Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_9dda2fd1d526f27aca30ba6dda8a419f |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N2201-3284 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N2201-3271 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N2201-3263 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N2201-3266 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N2201-3281 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06T2201-0081 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N2201-3269 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06T2201-0065 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06T1-0042 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N1-32154 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F18-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G09C5-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04N1-32309 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F7-02 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06T1-005 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04N1-387 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04N1-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06T1-00 |
filingDate |
2007-02-22-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_2d1c3454d866232d0f7fb2027e8743c8 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_9d6a9e80f16b36a271467e47cf82bf86 |
publicationDate |
2007-08-02-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
JP-2007195213-A |
titleOfInvention |
An improved technique for detecting, analyzing and using visible authentication patterns |
abstract |
A method for identifying a position of a copy detection pattern which is a visible authentication pattern is provided. Techniques for including a message in a copy detection pattern without altering the entropy of the copy detection pattern and reading the message, using the copy detection pattern on the analog form, the analog form of which is the original analog form Techniques for determining whether an analog copy detection pattern is without reference to the original digital representation of the analog copy detection pattern, the sensitivity of copy detection using the copy detection pattern, and the two copy detection patterns being compared Techniques to enhance one of the above by incorporating modifications resulting from the copy process, techniques to distribute the copy detection pattern throughout the document, and to locate the copy detection pattern using copy detection pattern entropy Including various techniques. [Selection] Figure 1 |
priorityDate |
2004-01-06-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |