Authentication Methods and Systems Including Embedded Auxiliary Data
First Claim
1. An authentication method comprising:
- receiving optical scan data representing at least a portion of an identification document, the portion of the identification document comprising a first region including a photographic representation of an authorized bearer of the identification document;
comparing geometric characteristics of the first region from the data representing the portion to predetermined geometric characteristics of the first region;
based at least in part on a result of said act of comparing, adjusting a detection process; and
detecting steganographic encoding with the adjusted detection process to obtain information steganographically encoded in the photographic representation of the authorized bearer of the identification document.
6 Assignments
0 Petitions
Accused Products
Abstract
The present invention generally relates to steganography and digital watermarking. An authentication method is provided in one embodiment. The method includes receiving an object including a host object and auxiliary data steganographically embedded within the host object; determining geometric characteristics of the host object relative to expected geometric characteristics of the host object; and detecting the auxiliary data from the host object. The method can further include re-aligning or correcting geometric characteristics of the object based on a result of the act of determining prior to the act of detecting. Other embodiments, method and apparatus and described as well.
149 Citations
22 Claims
-
1. An authentication method comprising:
-
receiving optical scan data representing at least a portion of an identification document, the portion of the identification document comprising a first region including a photographic representation of an authorized bearer of the identification document;
comparing geometric characteristics of the first region from the data representing the portion to predetermined geometric characteristics of the first region;
based at least in part on a result of said act of comparing, adjusting a detection process; and
detecting steganographic encoding with the adjusted detection process to obtain information steganographically encoded in the photographic representation of the authorized bearer of the identification document. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An authentication method comprising:
-
receiving an object comprising a host object and auxiliary data steganographically embedded within the host object;
determining geometric characteristics of the host object relative to expected geometric characteristics of the host object; and
detecting the auxiliary data from the host object. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A method comprising:
-
receiving data representing an identification document photograph and auxiliary data steganographically hidden within the identification document photograph;
determining geometric characteristics of the identification document photograph relative to expected geometric characteristics of the identification document photograph; and
detecting the auxiliary data from the identification document photograph based at least in part on a result from said act of determining. - View Dependent Claims (17, 18, 19, 20, 21, 22)
-
Specification