24 research outputs found

    Estimating toner usage with laser electrophotographic printers, and object map generation from raster input image

    Get PDF
    Accurate estimation of toner usage is an area of on-going importance for laser, electrophotographic (EP) printers. In Part 1, we propose a new two-stage approach in which we first predict on a pixel-by-pixel basis, the absorptance from printed and scanned pages. We then form a weighted sum of these pixel values to predict overall toner usage on the printed page. The weights are chosen by least-squares regression to toner usage measured with a set of printed test pages. Our two-stage predictor significantly outperforms existing methods that are based on a simple pixel counting strategy in terms of both accuracy and robustness of the predictions.^ In Part 2, we describe a raster-input-based object map generation algorithm (OMGA) for laser, electrophotographic (EP) printers. The object map is utilized in the object-oriented halftoning approach, where different halftone screens and color maps are applied to different types of objects on the page in order to improve the overall printing quality. The OMGA generates object map from the raster input directly. It solves problems such as the object map obtained from the page description language (PDL) is incorrect, and an initial object map is unavailable from the processing pipeline. A new imaging pipeline for the laser EP printer incorporating both the OMGA and the object-oriented halftoning approach is proposed. The OMGA is a segmentation-based classification approach. It first detects objects according to the edge information, and then classifies the objects by analyzing the feature values extracted from the contour and the interior of each object. The OMGA is designed to be hardware-friendly, and can be implemented within two passes through the input document

    2D Color Code Interference Cancellation by Super Imposing Methodology

    Get PDF
    Abstract-Today the 2-D barcodes have become more popular for information embedding. To encode information with high spatial density while ensuring robust reading by an optical system is the main goal of a barcode system. To enhance the density of information, different ink colors could be used. A High Capacity Color Barcode framework is proposed by exploiting the spectral diversity afforded by the Cyan, Magenta, Yellow print colorant channels and the complimentary Red, Green and Blue channels, respectively, used for capturing color images. Here a three-fold increase in the data rate is achieved by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complimentary R, G, and B channels captured via a mobile phone camera. This paper presents a framework of color barcode for mobile phone applications by exploiting the spectral diversity afforded by the cyan (C), magenta (M), and yellow (Y) print colorant channels which is more commonly used for color printing and the complementary in order to red (R), green (G), and blue (B) channels, respectively, used for capturing color images. In this paper the system exploit this spectral diversity to understand three-fold increase in the data rate by encoding independent data in the C, M, and Y print colorant channels and decoding the data from the complementary R, G, and B channels captured via a mobile phone camera. To mitigate the effect of cross-channel interference among the print colorant and capture color channels, the system develops an algorithm for interference cancellation which is based on a physically-motivated mathematical model for the print and capture processes. To collect the model parameters which are necessary for cross-channel interference cancellation, this scheme proposes a super imposing methodology. Experimental result clears that the scheme framework successfully overcomes the impact of the color interference, providing a low bit error rate and a high decoding rate for each of the colorant channels when used with a corresponding error correction scheme

    Design of data validation solutions using high density 2D colored codes and a (2,2) xor-based color interference visual cryptography scheme

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2018.A validação de dados nos sistemas de informação utiliza majoritariamente algoritmos criptográficos em sistemas que, geralmente, não utilizam materiais não eletrônicos como parte da infraestrutura do criptossistema. Nesse trabalho, foram desenvolvidos dois sistemas de armazenamento e recuperação de dados através da proposta de uma nova tecnologia de códigos de barra colorido bidimensional e de um novo esquema de criptografia visual. Os códigos de barras bidimensionais têm sido amplamente estudados, mas ainda continuam sem contar com um padrão que consiga transmitir alta quantidade de informação em pequenos espaços impressos. As aplicações desse modelo de transmissão tem como motivação a necessidade de armazenar (e recuperar) uma alta quantidade de informação em pequenas áreas impressas, como por exemplo, para utilização de dados criptográficos que sejam processados sem conexão e armazenados em pequenos espaços impressos, como os de caixas de remédios ou caixas de cigarros. O código de barras colorido 2D proposto nesse trabalho é chamado de High Density 2 Dimensional Code (HD2DC) e possui 8 diferentes tamanhos. O HD2DC permite a utilização de 5 ou 8 cores em cada tamanho e conta com o algoritmo de correção de erro Reed-Solomon com 3 diferentes níveis (10%, 20% e 30%). O HD2DC foi desenvolvido com o objetivo de ser um padrão de código de barras colorido 2D para operações de transmissão de grande quantidade de informações em pequenas ou médias áreas de impressão. Criptografia visual é uma técnica que cifra uma imagem secreta em duas ou mais imagens chave. A decodificação de qualquer esquema de criptografia visual depende do sistema visual humano e a maioria das propostas existentes consideram para a decodificação a utilização da sobreposição de duas ou mais lâminas físicas com n x n (n ≥ 2) pixels expandidos. O esquema de criptografia visual proposto nesse trabalho considera a utilização de duas imagens. A primeira é uma lâmina física feita por uma impressão colorida em Policloreto de Polivinila (PVC) transparente de 3 milímetros, enquanto que a segunda é uma imagem colorida apresentada na tela do visor de um smartphone. Ambas as imagens não geram expansão de pixels. A obtenção das melhores cores utilizadas nesse criptossistema foi realizada através de estudos físicos do comportamento da interferência de cor entre a tela do smartphone e a cor utilizada na impressão do PVC transparente. Essa nova proposta possui um alto nível de usabilidade para validação de dados em transações eletrônicas e conta com um custo muito baixo de implementação. Um sistema robusto de validação de dados é criado quando é combinada a criptografia visual proposta com o HD2DC. O HD2DC tem a capacidade de armazenar uma das imagens chave, no caso a que deve ser mostrada no visor do celular, essa arquitetura de codificação aumenta a percepção de segurança e explora a usabilidade do celular por meio da utilização da câmera e da tela como ferramentas para mostrar a imagem cifrada da criptografia visual.Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)Digital data validation generally requires that algorithms are ran into on cryptographic systems that, usually, do not use non-electronic devices as part of their information security infrastructure. This work presents two information storage and retrieval systems: a new colored two-dimensional barcode technology and a novel visual cryptography scheme. Two-dimensional barcodes have been a topic of research for several decades, but there is still no standard that stores and retrieves high amounts of data. Recently, new requirements have been imposed on applications that use 2D barcodes as a communication channel, such as the capability of storing information into a small printed area. This particular requirement is specially important for 2D barcodes that store cryptographic primitives to be processed off-line. This is the case of barcodes in products like cigarettes and medicines, which are used for data validation and product verification. The proposed 2D colored barcode is called High Density Two-Dimensional Code (HD2DC) and is currently one of the 2D barcodes with the highest data density. HD2DC can be generated in 8 different sizes, with 5 or 8 colors. To increase robustness, the system uses a Reed-Solomon error correction algorithm with 3 different levels: Low, Medium and High, which provide approximately 10%, 20% and 30% error correction, respectively. Visual cryptography (VC) is a technique that encodes the content of a secret image into two or more images, which are called shares. These shares are printed on transparencies and superimposed (requiring a good alignment) to reveal (visually) the original secret image, i.e. without requiring any computation. Current visual cryptography schemes use at least 2 shares (transparencies) as keys. With respect to the secret image size, most of these schemes produce a n x n (n ≥ 2) size expansion of the shares and the decoded image. The proposed Visual Cryptography scheme, on the other hand, uses two shares and does not require a size expansion. The first share is a colored film printed on a Polyvinyl Chloride (PVC) surface of 3 millimeters, while the second share is a colored image displayed on a smartphone or tablet. In this work, we performed a physical evaluation of the color interference properties of these two shares (the printed PVC transparency and the image displayed on the mobile device) to find the most adequate color space to be used in the proposed cryptosystem. We also propose a strong validation system combining our Xor-Based Visual Cryptography scheme with HD2DC. HD2DC has the capability of storing the share that is shown on the mobile device display. This encoding architecture enhances security perception and explores the mobile device usability, using its screen to display a Visual Cryptography share

    Image and Video Forensics

    Get PDF
    Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity

    Reflective-Physically Unclonable Function based System for Anti-Counterfeiting

    Get PDF
    Physically unclonable functions (PUF) are physical security mechanisms, which utilize inherent randomness in processes used to instantiate physical objects. In this dissertation, an extensive overview of the state of the art in implementations, accompanying definitions and their analysis is provided. The concept of the reflective-PUF is presented as a product security solution. The viability of the concept, its evaluation and the requirements of such a system is explored

    Detecting Forgery: Forensic Investigation of Documents

    Get PDF
    Detecting Forgery reveals the complete arsenal of forensic techniques used to detect forged handwriting and alterations in documents and to identify the authorship of disputed writings. Joe Nickell looks at famous cases such as Clifford Irving\u27s autobiography of Howard Hughes and the Mormon papers of document dealer Mark Hoffman, as well as cases involving works of art. Detecting Forgery is a fascinating introduction to the growing field of forensic document examination and forgery detection. Seldom does a book about forgery come along containing depth of subject matter in addition to presenting clear and understandable information. This book has both, plus a readability that is accessible to those studying questioned documents as well as seasoned experts. -- Journal of Forensic Identification The author\u27s expertise in historical documents is unmistakably evident throughout the book. Once I began reading, I found it hard to put down. -- Journal of Questioned Document Examination Guides the reader through various methods and techniques of identifying fakes and phone manuscripts. -- Manchester (KY) Enterprisehttps://uknowledge.uky.edu/upk_legal_studies/1000/thumbnail.jp

    New authentication applications in the protection of caller ID and banknote

    Get PDF
    In the era of computers and the Internet, where almost everything is interconnected, authentication plays a crucial role in safeguarding online and offline data. As authentication systems face continuous testing from advanced attacking techniques and tools, the need for evolving authentication technology becomes imperative. In this thesis, we study attacks on authentication systems and propose countermeasures. Considering various nominated techniques, the thesis is divided into two parts. The first part introduces caller ID verification (CIV) protocol to address caller ID spoofing in telecommunication systems. This kind of attack usually follows fraud, which not only inflicts financial losses on victims but also reduces public trust in the telephone system. We propose CIV to authenticate the caller ID based on a challenge-response process. We show that spoofing can be leveraged, in conjunction with dual tone multi-frequency (DTMF), to efficiently implement the challenge-response process, i.e., using spoofing to fight against spoofing. We conduct extensive experiments showing that our solution can work reliably across the legacy and new telephony systems, including landline, cellular and Internet protocol (IP) network, without the cooperation of telecom providers. In the second part, we present polymer substrate fingerprinting (PSF) as a method to combat counterfeiting of banknotes in the financial area. Our technique is built on the observation that the opacity coating leaves uneven thickness in the polymer substrate, resulting in random translucent patterns when a polymer banknote is back-lit by a light source. With extensive experiments, we show that our method can reliably authenticate banknotes and is robust against rough daily handling of banknotes. Furthermore, we show that the extracted fingerprints are extremely scalable to identify every polymer note circulated globally. Our method ensures that even when counterfeiters have procured the same printing equipment and ink as used by a legitimate government, counterfeiting banknotes remains infeasible

    ИНТЕЛЛЕКТУАЛЬНЫЙ числовым программным ДЛЯ MIMD-компьютер

    Get PDF
    For most scientific and engineering problems simulated on computers the solving of problems of the computational mathematics with approximately given initial data constitutes an intermediate or a final stage. Basic problems of the computational mathematics include the investigating and solving of linear algebraic systems, evaluating of eigenvalues and eigenvectors of matrices, the solving of systems of non-linear equations, numerical integration of initial- value problems for systems of ordinary differential equations.Для більшості наукових та інженерних задач моделювання на ЕОМ рішення задач обчислювальної математики з наближено заданими вихідними даними складає проміжний або остаточний етап. Основні проблеми обчислювальної математики відносяться дослідження і рішення лінійних алгебраїчних систем оцінки власних значень і власних векторів матриць, рішення систем нелінійних рівнянь, чисельного інтегрування початково задач для систем звичайних диференціальних рівнянь.Для большинства научных и инженерных задач моделирования на ЭВМ решение задач вычислительной математики с приближенно заданным исходным данным составляет промежуточный или окончательный этап. Основные проблемы вычислительной математики относятся исследования и решения линейных алгебраических систем оценки собственных значений и собственных векторов матриц, решение систем нелинейных уравнений, численного интегрирования начально задач для систем обыкновенных дифференциальных уравнений

    The Trace of Everyday Life: The Interpretation of Déjà vu in Fine Art Practice

    Full text link
    This practice-based research project investigates the use of déjà vu as an artistic strategy of ‘affect’, in relation to the spatial and temporal displacement associated with déjà vu and the unheimlich (i.e. uncanny/ unhomely). My practice, and its theoretical contextualisation, address ideas that are manifest in the philosophical and psychological literature on the connection between déjà vu and the unheimlich, particularly in relationship to Vernon M. Neppe’s definition of déjà vu and the Freudian uncanny concept. My specific focus is on displacement associated with being away from home. Although various artists have likewise engaged experiences of déjà vu, the unheimlich, their works tend to address emotions connected to fear, which relate to the idea of death or what we have lost. However, Alan S. Brown’s research of déjà vu emphasises the memory aspect of such experiences, while the explanations of Anne M. Cleary and Nikhil Shamapant investigate how déjà vu can be aroused by matching the current visual stimulus with a similar one in memory. Nicholas Royle argues that the uncanny is a mixture of familiarity and unfamiliarity, which has opened new insights that will be followed in this thesis. My use of déjà vu and the unheimlich aims to shed light into the process of exploring the continuity of home, such that déjà vu and the unheimlich can be perceived as a peculiar combination of feeling familiar and yet unfamiliar. Within the previous situation of lockdown due to COVID-19 on a global scale, the unheimlich becomes more ubiquitous through forced confinement. My research evolved during two periods of quarantine that I experienced respectively in March and September 2020. The first experience was when I was required to quarantine at my (familiar) parents’ home after arriving back in China; the second was the time after I returned to London from China and had to quarantine again in my new (unfamiliar) dwelling place. Such experiences helped me to focus more acutely on what déjà vu and the unheimlich might be in these different dwelling environments. In particular, I address my understanding from two directions in my practice: on the one hand, I use the silhouette image of everyday objects, and transparent figures in my drawing, as the metaphors for a state of ‘ghosting’ to discuss the unheimlich through the issue of absence and presence; on the other hand, I depict the changes of my perception about the composition during the process of settling down in a new dwelling space to explore the unheimlich and déjà vu (i.e. the setting of furniture and everyday objects to show a psychological change from feeling strange to familiar, or a sense of being at home). And later, the experience of moving to a new dwelling space almost in the same area in London in 2021 was also included in this study to continue my exploration. These experiences will be explored through material processes of making and contrasting my work to other practitioners such as Rachel Whiteread and Do Ho Suh. Through the process of making and exhibiting these artworks, and through the investigation of a sense of continuity of home, the meaning of special objects, and the issue of absence, presence and displacement, the research provides a new way of insights into the constructive role of déjà vu and the unheimlich within fine art perspective
    corecore