Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method to log whether a known document image has been used by a system

IP.com Disclosure Number: IPCOM000033688D
Publication Date: 2004-Dec-23
Document File: 1 page(s) / 24K

Publishing Venue

The IP.com Prior Art Database

Abstract

This invention is an application of US 6687385, "Method for steganographic encoding." For each document image that passes through a system, a function is estimated that maps the document image to a message. The function alone cannot be used to determine the message nor the image with which it was derived. Each document image produces a unique function and that function is archived for each image. The message may contain a machine or software serial number, a time stamp, or a user id. At some point, when one wants to know whether a given system component was used on a known image, each function in the archive is applied to the image and the one generating a message is considered a "hit."

This text was extracted from a Microsoft Word document.
This is the abbreviated version, containing approximately 56% of the total text.

Method to log whether a known document image has been used by a system

In a secure document imaging system, it may be useful to know whether a known document has passed through that system. This would allow a trace of a document's history.  It is also useful to protect customer's privacy by storing only information that alone could not reconstruct the document's content.

This invention is an application of US 6687385, "Method for steganographic encoding."  For each document image that passes through a system, a function is estimated that maps the document image to a message.  The function alone cannot be used to determine the message nor the image with which it was derived.  Each document image produces a unique function and that function is archived for each image.  The message may contain a machine or software serial number, a time stamp, or a user id.  At some point, when one wants to know whether a given system component was used on a known image, each function in the archive is applied to the image and the one generating a message is considered a "hit."

US 6687385 describes a method for generating a function f from an image I to a message M.  Each I and M would generate a f unique to that I and M.  Function f alone cannot be used to reconstruct I or M -- only f applied to I yields M.  Application of f to I or a slightly distorted version of I also produces M.

Function f is determined statistically.  In the current embodiment, it is an over-trained tree structu...