "halftoning"). The halftone data is then passed to a formatting module 9 which arranges the data, and 5 introduces formatting commands, into a forirn acceptable to the printer 2.
It is envisaged that the present invention may be adopted by organisations, such as the major world banks, as a means of combating the forgery of bank notes, bonds, certificates, and the like. The matching of an fingerprint found on a counterfeit document to a particular piece of software or hardware is likely to prove convincing evidence in a court of law.
It is also envisaged that manufacturers of printer drivers (or other software components) may use the present invention to combat the pirating of their software. Printer drivers and technologies such as halftoning and colour matching are critical to the success of print devices and require multiple man years to develop. Third parties are often tempted copy all or parts of drivers and to illegally attempt to pass them off as having developed them themselves. This problem may be combated by introducing of a hidden fingerprint into printed output as described above.
It will be appreciated by the person of skill in the art that various modifications may be made to the above described embodiment without departing from the scope of the present invention. For example, in order to overcome fears that an innocently printed document may be traced back to an originating computer system or printer, a one-way hashing function may be used to encrypt a fingerprint in a printer driver. The operation of one-way hashing is described in "Applied Cryptography% Bruce Schneier, 2ed, 1996, John Wiley & Sons, p30-31 and 351-354, and results in a value from which the fingerprint cannot be derived without the knowledge of the hashing function. Thus, assuming that the hashing function is only contained in the printer driver, authorities would only be able to match a printed document to a computer system or printer if they have access to the printer driver. The fingerprint may be combined with a unique identity known only to the printer driver, prior to hashing, in order to significantly 9 reduce the possibility of someone deriving the fingerprint by applying all possible fingerprints to recovered image data.

Claims (18)

CLAIMS:
1. A method of incorporating a fingerprint into a printed work, which fingerprint is substantially invisible to the naked eye but can be recognised by image processing techniques, the method comprising the steps of. sending digital data corresponding to an image to be printed to a printer driver; incorporating at least one fingerprint into the data during processing by 'the printer driver; and sending the data processed by the printer driver to a printer. 10
2. A method according to claim 1, wherein the step of incorporating at least one fingerprint into the image data is carried out automatically by the printer driver substantially without any possibility for intervention by the user of the equipment on which the printer driver resides.
3. A method according to claim 1 or 2, wherein said fingerprint corresponds to an identification associated with the host computer system or the printer.
4. A method according to claim 3, wherein the identification is selected from one of the following: a printer hardware or software ID, computer motherboard serial number, a CPU serial number, a hard disk serial number, an Ethernet MAC address, a hash value generated based on the bad sector map on the boot drive, a Plug and Play serial number, or an MS-DOS serial number, or an identification generated by the printer driver.
5. A method according to claim 4, wherein the identification is generated using two or more of the listed numbers.
6. A method according to any one of the preceding claims, wherein a fingerprint is identified during installation of the printer driver.
11
7. A method according to any one of the preceding claims, wherein the fingerprint is incorporated into the image to be printed in an encrypted form so that it can only be determined after image processing and decryption steps.
8. A method according to claim 7 and comprising subjecting the fingerprint to a one way hashing operation using a hashing function, prior to incorporation into the image data.
9. A method according to any one of the preceding claims, wherein the step of incorporating a fingerprint into the image data comprises altering the colour and/or intensity of pixels of the image data.
10. A method according to claim 9, wherein the luminance of pixels is varied, whilst the chrominance remains substantially unchanged.
11. A method according to claim 9 or 10, wherein the pixels are altered after the received image data has been rasterised by the print driver.
12. A method according to any one of the preceding claims, wherein the level by which the image data is altered to incorporate the fingerprint depends upon the quality of the image to be printed.
13. A computer memory encoded with executable instructions representing a printer driver computer program for causing a computer system to output digital data to a printer, wherein the resulting printed image comprises an image corresponding to the image data received by the printer driver and a fingerprint which is substantially invisible to the naked eye but can be recognised by image processing techniques.
14. A method according to claim 13, wherein said computer program is arranged to be inoperable in the event that software code relating to said fingerprint or to the incorporation of said fingerprint into an image to be printed is tampered with.
12
15. A method of combating the counterfeiting of printed works, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
16. A method of combating the pirating of driver software or images, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
17. A computer system having memory means storing a computer program according to the above second aspect of the present invention, and processing means for executing said program so as to cause a fingerprint to be incorporated into an image printed from the computer system.
18. A method of incorporating a fingerprint into printed image, which fingerprint is substantially invisible to the naked eye, the method comprising encrypting the fingerprint using a one-way hashing function prior to its incorporation into image data to be printed, and subsequently printing the modified image data, wherein the fingerprint may only be recovered from the printed image using a knowledge of the hashing function.
GB0007330A 2000-03-28 2000-03-28 Incorporating a fingerprint in a document at the printer driver Withdrawn GB2360893A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
GB0007330A GB2360893A (en) 2000-03-28 2000-03-28 Incorporating a fingerprint in a document at the printer driver
GB0224255A GB2379119B (en) 2000-03-28 2001-03-14 Document marking
AU2001240806A AU2001240806A1 (en) 2000-03-28 2001-03-14 Document marking
PCT/GB2001/001088 WO2001074053A1 (en) 2000-03-28 2001-03-14 Document marking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0007330A GB2360893A (en) 2000-03-28 2000-03-28 Incorporating a fingerprint in a document at the printer driver

Publications (2)

Publication Number Publication Date
GB0007330D0 GB0007330D0 (en) 2000-05-17
GB2360893A true GB2360893A (en) 2001-10-03

Family

ID=9888450

Family Applications (2)

Application Number Title Priority Date Filing Date
GB0007330A Withdrawn GB2360893A (en) 2000-03-28 2000-03-28 Incorporating a fingerprint in a document at the printer driver
GB0224255A Expired - Fee Related GB2379119B (en) 2000-03-28 2001-03-14 Document marking

Family Applications After (1)

Application Number Title Priority Date Filing Date
GB0224255A Expired - Fee Related GB2379119B (en) 2000-03-28 2001-03-14 Document marking

Country Status (3)

Country Link
AU (1) AU2001240806A1 (en)
GB (2) GB2360893A (en)
WO (1) WO2001074053A1 (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9630443B2 (en) 1995-07-27 2017-04-25 Digimarc Corporation Printer driver separately applying watermark and information
US7142691B2 (en) 2000-03-18 2006-11-28 Digimarc Corporation Watermark embedding functions in rendering description files
US7246239B2 (en) 2001-01-24 2007-07-17 Digimarc Corporation Digital watermarks for checking authenticity of printed objects
US6952485B1 (en) 2000-09-11 2005-10-04 Digimarc Corporation Watermark encoding and decoding in imaging devices and imaging device interfaces
US6760464B2 (en) 2000-10-11 2004-07-06 Digimarc Corporation Halftone watermarking and related applications
US6993150B2 (en) 2001-01-24 2006-01-31 Digimarc Corporation Halftone primitive watermarking and related applications
US6899475B2 (en) 2002-01-30 2005-05-31 Digimarc Corporation Watermarking a page description language file
US7463380B2 (en) 2004-04-23 2008-12-09 Sharp Laboratories Of America, Inc. Spooling/despooling subsystem job fingerprinting
DE602004030659D1 (en) 2004-04-26 2011-02-03 Adalbert Gubo Device for coding and marking documents for detection and recovery

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530757A (en) * 1994-06-28 1996-06-25 International Business Machines Corporation Distributed fingerprints for information integrity verification
EP0838785A2 (en) * 1996-10-28 1998-04-29 International Business Machines Corporation Protecting images with an image watermark
EP0947953A2 (en) * 1998-03-30 1999-10-06 Seiko Epson Corporation Watermarks for detecting tampering in images
JPH11298717A (en) * 1998-04-13 1999-10-29 Oki Data Corp Printing system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5644682A (en) * 1994-12-21 1997-07-01 Joseph Weinberger Method and system for incorporating indicia into a document generated by a computer application
US5530759A (en) * 1995-02-01 1996-06-25 International Business Machines Corporation Color correct digital watermarking of images
GB9504221D0 (en) * 1995-03-02 1995-04-19 Mor Limited Method of and apparatus for manipulating digital data works
GB9513790D0 (en) * 1995-07-06 1995-09-06 Highwater Fbi Limited Method of authenticating digital data works
US6198832B1 (en) * 1998-01-09 2001-03-06 U.S. Philips Corporation Embedding and detecting a watermark in images

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530757A (en) * 1994-06-28 1996-06-25 International Business Machines Corporation Distributed fingerprints for information integrity verification
EP0838785A2 (en) * 1996-10-28 1998-04-29 International Business Machines Corporation Protecting images with an image watermark
EP0947953A2 (en) * 1998-03-30 1999-10-06 Seiko Epson Corporation Watermarks for detecting tampering in images
JPH11298717A (en) * 1998-04-13 1999-10-29 Oki Data Corp Printing system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
IBM TDB November 1999, Accession No. NNRD42796 *
WPI Abstract Accession No. 2000-030724 & JP 11 298 717 A *

Also Published As

Publication number Publication date
GB2379119A (en) 2003-02-26
GB2379119B (en) 2004-12-08
GB0007330D0 (en) 2000-05-17
GB0224255D0 (en) 2002-11-27
WO2001074053A1 (en) 2001-10-04
AU2001240806A1 (en) 2001-10-08

Similar Documents

Publication Publication Date Title
EP1591953B1 (en) System and method for decoding digital encoded images
US6748533B1 (en) Method and apparatus for protecting the legitimacy of an article
US7571323B2 (en) Image processor, method thereof, computer program, and computer readable storage medium
US6101602A (en) Digital watermarking by adding random, smooth patterns
US7809152B2 (en) Visible authentication patterns for printed document
CA2326565C (en) Digital watermarking and banknotes
US8320607B2 (en) Image processing method and image processing device for embedding invisible sub information into main images
US20070003341A1 (en) Image processing device, image processing method, program, and recording medium
CA2374196A1 (en) Legitimacy protection of electronic document and a printed copy thereof
US7830537B2 (en) System and method for controlling copying of documents
US7257234B2 (en) Watermark-based goods authentication
US6636614B1 (en) Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph
US7352879B2 (en) Conjugate cluster screens for embedding digital watermarks into printed halftone documents
EP1770979A2 (en) Copy detection system using correlations of copy detection patterns
GB2360893A (en) Incorporating a fingerprint in a document at the printer driver
JP2007158947A (en) Image processing apparatus, program for executing image processing method, and medium which has stored program
Perry et al. Digital watermarks as a security feature for identity documents
Grusho et al. The research of a method to identify a workplace via a monitor snapshot
CA2355715A1 (en) Counterfeit deterrence system
Koltai et al. Enhanced optical security by using information carrier digital screening
Grover Data watermarking: Steganography and watermarking of digital data
Iqbal High capacity analog channels for smart documents
JP2008178081A (en) Method and system using digital watermark
KUMAR et al. A New Orthogonal Data Embedding for Binary Images in Morphological Transform Domain
Yoo et al. Practical off-line authentication

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)