Claims
- 1. A method of processing image data to screen for security document images comprising, in the order stated:
(a) performing a first analysis on the image data; (b) if the first analysis indicates the image data does not correspond to a security document, skipping steps (c)-(e) (c) performing a second analysis on the image data; (d) if the second image analysis indicates the image data does not correspond to a security document, skipping step (e); and (e) flagging the image data as corresponding to a security document.
- 2. The method of claim 1 that includes performing one or more additional analyses between steps (d) and (e), and skipping subsequent analyses if any of said additional analysis indicates the image data does not correspond to a security document.
- 3. The method of claim 1 in which at least one of the analyses employs the Hough transform.
- 4. The method of claim 1 in which the first analysis is based on a rotationally invariant feature.
- 5. Apparatus for processing image data comprising:
a steganographic watermark detector responsive to a steganographic watermark that is characteristic of a security document; and a pattern recognition detector responsive to a visible structure that is characteristic of a security document.
- 6. A photocopier according to claim 5.
- 7. A scanner according to claim 5.
- 8. A printer according to claim 5.
- 9. The apparatus of claim 5 that further includes an output having a signal that changes state when either of said detectors detects image data corresponding to a security document.
- 10. The apparatus of claim 9 further comprising a non-volatile memory for storing forensic tracer data in response to said signal.
- 11. The apparatus of claim 9 further comprising means for storing an audit trail memorializing detection of a security document.
- 12. A method of flagging image data as corresponding to a security document, comprising:
loading at least a portion of the image data into a memory; analyzing the image data in the memory for the presence of a steganographic watermark indicative of a security document; and analyzing the image data in the memory for the presence of a visible structure indicative of a security document.
- 13. The method of claim 12 wherein the two analyzing steps occur without moving at least a portion of the image data from the memory.
- 14. The method of claim 12 that further includes interfering with reproduction of the image data if either of said analyzing steps indicates that the image data corresponds to a security document.
- 15. The method of claim 12 in which at least one of said analyzing steps comprises analyzing plural scan lines of image data, but less than a complete set of image data.
- 16. The method of claim 12 that includes generating forensic tracer data redundantly, transmitting said forensic tracer data redundantly, and storing said forensic tracer data both transparently and inconspicuously, all in response to detection of either said steganographic watermark or said visible structure.
- 17. The method of claim 16 in which the forensic tracer data includes data selected from the group consisting of: data identifying the date of an activity, data identifying the serial number of a computer system, data identifying a serial number of a system component, data identifying a user of the computer system, data identifying a file, data indicating the nature of a detected event, data indicating the status of the computer system, data from a registry database, data relating to an external network connection, and data derived from a digital watermark payload.
- 18. A method of flagging image data as corresponding to a security document, comprising:
re-registering the image data; analyzing the re-registered image data for the presence of a steganographic watermark indicative of a security document; and analyzing the re-registered image data for the presence of a visible structure indicative of a security document.
- 19. The method of claim 18 that further includes interfering with reproduction of the image data if either of said analyzing steps indicates that the image data corresponds to a security document.
- 20. The method of claim 18 in which the re-registering includes determining a scaling or rotation factor by reference to detection of calibration data embedded within the image data, and compensating for said determined factor.
RELATED APPLICATION DATA
[0001] This application is a divisional application of application Ser. No. 09/185,380, filed Nov. 3, 1998, the disclosure of which is incorporated herein by reference.
Divisions (1)
|
Number |
Date |
Country |
Parent |
09185380 |
Nov 1998 |
US |
Child |
09428359 |
Oct 1999 |
US |