Claims
- 1. A method of producing a background image representing data comprising the steps of:
producing a first encoding of the data into a first binary array; producing a second encoding of the data into a second binary array; representing the first binary array as a first set of modules of a first size on nodes of a first lattice; representing the second binary array as a second set of modules of a second size, which is smaller than the first size on nodes of a second lattice; combining the first and second sets of modules; and printing the first and second sets of modules.
- 2. The method claimed in claim 1, further including the step of:
superimposing graphic material on the modules before printing.
- 3. The method claimed in claim 2, wherein the graphic material is a postal indicia.
- 4. The method claimed in claim 1, wherein the modules on the first lattice and the modules on the second lattice do not overlap.
- 5. A method for producing a composite image comprising the steps of:
producing a first image and a second image that embeds information in the first image; representing information contained in the second image by a two-dimensional bar code; filtering the two-dimensional bar code with a spreading algorithm that scrambles the information represented by the two-dimensional bar code; splitting the filter bar code into an equal first part and an equal second part, wherein each first part and each second part will contain an upper portion and a lower portion such that the lower portion of the first part and the upper portion of the second part will be white or empty space; applying a spreading algorithm to the first part and second part to further hide the information in the first and second parts; expanding the first and second parts over the entire image that is going to be printed; and printing the first and second parts over the first image to produce an image containing hidden information.
- 6. The method claimed in claim 5, wherein the first image is a postal indicia.
- 7. The method claimed in claim 5, wherein the first and second images are printed on a medium.
- 8. The method claimed in claim 5, wherein:
at each location in which information from the first parts is going to be printed, the printed information will be a printed pixel of a specified dimension, and at each location in which information from the plurality of second parts is going to be printed, the printed information will be a printed pixel of a specified dimension that differs from the pixels printed in the first parts.
- 9. The method claimed in claim 5, wherein when the first and second images are scanned and printed, the printed pixels of specified dimensions in the first and second parts will become larger.
- 10. The method claimed in claim 9, wherein the change in size of the printed pixels of specified dimensions in the first and second parts is detectable by the unaided human eye.
- 11. The method claimed in claim 9, wherein the change in size of the printed pixels of specified dimensions in the first and second parts is detectable by a scanner.
- 12. The method claimed in claim 5, further including the steps of:
photocopying the first and second images; and noticing a change in appearance of the second image.
- 13. The method claimed in claim 5, further including the steps of:
scanning the first and second images; and noticing a change in appearance of the second image.
- 14. The method claimed in claim 5, wherein when the first and second images are photocopied, the printed pixels of specified dimensions in the first and second parts will become larger.
- 15. The method claimed in claim 14, wherein the change in size of the printed pixels of specified dimensions in the first and second parts is detectable by the unaided human eye.
- 16. The method claimed in claim 14, wherein the change in size of the printed pixels of specified dimensions in the first and second parts is detectable by the scanner.
- 17. The method claimed in claim 5, wherein the first image will not change in appearance when the first image is scanned or photocopied.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] Reference is made to commonly assigned copending patent application Docket No. F-285 filed herewith entitled “Method For Reading Information That Has Been Embedded In An Image” in the names of Robert A. Cordery, Claude Zeller, Donald G. Mackay and William A. Brosseau; and Docket No. F-417 filed herewith entitled “Method For Utilizing A Fragile Watermark For Enhanced Security” in the names of Claude Zeller, Donald G. Mackay, William Kilmartin, William A. Brosseau, James Euchner and Robert A. Cordery (Docket No. F-417 claims the benefit of the filing date of U.S. Provisional Application No. 60/283,565 filed Apr. 13, 2001, which is owned by the assignee of the present Application).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60283565 |
Apr 2001 |
US |