Claims
- 1. A method for detecting a copy of a composite image that includes a first image and a second image that has information embedded in the second image that will change in appearance when the first and second images are scanned or photocopied, comprising the steps of:
scanning the first and second images; and detecting a change in appearance of the second image that indicates the first and second images were scanned or photocopied.
- 2. The method claimed in claim 1, wherein the first image is a postal indicia.
- 3. The method claimed in claim 1, wherein the first and second images are printed on a medium.
- 4. The method claimed in claim 1, wherein the information contained in the second image is produced by the steps of:
representing the information contained in the second image by a two- dimensional bar code; filtering the two-dimensional bar code with a spread spectrum algorithm that scrambles the information represented by the two-dimensional bar code;. splitting the filter bar code into an equal first part and an equal second part, wherein each first part and each second part will contain an upper portion and a lower portion such that the lower portion of the first part and the upper portion of the second part will be white or empty space; applying a spread spectrum algorithm to the first part and second part to further hide the information in the first and second parts; expanding the first and second parts over the entire image that is going to be printed; and printing the first and second parts over the first image to produce an image containing hidden information.
- 5. The method claimed in claim 1, wherein:
portions of the area of the second image are larger than portions of the area of the first image.
- 6. The method claimed in claim 5, wherein portions of the second image have a different shape.
- 7. The method claimed in claim 6, wherein sharp corners of the second image are removed.
- 8. The method claimed in claim 1, wherein the first image has a specified bar code module size, and the second image has a specified bar code module size that is different from module size specified for the first image.
- 9. The method claimed in claim 8, wherein the module size of the bar code in the second image is smaller than the module size of the bar code in the first image.
- 10. The method claimed in claim 9, wherein the ratio of the area of the second image to the perimeter of the second image is increased from the ratio of the second image to the perimeter of the first image before the image is scanned or photocopied.
- 11. The method claimed in claim 9, further including the steps of:
decoding information in the first and second images; and determining the amount of information in the original first and second images that is different from the amount of information in the scanned or photocopied first and second images.
- 12. The method claimed in claim 1, further including the step of:
informing an observer that a copy of the composite image was detected.
- 13. The method claimed in claim 1, wherein the first image will not change in appearance when the first image is scanned or photocopied.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] Reference is made to commonly assigned copending patent application Docket No. F-290 filed herewith entitled “Method For Embedding Information In An Image” in the names of Claude Zeller, Robert A. Cordery, Donald G. Mackay and William A. Brosseau; and Docket No. F-417 filed herewith entitled “Method For Utilizing A Fragile Watermark For Enhanced Security” in the names of Claude Zeller, Donald G. Mackay, William Kilmartin, William A. Brosseau, James Euchner and Robert A. Cordery (Docket No. F-417 claims the benefit of the filing date of U.S. Provisional Application No. 60/283,565 filed Apr. 13, 2001, which is owned by the assignee of the present Application).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60283565 |
Apr 2001 |
US |