|Publication number||US20050160271 A9|
|Application number||US 10/686,495|
|Publication date||Jul 21, 2005|
|Filing date||Oct 14, 2003|
|Priority date||Nov 19, 1998|
|Also published as||CA2502232A1, CA2502232C, EP1551644A1, EP1551644A4, US8059858, US20040181671, US20070016790, WO2004035321A1|
|Publication number||10686495, 686495, US 2005/0160271 A9, US 2005/160271 A9, US 20050160271 A9, US 20050160271A9, US 2005160271 A9, US 2005160271A9, US-A9-20050160271, US-A9-2005160271, US2005/0160271A9, US2005/160271A9, US20050160271 A9, US20050160271A9, US2005160271 A9, US2005160271A9|
|Inventors||Trent Brundage, Mahmood Sher-Jan, Matthew Weaver, Brett Hannigan, Brett Bradley, John Stach, Burt Perry, Robert Durst, Geoffrey Rhoads|
|Original Assignee||Brundage Trent J., Mahmood Sher-Jan, Weaver Matthew M., Hannigan Brett T., Bradley Brett A., John Stach, Perry Burt W., Durst Robert T.Jr., Rhoads Geoffrey B.|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (99), Referenced by (61), Classifications (46), Legal Events (2)|
|External Links: USPTO, USPTO Assignment, Espacenet|
The present application claims the benefit of U.S. Provisional Patent Application Nos. 60/418,762, filed Oct. 15, 2002, 60/421,254, filed Oct. 25, 2002, 60/494,709, filed Aug. 12, 2003, 60/495,236, filed Aug. 13, 2003 and 60/495,373, filed Aug. 14, 2003. Each of these patent documents is herein incorporated by reference.
This application is also related to assignee's U.S. patent application Ser. No. 09/945,244, filed Aug. 31, 2001 (published as 20020057823 A1), Ser. No. 09/503,881 (now U.S. Pat. No. 6,614,914), Ser. No. 09/452,023 (now U.S. Pat. No. 6,408,082), Ser. No. 10/366,541, filed Feb. 12, 2003 (published as US 2003-0179903 A1), Ser. No. 09/433,104, filed Nov. 3, 1999 (allowed), Ser. No. 10/032,282, filed Dec. 20, 2001 (published as US 2002-0114491 A1), and Ser. No. 09/498,223, filed Feb. 3, 2000 (now U.S. Pat. No. 6,574,350), and U.S. Pat. No. 6,389,151. The Ser. No. 10/366,541 application is a grandchild of assignee's U.S. Pat. No. 5,841,886. This application is also related to assignee's concurrently filed U.S. patent application titled “DIGITAL WATERMARKING FOR IDENTIFICATION DOCUMENTS” (Attorney Docket No. P0869—Inventors J. Scott Carr, et al.). Each of these patent documents is herein incorporated by reference.
The present invention relates to authenticating and securing identification documents through digital watermarking.
The use of identification documents is pervasive. Identification documents are used on a daily basis—to prove identity, to verify age, to access a secure area, to evidence driving privileges, to cash a check, and so on. Airplane passengers are required to show an identification document during check in, and sometimes at security screening and prior to boarding their flight. We also live in an ever-evolving cashless society. Identification documents are used to make payments, access an automated teller machine (ATM), debit an account, or make a payment, etc. Many industries require that their employees carry photo ID on the job.
For the purposes of this disclosure, identification documents are broadly defined and may include, e.g., credit cards, bank cards, phone cards, passports, driver's licenses, network access cards, employee badges, debit cards, security cards, visas, immigration documentation, national ID cards, citizenship cards, social security cards, security badges, certificates, identification cards or documents, voter registration cards, police ID cards, border crossing cards, legal instruments or documentation, security clearance badges and cards, gun permits, gift certificates or cards, labels or product packaging, membership cards or badges, etc., etc. Also, the terms “document,” “card,” and “documentation” are used interchangeably throughout this patent document. Identification documents are also sometimes interchangeably referred to as “security documents,” “ID documents,” “photo-IDs” and “photo ID documents”.
With reference to
The printed substrate 21 is usually laminated. The laminate typically includes a plastic, polyester or polycarbonate-based top sheet 23 and bottom sheet 25 that respectively overlay the top and bottom of the substrate 21. Heat and/or adhesives and pressure are used to bond the laminate sheets 23 and 25 with the substrate 21. Or a laminate can include a pouch into which the substrate 21 slips. Again, heat and/or adhesives and pressure are used to bond the substrate 21 with a pouch laminate. The laminates provide a protective covering for the printed substrate and provide a level of protection against unauthorized tampering. (For example, a laminate would have to be removed to alter the printed information and then subsequently replaced after the alteration.). A laminate layer 23 or 25 may optionally carry information like a card bearer's signature or security features.
In some implementations, information may also be optically or magnetically stored on recording media (e.g., magnetic stripe 27, or optical memory or electronic circuitry—not shown in
We note that the present invention encompasses ID documents including more or less features and layers than are illustrated in
Identification documents can also include information such as a bar code (e.g., which may contain information specific to the person whose image appears in the photographic image, and/or information that is the same from ID document to ID document), variable personal information (e.g., such as an address, signature, and/or birth date, biometric information associated with the person whose image appears in the photographic image, e.g., a fingerprint), a magnetic stripe (which, for example, can be on the a side of the ID document that is opposite a side with a photographic image), and various security features (e.g., a security pattern like a printed pattern comprising a tightly printed pattern of finely divided printed and unprinted areas in close proximity to each other, such as a fine-line printed security pattern as is used in the printing of banknote paper, stock certificates, and the like). Of course, an identification document can include more or less features.
Another example of an identification document is one including a core layer (which can be pre-printed), such as a light-colored, opaque material, e.g., TESLIN, which is available from PPG Industries) or polyvinyl chloride (PVC) material. The core can be laminated with a transparent material, such as clear PVC to form a so-called “card blank”. Information, such as variable personal information (e.g., photographic information, address, name, document number, etc.), is printed on the card blank using a method such as Dye Diffusion Thermal Transfer (“D2T2”) printing (e.g., as described in commonly assigned U.S. Pat. No. 6,066,594, which is herein incorporated by reference), laser or ink jet printing, offset printing, etc. The information can, for example, comprise an indicium or indicia, such as the invariant or nonvarying information common to a large number of identification documents, for example the name and logo of the organization issuing the documents. Any known process capable of forming the indicium may be used to form the information.
To protect the information that is printed, an additional layer of transparent overlaminate can be coupled to the card blank and printed information, as is known by those skilled in the art. Illustrative examples of usable materials for overlaminates include biaxially oriented polyester or other optically clear durable plastic film.
Of course, there are many other identification documents that include different structures, features and materials. These other identification documents can be suitably interchanged with the identification documents described herein. The inventive digital watermarking techniques disclosed herein will similarly benefit these other documents as well.
An identification document may include a digital watermark. Digital watermarking is a process for modifying physical or electronic media to embed a machine-readable code into the media. The media may be modified such that the embedded code is imperceptible or nearly imperceptible to the user, yet may be detected through an automated detection process. In some of our preferred embodiments, an identification document includes two or more digital watermarks.
Digital watermarking systems typically have two primary components: an encoder that embeds the digital watermark in a host media signal, and a decoder that detects and reads the embedded digital watermark from a signal suspected of containing a digital watermark (a suspect signal). The encoder embeds a digital watermark by altering the host media signal. The alterations usually take the form of altered signal values, such as slightly changed pixel values, luminance, colors, changed DCT coefficients, altered signal values or selective placement or signal tweaks, etc. However, a watermark can also be manifested in other ways, such as changes in the surface microtopology of a medium, localized chemical changes (e.g. in photographic emulsions), localized variations in optical density, localized changes in luminescence, etc. The surface texture of an object may be altered to create a watermark pattern. This may be accomplished by manufacturing an object in a manner that creates a textured surface or by applying material to the surface (e.g., an invisible film or ink) in a subsequent process. The watermark reading component analyzes content to detect whether a watermark pattern is present. In applications where the watermark encodes information, the reading component extracts this information from the detected watermark. The reading component analyzes a suspect signal to detect whether a digital watermark is present. The reading component can be hosted on a wide variety of units ranging from tethered or wireless reader devices, conventional personal computers, network servers, cell phones including cameras, to fully mobile readers with built-in displays. Image data corresponding to a watermarked surface of an identification document is read and decoded by this reader to obtain a watermark's information or “payload”.
Several particular digital watermarking techniques have been developed. The reader is presumed to be familiar with the literature in this field. Some techniques for embedding and detecting imperceptible watermarks in media signals are detailed in assignee's U.S. Pat. No. 6,614,914, U.S. Pat. No. 6,122,403 and PCT patent application PCT/US02/20832 (published in English as WO 03/005291), which are each herein incorporated by reference.
In assignee's U.S. Pat. No. 5,841,886 techniques and methods are disclosed to detect alteration of photo ID documents, and to generally enhance the confidence and security of such systems. In this regard, reference is made to
The photo ID document includes a photograph 1010 that is attached to the document 1000. Printed, human-readable information 1012 is incorporated in the document 1000, adjacent to the photograph 1010. Machine-readable information, such as that known as “bar code” may also be included adjacent to the photograph. Generally, the photo ID document is constructed so that tampering with the document (for example, swapping the original photograph with another) should cause noticeable damage to the card. Nevertheless, skilled forgers are able to either alter existing documents or manufacture fraudulent photo ID documents in a manner that is extremely difficult to detect. Security associated with the use of photo ID documents is enhanced by supplementing the photographic image with encoded information (which information may or may not be visually perceptible), thereby facilitating the correlation of the photographic image with other information concerning the person, such as the printed information 1012 appearing on the document 1000.
A photograph 1010 may be produced from a raw digital image to which is added a master snowy image as described in U.S. Pat. No. 5,841,886. A central network and point-of-sale reading device (which device, in the present embodiment, may be considered as a point-of-entry or point-of-security photo ID reading device), would essentially carry out the same processing as described with that embodiment, including the central network generation of unique numbers to serve as indices to a set of defined orthogonal patterns, the associated dot product operation carried out by the reader, and the comparison with a similar operation carried out by the central network. If the numbers generated from the dot product operation carried out by the reader and the central network match, in this embodiment, the network sends the OK to the reader, indicating a legitimate or unaltered photo ID document.
It will be appreciated that the information encoded into the photograph may correlate to, or be redundant with, the readable information 1012 appearing on the document. Accordingly, such a document could be authenticated by placing the photo ID document on a scanning system, such as would be available at a passport or visa control point. The local computer, which may be provided with the universal code for extracting the identification information, displays the extracted information on the local computer screen so that the operator is able to confirm the correlation between the encoded information and the readable information 1012 carried on the document. It will be appreciated that the information encoded with the photograph need not necessarily correlate with other information on an identification document. For example, the scanning system may need only to confirm the existence of the identification code so that the user may be provided with a “go” or “no go” indication of whether the photograph has been tampered with. It will also be appreciated that the local computer, using an encrypted digital communications line, could send a packet of information to a central verification facility, which thereafter returns an encrypted “go” or “no go” indication.
In another implementation of the '886 patent, it is contemplated that the identification code embedded in the photograph may be a robust digital image of biometric data, such as a fingerprint of the card bearer, which image, after scanning and display, may be employed for comparison with the actual fingerprint of the bearer in very high security access points where on-the-spot fingerprint recognition systems (or retinal scans, etc.) are employed.
We disclose herein methods, systems and identification document to improve or provide alternative techniques for confronting fraudulent use of identification documents. Fraudulent use of identification documents may occur where, for example, an otherwise legitimate identification document is modified such that the original photograph is swapped with that of another person, thereby enabling the other person to masquerade, at least temporarily, under the guise of the original identification document holder.
Even in the absence of photo swapping or alteration, it is oftentimes difficult to confirm by inspection that the individual depicted in the photograph of the identification card is indeed the bearer of the card.
One aspect of this invention provides enhanced security and certainty in the use of photo identification documents.
Another aspect provides methods and systems for authenticating and securing identification documents using multiple digital watermarks or multiple watermark components.
According to still another aspect of the present invention, a security document includes a substrate and a first graphic carried by the substrate. The first graphic conveys a photographic image to human viewers thereof, and the first graphic is steganographically encoded to convey first plural bits of data recoverable by computer analysis of the first graphic. The security document also includes a second graphic carried by the substrate. The second graphic conveys a visual image to human viewers thereof, and the second graphic is steganographically encoded to convey second plural bits of data recoverable by computer analysis of said second graphic. The steganographically encoded first plural bits of data and the steganographically encoded second plural bits of data cooperate to verify authenticity of the security document.
According to still another aspect of the invention, a method is provided to detect swapping of first artwork from a first identification document with second artwork on a second identification document. The swapping results in the first artwork being carried on the second identification document instead of the second artwork. The first artwork includes a first digital watermark embedded therein, and the second identification document includes a second digital watermark embedded in a first region. The method includes: receiving scan data associated with at least a portion of the first artwork and at least a portion of the first region; analyzing the scan data to detect the first digital watermark and the second digital watermark; and comparing the first digital watermark with the second digital watermark to detect swapping of the first artwork with the second artwork.
Another aspect of the present invention is a security document including a substrate and a first graphic carried by the substrate. The first graphic conveys a photographic image to human viewers thereof, and the first graphic is steganographically encoded to convey first plural bits of digital data recoverable by computer analysis of said first graphic. The security document also includes a second graphic, the second graphic conveying a visual image to human viewers thereof. The security document also includes a detection trigger. The detection trigger serves to indicate a presence of steganographic encoding. The second graphic is steganographically encoded to convey second plural bits of digital data recoverable by computer analysis of said second graphic, wherein the steganographically encoded first plural bits of digital data and the steganographically encoded second plural bits of digital data cooperate to verify authenticity of the security document.
Still another aspect of the present invention is a method of identifying a first area and a second area of a printed document that are likely to include, respectively, a first digital watermark and a second digital watermark. The first digital watermark includes a first orientation component and the second digital watermark includes a second orientation component. The method includes receiving optically scanned image data that corresponds with at least a portion of the printed document; segmenting the image data into a plurality of image portions; determining an orientation measure relative to a predetermined orientation for each of the image portions; identifying the first area by associating image portions having a first orientation measure; and identifying the second area by associating image portions having a second orientation measure
Additional features, aspects and advantages of the present invention will become even more apparent with reference to the following detailed description and accompanying drawings.
The following detailed description is grouped into four main sections. The grouping is not meant to limit the scope of the present invention, and is merely provided for the reader's convenience. Indeed, we anticipate that disclosed methods, systems and identification documents found under one section heading can be readily combined with methods, systems and identification documents under other section headings. The main sections include: i) Authenticating Identification Documents with Digital Watermarks; ii) Advantages of Watermarking Identification Documents; iii) Detecting Media Areas Likely of Hosting Watermarks; and iv) Introduction to Appendix A.
Authenticating Identification Documents with Digital Watermarks
First Embodiment—Forensics and Proof of Compliance
As discussed above with respect to our '886 patent, a photo-ID can be enhanced through embedding data therein. Data can be embedded in, e.g., a graphic or background of the photo-ID. More preferable, however, is to embed the data in a photograph image. The watermark is preferably robust, in that it survives scanning and printing. In some implementations of this embodiment, the watermark is repeated or redundantly embedded throughout an image or document.
Although sometimes redundantly embedded across an entire document surface, a watermark can be embedded in a particular region of the document if desired (e.g., only in a photograph or a graphic). In an area-based embedding implementation, we can use a mask to identify areas for embedding (or areas that will not receive embedding). The watermark is embedded in identified areas (or is embedded to avoid areas). The watermark can also include a so-called orientation component. An orientation component is helpful in resolving issues of image distortion such as scaling, rotation, translation, etc. In some cases the orientation component comprises a separate digital watermark.
A digital watermark can be used to provide a machine-readable means to detect fraud due to photo swapping and so-called card “simulation.” The watermark preferably includes a payload or message. The message, once decoded, can be used to provide a visual check for alterations. The decoded message or payload can be displayed, e.g., via a graphical user interface, for use by an inspector or law enforcement officer. For example, if the payload includes the cardholder's date of birth, the payload date of birth can be checked against the corresponding date of birth as printed on the photo-ID. The crosscheck can even be automated. The payload information can include additional information such as driver's license number, jurisdiction code (e.g., code or text indicating which state, agency or company issued the photo-ID), personal information (address, age, sex, weight, height, etc.), driver's insurance information (or a link thereto), unique identifier, etc.
An advantage of this implementation is that if a watermarked photograph is copied onto another photo-ID document, the watermark provides a telltale sign pointing to the originating card. Once a watermark photograph is determined to be non-compliant with the text or information provided on the document, e.g., the payload data does not correspond with the printed or stored information, the payload can be used to identify the originating document—providing a forensic tracking mechanism. (If the payload includes the originating driver's license number or other unique identifier, such payload information can be used to positively identify the originating document.).
Another advantage of this implementation is that a machine record for inspecting the photo-ID can be used as a “proof of compliance” or proof of identification inspection. To facilitate such, the watermarked photo-ID is presented to an optical sensor. The optical sensor captures an image of the photo-ID and produces scan data corresponding to such. A watermark detector analyzes the scan data to find and decode the digital watermark embedded in the photo-ID. The detector obtains the payload (e.g., a unique identifier or driver's license number) and a check for the correspondence between the payload and information carried by the card is made. The payload can be stored in a repository or list to evidence that the photo-ID was checked or inspected.
In an optional implementation of this embodiment, the payload is cross-related to information carried in a magnetic stripe on the card. Validating the card then requires two reads—one an optical read of the watermark on the face of the card, and a swipe of the magnetic stripe through a magnetic-stripe reader. The magnetic stripe information is decoded and compared with the watermark payload. This implementation has the benefit of locking the watermarked information to the magnetic stripe, but it requires an additional read (e.g., for the magnetic stripe) of the card.
Second Embodiment—Multiple Watermarks
Additional security is added to an identification document by providing first and second digital watermarks on the identification document. For example, a first digital watermark is embedded in first region of the identification document like in a photograph, artwork, graphic, seal, or image (e.g., ghost image). And a second digital watermark is provided in a second region of the identification card. For example, the second digital watermark is embedded in a background pattern or tint, line-art (see, e.g., assignee's U.S. Pat. No. 6,449,377) or in text, artwork, seal, images or graphics carried by the identification document. The first and second watermarks also may include a so-called orientation component. An orientation component is helpful to resolve image distortion such as rotation, scale and translation. (We note that the second watermark can be embedded using the same or different embedding protocol as the first watermark.). Although not necessary, the first and second watermarks are preferably redundantly embedded or tiled in their respective embedding regions.
The first digital watermark preferably includes a first payload or first message bits carrying or relating to a first set of information, and the second digital watermark preferably includes a second payload or second message bits carrying or relating to a second set of information. The payloads may include plural-bit payload structure. The payloads can have fixed and variable portions and/or error correction bits. In some cases a payload will include a checksum or error bits to ensure the validity of a payload or a cross-correlation between the watermark payloads. Examples of watermark payloads are shown, e.g., in assignee's U.S. published patent application Ser. No. 10/193,719, filed Jul. 10, 2002 (published as US 2003-0033530 A1) and in U.S. Pat. No. 6,614,914. Each of these patent documents is herein incorporated by reference.
The first set of information preferably relates to the holder of the identification card (hereafter “cardholder”) and/or to the issuing authority (e.g., state DMV or company) or jurisdiction. For example, the first set of information may include “related information” such as a unique identifier that is associated with the issuer or cardholder, a date of birth, jurisdiction code, identification document number, name, address, physical characteristics (hair color, weight, biometric, sex, etc.), issue date, restrictions (e.g., age restrictions, driving limitations, etc.), a hash (e.g., a reduced-bit representation) of such related information, and/or a combination of the above related information.
The second set of information, which is carried by or related to the second payload, preferably corresponds with the first set of information. The term “corresponds” in this context is used broadly and may range, e.g., from an exact match to a loose association within a predetermined tolerance.
In a first implementation, the second set of information corresponds exactly with the first set of information. The sets of information are compared to determine authenticity. In a second implementation, the second set of information includes a subset of the first set of information. The subset is cross-correlated with the first set of information to determine authenticity. In another implementation, the first set of information includes a key to decrypt the second set of information (or vise versa). (We note that an encrypted watermark payload may optionally be decrypted with a key contained in a watermark detector.). In still another implementation, the second set of information includes at least some information that should correspond with information carried by a magnetic stripe or barcode (see a related discussion under the First Embodiment, above). In yet another implementation, the second set of information includes both a subset of the first information and additional information. For example, the subset may include the birth date and document number, while the additional information may correspond with text printed on the document. Or the subset may include simply the document number (or portion thereof), or the bearer's birth date and date of issue. Of course, many other combinations of related information can be provided. For example, the sets of information may be targeted to detect an age or name alteration (e.g., by including age or name information in one or both of the sets of information). In some cases the sets of information includes hashes or reduced bit representations of information pertaining to the cardholder or printed text information. One hash, perhaps a hash carried by the second set of information, may even represent some or all of the first set of information. In still other implementations a document number is distributed between the first and second sets of information. For example, the first set of information includes a first part of the document number and the second set of information includes the remaining portion of the document number. A checksum or error bit can be included with the first or second sets of information to ensure that the document number portions correspond in the expected manner.
To authenticate an identification document including two digital watermarks, a watermark detector reads both watermarks. The first set of information and the second set of information are retrieved from their respective watermark payloads. (We note that typically only one optical scan is needed to generate scan data, from which both the first and second watermarks are detected from, when the first and second watermarks are provided on the same surface of the identification document.). The first and second sets of information are compared to determine a correspondence. If a correspondence occurs, some or all of the watermark information may be provided to an inspector to facilitate a further check against text alteration. For example, both the date of birth and some data to verify against printed text (e.g., an indication that the 3rd letter of the first name should be “e”, and the 2nd letter of the last name should be “t”) can be provided to the inspector. Or, in other implementations, a signal is generated to indicate the authenticity of the identification document.
In an alternative implementation, the authenticator (or watermark reader) passes all or a portion of the watermark information to a computer display (e.g., a computer graphical user interface). Displaying some or all of the watermark information allows an inspector or officer to visually compare the watermark information against information printed on the document. The authenticator outputs an authentication signal to indicate the authentication status of the identification document. In some cases the signal is conveyed to the display. Here, the authentication signal can be a simple pass or fail signal, or a more detailed response indicating the reason for the failure (e.g., one watermark found but the second one is undetectable). In other cases the signal is conveyed to an audio output device (e.g., audio speaker) to audibly signal the authentication status (e.g., a predetermined sound or audio segment is output if authentic, while another predetermined sound or audio segment is output is not authentic). In other implementations a fail signal is used to trigger a secondary process. For example, a fail signal is used to spawn a process to obtain additional data from the identification document. The additional data can be retrieved from optical scan data (e.g., OCR, barcode, or image data for another watermark detection attempt), optical or electronic memory, or manual input. The additional data can be used, e.g., to: i) verify watermark detection failure; ii) authenticate the document through a non-watermarking process; and/or iii) trigger a forensic analysis of the identification document.
The authenticator module is further discussed with reference to
We note that the second embodiment of this section is generally issuing source and document neutral. This means that a first and second digital watermark is used to verify an identification document regardless of the features provided on the card. Although document neutral, interpretation of the payload bits can vary according to issuer identification. To illustrate, consider a first employee badge issued by a first company and a second employee badge issued by a second company. Each of the first and second employee badges include first and second watermarks embedded therein. All four of the watermarks (i.e., two from the first badge and two from the second badge) have, e.g., a 72-bit payload. The watermarks include a subset of bits (e.g., 4-12 bits) to designate which company issued the badges or to which company the badges are associated with (e.g., an issuer or client code). The bits are located in a predetermined payload location, so that a detector or an application cooperating with the detector can grab the subset of bits and make a determination of who issued the badge. The watermark detector (or a cooperating software application) interprets the bits as designated for the particular issuer or client. For example, the detector or application can query a data structure, branch into a predetermined block of software code, or interrogate a look-up-table to decide what the bits correspond to. (For example, for issuer “Ace,” a private toolmaker, the first 10 bits are the issuer code, the next 32 bits represent a document number, the next 10 bits represent an issue date or birth date and the last 20 bits represent error correction bits or checksums. And, for “Beta,” a government agency, documents associate with Beta include a payload with the first 10 bits representing the issuer code, the next 20 bits represent a document number, the next 20 represent a security clearance, the next 10 represent an issue date and the last 10 represent error correction bits or checksums.). A watermark may similarly carry data (or a signal feature) to indicate that it is a first or second watermark, or an image frame location indicating where a watermark is located is used to distinguish between a first and second watermark. The payloads fields can be designated or interpreted differently for each of the first and second watermarks, even for watermarks issued by the same issuer.
As an alternative implementation of the second embodiment, a second digital watermark is provided on a different document surface than is the first digital watermark (e.g., the back side of the document). We note that this alternative implementation may require two optical scans to detect both the first and second digital watermarks. This may be less of an issue when the second digital watermark includes information that is used for forensic tracking purposes. For example, the watermark may include information that is tied to the original cardholder. If the second watermark is copied and transferred to a second identification document, the watermark information can be used to trace back to the original cardholder. Similarly, the second watermark may include information pertaining to the issuing location (e.g., which DMV branch office) or original issuing officer.
A few illustrative combinations are shown below. Of course, these combinations are not meant to limit the scope of this aspect of the invention. Rather, the combinations are provided by way of example only.
A1. A method to authenticate an identification document, the identification document comprising a first digital watermark and a second digital watermark, said method comprising the steps of:
A2. The method of combination A1, further comprising the step of displaying through a computer based graphical user interface at least a portion of information carried by either the first or second digital watermark, and comparing the displayed information with text printed on the identification document.
A3. The method of combination A1, wherein the document comprises text printed thereon, and at least a portion of information carried by the first and second digital watermark corresponds to the printed text.
A4. The method of combination A1, wherein the first digital watermark includes a first plural bit message, and the second digital watermark includes a second plural bit message.
A5. The method of combination A4, wherein said comparing of the first and second digital watermarks to determine if they correspond comprises comparing at least a portion of the first message with at least a portion of the second message.
A6. The method of combination A6, wherein at least one of the first message and the second message includes an issuer code, wherein said combination further comprises interpreting the plural bits of at least one of the first message and the second message according to a predetermined format associated with the issuer code.
A7. The method of combination A4, wherein the first message comprises a first subset and a second subset, and wherein the second message comprises a third subset and a fourth subset.
A8. The method of combination A7, wherein said comparing of the first and second digital watermarks to determine if they correspond comprises comparing the first subset with the third subset and comparing the second subset with the fourth subset.
A9. The method of combination A8, wherein said first subset and third subset comprise redundant information.
A10. The method of combination A8, wherein said first subset and third subset comprise corresponding information.
A11. The method of combination A9, wherein the information corresponds through at least one of a cryptographic permutation, a hash and a predetermined key.
B1. An identification document comprising a first graphic and a second graphic, the first graphic comprising a first digital watermark embedded therein having a first plural-bit payload, the second graphic comprising a second digital watermark embedded therein having a plural-bit payload, the identification document further comprising indicia thereon, wherein the first plural-bit payload comprises a representation of at least a portion of the indicia, and wherein the second plural-bit payload comprises information corresponding to the first plural-bit payload.
B2. The document of B1, wherein the information comprises the representation.
B3. The document of B1, wherein the information comprises at least one of a cryptographic permutation of the information, a hash of the representation, and a portion of the representation.
B4. The document of B1, wherein the representation comprises at least one of a hash of the indicia, a redundant version of the indicia and a subset of the indicia.
B5. The document of B1, wherein at least one the second payload comprises a checksum to verify the information.
Third Embodiment—Fragile Watermarks
A fragile or semi-fragile watermark is provided to any of the first and second embodiments as either a watermark replacement or to augment the above implementations. For example, in the second embodiment, a fragile watermark may be used as either the first or second watermark or as a third watermark component. In some implementations we preferably use our out-of-phase embedding techniques, e.g., as disclosed in PCT/US02/20832 (published in English as WO 03/005291), to embed a fragile watermark. It will be appreciated that a fragile watermark is designed to be lost or to predictably degrade upon certain types of signal processing. A semi-fragile watermark is designed to withstand normal signal processing, but is destroyed or predictably degrades upon malicious attacks.
The addition of a fragile or semi-fragile watermark adds protection against anticipated fraud scenarios by providing alerts when copies are made. Alteration in conjunction with card copying can be detected from the absence or condition of the fragile watermark.
In our fourth embodiment we provide a machine-readable link to related information. The machine-readable link is preferably provided via a digital watermark payload or identifier. The identifier can include a unique number that is used to interrogate a database or access a remote resource. In some cases the identifier includes a URL or a code that is used to access an appropriate URL. In a driver's license scenario, a digital watermark includes a link to an insurance database. The database includes data records evidencing that a cardholder does or does not have car insurance. In other cases, the digital watermark includes a link to a DMV database, to allow verification of information printed on the identification document, and perhaps a photograph of the cardholder. The database cardholder can be compared against the person presently holding the card. A “photo swap” can be further detected from comparison of a database photograph with a photograph carried on the card and a visual inspection of the current cardholder. The techniques discussed in assignee's U.S. patent application Ser. No. 09/571,422, filed May 15, 2000, and in U.S. Pat. No. 6,408,331 can be suitable interchanged with this linking aspect of the present invention. These patent documents are herein incorporated by reference.
Fifth Embodiment—Legacy Detection
Our fifth embodiment relates generally to handling ID documents including so-called legacy ID documents. The term legacy is used to generally refer to documents, which were previously produced with or without a particular feature like a digital watermark, but which differ in some manner from newly produced documents (e.g., they have or lack the feature). Consider a passport-issuing scenario in which renewal dates are spaced far apart (e.g., 10 years). Unless a total recall of old passports is issued, the population of outstanding passports will include both old passports (e.g., legacy documents) and new passports (e.g., which may include digital watermarking).
A challenge results for an ID document authentication process that authenticates a population of ID documents including both legacy documents (e.g., with no watermarking) and watermarked documents. To address this challenge we provide methods and systems to determine whether a digital watermark should be present in a document or whether the document was produced prior to the introduction of watermark embedding.
Assignee's U.S. Published Patent Application No. US 2002-0080994 A1, which is herein incorporated by reference, discusses a situation where a smart card carries information to trigger a watermark reader to look for a digital watermark. The trigger handles a case of legacy cards. In other words, the trigger serves as an indication to a watermark reader to check for a digital watermark. This allows reading new and legacy documents by the same reader.
We expand these techniques to further help differentiate between watermarked and non-watermarked ID documents, and/or to decide whether to search for a digital watermark on an ID document.
With reference to
In a first implementation a machine readable feature includes a watermark search or detection trigger. For example, an issue date, or bits corresponding to an issue date, is stored in a magnetic stripe, optical memory, a barcode or other machine-readable indicia. The issued data serves as a “trigger” to evidence whether and ID document should or should not including watermarking.
With reference to
An authenticator (e.g., a processor under the control of software) uses the trigger to determine whether to carry out a watermark-based authentication procedure. For example, the issue date may correspond with a date that indicates that a digital watermark or a plurality of digital watermarks should be present on an authentic ID document. If so, the authenticator directs a digital watermark verification process, like is discussed in the above embodiments, to determine whether a digital watermark is present. Or the issue date may indicate that the ID document was produced before digital watermarks were rolled out into production (e.g., indicating a so-called legacy card). The authenticator then skips or disables a watermark detection process and/or authenticates the ID document using a different authentication technique.
In an alternative, but related, implementation, an authenticator directs a watermark detector to analyze optical scan data corresponding to an ID document. The scan data is searched for a digital watermark or for a plurality of digital watermarks. If the watermark detector is unable to find a digital watermark, the authenticator looks for a legacy indicator. For example, an issue date or expiration date is used to determine whether the ID document is a legacy document; or an operator is prompted to enter an issue or expiration date, or to enter a determination as to whether the ID document is a legacy card.
In another implementation we check for a legacy indicator (e.g., issue date) regardless of whether a watermark is detected. This implementation addresses a counterfeiting scenario where a watermarked feature (e.g., a watermarked photograph) is lifted from an authentic watermarked ID document and pasted onto a legacy document that should not include a digital watermark. If a watermark is found, but the legacy indicator suggests that a watermark should not be present, the ID document is considered suspect.
A client code can be combined with an issue date or expiration date to indicate which documents should or should not include digital watermarks. A “client code” is broadly used herein and may include, e.g., a code to identify a particular client or a particular type of identification document. The client code can be associated with a particular issue or legacy date, to help identify whether an identification document should or should not include digital watermarking. For example, a client code for a sports arena can be used to signal that all employee badges issued after Jan. 1, 2003 should include a digital watermark or a plurality of digital watermarks. And a client code for an airport tarmac crew can be used to signal that all security badges issued after, e.g., Apr. 15, 2003 should include a digital watermark or a plurality of digital watermarks. A magnetic stripe or barcode (or other machine-readable feature) carries the client code. An authenticator uses the client code to make a determination, for a particular client, as to whether a digital watermark should be present. (An authenticator can manage various client codes and relevant legacy dates via, e.g., a look-up table, software programming or by accessing a local or remote database.). By way of further illustration, an authenticator receives the airport's tarmac crew client code from a security badge. The issue date for the security badge is Mar. 11, 2003. The authenticator then knows that a digital watermark should not be present. Or the authenticator receives a client code corresponding to the sports arena. The corresponding employee badge was issued on Jun. 23, 2003. The authenticator then expects to find digital watermarking on the employee badge. Of course, client codes can be assigned to other entities, like states, nations, companies, etc.
An authenticator is provided in another implementation to operate primarily between two different modes. Consider
If the trigger indicates that the ID document is not expected to include watermarking then the ID document is authenticated using a non-watermarking technique. For example, in one implementation the issue or expiration date (with perhaps a client code) is used as a trigger. If the issue date indicates that watermarking is not expected, another authentication clue, like a bearer's birth date, is obtained from the ID document. A birth date can be machine-read, e.g., from a magnetic stripe, optical memory, electronic circuitry, and/or barcode (e.g., PDF-417, 1-D barcode, etc.). The birth date can also be obtained from a remote repository, e.g., which is interrogated with a document number (e.g., driver's license number). A birth date obtained from such methods (e.g., machine-read, remote access, etc.) is referred to as a “stored birth date.” The stored birth date is then cross-correlated with a birth date that is printed or otherwise carried on the ID document. The printed or otherwise carried birth date is called a “carried birth date.” In some cases the carried birth date is carried via a machine-readable feature. For example, the stored birth date is conveyed through a barcode, while the carried birth date is carried by a magnetic stripe. Retrieving the carried birth date for cross-correlation with the stored birth date can be machine-aided (e.g., with OCR input of a printed birth date), or can be aided by an operator entering the birth date as printed on the ID document. The cross-correlation correlates the stored birth date with the carried birth date. The document is considered authentic when the carried and the stored birth dates correspond. Of course, if either (or both) of the carried or stored birth dates is not recoverable, or is not obtained, the document is considered suspect. Thus, this implementation provides a watermark readable/non-readable authenticator. (Instead of a birth date, other bearer or document specific information like an address (or a hash of an address), name (or hash of a name) or document number (or hash of a document number) can be suitably interchanged. The term “hash” in this context implies a reduced-bit representation of a larger number, value or character string.)
In still further implementations we add or change a feature on an ID document to signal that the ID document includes a digital watermark. For example, we shift or reposition a photograph carried by the ID document. Instead of positioning the photograph in the upper, left hand corner of the document, we position the photograph in the lower right hand corner, or we offset the photograph by a predetermined spacing. Or we print text (e.g., birth date) in a color (e.g., green) or with a different font. Still further we can place a machine-readable feature in artwork (e.g., a predetermined frequency response due to repetitive spacing of artwork features or lines). These features can be used to trigger (either manually or automatically) watermark detection. Or we can add a predetermined laminate, perhaps embossed or laser engraved features, which can be used to signal watermark detection. Related is a certain type of card stock—perhaps textured with machine-readable code—that signals digital watermarking. Indeed, most of the security features detailed in Appendix A can be used to signal the presence of a digital watermark. In still further implementations, we add a feature that can be pattern recognized. For example, we add a graphic that resembles a triangle. After capturing image data, a pattern recognizer searches the image data for the expected triangle. If found, the triangle signals an expected presence of digital watermarking.
Sometimes we prefer to add more subtle features to signal the presence of a digital watermark. In one implementation we shift the spatial starting position of text relative to other document features. For example, a document bearer's printed name or employee number can be spatially shifted with respect to the bearer's photograph. The spatial distance between a starting point of text and a photograph (e.g., a lower right hand corner of the photograph) can be machine-measured and used to trigger watermark detection. Of course, instead of shifting text, we can subtly reposition graphics or other artwork as well. In other cases we trigger off of an identification document number. For example, the number may include an extra character (e.g., the seventh or eighth character in) or a leading one or zero can be used to indicate digital watermarking. In other cases we use a plurality of characters, e.g., the last four characters or every other character to indicate the presence of digital watermarking.
While we have discussed handling legacy documents with respect to digital watermarking, this embodiment of the present invention is not so limited. Of course, our techniques apply to triggering detection of other types of machine-readable features or identifying other types of legacy documents as well.
A few illustrative combinations are shown below. Of course, these combinations are not meant to limit the scope of this aspect of the invention. Rather, the combinations are provided by way of example only.
C1. An identification document authenticator operable to authenticate an identification document through a digital watermarking authentication process or through a non-digital watermarking authentication process, a process being selected depending on a detection trigger, said authenticator comprising:
C2. The authenticator of C1, wherein the identification document carries the detection trigger.
C3. The authenticator of any one of C1 or C2, wherein the detection trigger comprises a document issue date
C4. The authenticator of any one of C1 or C2, wherein the detection trigger comprises a document expiration date.
C5. The authenticator of C2, wherein the detection trigger is carried by a machine-readable feature.
C6. The authenticator of C5, wherein the machine-readable feature comprises at least one of a barcode, magnetic stripe, optical memory and electronic circuitry.
C7. The authenticator of C1, wherein the non-digital watermarking authentication process comprises a cross-correlation of first and second instances of bearer or document specific information carried by the document.
C8. The authenticator of C7, wherein the first and second instances each comprise data corresponding to a birth date.
C9. The authenticator of C7, wherein the first and second instances each comprise data corresponding to a name.
C10. The authenticator of C7, wherein the first and second instances each comprise data corresponding to a document number.
C11. The authenticator of C7, wherein the first and second instances each comprise data corresponding to an address.
C12. The authenticator of claim C1, wherein the digital watermarking comprises a first digital watermark including a first payload and a second digital watermark including a second payload.
C13. The authenticator of C12, wherein the digital watermarking authentication process comprises at least a cross-correlation of some of the first payload with at least some of the second payload.
C14. The authenticator of C1, wherein the memory comprises electronic memory circuits.
C15. The authenticator of C14, wherein the electronic processing circuitry comprises a processor.
C16. The authenticator of C1, wherein the memory comprises at least one of removable memory and fixed memory.
C17. The authenticator of C1 further comprising an input device.
C18. The authenticator of C17, wherein the detection trigger is manually entered into the authenticator via the input device.
C19. The authenticator of C17, wherein the detection trigger is machine-read into the authenticator via the input device.
C20. The authenticator of C17, wherein the input device comprises at least one of a key pad, mouse, magnetic stripe reader, optical memory reader, optical sensor, barcode reader, touch screen and smart card reader.
D1. A method to determine whether to authenticate an identification document through a digital watermark authentication process, wherein the identification document comprises a detection trigger, said method comprising the steps of:
D2. The method of claim D1, wherein the trigger comprises a document issue date.
D3. The method of claim D1, wherein the trigger comprises a document expiration date.
D4. The method of any one of D1-D3, wherein the document comprises a magnetic stripe, and wherein the trigger is stored by the magnetic stripe.
D5. The method of any one of D1-D3, wherein the document comprises electronic circuitry, and wherein the trigger is stored in the electronic circuitry.
D6. The method of any one of D1-D3, wherein the document comprises a machine-readable feature, and wherein the trigger is conveyed through the machine-readable feature.
D7. The method of D6, wherein the machine-readable feature comprises a barcode.
D8. The method of D1, wherein the trigger comprises a client code.
D9. The method of D8, wherein the trigger further comprises at least one of a document issue date and a document expiration date.
D10. The method of D1, wherein the providing an indication comprises disabling or foregoing a watermark detection process.
D11. The method of D1, wherein the providing an indication comprises outputting a signal to indicate that the document is a legacy document.
D12. The method of D11, wherein the signal is displayed through a graphical user interface.
D13. The method of D11, wherein the signal activates a warning.
D14. The method of claim D11, wherein the signal controls or initiates an automated, but non-watermarking based, authentication process.
Sixth Embodiment—Plural Watermarks
While some of the above embodiments have envisioned enhanced identification document security through embedding of two digital watermarks, the present invention is not so limited. Indeed, the inventive techniques discussed herein will apply to identification documents including three or more watermarks as well. For example, watermark payload correspondence as discussed under the Second Embodiment can involve three or more watermarks.
Advantages of Watermarking Identification Documents
Some advantages provided to identification documents by digital watermarking may include the following bullet list. Of course, this list is not meant to limit the present invention, and many of the disclosed embodiments need not include such advantages. By way of illustration only, some watermarking advantages include:
Some advantages of watermarking to government agencies (e.g., DMV, law enforcement officials, and other authorized audiences) and financial institutions are discussed in the following bulleted list. Of course, this list is not meant to limit the present invention, and many of the disclosed embodiments need not include such advantages. By way of illustration only, some watermarking advantages for government agencies include:
The subject matter in this section relates to assignee's U.S. patent application Ser. No. 10/032,282, filed Dec. 20, 2001 (published as US 2002-0114491 A1) and Ser. No. 09/945,244, filed Aug. 31, 2001 (published as 20020057823 A1). Each of these U.S. patent documents is herein incorporated by reference
Steganographic calibration signals (sometimes termed “marker signals,” reference signals,” “grid signals,” or “orientation components,” etc.) are sometimes included with digital watermarking signals so that subsequent distortion of the object thereby marked (e.g., a digital image file, audio clip, document, etc.) can later be discerned and compensated for. Such arrangements are detailed in the related applications.
One type of watermark orientation component is an image signal that comprises a set of impulse functions in a transform domain, like a Fourier magnitude domain, e.g., each with pseudorandom phase. To detect rotation and scale of a watermarked image (e.g., after printing and scanning of the watermarked image), a watermark decoder converts the watermarked image to the Fourier magnitude domain and then performs, e.g., a log polar resampling of the Fourier magnitude image. A generalized matched filter correlates a known orientation component with the re-sampled watermarked signal to find the rotation and scale parameters providing the highest correlation. The watermark decoder performs additional correlation operations between the phase information of the known orientation signal and watermarked signal to determine translation parameters, which identify an origin of the watermark signal. Having determined the rotation, scale and translation of the watermark signal, the watermark reader then adjusts the image data to compensate for this distortion, and extracts the watermark message signal.
An exemplary orientation signal may include one or more of the following characteristics:
In other embodiments, different orientation components can be used in differently watermarked excerpts of the content. An image may be segmented into blocks, pre-filtered, and then converted into the Fourier domain. The Fourier representation for all the component blocks can be accumulated, filtered, and remapped into the log-polar domain.
Multiple Watermarks on Printed Documents
As discussed above, some watermarking implementations include a printed document having a plurality of digital watermarks embedded thereon. We have developed methods and systems to quickly identify areas where the digital watermarks may be embedded, and then focus decoding efforts on the identified areas, particularly when each of the embedded digital watermarks includes an orientation component (or calibration signal). Message decoding efforts can focus on areas identified as likely candidates of including a digital watermark.
We choose to illustrate our inventive methods and systems with respect to printed documents, such as financial documents, e.g., checks, banknotes, financial instruments, legal instruments and identification documents. Some financial and identification documents may include so-called radio frequency identification circuitry (RFID), smart card chips or circuitry, optical memory, magnetic memory, etc. Of course, our techniques apply to other objects and media (e.g., digital images and video) as well.
ID document 100 includes a plurality of watermarks embedded thereon. To simplify the discussion ID document 100 includes two (2) digital watermarks. It should be appreciated, however, that our techniques apply to documents including one and three (3) or more digital watermarks as well.
A first digital watermark is embedded in the photographic representation 102 (
A second digital watermark is embedded in area 104. Area 104 includes a graphic, seal, background area, artwork, ghost image, photographic image, hologram, Kineogram® or line art, etc. (hereafter generally referred to as “artwork”), in which the second digital watermark is embedded. The artwork may overlap with text or other document features. While area 104 is illustrated as a bounded and limited area, area 104 can alternatively occupy much larger or smaller document 100 areas. In our preferred implementations we redundantly embed the second digital watermark throughout area 104. The second digital watermark typically includes an orientation component (hereafter called a “second orientation component”) and a message component. The second orientation component differs from the first orientation component. The difference may be subtle such as a difference in embedding scale, rotation or translation, or may explicitly differ in terms of a different calibration technique or embedding protocol.
The second orientation component is preferably embedded at (or is embedded so as to represent) a second orientation, e.g., at a second scale, rotation and/or translation. If the second digital watermark is redundantly embedded throughout area 104, the redundant instances of the second orientation component preferably include the same second orientation.
Thus, the first and second digital watermarks each preferably include an orientation component that differs from one another (e.g., the orientation components differ in terms of scale, rotation and/or translation, etc.) or differs relative to a know or predetermined orientation component.
A digital watermark detection process is discussed with respect to
Watermark detector 120 is configured to analyze windows or image areas (e.g., blocks, image portions or segments), in search of watermark orientation components or in search of characteristics that are associated with watermark orientation components. For example, the watermark detector 120 analyzes scan data associated with a first window 60 a (
We prefer a sliding window approach for our detector. That is, after the watermark detector 120 analyzes image area 60 a, it analyzes an adjacent, perhaps even overlapping, window area 60 b, and so on until it analyzes a last window 60 n for a first window row (
While not necessary to do so, the watermark detector 120 preferably analyzes all of the captured image data. (Alternative implementations only look at a subset of the captured image data.). To illustrate, e.g., if the scan data corresponds with a 1024×1280 pixel area, and if 64×64 pixel windows overlap by 50 percent, about 1280 windows are analyzed. Of course the number of windows will decrease as the window size increases and/or as the overlap area decreases.
Each window or image portion is preferably classified in terms of its orientation characteristics. For example, the detector 120 compares an orientation of each image window or block (some of which may include no watermark signal at all) to that of a predetermined orientation (e.g., an orientation corresponding to an expected watermark orientation component). A metric or measure can be used to classify each image portion in terms of its determined orientation or in terms of its determined orientation relative to the predetermined orientation. An orientation measure may include factors such as rotation, scale, translation, etc.
The detector 120 (or a computer cooperating with the detector 120) remembers or groups together those windows or image portions which have the same metric or orientation measures. The term “same metric” is broadly used and may include an exact sameness or the metric may include a tolerance. For example, orientations falling within plus-or-minus 1-10 degrees (for rotation) may be grouped together, or those falling within plus-or-minus 2-10% scale or translation might similarly be grouped. After grouping the blocks, the detector (or a cooperating computer) sifts through the groupings to identify predominate groups. The two most predominate groups will likely correspond to one of a first watermark orientation component and a second watermark orientation component.
There may be some cases in which the two or more watermark components have the same rotation and scale. For example, only a single predominate peak is seen in
Once predominate orientations are identified, document areas 80 and 82 shown in
Sometimes we may see an isolated window 84 identified as shown in
As an alternative grouping technique, a watermark “strength” is determined for each window. Each image window then has an orientation metric and a strength metric associated therewith. The strength metric is a representation of a watermark characteristic, or a relative correlation between an expected watermark signal and the detected watermark signal. Windows are grouped according to their orientation metrics, but are represented according to a collective strength of all of the windows in a group (e.g., we add together the strength metric for each window within a group). Groups are then represented in terms of collective group strength and not in terms of the number of windows within a group. A strength metric provides an even more prominent indication of watermarked windows, e.g., as shown by the histogram peaks in
As a further alternative approach, we filter image data or histogram data to help jettison unwanted noise. This approach even further increases the prominence of window groups or peaks over background noise.
Our approach saves processing time since only those areas including watermark orientation components are further analyzed to detect a watermark or payload message.
In addition to reducing processing time and ensuring better watermark detection, our techniques may be used as a copy detection tool.
Consider a financial document like a check. A common counterfeiting technique “cuts and pastes” (perhaps digitally) features from one check to another check. For example, a counterfeiter may cut and paste a bank seal or logo from one check onto another.
To help detect a copy we provide a document (e.g., a check from Bill's Bank) with two embedded digital watermarks. Each of the first and second digital watermarks includes a first and second orientation component, respectively. The first and second orientation components have a known relationship to one another or a known relationship to a predetermined orientation component. To simplify the discussion, lets say that the first orientation component has a scale that is 82% of an expected scale, and the second orientation component has a scale that is 78% of an expected scale.
A watermark detector can expects to find the relative scales for the first and second orientation components in order to authenticate Bill's check. (Of course, the detector can account for any optical sensor discrepancies, such as unwanted scaling relative to the printed check.).
The document is considered suspect if the orientation components' scales are not as expected.
In some implementations, each bank (or client type) includes a unique orientation component relationship between its watermarks. For example, if the customer or account is associated with a commercial endeavor, then the orientation components are related according to a first predetermined relationship. But if the customer or account is associated with a government endeavor then the orientation components are related according to a second predetermined relationship, and so on.
A third watermark or watermark component can be used to convey the predetermined relationship or a watermark detector can be configured to expect a certain relationship.
Even if the counterfeiter is careful when replicating a predetermined scale and rotation, it remains difficult to properly align the multiple watermarks to achieve a predetermined translation.
Our copy detection also works with ID documents where a counterfeiting technique involves photo or feature swapping. A first watermark is embedded in a photograph, and a second watermark is embedded in a background or artwork. Each of the first and second watermarks includes an orientation component. The orientation components have a predetermined relationship to one another or to a control orientation component. Scan data is collected and orientation parameters are determined. The determined orientation parameters are analyzed to detect a counterfeit document or photo swap. (Different issuers (e.g., state or country) can include a unique orientation component relationship. If the relationship is not what is expected for the issuer, then the document is considered suspect.).
In alternative implementations a financial document or ID document includes a visible fiducial or overt structure printed or engraved thereon. Orientation parameters are determined relative to the visible fiducial or structure. For example, a scale or rotation of a watermark orientation component is determined relative to the fiducial, and image portions are classified by their relative relationship (or any deviation from an expected relationship) to the fiducial.
A few illustrative combinations are shown below. Of course, these combinations are not meant to limit the scope of this aspect of the invention. Rather, the combinations are provided by way of example only.
E1. A method to detect a copy of a printed document, the printed document comprising a first area and a second area including, respectively, a first digital watermark and a second digital watermark, wherein the first digital watermark includes a first orientation component and the second digital watermark includes a second orientation component, said method comprises:
E2. The method of E1 wherein the printed document comprises a financial document.
E3. The method of E1 wherein the printed document comprises an identification document, and wherein the first area corresponds with a photographic representation of a bearer of the identification document.
E4. The method of E1, wherein the orientation parameter comprises rotation and scale.
F1. A method of determining areas of media that have a likelihood of including digital watermark information, said method comprising:
F2. The method of F1, wherein the media comprises a digital image.
F3. The method of F1, wherein the media comprises video.
F4. The method of F1, wherein the media comprises a printed document.
F5. The method of F4, wherein the printed document comprises at least one of an identification document and a financial document.
F6. The method of F1, further comprising analyzing portions that correspond to the identified orientation measures to recover the digital watermark information
F7. The method of F6, wherein the identified orientation measures respectively correspond to different digital watermark orientation components.
F8. The method of claim F6, wherein prior to said analyzing step, said method further comprises manipulating the portions that correspond to the identified orientation measures to compensate for image distortion identified by the orientation measures.
G1. A method of identifying areas of image data that are likely to include a digital watermark, the image data corresponding to a document comprising a first area and a second area including, respectively, a first digital watermark and a second digital watermark, wherein the first digital watermark includes a first orientation component and the second digital watermark includes a second orientation component, and wherein the document further comprises a visible fiducial, said method comprises:
Reference is now made to the accompanying Appendix A, which is herein incorporated by reference. Appendix A details various additional identification document security features that can be used in combination with digital watermarking, including multiple digital watermarks. Indeed, use of these additional security features provides a layer-security approach—making it even more difficult for a potential forger to successfully replicate an identification document.
In addition to providing a layered security feature, we note that many of these security features can cooperate with a digital watermark. For example, a radio frequency-based security feature may include a code for comparison with (or to unlock or decrypt) a code or message carried by a digital watermark, or vice versa.
As a further example, a fragile or semi-fragile digital watermark can be embedded or laser engraved in a security laminate. If the laminate is tampered with (e.g., manipulated, removed and/or replaced) the fragile watermark will be destroyed or predictably degraded. In addition, a watermark may be embedded in many of the security features discussed in Appendix A, like fine line printing (background), holograms, optical watermarks, seals and spot colors, to name but a few.
Still further, one or more digital watermark may be embedded with ultra-violet inks, optically variable inks, specialized inks, infrared inks, etc. In some cases, we anticipate embedding a first digital watermark with conventional ink, while we embed a second digital watermark with one of the specialized (e.g., UV, IR, optically variable, etc.) inks described in Appendix A. The two digital watermarks may cooperate with each other, or may correspond with text (or microprinting) that is providing on an identification document substrate.
A watermark can also cooperate with biometric information carried by the identification document. In a first implementation, the digital watermark includes a payload having a key to decrypt or decode biometric information stored in a 2-D barcode or magnetic or RF storage carried on the card. In a second implementation, the digital watermark includes information that is redundant with biometric information carried by another security feature. Comparison of the digital watermark information and the biometric information reveals whether the identification document is authentic. In a third implementation, the digital watermark includes at least a portion of a biometric template. Once decoded, the biometric template is used to help authenticate the identification document or to convey information.
Of course additional combinations of these security features are anticipated. In some cases, the combination will include digital watermarking, and in other combinations they will not include digital watermarking.
For example, possible combinations might be:
H1. A security document comprising:
H2. The security document of H1, wherein the steganographically encoded first plural bits of digital data and the steganographically encoded second plural bits of digital data cooperate to verify authenticity of the security document.
H3. The security document of H1, wherein the security feature comprises at least one of a deliberate error, a known flaw, fine line background, ghost image, laser encoded optical image, laser engraving, laser perforation, microprinting, a Moiré Pattern, overlapping data, rainbow printing, and security code printing.
H4. The method of H1, wherein the security feature comprises ultra-violet ink.
H5. The method of H4, wherein the steganographically encoded first plural bits of digital data and the steganographically encoded second plural bits of digital data cooperate to verify authenticity of the security document, and wherein at least one of the first plural bits of digital data and the second plural bits of digital data cooperate with the security feature to verify the authenticity of the security document.
The foregoing are just exemplary implementations of the present invention. It will be recognized that there are a great number of variations on these basic themes. The foregoing illustrates but a few applications of the detailed technology. There are many others.
To provide a comprehensive disclosure without unduly lengthening this specification, applicants incorporate by reference, in their entireties, the disclosures of the above-cited patents and applications. The particular combinations of elements and features in the above-detailed embodiments are exemplary only; the interchanging and substitution of these teachings with other teachings in this application and the incorporated-by-reference patents/applications are also contemplated.
The section headings in this document are provided for the reader's convenience, and are not intended to impose limitations on the present invention. Features disclosed under one section (or embodiment) heading can be readily combined with features disclosed under another section (or embodiment) heading.
While some of the preferred implementations have been illustrated with respect to identification documents the present invention is not so limited. Indeed, the inventive methods can be applied to other types of objects as well, including, but not limited to: checks, traveler checks, banknotes, legal documents, printed documents, in-mold designs, printed plastics, product packaging, labels, photographs, etc.
Also, while some of the implementations discuss embedding first and second digital watermarks, an alternative implementation embeds a single watermark having a first payload component and a second payload component. The first payload component can be embedded, e.g., in a photograph and the second payload component can be embedded, e.g., in a graphic or artwork. The first payload component and the second payload component can be cross-correlated or intertwined to evidence an authentic identification document, as discussed in the above implementations and embodiments.
Although not belabored herein, artisans will understand that the systems and methods described above can be implemented using a variety of hardware and software systems. Alternatively, dedicated hardware, firmware, or programmable logic circuits, can be employed for such operations. Also, some implementations described in the detailed description suggest that some of the methods or functionality can be carried out using computers or electronic processing circuitry executing software. While this may be a preferred implementation, the present invention is not so limited. Indeed the methods and functionality may be achieved by other means, such as dedicated hardware, firmware, programmable logic circuits, etc.
In view of the wide variety of embodiments to which the principles and features discussed above can be applied, it should be apparent that the detailed embodiments are illustrative only and should not be taken as limiting the scope of the invention. Rather, we claim as our invention all such modifications as may come within the scope and spirit of the following claims and equivalents thereof.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US4313197 *||Apr 9, 1980||Jan 26, 1982||Bell Telephone Laboratories, Incorporated||Spread spectrum arrangement for (de)multiplexing speech signals and nonspeech signals|
|US4367488 *||May 1, 1981||Jan 4, 1983||Sterling Television Presentations Inc. Video Data Systems Division||Data encoding for television|
|US4379947 *||Feb 2, 1979||Apr 12, 1983||Teleprompter Corporation||System for transmitting data simultaneously with audio|
|US4380027 *||Dec 8, 1980||Apr 12, 1983||William Leventer||Data encoding for television|
|US4425642 *||Jan 8, 1982||Jan 10, 1984||Applied Spectrum Technologies, Inc.||Simultaneous transmission of two information signals within a band-limited communications channel|
|US4590366 *||Jun 28, 1984||May 20, 1986||Esselte Security Systems Ab||Method of securing simple codes|
|US4660221 *||Jul 18, 1983||Apr 21, 1987||Pitney Bowes Inc.||System for printing encrypted messages with bar-code representation|
|US4723072 *||Jan 4, 1985||Feb 2, 1988||Kabushiki Kaisha Toshiba||Apparatus for discriminating sheets|
|US4807031 *||Oct 20, 1987||Feb 21, 1989||Interactive Systems, Incorporated||Interactive video method and apparatus|
|US4908836 *||Oct 11, 1988||Mar 13, 1990||Unisys Corporation||Method and apparatus for decoding multiple bit sequences that are transmitted simultaneously in a single channel|
|US4994831 *||Dec 11, 1989||Feb 19, 1991||Beattie Systems, Inc.||Floating image camera|
|US5113445 *||Feb 11, 1991||May 12, 1992||Symbol Technologies Inc.||System for encoding data in machine readable graphic form|
|US5284364 *||Jun 10, 1992||Feb 8, 1994||Anvik Corporation||Increased-security identification card system|
|US5379344 *||Apr 26, 1991||Jan 3, 1995||Scandic International Pty. Ltd.||Smart card validation device and method|
|US5379345 *||Jan 29, 1993||Jan 3, 1995||Radio Audit Systems, Inc.||Method and apparatus for the processing of encoded data in conjunction with an audio broadcast|
|US5384846 *||Apr 26, 1993||Jan 24, 1995||Pitney Bowes Inc.||System and apparatus for controlled production of a secure identification card|
|US5396559 *||Aug 24, 1990||Mar 7, 1995||Mcgrew; Stephen P.||Anticounterfeiting method and device utilizing holograms and pseudorandom dot patterns|
|US5490217 *||Mar 5, 1993||Feb 6, 1996||Metanetics Corporation||Automatic document handling system|
|US5499293 *||Jan 24, 1995||Mar 12, 1996||University Of Maryland||Privacy protected information medium using a data compression method|
|US5499294 *||May 24, 1995||Mar 12, 1996||The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration||Digital camera with apparatus for authentication of images produced from an image file|
|US5505494 *||Sep 17, 1993||Apr 9, 1996||Bell Data Software Corporation||System for producing a personal ID card|
|US5613004 *||Jun 7, 1995||Mar 18, 1997||The Dice Company||Steganographic method and device|
|US5617119 *||Jun 7, 1995||Apr 1, 1997||Systems Research & Applications Corporation||Protection of an electronically stored image in a first color space by the alteration of a digital component in a second color space|
|US5721788 *||Jul 31, 1992||Feb 24, 1998||Corbis Corporation||Method and system for digital image signatures|
|US5740244 *||May 7, 1996||Apr 14, 1998||Washington University||Method and apparatus for improved fingerprinting and authenticating various magnetic media|
|US5745604 *||Mar 15, 1996||Apr 28, 1998||Digimarc Corporation||Identification/authentication system using robust, distributed coding|
|US5748763 *||May 8, 1995||May 5, 1998||Digimarc Corporation||Image steganography system featuring perceptually adaptive and globally scalable signal embedding|
|US5748780 *||Jun 14, 1994||May 5, 1998||Stolfo; Salvatore J.||Method and apparatus for imaging, image processing and data compression|
|US5751854 *||Jun 7, 1996||May 12, 1998||Ricoh Company, Ltd.||Original-discrimination system for discriminating special document, and image forming apparatus, image processing apparatus and duplicator using the original-discrimination system|
|US5859920 *||Nov 30, 1995||Jan 12, 1999||Eastman Kodak Company||Method for embedding digital information in an image|
|US5862260 *||May 16, 1996||Jan 19, 1999||Digimarc Corporation||Methods for surveying dissemination of proprietary empirical data|
|US5864622 *||Nov 20, 1992||Jan 26, 1999||Pitney Bowes Inc.||Secure identification card and method and apparatus for producing and authenticating same|
|US5864623 *||Jul 15, 1996||Jan 26, 1999||Intellicheck Inc.||Authentication system for driver licenses|
|US5892847 *||Apr 22, 1996||Apr 6, 1999||Johnson-Grace||Method and apparatus for compressing images|
|US5892900 *||Aug 30, 1996||Apr 6, 1999||Intertrust Technologies Corp.||Systems and methods for secure transaction management and electronic rights protection|
|US5905800 *||Mar 25, 1998||May 18, 1999||The Dice Company||Method and system for digital watermarking|
|US5907149 *||Jun 27, 1994||May 25, 1999||Polaroid Corporation||Identification card with delimited usage|
|US6024287 *||Nov 20, 1997||Feb 15, 2000||Nec Corporation||Card recording medium, certifying method and apparatus for the recording medium, forming system for recording medium, enciphering system, decoder therefor, and recording medium|
|US6026193 *||Oct 16, 1997||Feb 15, 2000||Digimarc Corporation||Video steganography|
|US6064764 *||Mar 30, 1998||May 16, 2000||Seiko Epson Corporation||Fragile watermarks for detecting tampering in images|
|US6065119 *||May 30, 1997||May 16, 2000||The Regents Of The University Of California||Data validation|
|US6185312 *||Jan 27, 1998||Feb 6, 2001||Nippon Telegraph And Telephone Corporation||Method for embedding and reading watermark-information in digital form, and apparatus thereof|
|US6185683 *||Dec 28, 1998||Feb 6, 2001||Intertrust Technologies Corp.||Trusted and secure techniques, systems and methods for item delivery and execution|
|US6208735 *||Jan 28, 1999||Mar 27, 2001||Nec Research Institute, Inc.||Secure spread spectrum watermarking for multimedia data|
|US6226387 *||Aug 27, 1997||May 1, 2001||Regents Of The University Of Minnesota||Method and apparatus for scene-based video watermarking|
|US6233347 *||Dec 7, 1998||May 15, 2001||Massachusetts Institute Of Technology||System method, and product for information embedding using an ensemble of non-intersecting embedding generators|
|US6233684 *||Oct 10, 1997||May 15, 2001||Contenaguard Holdings, Inc.||System for controlling the distribution and use of rendered digital works through watermaking|
|US6237786 *||Jun 17, 1999||May 29, 2001||Intertrust Technologies Corp.||Systems and methods for secure transaction management and electronic rights protection|
|US6240121 *||Jul 9, 1998||May 29, 2001||Matsushita Electric Industrial Co., Ltd.||Apparatus and method for watermark data insertion and apparatus and method for watermark data detection|
|US6343138 *||Jun 29, 1999||Jan 29, 2002||Digimarc Corporation||Security documents with hidden digital data|
|US6345104 *||Jul 31, 1998||Feb 5, 2002||Digimarc Corporation||Digital watermarks and methods for security documents|
|US6369904 *||Dec 1, 1998||Apr 9, 2002||Seiko Epson Corporation||User verification by zero-knowledge interactive proof|
|US6370258 *||May 29, 1998||Apr 9, 2002||Canon Kabushiki Kaisha||Image processing apparatus and method|
|US6389151 *||Nov 18, 1999||May 14, 2002||Digimarc Corporation||Printing and validation of self validating security documents|
|US6512837 *||Oct 11, 2000||Jan 28, 2003||Digimarc Corporation||Watermarks carrying content dependent signal metrics for detecting and characterizing signal alteration|
|US6519352 *||Jan 23, 2002||Feb 11, 2003||Digimarc Corporation||Encoding and decoding in accordance with steganographically-conveyed data|
|US6536665 *||Jan 20, 2000||Mar 25, 2003||Eastman Kodak Company||Method and apparatus for transaction card security utilizing embedded image data|
|US6542618 *||Nov 17, 1999||Apr 1, 2003||Digimarc Corporation||Methods for watermark decoding|
|US6674886 *||Oct 28, 1999||Jan 6, 2004||Digimarc Corporation||Method and system for recognizing security documents|
|US6704869 *||Jul 22, 2002||Mar 9, 2004||Digimarc Corporation||Extracting digital watermarks using logarithmic sampling and symmetrical attributes|
|US6732924 *||Feb 28, 2001||May 11, 2004||Kabushiki Kaisha Toshiba||Automatic ticket checking apparatus|
|US6843422 *||Dec 23, 2002||Jan 18, 2005||Digimarc Corporation||Contact smart cards having a document core, contactless smart cards including multi-layered structure, pet-based identification document, and methods of making same|
|US6869023 *||Jun 14, 2002||Mar 22, 2005||Digimarc Corporation||Linking documents through digital watermarking|
|US6882737 *||Jun 18, 2003||Apr 19, 2005||Digimarc Corporation||Digitally watermarking holograms for identity documents|
|US6883716 *||Dec 7, 1999||Apr 26, 2005||Sun Microsystems, Inc.||Secure photo carrying identification device, as well as means and method for authenticating such an identification device|
|US6991174 *||Dec 30, 2003||Jan 31, 2006||Brite Smart Corporation||Method and apparatus for authenticating a shipping transaction|
|US6999619 *||Jul 11, 2001||Feb 14, 2006||Canon Kabushiki Kaisha||Processing for accurate reproduction of symbols and other high-frequency areas in a color image|
|US7007852 *||Oct 2, 2003||Mar 7, 2006||Silverbrook Research Pty Ltd||Data distribution mechanism in the form of ink dots on cards|
|US7016516 *||Sep 4, 2003||Mar 21, 2006||Digimarc Corporation||Authentication of identification documents|
|US20020010684 *||Dec 7, 2000||Jan 24, 2002||Moskowitz Scott A.||Systems, methods and devices for trusted transactions|
|US20020011519 *||May 3, 2001||Jan 31, 2002||Shults John R.||System and method for consumer identification using optical and electronic means|
|US20020015509 *||Apr 9, 2001||Feb 7, 2002||Takeshi Nakamura||Method and apparatus for superposing a digital watermark and method and apparatus for detecting a digital watermark|
|US20020019767 *||Jun 15, 2001||Feb 14, 2002||Babbitt Victor L.||Distributed network voting system|
|US20020023148 *||Sep 13, 2001||Feb 21, 2002||Airclic, Inc.||Method for managing printed medium activated revenue sharing domain name system schemas|
|US20020033844 *||Sep 11, 2001||Mar 21, 2002||Levy Kenneth L.||Content sensitive connected content|
|US20020034305 *||Jul 20, 2001||Mar 21, 2002||Hideo Noyama||Method and system for issuing service and method and system for providing service|
|US20020037091 *||Sep 19, 2001||Mar 28, 2002||Hiroshi Terasaki||Image transmission system, method of the same, and recording medium|
|US20020037093 *||Mar 5, 2001||Mar 28, 2002||Murphy Stephen C.||System for detecting photocopied or laser-printed documents|
|US20020046171 *||Jul 6, 2001||Apr 18, 2002||Nec Corporation||Authenticity checker for driver's license, automated-teller machine provided with the checker and program recording medium|
|US20020049908 *||Sep 26, 2001||Apr 25, 2002||Seiko Epson Corporation||Apparatus, system and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon|
|US20020052885 *||Sep 11, 2001||May 2, 2002||Levy Kenneth L.||Using embedded data with file sharing|
|US20020054317 *||Aug 8, 2001||May 9, 2002||Fuji Xerox Co., Ltd.||Image data outputting apparatus and image data outputting method|
|US20020059880 *||Feb 8, 2002||May 23, 2002||Klinefelter Gary M.||Method and apparatus for communicating between printer and card supply|
|US20020061120 *||Nov 9, 2001||May 23, 2002||Carr Jonathan Scott||Self validating security documents utilizing watermarks|
|US20020061121 *||Dec 7, 2001||May 23, 2002||Rhoads Geoffrey B.||Methods and sytems using multiple watermarks|
|US20020061122 *||Oct 26, 2001||May 23, 2002||Nec Corporation||Image data protection technique|
|US20020064298 *||Dec 7, 2001||May 30, 2002||Rhoads Geoffrey B.||Methods and systems using multiple watermarks|
|US20020064759 *||Nov 30, 2000||May 30, 2002||Durbin Duane Milford||Method and system for viewing, altering and archiving digital models of dental structures and computer integrated manufacturing of physical models of dental structures|
|US20030002710 *||Jun 4, 2002||Jan 2, 2003||Digimarc Corporation||Digital authentication with analog documents|
|US20030005303 *||Apr 24, 2002||Jan 2, 2003||Pitney Bowes Incorporated||Method and system for validating a security marking|
|US20030039360 *||Aug 21, 2001||Feb 27, 2003||Younis Saed G.||Method and system for restricting mobility using unique encrypted chargers|
|US20030089764 *||Nov 13, 2001||May 15, 2003||Payformance Corporation||Creating counterfeit-resistant self-authenticating documents using cryptographic and biometric techniques|
|US20030099374 *||Nov 2, 2001||May 29, 2003||Choi Jong Uk||Method for embedding and extracting text into/from electronic documents|
|US20040026496 *||Aug 9, 2002||Feb 12, 2004||Patrick Zuili||Remote portable and universal smartcard authentication and authorization device|
|US20050063027 *||Jul 16, 2004||Mar 24, 2005||Durst Robert T.||Uniquely linking security elements in identification documents|
|US20050092849 *||Jul 6, 2004||May 5, 2005||Kia Silverbrook||Information card with fault tolerant printing of encoded information|
|US20050094848 *||Nov 17, 2004||May 5, 2005||Carr J. S.||Authentication of identification documents using digital watermarks|
|US20060016107 *||May 18, 2005||Jan 26, 2006||Davis Bruce L||Photo ID cards and methods of production|
|US20060040726 *||Feb 11, 2005||Feb 23, 2006||Walter Szrek||Method and system for authentication|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7475246 *||Aug 4, 2000||Jan 6, 2009||Blue Spike, Inc.||Secure personal content server|
|US7647502||Nov 15, 2006||Jan 12, 2010||Wistaria Trading, Inc.||Optimization methods for the insertion, protection, and detection of digital watermarks in digital data|
|US7647503||Sep 7, 2007||Jan 12, 2010||Wistaria Trading, Inc.||Optimization methods for the insertion, projection, and detection of digital watermarks in digital data|
|US7660700||Dec 26, 2007||Feb 9, 2010||Blue Spike, Inc.||Method and device for monitoring and analyzing signals|
|US7664263||Jun 25, 2003||Feb 16, 2010||Moskowitz Scott A||Method for combining transfer functions with predetermined key creation|
|US7664264||Sep 12, 2006||Feb 16, 2010||Blue Spike, Inc.||Utilizing data reduction in steganographic and cryptographic systems|
|US7664958||Aug 31, 2007||Feb 16, 2010||Wistaria Trading, Inc.||Optimization methods for the insertion, protection and detection of digital watermarks in digital data|
|US7668750||Mar 10, 2004||Feb 23, 2010||David S Bonalle||Securing RF transactions using a transactions counter|
|US7690577||Sep 20, 2007||Apr 6, 2010||Blayn W Beenau||Registering a biometric for radio frequency transactions|
|US7705732||Dec 9, 2004||Apr 27, 2010||Fred Bishop||Authenticating an RF transaction using a transaction counter|
|US7711142 *||Apr 22, 2006||May 4, 2010||Teselle John||Method and system for composing a digital signature graphic appearance and specifying a document display location thereof|
|US7725427||Sep 28, 2004||May 25, 2010||Fred Bishop||Recurrent billing maintenance with radio frequency payment devices|
|US7730317||Nov 2, 2006||Jun 1, 2010||Wistaria Trading, Inc.||Linear predictive coding implementation of digital watermarks|
|US7738659||Feb 21, 2006||Jun 15, 2010||Moskowitz Scott A||Multiple transform utilization and application for secure digital watermarking|
|US7739511||Oct 29, 2007||Jun 15, 2010||Intertrust Technologies Corp.||Systems and methods for watermarking software and other media|
|US7761712||Feb 7, 2005||Jul 20, 2010||Wistaria Trading, Inc.||Steganographic method and device|
|US7770016||Aug 3, 2010||Intertrust Technologies Corporation||Systems and methods for watermarking software and other media|
|US7770017||Dec 26, 2007||Aug 3, 2010||Wistaria Trading, Inc.||Method and system for digital watermarking|
|US7779261||Jan 3, 2007||Aug 17, 2010||Wistaria Trading, Inc.||Method and system for digital watermarking|
|US7793845||Aug 3, 2009||Sep 14, 2010||American Express Travel Related Services Company, Inc.||Smartcard transaction system and method|
|US7813506||Mar 30, 2009||Oct 12, 2010||Blue Spike, Inc||System and methods for permitting open access to data objects and for securing data within the data objects|
|US7814332||Sep 6, 2007||Oct 12, 2010||Blayn W Beenau||Voiceprint biometrics on a payment device|
|US7822197||Sep 7, 2007||Oct 26, 2010||Wistaria Trading, Inc.||Optimization methods for the insertion, protection, and detection of digital watermarks in digital data|
|US7827415 *||Apr 6, 2005||Nov 2, 2010||Ricoh Company, Ltd.||Image processing apparatus capable of authenticating document|
|US7830915||Jan 23, 2008||Nov 9, 2010||Wistaria Trading, Inc.||Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments|
|US7844074||Jun 30, 2008||Nov 30, 2010||Wistaria Trading, Inc.||Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data|
|US7855810 *||Apr 21, 2005||Dec 21, 2010||Eastman Kodak Company||Method for automatically organizing a digitized hardcopy media collection|
|US7870393||Aug 21, 2007||Jan 11, 2011||Wistaria Trading, Inc.||Steganographic method and device|
|US7877609||Nov 12, 2009||Jan 25, 2011||Wistaria Trading, Inc.||Optimization methods for the insertion, protection, and detection of digital watermarks in digital data|
|US7886157||Jan 25, 2008||Feb 8, 2011||Xatra Fund Mx, Llc||Hand geometry recognition biometrics on a fob|
|US7889052||Jan 10, 2003||Feb 15, 2011||Xatra Fund Mx, Llc||Authorizing payment subsequent to RF transactions|
|US7930545||Nov 15, 2006||Apr 19, 2011||Wistaria Trading, Inc.|
|US7949494||Dec 22, 2009||May 24, 2011||Blue Spike, Inc.||Method and device for monitoring and analyzing signals|
|US7953981||Aug 10, 2009||May 31, 2011||Wistaria Trading, Inc.|
|US7991157||Apr 25, 2007||Aug 2, 2011||Digimarc Corporation||Methods and systems responsive to features sensed from imagery or other data|
|US8050451||Jun 11, 2010||Nov 1, 2011||Digimarc Corporation||Electronic forms using indicia, sometimes hidden indicia|
|US8140850||Dec 8, 2008||Mar 20, 2012||Intertrust Technologies Corporation||Systems and methods for watermarking software and other media|
|US8171561||Oct 9, 2008||May 1, 2012||Blue Spike, Inc.||Secure personal content server|
|US8249350 *||Jun 30, 2006||Aug 21, 2012||University Of Geneva||Brand protection and product autentication using portable devices|
|US8335924||Jun 29, 2010||Dec 18, 2012||Intertrust Technologies Corp.||Systems and methods for watermarking software and other media|
|US8370634 *||May 20, 2010||Feb 5, 2013||Intertrust Technologies Corp.||Systems and methods for watermarking software and other media|
|US8538011||Aug 29, 2006||Sep 17, 2013||Blue Spike, Inc.||Systems, methods and devices for trusted transactions|
|US8542831||May 4, 2010||Sep 24, 2013||Scott A. Moskowitz||Multiple transform utilization and application for secure digital watermarking|
|US8542871 *||Aug 9, 2012||Sep 24, 2013||University Of Geneva||Brand protection and product authentication using portable devices|
|US8576049 *||Sep 23, 2009||Nov 5, 2013||International Business Machines Corporation||Document authentication and identification|
|US8630526||Apr 12, 2002||Jan 14, 2014||At&T Intellectual Property Ii, L.P.||Method of indexing multimedia content by creating database records that include location data|
|US8739295||Mar 7, 2012||May 27, 2014||Blue Spike, Inc.||Secure personal content server|
|US8789201||Mar 12, 2013||Jul 22, 2014||Blue Spike, Inc.||Secure personal content server|
|US8892893||Jan 10, 2013||Nov 18, 2014||Intertrust Technologies Corporation||Systems and methods for watermarking software and other media|
|US9070151||Mar 12, 2013||Jun 30, 2015||Blue Spike, Inc.||Systems, methods and devices for trusted transactions|
|US9104842||Aug 24, 2007||Aug 11, 2015||Scott A. Moskowitz||Data protection method and device|
|US20040190751 *||Nov 26, 2003||Sep 30, 2004||Digimarc Corporation||Method for utilizing fragile watermark for enhanced security|
|US20050206158 *||Feb 10, 2005||Sep 22, 2005||Touchstone Research Laboratory, Ltd.||Certificate issuing method and certificate verifying method|
|US20090017765 *||Sep 25, 2008||Jan 15, 2009||Dspv, Ltd||System and Method of Enabling a Cellular/Wireless Device with Imaging Capabilities to Decode Printed Alphanumeric Characters|
|US20090196465 *||Feb 1, 2008||Aug 6, 2009||Satish Menon||System and method for detecting the source of media content with application to business rules|
|US20100229002 *||Sep 9, 2010||Intertrust Technologies Corporation||Systems and methods for watermarking software and other media|
|US20110072271 *||Mar 24, 2011||International Business Machines Corporation||Document authentication and identification|
|US20130326020 *||May 30, 2012||Dec 5, 2013||International Business Machines Corporation||Preventing personal information from being posted to an internet|
|WO2006063331A2 *||Dec 9, 2005||Jun 15, 2006||Michael Robert Anderson||Bit stream backup incorporating parallel processes|
|WO2010135263A2 *||May 17, 2010||Nov 25, 2010||Deeper Arts, Inc.||System and method for creating and unlocking coded messages|
|WO2013137908A1 *||Mar 16, 2012||Sep 19, 2013||Hewlett-Packard Development Company, L. P.||Classifying images|
|International Classification||H04N1/32, G07F7/12, G07F7/08, G07D7/12, G06T1/00, B42D15/10|
|Cooperative Classification||B42D25/00, B42D25/309, G09C5/00, H04L9/3231, H04N2201/3205, G06T2201/0051, H04N2201/3233, G07F7/12, G06T1/0028, G06Q20/347, H04N2201/327, H04N1/32288, G07F7/086, G07D7/002, H04N1/32352, G06T1/0071, H04N1/32304, H04N2201/3235, G07F7/08, H04N1/32144, G06Q20/401, B42D2035/34, H04K1/00, H04L2209/608, H04L2209/56, H04L2209/805|
|European Classification||H04N1/32C19C, G06Q20/347, H04K1/00, H04N1/32C19B6D, G07F7/12, G06T1/00W2, G06Q20/401, H04N1/32C19, G07F7/08B, B42D15/10, G06T1/00W6M, G07D7/00B4, G07F7/08|
|May 24, 2004||AS||Assignment|
Owner name: DIGIMARC CORPORATION, OREGON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRUNDAGE, TRENT J.;SHER-JAN, MAHMOOD;WEAVER, MATHEW M.;AND OTHERS;REEL/FRAME:015359/0011;SIGNING DATES FROM 20040409 TO 20040505
Owner name: DIGIMARC CORPORATION, OREGON
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRUNDAGE, TRENT J.;SHER-JAN, MAHMOOD;WEAVER, MATHEW M.;AND OTHERS;SIGNING DATES FROM 20040409 TO 20040505;REEL/FRAME:015359/0011
|Nov 5, 2008||AS||Assignment|
Owner name: DIGIMARC CORPORATION (FORMERLY DMRC CORPORATION),O
Free format text: CONFIRMATION OF TRANSFER OF UNITED STATES PATENT RIGHTS;ASSIGNOR:L-1 SECURE CREDENTIALING, INC. (FORMERLY KNOWN AS DIGIMARC CORPORATION);REEL/FRAME:021785/0796
Effective date: 20081024