2003. május 6.Digital watermark1 Alfréd Rényi Institute of Mathematics  László Csirmaz  Gyula Katona  Dezső Miklós  Tibor Nemetz HP ( Compaq )  László.

Slides:



Advertisements
Similar presentations
Chapter 6 Storage and Multimedia
Advertisements

COMPUTERS: TOOLS FOR AN INFORMATION AGE Chapter 5 Input and Output.
AQA INFO 1 SECTION 4 Selection & Use of Input devices and media tcowling 2009 from Mott, Leaming & Williams.
E – Electors P – Photo I - Identity C - Card. EPIC Identity card issued by ERO under rule 28, RER is Permanent document for an elector Used at time of.
Handmade Card Making. Step 1 Choose your paper. You will need at least one piece of card stock to form the body of the card, but gluing on other pieces.
devices... Inputs and Output Keyboard The commonest way to enter data into a computer. Each key is simply a switch, which when pressed, results in a.
ECE 5367 – Presentation Prepared by: Adnan Khan Pulin Patel
1 Ultimate in Card Security Enhancing the Security of RFID/Smart Cards using Secure OVD Detection 94 Old Camplain Road Hillsborough NJ
Input & Output Devices ASHIMA KALRA.
Digital Photography By Mike Volker. What is Digital Photography? A form of Photography that uses digital technology to make images of subjects Replaced.
Input to the Computer * Input * Keyboard * Pointing Devices
Pin hole Photograph. WHAT WE DID Photo Paper + Can with a hole + light + Chemicals = An Image.
1 Introduction to Computers Day 2. 2 Input Devices Input devices are used to feed data and instructions to the computer systems.They consist of a range.
EXAMPLE 5 Simplify a mathematical model Digital Photo Printing You send 15 digital images to a printing service that charges $. 80 per print in large format.
Images you see on your screen are made up of these things called pixels. A screen will show over 1 million pixels and then a computer has to do what it.
GCSE Information Technology Input Devices and Methods Objectives:  To understand what input devices are.  Identify their individual uses  Be able to.
Peripherals and Storage Looking at: Scanners Printers Why do we need storage devices anyway? What are magnetic disks? How do magnetic disks physically.
Chapter 2 – Coputer Hardware
IT Introduction to Information Technology CHAPTER 05 - INPUT.
Chapter 10: Authentication Guide to Computer Network Security.
Lesson 4: Input and Output Digital Photography MITSAA IAP 2002 Rob Zehner.
Digital Imaging Systems –I/O. Workflow of digital imaging Two Competing imaging format for motion pictures Film vs Digital Video( TV) Presentation of.
OCR GCSE ICT DATA CAPTURE METHODS. LESSON OVERVIEW In this lesson you will learn about the various methods of capturing data.
 Optical Scanners Optical Scanners  Scanners Scanners  Electronic Tablet/Pen Electronic Tablet/Pen  Digital Camera Digital Camera  Webcam Webcam.
Input and Output Devices - Inputs
Capture your favorite image Done by: ms.Hanan Albarigi.
Input Devices Manual and Automatic By Laura and Gracie.
How A Camera Works Image Sensor Shutter Mirror Lens.
Yat Li Department of Chemistry & Biochemistry University of California, Santa Cruz CHEM 146C_Experiment #7 Soft Lithography: Patterning.
History of Photography WC Tech Club. Photography Photography took several hundred years to reach it’s present state. No one person can be credited with.
LIGHT SHADOW AND REFLECTION
DATA COLLECTION METHODS CONTENT PAGE How data is collected via questionnaires. How data is collected via questionnaires. How data is collected with mark.
Biometrics The Password You’ll Never Forget Shadi Azoum & Roy Donaldson CIS 4360 – Introduction to Computer Security.
Data Capture F451 - AS Computing. Data and Information Data –Raw Facts and Figures –No structure or context Information –Structured, Organised Data –Processed.
CHEMISTRY 1000 Topics of Interest #4: Organic Electronics on Banknotes.
Computing and the Web Databases: Controlling the Information Deluge.
What are Output Devices An output device is any piece of computer hardware equipment used to communicate the results of data processing carried out by.
12.4 Essential Questions How is a hologram made? When does total internal reflection occur? How are optical fibers used? Using Light Copyright © McGraw-Hill.
DIGITAL CAMERAS Prof Oakes. Overview Camera history Digital Cameras/Digital Images Image Capture Image Display Frame Rate Progressive and Interlaced scans.
Iris Scanning By, rahul vijay 1. Introduction  Biometrics provides a secure method of authentication and identification.  Biometric identification utilises.
K.B.H.POLYTECHNIC,MALEGAON CAMP, MALEGAON. Computer Hardware & Maintenance. S.Y.C.M/I.F Guided By :- Mr.K.S.Pawar. Lecturer in Computer Department.
Specialized Input Devices
Graphics, Digital Media and Multimedia Mariangela Reyes de los Santos#19 Francisco Mariano Brandi Frausto#3 Priscila Chapa#4 Andrea González García#11.
Light always travel in a STRAIGHT line. A luminous object radiates light in ALL directions.
There are two types of keyboards: Alphanumeric Special Function Alphanumeric, the most common type of keyboard contains 101 to 105 keys, however all keyboards.
Computer Components Part #2 – Input and Output. Let’s Review.
Printing Processes Including commercial digital printing KS4 Graphics.
 A PCB is printed circuit board, also known as a printed wiring board. It is used in electronics to build electronic devices. A PCB serves 2 purposes.
The Big Picture Things to think about What different ways are there to collect information automatically? What are the advantages and disadvantages of.
Input & Output Devices ASHIMA KALRA.
Printer Types Ball Printer-Impact type- Uses a round ball with raised characters. Chain Printer- Impact Type- Uses a character slug attached to a chain.
DATA COLLECTION Data Collection Data Verification and Validation.
Input and Output Devices
The history of camera Prepared by Olga Sokolova Form 11-А.
ERT247 GEOMATICS ENGINEERING
Business Document Platform
Principles of Information Technology
EXAMPLE 5 Simplify a mathematical model Digital Photo Printing
Introduction to Computers
Business Computer Technology
Section 4: Using Light Light can be used to form three-dimensional images and to transmit information in optical fibers. K What I Know W What I Want to.
OCR GCSE ICT Data capture methods.
What is Input "Any data or instruction that is entered into a computer is called input". This data or instruction can come directly from end user or.
How the Biometrics Works
SOLUTION ID CARDS AND DRIVER’S LICENSES
LITHOGRAPHY Lithography is the process of imprinting a geometric pattern from a mask onto a thin layer of material called a resist which is a radiation.
Data Capture F451 - AS Computing.
EYES OF A COMPUTER Autorem materiálu a všech jeho částí, není-li uvedeno jinak, je Zuzana Strnadlová. Dostupné z Metodického portálu ISSN: 
Chapter 14: Light Section 4: Using Light
Chapter 17 Reflection Homework: Read Section 1, pp. Reflection:
Presentation transcript:

2003. május 6.Digital watermark1 Alfréd Rényi Institute of Mathematics  László Csirmaz  Gyula Katona  Dezső Miklós  Tibor Nemetz HP ( Compaq )  László Marsovsky  Attila Haraszti Drótposta Ltd.

2003. május 6.Digital watermark2 The problem  Current method of identifying legal or high value documents: Producing complicated patterns via printing technology (e.g. banknotes) Producing complicated patterns via printing technology (e.g. banknotes) Applying holographic markers (e.g. tax stamps) Applying holographic markers (e.g. tax stamps) Specially prepared medium (e.g. embedding metal strips into paper) Specially prepared medium (e.g. embedding metal strips into paper)  At the present time, the most common technique of authentication uses serial numbers or in general alphanumerical strings, rarely combined with pictograms. These can be copied or falsely created. We need a cheap automated solution!

2003. május 6.Digital watermark3 The promise  Finding a cheap solution (mark) of identifying legal documents (bank cards, banknotes, stock certificates), which is: Unique Unique Very difficult or expensive to copy or duplicate Very difficult or expensive to copy or duplicate Can be measured and processed quickly Can be measured and processed quickly A couple of hundred bits can be generated as a check code A couple of hundred bits can be generated as a check code  Goal: An unforgeable, unique physical identifying mark An unforgeable, unique physical identifying mark A cheap device for reading the mark A cheap device for reading the mark An algorithm making a unique and short ( bits long) extract from the picture An algorithm making a unique and short ( bits long) extract from the picture

2003. május 6.Digital watermark4 Previous achievements Different surfaces – that are actually difficult to copy, but often expensive – are measured, and the results are stored in a central database. The results of the control measurement are compared to the stored data.

2003. május 6.Digital watermark5 Novelties  We do not store results  The mark is cheap, but difficult to copy  IT WORKS

2003. május 6.Digital watermark6 The mark

2003. május 6.Digital watermark7 The reading device

2003. május 6.Digital watermark8 The method  A three-dimensional thin layer, a small mark – which is very difficult or expensive to copy or duplicate – is inseparably attached to the object. This small mark will contain randomly positioned small objects.  Using digital imaging technology we test a photograph of the object, to see that the mark is 3 dimensional, and not just a 2 dimensional copy of a 3 dimensional object.  Using different mathematical algorithms we generate a unique number (check-code), which can clearly identify the object.

2003. május 6.Digital watermark9 The material Into a thin (typically mm thick), translucent layer without a light reflecting coating small objects (e.g. glass beads) are embedded. Thin film mm Small (5-20 micrometer) glass beads (balls) coated or not

2003. május 6.Digital watermark10 Unforgeable Photos taken in diffuse and direct light

2003. május 6.Digital watermark11 Results  The mark is very cheap, as we use a material available anywhere, the price could be around 2-3 cents.  The measuring device is a WEB cam with special optics, which costs 200$-300$  The stability of the ”code” is excellent. All measurement was in a tolerance of one digit. (plus, minus one pixel!)  The measurement time with non-optimized code is around 10 seconds.  We have developed a method, which does not require storing the code and checking the Hamming distance, but regenerates the code every time on line, using a small piece of redundant information, like a PIN code.