Authentication methods and systems including embedded auxiliary data
First Claim
Patent Images
1. An authentication method comprising:
- receiving optical scan data representing at least a portion of an identification document, the portion of the identification document comprising a first region including a photographic representation of an authorized bearer of the identification document;
comparing geometric characteristics of the first region from the data representing the portion to predetermined geometric characteristics of the first region;
based at least in part on a result of said act of comparing, adjusting a detection process; and
utilizing a programmed electronic processor for detecting steganographic encoding with the adjusted detection process to obtain information steganographically encoded in the photographic representation of the authorized bearer of the identification document.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention generally relates to steganography and digital watermarking. An authentication method is provided in one embodiment. The method includes receiving an object including a host object and auxiliary data steganographically embedded within the host object; determining geometric characteristics of the host object relative to expected geometric characteristics of the host object; and detecting the auxiliary data from the host object. The method can further include re-aligning or correcting geometric characteristics of the object based on a result of the act of determining prior to the act of detecting. Other embodiments, method and apparatus and described as well.
188 Citations
26 Claims
-
1. An authentication method comprising:
-
receiving optical scan data representing at least a portion of an identification document, the portion of the identification document comprising a first region including a photographic representation of an authorized bearer of the identification document; comparing geometric characteristics of the first region from the data representing the portion to predetermined geometric characteristics of the first region; based at least in part on a result of said act of comparing, adjusting a detection process; and utilizing a programmed electronic processor for detecting steganographic encoding with the adjusted detection process to obtain information steganographically encoded in the photographic representation of the authorized bearer of the identification document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An authentication method comprising:
-
receiving an object comprising a host object and auxiliary data steganographically embedded within the host object; determining geometric characteristics of the host object relative to expected geometric characteristics of the host object; re-aligning or adjusting data representing the host object to compensate for geometric characteristics of the host object based on a result of said act of determining; and
thenutilizing a programmed electronic processor for detecting the auxiliary data from the host object. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A method comprising:
-
receiving data representing an identification document photograph and auxiliary data steganographically hidden within the identification document photograph; determining geometric characteristics of the identification document photograph relative to expected geometric characteristics of the identification document photograph, in which the expected geometric characteristics are represented in terms of at least scale, translation or rotation; and utilizing a programmed electronic processor for detecting the auxiliary data from the data representing the identification document photograph based at least in part on a result from said act of determining. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
Specification