Security marks simulating natural defects for embedding information in documents

作者: Reiner Eschbach , Calvin Jon Marlett , James R. Low , William A. Fuss , Shen-ge Wang

DOI:

关键词: Natural (music)EmbeddingFeature (computer vision)Component (UML)Computer scienceData mining

摘要: A system for generating a security mark includes data reception component that receives information. generation in communication with the generates at least one configuration based part upon received The simulation which resembles natural feature. An application applies of configurations to recipient. applied obeys rule whereby is distinguishable from feature it by detection marks.

参考文章(16)
Zhigang Fan, Mike C. Chen, John W. Wu, Kien A. Phong, Digital imaging method and apparatus for detection of document security marks ,(1999)
Pierre Degott, Claude-Alain Despland, Anton Bleikolm, Edgar Müller, Security document, method for producing a security document and the use of a security element ,(2004)
Wendell M. Smith, Secure document printing ,(2003)
Thomas Charles Antognini, Walter Gerard Antognini, Variable formatting of digital data into a pattern ,(1997)
J. Carr, Phillip Seder, Burt Perry, Geoffrey Rhoads, Methods for determining contents of media ,(2002)
Stuart Schweid, Reiner Eschbach, Zhigang Fan, Steven Harrington, Edward Francis, Michael Butler, Shen-ge Wang, Method and apparatus for internet coupon fraud deterrence ,(2004)
William H. Mowry, George W. Stubbs, John S. Simpson, John F. Kane, Alan Leon Sink, Varying tone securing document ,(1992)
Tony F. Rodriguez, Ravi K. Sharma, Geoffrey B. Rhoads, Authenticating Identification and Security Documents ,(2005)
Robert N. Goldman, Non-counterfeitable document system ,(1981)