$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Anti-counterfeiting method and apparatus using digital screening 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G09C-005/00
  • B42D-015/00
  • H04L-009/00
출원번호 US-0005529 (1998-01-12)
발명자 / 주소
  • Koltai Ferenc,HUX
  • Baros Laszlo,HUX
  • Adam Bence,HUX
  • Takacs Ferenc,HUX
출원인 / 주소
  • Juratrade, Limited, HUX
대리인 / 주소
    Ratner & Prestia
인용정보 피인용 횟수 : 174  인용 특허 : 29

초록

An apparatus and process for hiding the secondary image within the primary image and generating a high quality hard copy of the unified elemental image of a variety of media. The process comprises the steps of rasterizing the first image into an first elemental image and rasterizing the second image

대표청구항

[ What is claimed:] [1.] A method as implemented on a computer system for digitally producing encoded screens for incorporating secondary information composed of pixels as an anti-counterfeiting security feature into a visible primary image for use on a document, the method comprising the steps of:(

이 특허에 인용된 특허 (29)

  1. Brosh Scott (Arlington TX) Wright Timothy (Lake Dallas TX), Anti-counterfeiting process using lenticular optics and color masking.
  2. McGrew Stephen P. (149-B Josephine St. Santa Cruz CA 95060), Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns.
  3. Wen Xin, Copyright protection in color thermal prints.
  4. Abe Jin,JPX ; Nishi Tetsuya,JPX, Data transfer accounting device and method for performing an accounting process including an accounting information coll.
  5. Alasia Alfred, Digital anti-counterfeiting software method and apparatus.
  6. Wang Shen-ge, Digital watermarking using conjugate halftone screens.
  7. Knox Keith T., Digital watermarking using stochastic screen patterns.
  8. Pastor Jose (Westport CT), Electronic indicia in bit-mapped form.
  9. Alasia Alfred V. (146-07 13th Ave. Whitestone NY 11357), Encoding system.
  10. Ikenoue Yoshikazu (Toyohashi JPX) Kumashiro Hideo (Toyohashi JPX) Nakatani Munehiro (Toyohashi JPX), Image forming apparatus and copy management system.
  11. Merry Trevor (Nepean CAX) Boate Alan R. (Gloucester CAX), Latent images comprising phase shifted micro printing.
  12. Daly Scott J., Method and apparatus for hiding one image or pattern within another.
  13. Alasia Alfred V. (146-07 Thirteenth Ave. Whitestone NY 11357), Method and apparatus for scrambling and unscrambling bar code symbols.
  14. Berson William (Westport CT), Method and apparatus for verification of classes of documents.
  15. Rhoads Geoffrey B., Method and apparatus responsive to a code signal conveyed through a graphic image.
  16. Daly Scott J. ; Squilla John R. ; Denber Michel ; Honsinger Chris W. ; Hamilton John, Method for embedding digital information in an image.
  17. Honsinger Chris W. ; Rabbani Majid, Method for generating an improved carrier for use in an image data embedding application.
  18. Amidror Isaac,CHX ; Hersch Roger D.,CHX, Methods and apparatus for authentication of documents by using the intensity profile of moire patterns.
  19. Alasia Alfred V. (146-07 Thirteenth Ave. Whitestone NY 11357), Process of coding indicia and product produced thereby.
  20. Braudaway Gordon Wesley ; Mintzer Frederick Cole, Protecting images with an image watermark.
  21. Briggs Robert (Annandale VA) Iannacone Carmen (Fairfax VA) Rothey James (Fairfax VA) Evans David (Falls Church VA), Protection of an electronically stored image in a first color space by the alteration of a digital component in a second.
  22. Wang Ynjiun P. (Stony Brook NY) Swartz Jerome (Old Field NY) McGlynn Daniel R. (Brooklyn NY), Record with encoded data.
  23. Curry Douglas N. (Menlo Park CA), Rotating non-rotationally symmetrical halftone dots for encoding embedded data in a hyperacuity printer.
  24. Kendrick Jimmy Ray, Security bands to prevent counterfeiting with color copies.
  25. Mowry ; Jr. William H. (Ionia NY) Gerew Kathleen M. (Spartanburg SC), Security document using a variable dot screen.
  26. Wang Shen-ge (Fairport NY), Stochastic halftoning screening method.
  27. Conley Ralph F. (Miamisburg OH), System and method for encrypting sensitive information.
  28. Soltesz John A. (1082 Broadway Ave. Masury OH 44438), System for the secure storage and transmission of data.
  29. Mowry ; Jr. William H. (Dayton OH), Varying tone security document.

이 특허를 인용한 특허 (174)

  1. Reed, Alastair M.; Jones, Robert L., Apparatus to analyze security features on objects.
  2. Rhoads, Geoffrey B.; Gustafson, Ammon E., Apparatus to process images and video.
  3. Reed, Alastair M., Applying digital watermarks using dot gain correction.
  4. Stach, John, Arrangement of objects in images or graphics to convey a machine-readable signal.
  5. De Jong,Eduard Karel; Bos,Jurjen Norbert Eelco, Arrangements storing different versions of a set of data in separate memory areas and method for updating a set of data in a memory.
  6. Azuma, Takeo; Kondo, Kenji; Iwasaki, Masahiro; Wakamori, Masahiro, Artificial eye distinguishing method and device, artificial eye distinguishing program, iris recognition method, false printed matter distinguishing method, and image distinguishing method.
  7. Zeller,Claude; Mackay,Donald G.; Kilmartin,William; Cordery,Robert A.; Brosseau,William A.; Brunk,Hugh L.; Decker,Stephen K.; Tian,Jun, Authenticating printed objects using digital watermarks associated with multidimensional quality metrics.
  8. Alattar,Adnan M.; Rhoads,Geoffrey B., Authentication of identification documents and banknotes.
  9. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of identification documents using digital watermarks.
  10. Carr,J. Scott; Lofgren,Neil E.; Seder,Phillip Andrew, Authentication of objects using steganography.
  11. Rhoads, Geoffrey B., Authentication using a digital watermark.
  12. Rudaz, Nicolas; Kutter, Martin; Jordan, Fred; Gilles, Jean-Claude; Durant, Pierre, Banknotes with a printed security image that can be detected with one-dimensional signal processing.
  13. Deguillaume, Frédéric; Voloshynovskiy, Sviatoslav; Pun, Thierry, Character and vector graphics watermark for structured electronic documents security.
  14. De Jong,Eduard Karel, Computer-readable medium with microprocessor to control reading and computer arranged to communicate with such a medium.
  15. Meadows, Grant Robert; Stonehouse, Jonathan Richard, Consumer products packaging and methods for producing packaging.
  16. Brown, John Carl; Russell, Larry Arnise, Controlled transmissions across packet networks.
  17. Brown,John Carl; Russell,Larry Arnise, Controlled transmissions across packet networks.
  18. Dawson, Thomas Patrick, Copy protection arrangement.
  19. Dawson,Thomas Patrick, Copy protection arrangement.
  20. Phillips, George K.; Phillips, Noal, Copy-resistant security paper.
  21. Sadiq, Masoom, Currency examining system.
  22. Douglas U. Mennie ; John F. Weggesser ; Matthew S. Vogel ; Gary P. Watts ; Richard A. Mazur, Customizable international note counter.
  23. Mennie, Douglas U.; Weggesser, John F.; Vogel, Matthew S.; Watts, Gary P.; Mazur, Richard A., Customizable international note counter.
  24. De Jong,Eduard Karel, Data exchange system comprising portable data processing units.
  25. Ikeda,Yuichi; Sasanuma,Nobuatsu; Suzuki,Kazuo; Itagaki,Tomohisa; Zaima,Nobuhiko, Data processing system, maintenance apparatus and image processing apparatus.
  26. Reed, Alastair M.; Brundage, Trent J.; Cattone, Jeremy, Detecting information hidden out-of-phase in color channels.
  27. Reed, Alastair M., Detection from two chrominance directions.
  28. Reed, Alastair M., Detection from two chrominance directions.
  29. Reed, Alastair M.; Cattone, Jeremy, Detection of out-of-phase low visibility watermarks.
  30. Nobuyoshi Miyahara JP; Yoichi Yagasaki JP, Device and method for processing image data, transmitting medium, and recording medium.
  31. Reed, Alastair M.; Hannigan, Brett T., Digital watermark detection using predetermined color projections.
  32. Carr, J. Scott; Sher-Jan, Mahmood; Levy, Kenneth L.; Miller, Marc D.; McKinley, Tyler J., Digital watermarking for identification documents.
  33. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  34. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  35. Reed, Alastair M.; Brundage, Trent J., Digital watermarking in data representing color channels.
  36. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  37. Miller,Marc D.; Levy,Kenneth L.; Rhoads,Geoffrey B., Digital watermarking systems and methods.
  38. Rhoads, Geoffrey B., Digital watermarks and methods for security documents.
  39. Rhoads, Geoffrey B., Digital watermarks and postage.
  40. Rodriguez, Tony F.; Haynes, Mark E.; Brunk, Hugh L.; Rhoads, Geoffrey B., Digital watermarks for checking authenticity of printed objects.
  41. Rodriguez,Tony F.; Haynes,Mark E.; Brunk,Hugh L.; Rhoads,Geoffrey B., Digital watermarks for checking authenticity of printed objects.
  42. Decker, Stephen K.; Brunk, Hugh L.; Carr, J. Scott; Rhoads, Geoffrey B.; Lofgren, Neil E., Digitally watermarking holograms.
  43. McElvain, Jon, Distributing a SRE codes in halftone pixels pattern in supercell.
  44. Wicker, Thomas M., Document containing scanning survivable security features.
  45. Wicker, David Michael; Caton, Michael Scott, Document with linked viewer file for correlated printing.
  46. Rhoads, Geoffrey B.; Gustafson, Ammon E., Documents and methods involving multiple watermarks.
  47. Wicker, Thomas M.; Wicker, David M.; Caton, Michael Scott, Double-blind security features.
  48. Alattar, Osama M.; Reed, Alastair M.; Brundage, Trent J., Embedding digital watermarks in spot colors.
  49. Brunk,Hugh L.; Alattar,Osama M., Embedding digital watermarks in spot colors.
  50. Coyle, William J., Emissive image substrate marking, articles marked with an emissive image, and authentication methods involving the same.
  51. Crisan, Silviu; Gaudreau, Marc; Rygas, Tadeusz, Encoding hidden information in spatial line frequencies.
  52. Reed, Alastair M., Encoding in two chrominance directions.
  53. Reed, Alastair M., Encoding in two chrominance directions.
  54. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Nishi, Takahiro; Shibahara, Youji; Sasai, Hisao; Sugio, Toshiyasu, Encoding method and encoding apparatus.
  55. Reed, Alastair M.; Hannigan, Brett T.; Brundage, Trent J., Enhancing embedding of out-of-phase signals.
  56. Rhoads, Geoffrey B.; Gustafson, Ammon E., Equipment employing watermark-based authentication function.
  57. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Sasai, Hisao; Nishi, Takahiro; Shibahara, Youji; Sugio, Toshiyasu, Filtering method for performing deblocking filtering on a boundary between an intra pulse code modulation block and a non-intra pulse code modulation block which are adjacent to each other in an image.
  58. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Sasai, Hisao; Nishi, Takahiro; Shibahara, Youji; Sugio, Toshiyasu, Filtering method for performing deblocking filtering on a boundary between an intra pulse code modulation block and a non-intra pulse code modulation block which are adjacent to each other in an image.
  59. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Sasai, Hisao; Nishi, Takahiro; Shibahara, Youji; Sugio, Toshiyasu, Filtering method for performing deblocking filtering on a boundary between an intra pulse code modulation block and a non-intra pulse code modulation block which are adjacent to each other in an image.
  60. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Sasai, Hisao; Nishi, Takahiro; Shibahara, Youji; Sugio, Toshiyasu, Filtering method for performing deblocking filtering on a boundary between an intra pulse code modulation block and a non-intra pulse code modulation block which are adjacent to each other in an image.
  61. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Nishi, Takahiro; Shibahara, Youji; Sasai, Hisao; Sugio, Toshiyasu, Filtering method, moving picture coding apparatus, moving picture decoding apparatus, and moving picture coding and decoding apparatus.
  62. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Nishi, Takahiro; Shibahara, Youji; Sasai, Hisao; Sugio, Toshiyasu, Filtering method, moving picture coding apparatus, moving picture decoding apparatus, and moving picture coding and decoding apparatus.
  63. Simon Lau CA; Hui Wu CA, Financial document processing system and method of operating a financial document processing system to verify zone coordinates.
  64. Reed, Alastair M.; Rodriguez, Tony F.; Sharma, Ravi K., Fragile and emerging digital watermarks.
  65. Haynes,Mark E., Halftone primitive watermarking and related applications.
  66. Brunk, Hugh L., Halftone watermarking and related applications.
  67. Brunk, Hugh L., Halftone watermarking and related applications.
  68. Brunk, Hugh L., Halftone watermarking and related applications.
  69. Brunk,Hugh L., Halftone watermarking and related applications.
  70. Brunk,Hugh L.; Zeller,Claude, Halftone watermarking and related applications.
  71. McCarthy, Lawrence David; Ballard, Matthew John, Hidden image method and hidden image apparatus.
  72. Reed, Alastair M.; Brundage, Trent J., Hiding information out-of-phase in color channels.
  73. Reed,Alastair M., Hiding information to reduce or offset perceptible artifacts.
  74. Nishikado, Hiroshi; Shimazaki, Satoshi; Miwa, Tatahiro, INFORMATION CODE PRODUCT, MANUFACTURING DEVICE AND METHOD FOR MANUFACTURING THE SAME, INFORMATION CODE READING DEVICE, AUTHENTICATION SYSTEM, AUTHENTICATION TERMINAL, AUTHENTICATION SERVER, AND AUTHE.
  75. Alattar, Adnan M., Identification and protection of security documents.
  76. Alattar, Adnan M., Identification and protection of video.
  77. Jones, Robert; Bi, Daoshen; Mailloux, Dennis, Identification card printer-assembler for over the counter card issuing.
  78. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  79. Carr, J. Scott; Perry, Burt W.; Rhoads, Geoffrey B., Identification documents and authentication of such documents.
  80. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Illuminated decoder.
  81. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Illuminated lens device for use in object authentication.
  82. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Nishi, Takahiro; Shibahara, Youji; Sasai, Hisao; Sugio, Toshiyasu, Image coding method, image decoding method, image coding apparatus, image decoding apparatus, and image coding and decoding apparatus.
  83. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Nishi, Takahiro; Shibahara, Youji; Sasai, Hisao; Sugio, Toshiyasu, Image coding method, image decoding method, image coding apparatus, image decoding apparatus, and image coding and decoding apparatus.
  84. Lim, Chong Soon; Wahadaniah, Viktor; Naing, Sue Mon Thet; Nishi, Takahiro; Shibahara, Youji; Sasai, Hisao; Sugio, Toshiyasu, Image coding method, image decoding method, image coding apparatus, image decoding apparatus, and image coding and decoding apparatus.
  85. Yamaguchi, Takashi; Miki, Takeo, Image processing method.
  86. Yamaguchi,Takashi; Miki,Takeo, Image processing method.
  87. Labrec, Brian, Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  88. Labrec, Brian C., Increasing thermal conductivity of host polymer used with laser engraving methods and compositions.
  89. Rhoads,Geoffrey B.; Gustafson,Ammon E., Inferring object status based on detected watermark data.
  90. Kawaguchi, Eiji; Eason, Richard; Tsuda, Kunihiro, Information hiding system, method, and printed matter into which information is hidden.
  91. Liu,Chao, Invisible graphics context identifying system and fabrication method thereof.
  92. Barr, John Kennedy; Bradley, Brett A.; Hannigan, Brett T.; Alattar, Adnan M.; Durst, Robert, Layered security in digital watermarking.
  93. Bradley, Brett A.; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  94. Bradley, Brett Alan; Hannigan, Brett T.; Barr, John Kennedy, Layered security in digital watermarking.
  95. Reed, Alastair M.; Berkley, Jr., Lou H., Low visibility watermark using time decay fluorescence.
  96. Reed, Alastair M.; Bradley, Brett A., Low visibility watermarks using an out-of-phase color.
  97. Rodriguez, Tony F., Machine-readable features for objects.
  98. Reed, Alastair M.; Rodriguez, Tony F., Machine-readable security features for printed objects.
  99. Brunk,Hugh L., Measuring digital watermark strength using error correction coding metrics.
  100. Adam, Bence; Manhercz, Kalman; Takacs, Ferenc, Method and apparatus for generating and authenticating security documents.
  101. Grewe, Ralph; Hegemann, Stefan; Zobel, Matthias, Method and device for analyzing trafficability.
  102. Alasia,Alfred V.; Alasia,Alfred J.; Alasia,Thomas C.; Cvetkovic,Slobodan, Method and system for controlling encoded image production.
  103. Alasia,Alfred V.; Alasia,Alfred J.; Alasia,Thomas C.; Cvetkovic,Slobodan, Method and system for controlling encoded image production using image signatures.
  104. Hogl, Christian, Method and system for transmitting data from a first data processing device to a second data processing device.
  105. De Jong, Eduard Karel, Method and system of communicating devices, and devices therefor, with protected data transfer.
  106. Cvetkovic, Slobodan; Alasia, Thomas C.; Alasia, Alfred J., Method for constructing a composite image incorporating a hidden authentication image.
  107. Slobodan, Cvetkovic; Alasia, Thomas C.; Alasia, Alfred J.; Quinn, Cary, Method for encoding and simultaneously decoding images having multiple color components.
  108. Jordan, Frederic; Meylan, Roland; Kutter, Martin, Method for preventing counterfeiting or alteration of a printed or engraved surface.
  109. Rhoads,Geoffrey B.; Gustafson,Ammon E., Method for utilizing fragile watermark for enhanced security.
  110. Rhoads,Geoffrey B., Methods and apparatus to produce security documents.
  111. Coyle, William J.; Smith, John C., Methods and ink compositions for invisibly printed security images having multiple authentication features.
  112. Rhoads, Geoffrey B., Methods and systems for marking printed documents.
  113. Geoffrey B. Rhoads, Methods and systems for watermark processing of line art images.
  114. Rhoads, Geoffrey B., Methods and systems for watermark processing of line art images.
  115. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  116. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods and systems using multiple watermarks.
  117. Rhoads, Geoffrey B.; Gustafson, Ammon E., Methods employing multiple watermarks.
  118. Rhoads, Geoffrey B., Methods for encoding security documents.
  119. Rhoads, Geoffrey B., Methods for steganographic encoding media.
  120. Rhoads,Geoffrey B.; Gustafson,Ammon E., Methods to evaluate images, video and documents.
  121. Alasia,Alfred V.; Alasia,Thomas C.; Alasia,Alfred J., Multi-section decoding lens.
  122. LaBrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  123. Labrec, Brian C.; Anderson, Joseph; Jones, Robert L.; Batey, Danielle, Multiple image security features for identification documents and methods of making same.
  124. Rhoads,Geoffrey B.; Gustafson,Ammon E., Multiple watermarks in content.
  125. Cok,Ronald S.; Bryant,Robert C., Non-image pixel data stored on hard-copy image media.
  126. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, Object authentication using encoded images digitally stored on the object.
  127. Huang,Sheng; Wu,Jian Kang, Optical watermark.
  128. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  129. Reed, Alastair M., Out of phase digital watermarking in two chrominance directions.
  130. Wang, Shen-Ge; Fan, Zhigang, Pantograph methods, apparatus and systems based on UCR/GCR.
  131. Reed, Alastair M.; Rogers, Eliot, Perceptability model applied to watermark signals.
  132. Carr,J. Scott; Perry,Burt W.; Rhoads,Geoffrey B., Physical objects and validation of physical objects.
  133. Yamashita, Taichiro; Shibuya, Takeshi; Matsuno, Junichi, Printed matter including invisible information and printing system.
  134. Rhoads, Geoffrey B., Printer driver separately applying watermark and information.
  135. Yoshida, Kenji, Printing medium, information processing method, information processing device.
  136. Hudson,Philip; Drinkwater,John, Product verification and authentication system and method.
  137. Jones, Robert L.; Reed, Alastair M., Readers to analyze security features on objects.
  138. Rhoads,Geoffrey B.; Rodriguez,Tony F., Secure document design carrying auxiliary machine readable information.
  139. Rhoads, Geoffrey B., Secure document design with machine readable, variable message encoded in a visible registration pattern.
  140. De Jong,Eduard Karel, Secure photo carrying identification device, as well as means and method for authenticating such an identification device.
  141. Field, Gary, Security code verification for identification cards.
  142. Rhoads, Geoffrey B.; Rodriguez, Tony F., Security document carrying machine readable pattern.
  143. Tompkin, Wayne Robert; Schilling, Andreas; Peters, John Anthony, Security document with electrically-controlled display element.
  144. Phillips, George K., Security document with nano-pattern.
  145. Jones,Robert L.; Reed,Alastair M., Security features for objects and method regarding same.
  146. Carr, Jonathan Scott; Perry, Burt W.; Rhoads, Geoffrey B., Self validating security documents utilizing watermarks.
  147. Alasia,Alfred V.; Alasia,Thomas C., Self-authenticating documents.
  148. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C., Self-authenticating documents with printed or embossed hidden images.
  149. Wicker, David Michael; Caton, Michael Scott, Solid-color embedded security feature.
  150. Coyle, William J.; Stramondo, Anthony, Stable emissive toner composition system and method.
  151. Coyle, William J.; Stramondo, Anthony, Stable emissive toner composition system and method.
  152. Coyle, William J.; Stramondo, Anthony, Stable emissive toner composition system and method.
  153. Coyle, William J.; Stramondo, Anthony, Stable emissive toner composition system and method.
  154. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  155. Miller, Marc D.; Levy, Kenneth L.; Rhoads, Geoffrey B., Steganographic systems and methods.
  156. De Jong,Eduard Karel, Superposition of data over voice.
  157. Alasia, Alfred V.; Alasia, Thomas C.; Alasia, Alfred J., System and method for authenticating an article.
  158. Alasia,Alfred V.; Alasia,Thomas C.; Alasia,Alfred J., System and method for authenticating an article.
  159. Alasia,Alfred V.; Alasia,Alfred J.; Alasia,Thomas C., System and method for authenticating objects.
  160. Quinn, Cary M; Cvetkovic, Slobodan; Ilic, Igor, System and method for creating an animation from a plurality of latent images encoded into a visible image.
  161. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, System and method for decoding digital encoded images.
  162. Alasia,Alfred V.; Alasia,Alfred J.; Alasia,Thomas C.; Cvetkovic,Slobodan, System and method for decoding digital encoded images.
  163. Sansone, Ronald P., System and method for issuing electronic tickets.
  164. Merry,Trevor; Buzuloiu,Ileana, System for producing a printable security device image and detecting latent source image(s) therefrom.
  165. Alasia, Alfred V.; Alasia, Alfred J.; Alasia, Thomas C.; Cvetkovic, Slobodan, Systems and methods for authenticating objects using multiple-level image encoding and decoding.
  166. Alattar, Adnan M.; Rhoads, Geoffrey B., Tamper-resistant authentication techniques for identification documents.
  167. Jones, Robert L.; Kenen, Leo M., Three dimensional data storage.
  168. Izawa, Hikaru; Fujita, Masanobu; Ohya, Toitsu, Valuable paper distinguishable by a validator for discriminating bills.
  169. Reed,Allister; Hannigan,Brett, Watermark detection using adaptive color projections.
  170. Rhoads,Geoffrey B.; Carr,J. Scott, Watermark embedder and reader.
  171. Walton, Scott E., Watermarking a page description language file.
  172. Alattar, Adnan M.; Alattar, Osama M., Watermarking electronic text documents.
  173. Alattar, Adnan M.; Alattar, Osama M., Watermarking electronic text documents.
  174. Ahmed, Farid, Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로