Browse Prior Art Database

Method to log whether a known document image has been used by a system

IP.com Disclosure Number: IPCOM000129235D
Publication Date: 2005-Oct-03
Document File: 1 page(s) / 26K

Publishing Venue

The IP.com Prior Art Database

Abstract

In a secure document imaging system, it may be useful to know whether a known document has passed through that system. This would allow a trace of a document's history. It is also useful to protect customer's privacy by storing that information that alone could not reconstruct the document's content. This invention is an application of US 6687385, "Method for Steganographic Encoding." For each document image that passes through a system, a function is estimated that maps the document image to a message. The function alone cannot be used to determine the message nor the image with which it was derived. Each document image produces a unique function and that function is archived for each image. The message may contain a machine or software serial number, a time stamp, or user id. At some point, when one wants to know whether a given system component was used on a known image, each function in the archive is applied to the image and the one generating a message is considered a "hit."

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 55% of the total text.

Method to log whether a known document image has been used by a system

In a secure document imaging system, it may be useful to know whether a known document has passed through that system.  This would allow a trace of a document's history.  It is also useful to protect customer's privacy by storing that information that alone could not reconstruct the document's content.

This invention is an application of US 6687385, "Method for Steganographic Encoding."  For each document image that passes through a system, a function is estimated that maps the document image to a message.  The function alone cannot be used to determine the message nor the image with which it was derived.  Each document image produces a unique function and that function is archived for each image.  The message may contain a machine or software serial number, a time stamp, or user id.  At some point, when one wants to know whether a given system component was used on a known image, each function in the archive is applied to the image and the one generating a message is considered a "hit."

US

6687385, "Method for Steganographic Encoding” describes a method for generating a function x from an image I to a message M.  Each I and M would generate a x unique to that I and M.  Function x alone cannot be used to reconstruct I or M -- only x applied to I yields M.  Application of x to I or a slightly distorted version of I also produces M. 

Function x is determined statistically.  In the current embo...