최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
DataON 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Edison 바로가기다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
Kafe 바로가기국가/구분 | United States(US) Patent 등록 |
---|---|
국제특허분류(IPC7판) |
|
출원번호 | US-0113910 (2002-03-28) |
발명자 / 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 | 피인용 횟수 : 94 인용 특허 : 397 |
Image, video, or audio data is encoded with both a frail and a robust watermark. The two watermarks respond differently to different forms of processing (e.g., copying the object may render the frail watermark unreadable), permitting an original object to be distinguished from a processed object. Ap
Image, video, or audio data is encoded with both a frail and a robust watermark. The two watermarks respond differently to different forms of processing (e.g., copying the object may render the frail watermark unreadable), permitting an original object to be distinguished from a processed object. Appropriate action can then taken in response thereto.
1. A watermarking method to mark a security document comprising:receiving first information; receiving second information; embedding the first information as a first digital watermark in data representing a first portion of the security document; embedding the second information as a second digital
1. A watermarking method to mark a security document comprising:receiving first information; receiving second information; embedding the first information as a first digital watermark in data representing a first portion of the security document; embedding the second information as a second digital watermark in data representing a second portion of the security document, wherein an original security document comprises both a first digital watermark and a second digital watermark, and wherein the first and second watermarks are provided so as to each react in a different manner when the security document is subjected to a predetermined process. 2. The method of claim 1 in which the first watermark is designed to withstand a predetermined process, and the second watermark is not.3. The method of claim 2 in which the predetermined process includes scanning.4. The method of claim 2 in which the predetermined process includes printing.5. The method of claim 2 in which the predetermined process includes distortion.6. The method of claim 1 in which the security document comprises an image.7. The method of claim 6 in which the security document comprises a document printed with said image.8. The method of claim 1 that further includes analyzing a suspect document for the presence of the second watermark, the absence of said second watermark indicating that the suspect document is not an original document.9. The method of claim 1 in which the document includes plural data samples, each sample having a value, and the watermarking changes the values of at least certain of said samples.10. The method of claim 9 in which said samples comprises pixels.11. The method of claim 9 wherein the watermarking of at least the first watermark is effected by slight alterations to the sampled data's color.12. The method of claim 11 in which the first watermark is designed to withstand a predetermined process, and the second watermark is not, wherein the predetermined process comprises at least scanning and reprinting.13. A security document provide according to claim 1, wherein at least a portion of one of the first digital watermark and the second digital watermark is provided on the security document with photoluminescent ink.14. The security document of claim 13 wherein the predetermined process comprises exposure to non-visible light.15. The security document of claim 13 wherein the predetermined process comprises optical scanning.16. A security document according to claim 1, wherein at least a portion of one of the first digital watermark and the second digital watermark is provided on the security document with fluorescing ink.17. The security document of claim 16 wherein the predetermined process comprises exposure to non-visible light.18. The security document of claim 16 wherein the predetermined process comprises optical scanning.19. The method of claim 1, wherein the predetermined process comprises exposure to light.20. A method of marking an object comprising:receiving first information; receiving second information; embedding the first information with a first digital watermark in data representing a first portion of the object; embedding the second information with a second digital watermark in data representing a second portion of the object, wherein at least portions of the first and second watermarks are to be provided with a first ink and a second different ink, respectively, so that the first and second watermarks react in different manners when the object is subjected to a predetermined process. 21. A method comprising:receiving data including the first digital watermark and the second digital watermark of claim 20; providing at least portions of the first and second watermarks on an object with a first ink and a second different ink, respectively. 22. The method of claim 20 wherein the predetermined process comprises exposure to non-visible light.23. The method of claim 20 wherein the predetermined process comprises optical scanning and printing.
Copyright KISTI. All Rights Reserved.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.