Techniques for Detecting, Analyzing, and Using Visible Authentication Patterns
1 Assignment
0 Petitions
Accused Products
Abstract
Improved techniques for making copy detection patterns and using them to detect copying relationships between digital representations. The techniques include techniques for including a message in a copy detection pattern without altering the copy detection patterns entropy and reading the message, techniques for using a copy detection pattern on an analog form to determine whether the analog form is an original analog form without reference to a digital representation of the original of the analog form'"'"'s copy detection pattern, techniques for increasing the sensitivity of copy detection using copy detection patterns by modifying one of two copy detection patterns that are being compared to take into account alterations resulting from the copying process, techniques for distributing a copy detection pattern across a document, and techniques for using the entropy of a copy detection pattern to locate the copy detection pattern. Also disclosed are applications of copy detection patterns with copying that involves transformations between the digital and analog forms and with digital-to-digital copying.
65 Citations
84 Claims
-
1-52. -52. (canceled)
-
53. A digital representation of an analog signal, the digital representation being wherein:
the digital representation includes a representation of a copy detection signal that is sensitive to transformations produced by digital-to-analog and analog-to-digital conversions, whereby the representation of the copy detection signal may be used to determine whether another digital representation of the analog signal was made by digitizing an analog signal produced from the digital representation.
-
54. (canceled)
-
55. A method of creating a digital authentication pattern that contains a message, the digital authentication pattern belonging to a digital representation and the method comprising:
-
selecting sets of pattern elements belonging to the digital authentication pattern to carry message elements of the message; and for each selected set, setting the values of the pattern elements in the set to carry the message element such that the digital authentication pattern'"'"'s ability to detect copying remains substantially unchanged. - View Dependent Claims (56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
-
66. A digital authentication pattern that contains a message, the digital authentication pattern comprising:
-
a plurality of sets of pattern elements, the plurality of sets of pattern elements including sets thereof that carry message elements belonging to the message; and in a set that carries a message element, the set'"'"'s values are set such that the digital authentication pattern'"'"'s ability to detect copying remain substantially unchanged. - View Dependent Claims (67, 68, 69, 70, 71, 72, 73, 74)
-
-
75. A method of reading a message contained in a digital authentication pattern that includes a plurality of sets of pattern elements, the method comprising:
-
selecting sets of the pattern elements from the plurality, said selected sets carrying message elements of the message and the values of said selected set'"'"'s pattern elements being set such that the digital authentication pattern'"'"'s ability to detect copying remains substantially unchanged; and for each selected set, comparing the selected set with equivalent sets that have a possible value of the message element to determine a value of the message element in the selected set. - View Dependent Claims (76, 77, 78, 79, 80, 81, 82, 83, 84)
-
Specification