GB2360893A - Incorporating a fingerprint in a document at the printer driver - Google Patents
Incorporating a fingerprint in a document at the printer driver Download PDFInfo
- Publication number
- GB2360893A GB2360893A GB0007330A GB0007330A GB2360893A GB 2360893 A GB2360893 A GB 2360893A GB 0007330 A GB0007330 A GB 0007330A GB 0007330 A GB0007330 A GB 0007330A GB 2360893 A GB2360893 A GB 2360893A
- Authority
- GB
- United Kingdom
- Prior art keywords
- fingerprint
- image
- printed
- printer driver
- image data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/00127—Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture
- H04N1/00204—Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server
- H04N1/00236—Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server using an image reading or reproducing device, e.g. a facsimile reader or printer, as a local input to or local output from a computer
- H04N1/00238—Connection or combination of a still picture apparatus with another apparatus, e.g. for storage, processing or transmission of still picture signals or of information associated with a still picture with a digital computer or a digital computer system, e.g. an internet server using an image reading or reproducing device, e.g. a facsimile reader or printer, as a local input to or local output from a computer using an image reproducing device as a local output from a computer
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3269—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs
- H04N2201/327—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of machine readable codes or marks, e.g. bar codes or glyphs which are undetectable to the naked eye, e.g. embedded codes
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Accessory Devices And Overall Control Thereof (AREA)
- Editing Of Facsimile Originals (AREA)
- Record Information Processing For Printing (AREA)
- Processing Or Creating Images (AREA)
Abstract
A method of incorporating a fingerprint into a printed work, which fingerprint is substantially invisible to the naked eye but can be recognised by image processing techniques. The method comprises the steps of sending digital data corresponding to an image to be printed to a printer driver 5, incorporating at least one fingerprint into the data during processing by the printer driver 5, and sending the data processed by the printer driver 5 to a printer 2. The fingerprint may be subjected to a one way hashing operation. The level of the fingerprint may be altered in accordance with the required image quality.
Description
2360893 DOCUMENT MARKING The present invention relates to document marking
and in particular to a method, apparatus, and computer program for incorporating a unique identifier into a printed document.
The counterfeiting of bank notes and of other intrinsically valuable documents has always been a serious problem which has exercised the minds of individuals, companies, and governments alike. The counterfeiting of bank notes in the US alone is estimated to run at 70 million dollars per annum. Recently, the problem of counterfeiting has increased due to the availability of high quality, low cost digital printers and scanners, and the quality of counterfeits produced by such means is approaching that which can be achieved by conventional offset lithography equipment.
It will be appreciated that the potential for damage is enormous, if every home and office is capable of producing extremely high quality forgeries.
There is only a limited amount which can be done- to stop a person producing counterfeits if they have the desire to do so. Attempts have been made to produce bank notes which are in some ways resistant to photocopying or digital scanning, but these have met with only limited success and at best achieve only some degree of degradation in the copies or scanned image. In the light of this, enforcement agencies still rely on more conventional methods of policing. However, in the event that a suspected counterfeiter is apprehended by the authorities, there is often a problem in obtaining sufficient information to achieve a successful prosecution. Particularly where counterfeits are prepared using a home PC and printer, it is very easy for the counterfeiter to erase any trace of his activities.
One solution to the problem of obtaining evidence for use in a court of law, involves incorporating a "fingerprint" into printed or copied documents which is unique to the equipment used to prepare the document. For example, certain photocopiers comprise a chip on which is encoded a unique identifier which is incorporated into a copied document in such a way that, whilst substantially invisible to the naked eye, it can be 2 discerned using special imaging technology. The requirement for a special chip adds to manufacturing costs however and, whilst contributing only a relatively small fraction of the total cost of a photocopier, would be more significant if the same technology were to be incorporated into desktop printers.
It is an object of the present invention to overcome or at least mitigate the disadvantages of existing anti-counterfeiting measures noted above. In particular, it is an object of the present invention to provide a relatively simple and low cost anti- counterfeiting means which may be incorporated into desktop PCs, workstations, and the like. It is also an object of the present invention to provide a mechanism for combating the pirating of printer driver software and software components.
According to a first aspect of the present invention there is provided a method of incorporating a fingerprint into a printed work, which fingerprint is substantially invisible to the naked eye but can be recognised by image processing techniques, the method comprising the steps of..
sending digital data corresponding to an image to be printed to a printer driver; incorporating at least one fingerprint into the data during processing by the printer driver; and sending the data processed by the printer driver to a printer.
The printer driver represents a "poinC through which all data to be printed must pass, and is aware of both the format of the data received from the printing application and of the format of data required by the printer. It therefore represents a more comprehensive solution than could be achieved by incorporating a fingerprint into image data at say an image scanner (using either a software or a hardware solution) or by way of a specific application (e.g. Microsoft WordTm). Implementing a solution at the operating system level is also unlikely to be feasible as many operating systems are already in use and it would be difficult or impossible to "retrofit" a fingerprint solution. In contrast, printer drivers tend to be replaced or updated (e.g. to introduce bug fixes) fairly often, and so a solution introduced at this level would percolate through computer systems fairly rapidly.
3 Preferably, the step of incorporating at least one fingerprint into the image data is carried out automatically by the printer driver substantially without any possibility for intervention by the user of the equipment on which the printer driver resides.
Preferably, said fingerprint corresponds to an identification (e.g. serial number) associated with the host computer system (e.g. the ID of the host computer BIOS, the operating system ID or a chip ID), the printer, or the printer driver. More preferably, the identification is a unique identifier. The method of the present invention may comprise the steps of determining whether or not the printer has an ID which can be used as said fingerprint and, if not, determining whether or not the computer system has a usable ED. The latter step may comprise determining whether or not the computer operating system has an ID which can be used as said fingerprint and, if not, determining whether or not the motherboard or microprocessor of the computer system has a usable ID. The step(s) of determining a suitable fingerprint may be carded for example out during the installation of the printer driver, or each time the printer driver receives a new print job.
The fffigerprint may be incorporated into the image data to.be printed, in an encrypted form so that it can only be determined after image processing and decryption steps. The use of encryption may prevent unauthorised parties from determining the source of a printed document. Encryption may be achieved, for example, using an encryption key based algorithm.
In certain embodiments of the present invention, the fingerprint may be subjected to a one way hashing operation using a hashing function prior to incorporation into the image data. This would make it difficult or impossible to reverse the process, i.e. to determine the fingerprint from data recovered from a printed work. However, it would be possible to associate a printed work to a computer system if the computer system is available. The use of a fingerprint which is generated using multiple IDs, e.g. an ID of the printer and an ID of the printer driver, may result in an increased level of security.
Preferably, the step of incorporating a fingerprint into the image data comprises altering the colour and/or intensity of pixels of the image data. Preferably, this step is carried 4 out after the received image data has been rasterised by the printer driver. More preferably, the luminance of pixels is varied, whilst the chrominance remains substantially unchanged. This may be achieved, in a colour image, by varying each of the Red, Green, and Blue components.
Preferably, the level by which the image data is altered to incorporate the fingerprint depends upon the quality of the image to be printed. The level of alteration may vary with one or more of the following; the printing resolution, paper quality, and bit depth of the image.
The level of alteration may vary across the image to be printed. A single fingerprint may be repeated at intervals across the image to be printed, or different fingerprints may be incorporated into a single image.
According to a second aspect of the present invention there is provided a computer memory encoded with executable instructions representing a printer driver computer program for causing a computer system to output digital data to a printer, wherein the resulting printed image comprises an image corresponding to the image data received by the printer driver and a fingerprint which is substantially invisible to the naked eye but can be recognised by image processing techniques.
Preferably, said computer program is'arranged to be inoperable in the event that software code relating to said fingerprint or to the incorporation of said fingerprint into an image to be printed is tampered with.
According to a third aspect of the present invention there is provided a method of combating the counterfeiting of printed works, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
According to a fourth aspect of the present invention there is provided a method of combating the pirating of driver software or images, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
According to a fifth aspect of the present invention there is provided a computer system having memory means storing a computer program according to the above second aspect of the present invention, and processing means for executing said program so as to cause a fingerprint to be incorporated into an image printed from the computer system.
According to a sixth aspect of the present invention there is provided a method of incorporating a fingerprint into printed image, which fingerprint is substantially invisible to the naked eye, the method comprising encrypting the fingerprint using a one-way hashing function prior to its incorporation into image data to be printed, and subsequently printing the modified image data, wherein the fingerprint may only. be recovered from the printed image using a knowledge of the hashing function.
For a better understanding of the present invention and in order to show how the same may be carried into effect reference will now be made, by way of example, to the accompanying drawings, in which:
Figure 1 illustrates a typical computer system; and Figure 2 illustrates in block diagram form a printing portion of the computer system of Figure 1.
There is illustrated in Figure 1 a personal computer (PC) 1 and a digital printer 2. The PC is controlled by a software operating system 3 such as Microsoft Windows 98Tm, LINUX, or UNIX7m, and is arranged to run applications 4 such as Microsoft WordTm, Adobe PhotoShopym and the like. In use, data to be printed is transferred from an application 4, under the control of the operating system 3, to a software module known as a printer driver 5. Printer drivers are often printer specific and are typically installed 6 into a PC from a printer manufacturer's CD ROM or from a driver library provided with the operating system. Printer drivers may be updated, e.g. to add new features or to fix bugs, using executable files supplied by the driver manufacturers.
The printer driver 5 typically takes image data to be printed (the image may correspond to text, pictures, diagrams, etc), and converts this into a grid (or raster space) of values, where each value represents the colour of the image at that point in the grid. This process is referred to as "rasterising". Following the rasterising of the image data, the data is modified in order to incorporate into the image a unique fingerprint. This fingerprint is preferably a unique ID which is encoded into the printer hardware or software and which is detected by the printer driver 5 during its installation. The determined ID is stored in an appropriate secure location for later use by the printer driver 5. If the printer 2 has no useable ID, or the ED cannot be determined for any reason, the printer driver 5 may then try to identify a motherboard serial number or CPU serial number (as for example on the Intel Pentium III). If a usable ID still cannot be obtained, then the printer driver 5 may look for a hard disk serial number, an Ethernet MAC address (when the computer has a card with a non-null address), a hash value generated based on the bad sector map on the boot drive, a Plug and Play serial number (on PCs with PC1 only), or an MS-DOS serial number (on PCs). If there is no convenient permanent value, then one may be generated, for example using CoCreateGuid (under MS Windows on a PC), and stored in the PC's registry or its equivalent, or in a custom generated file. A unique ID may also be generated using some combination of the listed codes. An advantage of using such a combination would be that even though a user changes some parts of his system, it may still be possible to link the fingerprint to remaining parts of the system.
Figure 2 illustrates schematically a printing system of the computer system of Figure 1. In essence, the printing system consists of a printer driver 5 which uses a set of data processing modules to process image data received from the operating system. A first of the modules used by the driver 5 is a rasterising module 6, the function of which has already been described above. The second module which receives the rasterised data from the rasterising module is a fingerprint application module 7.
7 The operation of the fingerprint module 7 will not be describer in detail here. Instead, reference should be made to International application no. PCT/GB/00491 in the name of Highwater FBI Ltd. Briefly, this document describes a method of incorporating a fingerprint into a printed image in such a way that the fingerprint is not readily visible to 5 the naked eye, but can be determined by scanning and processing the printed image. The method uses a technique known as the "permutation" method and involves applying a code to modify the luminance (with the chrominance remaining substantially unchanged) of a sequence of pixels of the rasterised image data. Permutations of the code are applied in sequence to modify the entire image (alternatively, the process may be repeated for multiple tiled regions of the image). Orientation markers are incorporated into the image to allow analysis software to correctly orient the image. PCT/GB/00491 describes how the fingerprint may be recovered using a statistical analysis of a subsequently scanned version of the image, and the encryption key. The fingerprint module of the printer driver 5 uses the permutation technique, where the code used to modify the image data is generated using the fingerprint described above and an encryption key. Both the fingerprint and the encryption key are stored in secure block of memory and are retrieved by the fingerprint module when required.
The "strength" of the fingerprint may be scaled prior to its incorporation into the image in order to prevent the encrypted fingerprint from visibly altering the image quality (obviously any distortion of a printed image is undesirable). The strength may be determined on the basis of a number of factors including the resolution at which the printing occurs, the quality of the paper on which the image is to be printed, and the bit depth of the image data. The strength may vary across an image depending upon local conditions, e.g. the fingerprint is applied more heavily in noisy regions.
It will be appreciated that in order to be useful, the fingerprint module should be secure against tampering, e.g. to modify the fingerprint. A satisfactory level of security may be achieved, for example, by using the multiple storage and cross-referencing of the fingerprint, and/or storage of the fingerprint within a self-modifying driver.
The image data output from the fingerprint module 7 is passed by the printer driver 5 to a rendering module 8. A main function of the rendering module 8 is to convert the pixel 8 intensity data into corresponding halftone values (most printers are incapable of varying the intensity of a printed pixel, and so intensity variations are achieved by mixing colour and white pixels to an appropriate degree, a process known as "halftoning"). The halftone data is then passed to a formatting module 9 which arranges the data, and 5 introduces formatting commands, into a forirn acceptable to the printer 2.
It is envisaged that the present invention may be adopted by organisations, such as the major world banks, as a means of combating the forgery of bank notes, bonds, certificates, and the like. The matching of an fingerprint found on a counterfeit document to a particular piece of software or hardware is likely to prove convincing evidence in a court of law.
It is also envisaged that manufacturers of printer drivers (or other software components) may use the present invention to combat the pirating of their software. Printer drivers and technologies such as halftoning and colour matching are critical to the success of print devices and require multiple man years to develop. Third parties are often tempted copy all or parts of drivers and to illegally attempt to pass them off as having developed them themselves. This problem may be combated by introducing of a hidden fingerprint into printed output as described above.
It will be appreciated by the person of skill in the art that various modifications may be made to the above described embodiment without departing from the scope of the present invention. For example, in order to overcome fears that an innocently printed document may be traced back to an originating computer system or printer, a one-way hashing function may be used to encrypt a fingerprint in a printer driver. The operation of one-way hashing is described in "Applied Cryptography% Bruce Schneier, 2ed, 1996, John Wiley & Sons, p30-31 and 351-354, and results in a value from which the fingerprint cannot be derived without the knowledge of the hashing function. Thus, assuming that the hashing function is only contained in the printer driver, authorities would only be able to match a printed document to a computer system or printer if they have access to the printer driver. The fingerprint may be combined with a unique identity known only to the printer driver, prior to hashing, in order to significantly 9 reduce the possibility of someone deriving the fingerprint by applying all possible fingerprints to recovered image data.
Claims (18)
1. A method of incorporating a fingerprint into a printed work, which fingerprint is substantially invisible to the naked eye but can be recognised by image processing techniques, the method comprising the steps of. sending digital data corresponding to an image to be printed to a printer driver; incorporating at least one fingerprint into the data during processing by 'the printer driver; and sending the data processed by the printer driver to a printer. 10
2. A method according to claim 1, wherein the step of incorporating at least one fingerprint into the image data is carried out automatically by the printer driver substantially without any possibility for intervention by the user of the equipment on which the printer driver resides.
3. A method according to claim 1 or 2, wherein said fingerprint corresponds to an identification associated with the host computer system or the printer.
4. A method according to claim 3, wherein the identification is selected from one of the following: a printer hardware or software ID, computer motherboard serial number, a CPU serial number, a hard disk serial number, an Ethernet MAC address, a hash value generated based on the bad sector map on the boot drive, a Plug and Play serial number, or an MS-DOS serial number, or an identification generated by the printer driver.
5. A method according to claim 4, wherein the identification is generated using two or more of the listed numbers.
6. A method according to any one of the preceding claims, wherein a fingerprint is identified during installation of the printer driver.
11
7. A method according to any one of the preceding claims, wherein the fingerprint is incorporated into the image to be printed in an encrypted form so that it can only be determined after image processing and decryption steps.
8. A method according to claim 7 and comprising subjecting the fingerprint to a one way hashing operation using a hashing function, prior to incorporation into the image data.
9. A method according to any one of the preceding claims, wherein the step of incorporating a fingerprint into the image data comprises altering the colour and/or intensity of pixels of the image data.
10. A method according to claim 9, wherein the luminance of pixels is varied, whilst the chrominance remains substantially unchanged.
11. A method according to claim 9 or 10, wherein the pixels are altered after the received image data has been rasterised by the print driver.
12. A method according to any one of the preceding claims, wherein the level by which the image data is altered to incorporate the fingerprint depends upon the quality of the image to be printed.
13. A computer memory encoded with executable instructions representing a printer driver computer program for causing a computer system to output digital data to a printer, wherein the resulting printed image comprises an image corresponding to the image data received by the printer driver and a fingerprint which is substantially invisible to the naked eye but can be recognised by image processing techniques.
14. A method according to claim 13, wherein said computer program is arranged to be inoperable in the event that software code relating to said fingerprint or to the incorporation of said fingerprint into an image to be printed is tampered with.
12
15. A method of combating the counterfeiting of printed works, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
16. A method of combating the pirating of driver software or images, the method comprising incorporating into printer driver software, software code for causing a fingerprint to be incorporated into image data processed by that printer driver, which fingerprint results in a change in the image when printed which is substantially invisible to the naked eye but can be detected by image processing techniques.
17. A computer system having memory means storing a computer program according to the above second aspect of the present invention, and processing means for executing said program so as to cause a fingerprint to be incorporated into an image printed from the computer system.
18. A method of incorporating a fingerprint into printed image, which fingerprint is substantially invisible to the naked eye, the method comprising encrypting the fingerprint using a one-way hashing function prior to its incorporation into image data to be printed, and subsequently printing the modified image data, wherein the fingerprint may only be recovered from the printed image using a knowledge of the hashing function.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0007330A GB2360893A (en) | 2000-03-28 | 2000-03-28 | Incorporating a fingerprint in a document at the printer driver |
GB0224255A GB2379119B (en) | 2000-03-28 | 2001-03-14 | Document marking |
AU2001240806A AU2001240806A1 (en) | 2000-03-28 | 2001-03-14 | Document marking |
PCT/GB2001/001088 WO2001074053A1 (en) | 2000-03-28 | 2001-03-14 | Document marking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB0007330A GB2360893A (en) | 2000-03-28 | 2000-03-28 | Incorporating a fingerprint in a document at the printer driver |
Publications (2)
Publication Number | Publication Date |
---|---|
GB0007330D0 GB0007330D0 (en) | 2000-05-17 |
GB2360893A true GB2360893A (en) | 2001-10-03 |
Family
ID=9888450
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0007330A Withdrawn GB2360893A (en) | 2000-03-28 | 2000-03-28 | Incorporating a fingerprint in a document at the printer driver |
GB0224255A Expired - Fee Related GB2379119B (en) | 2000-03-28 | 2001-03-14 | Document marking |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB0224255A Expired - Fee Related GB2379119B (en) | 2000-03-28 | 2001-03-14 | Document marking |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU2001240806A1 (en) |
GB (2) | GB2360893A (en) |
WO (1) | WO2001074053A1 (en) |
Families Citing this family (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9630443B2 (en) | 1995-07-27 | 2017-04-25 | Digimarc Corporation | Printer driver separately applying watermark and information |
US7142691B2 (en) | 2000-03-18 | 2006-11-28 | Digimarc Corporation | Watermark embedding functions in rendering description files |
US7246239B2 (en) | 2001-01-24 | 2007-07-17 | Digimarc Corporation | Digital watermarks for checking authenticity of printed objects |
US6952485B1 (en) | 2000-09-11 | 2005-10-04 | Digimarc Corporation | Watermark encoding and decoding in imaging devices and imaging device interfaces |
US6760464B2 (en) | 2000-10-11 | 2004-07-06 | Digimarc Corporation | Halftone watermarking and related applications |
US6993150B2 (en) | 2001-01-24 | 2006-01-31 | Digimarc Corporation | Halftone primitive watermarking and related applications |
US6899475B2 (en) | 2002-01-30 | 2005-05-31 | Digimarc Corporation | Watermarking a page description language file |
US7463380B2 (en) | 2004-04-23 | 2008-12-09 | Sharp Laboratories Of America, Inc. | Spooling/despooling subsystem job fingerprinting |
DE602004030659D1 (en) | 2004-04-26 | 2011-02-03 | Adalbert Gubo | Device for coding and marking documents for detection and recovery |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530757A (en) * | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
EP0838785A2 (en) * | 1996-10-28 | 1998-04-29 | International Business Machines Corporation | Protecting images with an image watermark |
EP0947953A2 (en) * | 1998-03-30 | 1999-10-06 | Seiko Epson Corporation | Watermarks for detecting tampering in images |
JPH11298717A (en) * | 1998-04-13 | 1999-10-29 | Oki Data Corp | Printing system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5644682A (en) * | 1994-12-21 | 1997-07-01 | Joseph Weinberger | Method and system for incorporating indicia into a document generated by a computer application |
US5530759A (en) * | 1995-02-01 | 1996-06-25 | International Business Machines Corporation | Color correct digital watermarking of images |
GB9504221D0 (en) * | 1995-03-02 | 1995-04-19 | Mor Limited | Method of and apparatus for manipulating digital data works |
GB9513790D0 (en) * | 1995-07-06 | 1995-09-06 | Highwater Fbi Limited | Method of authenticating digital data works |
US6198832B1 (en) * | 1998-01-09 | 2001-03-06 | U.S. Philips Corporation | Embedding and detecting a watermark in images |
-
2000
- 2000-03-28 GB GB0007330A patent/GB2360893A/en not_active Withdrawn
-
2001
- 2001-03-14 WO PCT/GB2001/001088 patent/WO2001074053A1/en active Application Filing
- 2001-03-14 GB GB0224255A patent/GB2379119B/en not_active Expired - Fee Related
- 2001-03-14 AU AU2001240806A patent/AU2001240806A1/en not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5530757A (en) * | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification |
EP0838785A2 (en) * | 1996-10-28 | 1998-04-29 | International Business Machines Corporation | Protecting images with an image watermark |
EP0947953A2 (en) * | 1998-03-30 | 1999-10-06 | Seiko Epson Corporation | Watermarks for detecting tampering in images |
JPH11298717A (en) * | 1998-04-13 | 1999-10-29 | Oki Data Corp | Printing system |
Non-Patent Citations (2)
Title |
---|
IBM TDB November 1999, Accession No. NNRD42796 * |
WPI Abstract Accession No. 2000-030724 & JP 11 298 717 A * |
Also Published As
Publication number | Publication date |
---|---|
GB2379119A (en) | 2003-02-26 |
GB2379119B (en) | 2004-12-08 |
GB0007330D0 (en) | 2000-05-17 |
GB0224255D0 (en) | 2002-11-27 |
WO2001074053A1 (en) | 2001-10-04 |
AU2001240806A1 (en) | 2001-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1591953B1 (en) | System and method for decoding digital encoded images | |
US6748533B1 (en) | Method and apparatus for protecting the legitimacy of an article | |
US7571323B2 (en) | Image processor, method thereof, computer program, and computer readable storage medium | |
US6101602A (en) | Digital watermarking by adding random, smooth patterns | |
US7809152B2 (en) | Visible authentication patterns for printed document | |
CA2326565C (en) | Digital watermarking and banknotes | |
US8320607B2 (en) | Image processing method and image processing device for embedding invisible sub information into main images | |
US20070003341A1 (en) | Image processing device, image processing method, program, and recording medium | |
CA2374196A1 (en) | Legitimacy protection of electronic document and a printed copy thereof | |
US7830537B2 (en) | System and method for controlling copying of documents | |
US7257234B2 (en) | Watermark-based goods authentication | |
US6636614B1 (en) | Method for preventing the falsification of documents comprising a photograph, preferably a facial-view photograph | |
US7352879B2 (en) | Conjugate cluster screens for embedding digital watermarks into printed halftone documents | |
EP1770979A2 (en) | Copy detection system using correlations of copy detection patterns | |
GB2360893A (en) | Incorporating a fingerprint in a document at the printer driver | |
JP2007158947A (en) | Image processing apparatus, program for executing image processing method, and medium which has stored program | |
Perry et al. | Digital watermarks as a security feature for identity documents | |
Grusho et al. | The research of a method to identify a workplace via a monitor snapshot | |
CA2355715A1 (en) | Counterfeit deterrence system | |
Koltai et al. | Enhanced optical security by using information carrier digital screening | |
Grover | Data watermarking: Steganography and watermarking of digital data | |
Iqbal | High capacity analog channels for smart documents | |
JP2008178081A (en) | Method and system using digital watermark | |
KUMAR et al. | A New Orthogonal Data Embedding for Binary Images in Morphological Transform Domain | |
Yoo et al. | Practical off-line authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |